# Artefacts overview

**Windows DFIR notes are no longer maintained on InfoSec-Notes. Updated versions can be found on:** [**artefacts.help**](https://artefacts.help/)**.**

### General

| Name            | Type    | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | Location                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | Tool(s)                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  |
| --------------- | ------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| `Event Tracing` | General | <p>Overall system usage: Accounts authentication successes and failures, local accounts and groups management, Windows Services or scheduled tasks operations, PowerShell activity, etc.<br><br>Various events of forensic interest across multiple providers are referenced in the present overview.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     | <p><code>Event Tracing</code> is broken into three distinct components:<br>- <code>Controllers</code>: start and stop an event <code>tracing session</code> and enable <code>providers</code>.<br>- <code>Providers</code>: provide the events.<br>- <code>Consumers</code>: consume the events in real time.<br><br>Events can eventually be written to event log <code>channels</code> (assimilable to the log file names), <code>event tracing</code> log files, or both. The provider itself defines the event log <code>channel(s)</code> to which events should be written (trough its <a href="https://learn.microsoft.com/en-us/windows/win32/wes/defining-channels">"instrumentation manifest" for manifested-based providers</a>). Providers can define new <code>channels</code> or import existing <code>channels</code>. While the provider may use different <code>channels</code> for different events, each event can only be written to a single <code>channel</code> (as specified in the event's <code>event element</code> in the instrumentation manifest). If no <code>channel</code> is defined for a given event, the event will not be written to an event log channel, but can still be consumed (in memory) by a consumer through a <code>trace session</code>.<br><br>Event <code>trace sessions</code> record events by subscribing to one or more <code>providers</code> and may write to a log file. Events can only be written to one <code>channel</code> at a time, but can also be collected by up to 7 <code>trace sessions</code>.<br><br><code>Security</code>, <code>System</code>, and <code>Application</code> are legacy <code>channels</code>. Only the <code>LSASS</code> process can write to the <code>Security</code> channel.<br><br>Four types of channels are supported: <code>Admin</code>, <code>Operational</code>, <code>Analytic</code>, and <code>Debug</code>.<br><br><code>Provider</code> example: <code>Microsoft-Windows-TerminalServices-RemoteConnectionManager</code>.<br>Associated <code>channel</code> example: <code>Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational</code>.</p>                                                   | <p>Default location for <code>EVTX</code> files:<br><code>%SystemRoot%\System32\winevt\Logs\*</code><br><br>Lists the system's provider:<br><code>logman.exe query providers</code><br><br>Retrieves information about a provider, including its channel and the process sending events to it:<br><code>logman.exe query providers "\<PROVIDER\_NAME>"</code><br><br>Lists the providers the specified process emit evnets to:<br><code>logman query providers -pid \<PID></code><br><br>List the available <code>channels</code> and their associated event counts:<br><code>Get-WinEvent -ListLog \*</code></p> | <p>Tools for analyzing <code>EVTX</code> files:<br><br>- <code>Event Viewer</code>: Windows built-in <code>GUI</code> events viewer utility.<br><br>- <code>Event Log Explorer</code>: Proprietary <code>GUI</code> events viewer utility.<br><br>- <code>LogParser</code>: to conduct <code>SQL</code>-like queries on <code>EVTX files</code>. Notable <code>KAPE</code> modules available that leverage <code>LogParser</code>: <code>LogParser\_LogonLogoffEvents</code>, <code>LogParser\_RDPUsageEvents</code>, and <code>LogParser\_DetailedNetworkShareAccess</code>.<br><br>- <code>Winlogbeat</code>: to parse <code>EVTX</code> into JSON or to ship them to <code>ELK</code>.<br><br>- <code>EvtxECmd</code>: Utility to parse <code>EVTX</code> into CSV, JSON, or XML outputs (without doing a per fields extract however).<br><br>- <a href="https://github.com/WithSecureLabs/chainsaw"><code>Chainsaw</code></a>: Rust utility to parse and extract key information from <code>EVTX</code> files (notably with the use of <code>Sigma</code> rules).<br><br>- <a href="https://github.com/Yamato-Security/hayabusa"><code>Hayabusa</code></a>: Rust utility to parse and extract key information from <code>EVTX</code> files in the form of a timeline (notably with the use of <code>Sigma</code> rules).<br><br><code>Velociraptor</code>: with modules dedicated to event logs analysis (such as <code>Windows.EventLogs.CondensedAccountUsage</code>, <code>Windows.EventLogs.Chainsaw</code>, <code>Windows.EventLogs.Hayabusa</code>, etc.).</p> |
| Registry hives  | General | <p>Registry hives are system-wide or per users hierarchical databases used by the Windows operating system, and third-party applications, to store information.<br><br>A registry hive is a group of keys, subkeys, and values in the registry, with supporting file(s) on disk. Registry hives are loaded in memory upon system boot or user logon from their associated files on disk.<br><br>Before being written / committed to a file on disk, registry modifications can be written to <code>Registry Transaction logs</code> (notably if the hives cannot be written to directly due to locking). <code>Transaction logs</code> are files named, and stored in the same directory, as their corresponding registry hives. Such as <code>SYSTEM.LOG1</code> and <code>SYSTEM.LOG2</code> for the <code>SYSTEM</code> registry file.</p> | <p>The system-wide registry hives are stored in the <code>HKEY\_LOCAL\_MACHINE</code> (<code>HKLM</code>) hive. The following notable system-wide root keys are defined:<br><br><code>HKEY\_LOCAL\_MACHINE\SYSTEM</code><br>File on disk: <code>%SystemRoot%\System32\config\SYSTEM</code>.<br><br><code>HKEY\_LOCAL\_MACHINE\SOFTWARE</code><br>File on disk: <code>%SystemRoot%\System32\config\SOFTWARE</code>.<br><br><code>HKEY\_LOCAL\_MACHINE\SECURITY</code><br>File on disk: <code>%SystemRoot%\System32\config\SECURITY</code>.<br><br><code>HKEY\_LOCAL\_MACHINE\SAM</code><br>File on disk: <code>%SystemRoot%\System32\config\SAM</code>.<br><br><code>HKEY\_USERS</code><br>Contains all the actively loaded user profile registry hives on the computer. The <code>.DEFAULT</code> key is populated from the <code>%SystemRoot%\Users\Default\NTUSER.DAT</code> file.<br>File on disk: users' <code>NTUSER.dat</code> and <code>UsrClass.dat</code> files (of logon users).<br><br>The <code>SYSTEM</code>, <code>SOFTWARE</code>, <code>SECURITY</code>, and <code>SAM</code> registry hives used to be backed up periodically (every 10 days by default) under the <code>%SystemRoot%\System32\config\RegBack</code> folder by the <code>RegIdleBackup</code> scheduled task. Starting with the Windows 10 operating system, this mechanism is no longer in use and no registry hive backups are stored under the <code>RegBack</code> folder.<br><br><br>The user specific registry information are stored in the <code>HKEY\_CURRENT\_USER</code> (<code>HKCU</code>) root key.<br><br><code>HKEY\_CURRENT\_USER</code><br>File on disk <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br><code>HKEY\_CURRENT\_USER\SOFTWARE\Classes</code><br>File on disk <code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat</code><br><br><br><code>HKEY\_CLASSES\_ROOT</code><br>Define the programs and file extensions association.<br>Mapped to the keys <code>HKEY\_LOCAL\_MACHINE\SOFTWARE\Classes</code>, for default settings, and <code>HKEY\_CURRENT\_USER\SOFTWARE\Classes</code>, for user specific settings that override the default settings.</p> | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | <p><code>RegistryExplorer</code><br><br><code>RECmd</code><br><br><code>RegRipper</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             |

### System information

| Name                                                                                                            | Type               | Description                                                                                                                                                                                                                                                                                                                                                             | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        | Location                                                                                                                                                                                                                                                                                                                                                                    | Tool(s) |
| --------------------------------------------------------------------------------------------------------------- | ------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------- |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>ComputerName</code></p>                                               | System information | Name of the computer.                                                                                                                                                                                                                                                                                                                                                   | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName</code></p>                                                                                                                                                                                                                 |         |
| <p><code>HKLM\SOFTWARE</code><br>-<br><code>CurrentVersion</code> (<code>ProductName</code> value)</p>          | System information | Version and Service pack number of the Windows operting system.                                                                                                                                                                                                                                                                                                         | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemRoot%\System32\config\SOFTWARE</code><br>Registry key: <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion</code></p>                                                                                                                                                                                                                             |         |
| <p><code>HKLM\SYSTEM</code><br>-<br>Security <code>Policy</code></p>                                            | System information | <p>Basic information on the system:<br>- Computer name and <code>SID</code>.<br>- Computer's domain and domain <code>SID</code> (for domain-joined hosts).</p>                                                                                                                                                                                                          | <p>Registry keys under <code>HKLM\SECURITY\Policy</code>:<br><br>- <code>PolAcDmN</code>: computer name<br><br>- <code>PolAcDmS</code>: computer <code>SID</code><br><br>- <code>PolDnDDN</code>: computer's domain name<br><br>- <code>PolPrDmS</code>: computer's domain <code>SID</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     | File: `%SystemRoot%\System32\config\SECURITY`                                                                                                                                                                                                                                                                                                                               |         |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>TimeZoneInformation</code></p>                                        | System information | Time zone information.                                                                                                                                                                                                                                                                                                                                                  | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\System\CurrentControlSet\Control\TimeZoneInformation</code></p>                                                                                                                                                                                                                       |         |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>Select</code></p>                                                     | System information | <p><code>ControlSet</code> information for the <code>CurrentControlSet</code>, <code>ControlSet002</code>, ... registry keys:<br><br>- Current <code>ControlSet</code> pointed by the <code>CurrentControlSet</code> key.<br><br>- Last known good <code>ControlSet</code>.</p>                                                                                         | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\SYSTEM\Select</code></p>                                                                                                                                                                                                                                                              |         |
| <p><code>HKLM\SYSTEM</code><br>-<br>Network interfaces (<code>Interfaces</code>)</p>                            | System information | <p>Basic information about network interfaces (interface name, associated IP address, default gateway, and DHCP lease and eventual domain).<br><br>Additional network information is available in the <code>NetworkList</code> registry key.</p>                                                                                                                        | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry keys: <code>HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\*</code></p>                                                                                                                                                                                                           |         |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>LanmanServer\Shares</code></p>                                        | System information | Network SMB shares hosted by the system.                                                                                                                                                                                                                                                                                                                                | <p>Each network share is associated with a <code>REG\_MULTI\_SZ</code> value.<br><br>The value is named from the network share name. The share name is also defined in the <code>ShareName</code> field of the registry value's data.<br><br>The share path on disk is defined in the in the <code>Path</code> field of the registry value's data.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares</code></p>                                                                                                                                                                                                                      |         |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>FirewallPolicy</code></p>                                             | System information | Windows local Firewall profiles (Public, Private, and Domain) status and configured rules.                                                                                                                                                                                                                                                                              | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\*</code></p>                                                                                                                                                                                                 |         |
| <p><code>HKLM\SOFTWARE</code> / <code>NTUSER</code><br>-<br>Installed applications (<code>App Paths</code>)</p> | System information | <p>Applications installed on the system, on a system-wide or per user basis.<br><br>The entries are mainly used by the Windows operating system for two purposes:<br><br>- Mapping an application file name to its executable full path.<br><br>- Pre-pending information to the <code>PATH</code> environment variable on a per-application and per-process basis.</p> | <p>Applications installed system-wide have their information written in the <code>HKLM\SOFTWARE</code> registry hive, while applications installed per user have their information written in the user <code>NTUSER</code> hive.<br><br>For each installed application the following notable information is available:<br><br>- File name and full file path of the application executable.<br><br>- Timestamp of installation.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | <p>For system-wide applications:<br>File:<br><code>%SystemRoot%\System32\config\SOFTWARE</code><br>Registry key: <code>Microsoft\Windows\CurrentVersion\App Paths</code><br><br>For per-user applications:<br>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\Software\Microsoft\Windows\CurrentVersion\App Paths</code></p> |         |
| <p><code>HKLM\SOFTWARE</code> / <code>NTUSER</code><br>-<br><code>Uninstall</code></p>                          | System information | Applications installed on the system, on a system-wide or per user basis, as displayed in the "Add or remove programs" of the Windows Control Panel / Settings.                                                                                                                                                                                                         | <p>Applications installed system-wide have their information written in the <code>HKLM\SOFTWARE</code> registry hive, while applications installed per user have their information written in the user <code>NTUSER</code> hive.<br><br>Each application installation data is defined in a dedicated subkey under <code>Uninstall</code>, identified by the application name.<br><br>For each installed application the following notable information is available:<br><br>- The application name.<br><br>- The application installation location, display icon (often based directly on the application main executable, thus giving the full path of the application main program), full path of the uninstaller.<br><br>- The date of the installation. The last write timestamp of the registry key can also be an indicator of when the application was installed (with better precision).<br><br>- The size of the applicationn.<br><br>- Various metadata on the application (provided by the application installer itself): version, publisher, ...</p>                                                                                                                                                                                                                                                                                                                                                                                                                     | <p>For system-wide applications:<br>File:<br><code>%SystemRoot%\System32\config\SOFTWARE</code><br>Registry key: <code>Microsoft\Windows\CurrentVersion\Uninstall</code><br><br>For per-user applications:<br>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall</code></p> |         |
| <p><code>HKLM\SYSTEM</code><br>-<br>Installed services (<code>Services</code>)</p>                              | System information | <p>Windows services installed on the system.<br><br>For more information:<br><a href="ttps_analysis/local_persistence">local persistence note</a>.</p>                                                                                                                                                                                                                  | <p>Each service configuration is defined in a dedicated subkey under <code>Services</code>, identified by the service name.<br><br>For each services, the following notable information is available (under the service name root key):<br><br>- Service name and display name.<br><br>- Services image path.<br><br>- The service type:<br><code>0x1</code>: Kernel driver<br><code>0x2</code> / <code>0x8</code>: file system driver<br><code>0x10</code>: standard Windows service that runs in a process by itself<br><code>0x20</code>: Windows service that can share a process with other services.<br><code>0x50</code>: "USER\_OWN\_PROCESS TEMPLATE"<br><code>0x60</code>: "USER\_SHARE\_PROCESS TEMPLATE"<br><code>0x110</code>: like <code>0x10</code> but can interact with users.<br><code>0x120</code>: like <code>0x20</code> but can interact with users.<br><br>- The service start mode:<br><code>0x0</code>: "Boot Start"<br><code>0x01</code>: "System Start"<br><code>0x02</code>: "Auto Start"<br><code>0x03</code>: "Manual"<br><code>0x04</code>: "Disabled"<br><br>- The Windows specific privileges required by the service (<code>SeImpersonatePrivilege</code>, <code>SeDebugPrivilege</code>, etc.). No privileges can be set, for exemple if the service runs as <code>NT AUTHORITY\SYSEM</code>.<br><br>The last write timestamp of the service name root key can be an indicator of when the specific service configuration was last modified.</p> | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\SYSTEM\CurrentControlSet\Services\&#x3C;SERVICE\_NAME></code></p>                                                                                                                                                                                                                     |         |
| <p><code>HKLM\SOFTWARE</code><br>-<br>Configured scheduled tasks (<code>Schedule\Taskcache</code>)</p>          | System information | <p>Scheduled tasks configured on the system as stored in the registry.<br><br>For more information:<br><a href="ttps_analysis/local_persistence">local persistence note</a>.</p>                                                                                                                                                                                        | <p>Each scheduled task configuration is defined in a dedicated subkey under <code>Schedule\Taskcache\Tasks</code>, identified by the task GUID.<br><br>For each tasks, the following notable information is available (under the task GUID root key):<br><br>- The task path.<br><br>- Some lifecycle timestamps of the task: created on, last start, and last stop.<br><br>- The task security descriptor (in <code>SDDL</code> notation).<br><br>- The task trigger(s) and action(s) in binary, non human readable format.<br><br>The mapping between a task name and its GUID can be done using the subkeys of the <code>Schedule\Taskcache\Tree</code> keys.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | <p>File: <code>%SystemRoot%\System32\config\SOFTWARE</code><br>Registry keys:<br><code>HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\Taskcache\Tasks</code><br><code>HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\Taskcache\Tree</code></p>                                                                                                      |         |
| Configured scheduled tasks (`Tasks` folder)                                                                     | System information | <p>Scheduled tasks configured on the system, as stored in tasks <code>XML</code> files.<br><br>For more information:<br><a href="ttps_analysis/local_persistence">local persistence note</a>.</p>                                                                                                                                                                       | <p>Each scheduled task configuration is defined in a <code>XML</code> file, eventually in an intermediate subfolder, under the <code>Tasks</code> folder.<br><br>For each tasks, the following notable information is available:<br><br>- The task name and GUID, in the task filename itself.<br><br>- The task description.<br><br>- The task trigger(s) and action(s) (executable / command to be executed and its parameters for instance) in human readable format.<br><br>- The task status (enabled / disabled).<br><br>- The additional parameters of the task (wake to run, execution timeout, ...).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p><code>Windows XP</code> / <code>Windows Server 2003</code> (<code>Task Scheduler 1.0</code>):<br><code>%SystemRoot%\Windows\Tasks</code><br><br>Starting from <code>Windows 7</code> / <code>Windows Server 2008</code> (<code>Task Scheduler 2.0</code>):<br><code>%SystemRoot%\Windows\System32\Tasks</code></p>                                                       |         |

### Filesystem

| Name                             | Type                       | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            | Location                                                                                                                                                                                                                                                                                   | Tool(s)                                                                                                               |
| -------------------------------- | -------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | --------------------------------------------------------------------------------------------------------------------- |
| `MFT`                            | Filesystem                 | <p>The <code>MFT</code>, filename <code>$MFT</code>, is the main element of any <code>NTFS</code> partition.<br><br>The <code>MFT</code> contains an entry for all existing files written on the partition. Deleted files that were once written on the partition may also still (temporally) have a record in the <code>MFT</code>.<br><br>The Partition Boot Sector <code>$Boot</code> metadata file, which starts at sector 0 and can be up to 16 sectors long, describes the basic <code>NTFS</code> volume information and indicates the location of the <code>$MFT</code>.<br><br>The <code>$MFTMirr</code> file is statically-located as the first entry in the <code>MFT</code> and contains the first 4 entries of the <code>MFT</code> (<code>MFT</code>, <code>$MFTMir</code>, <code>$LogFile</code>, and <code>$Volume</code>) as a recovery mechanism.<br><br>The <code>$Bitmap</code> file tracks the allocation status (allocated or unused) of the clusters of the volume. Each cluster is associated with a bit, set to <code>0x1</code> if the cluster is in use. Upon deletion of a non resident file, the <code>$Bitmap</code> file is updated to tag the cluster(s) associated with the file as free. The clusters are not overwritten during the deletion process, and the file data can thus be carved as long as the cluster(s) are not re-used.<br><br>For more information: <a href="_artefacts_overview/mft"><code>MFT</code> note</a>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                            | <p>Each file on an <code>NTFS</code> volume is represented in the <code>MFT</code> in a file record.<br><br>Small files and directories (typically 512 bytes or smaller), can be entirely contained within their associated <code>MFT</code> file record. These files are called <code>resident files</code>. Files larger than .<br><br>Directory records are stored within the master file table just like file records. Instead of data, directories contain index information.<br><br>A file record (<code>FILE0</code> data structure) notably includes:<br><br>- The filename.<br><br>- The file size.<br><br>- The file unique (under the <code>NTFS</code> volume) <code>Security ID</code> in the <code>$STANDARD\_INFORMATION</code> attribute.<br><br>- Two or three set of timestamps:<br><br>> The file creation, last modified, last accessed, last changed <code>SI</code> timestamps (<code>MACB</code>) in the <code>$STANDARD\_INFORMATION</code> attribute.<br><br>> The file creation, last modified, last accessed, last changed <code>FN</code> timestamps (<code>MACB</code>) in the <code>$FILE\_NAME</code> attribute. Two sets of <code>$FILE\_NAME</code> timestamps will be available for files with a short (<code>DOS</code>) and long filenames.<br><br>> For more information on Windows timestamps:<br><a href="_artefacts_overview/timestamps">Windows timestamps note</a>.<br><br>- File access permissions.<br><br>- One or multiple <code>DATA</code> attribute, that either contain the file data for <code>resident file</code> or reference the clusters of disk space where the file is stored for <code>nonresident file</code>.<br><br>- Whether the <code>file record</code> is in use. When a file is deleted from the volume, its associated <code>MFT</code> <code>file record</code> is set as no longer in use, but is not directly deleted during the file deletion process. Metadata information, and content for <code>MFT</code> resident files, can thus be retrieved for recently deleted files (as long as the <code>file record</code> is not overwritten by a new entry).</p> | `%SystemDrive%:\$MFT`                                                                                                                                                                                                                                                                      | `MFTECmd.exe`                                                                                                         |
| `$Secure`                        | Filesystem                 | <p>The <code>$Secure</code> file contains the <code>security descriptor</code> for all the files and folders on a <code>NTFS</code> volume.<br><br>The <code>security descriptors</code> are stored within the <code>$SDS</code> named data stream of the <code>$Secure</code> file. The <code>$Secure</code> file additionally defines two other named streams (<code>$SDH</code> and <code>$SII</code>) for lookup in the <code>$SDS</code> stream.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | <p>Each file or folder is referenced in the <code>$Secure</code> file with its volume-unique <code>Security ID</code> and <code>security descriptor</code>.<br><br>The <code>Security ID</code> of the file is referenced in the <code>MFT</code> file record associated with the file (in the <code>$STANDARD\_INFORMATION</code> attribute). While no metadata information are present in the <code>$Secure</code> file (only the file's <code>security descriptor</code>), the file's <code>Security ID</code> can be used to map the file's information / data from the <code>MFT</code> to its <code>security descriptor</code> in the <code>$Secure</code> file.<br><br><br>The <code>security descriptor</code> (<code>SECURITY\_DESCRIPTOR</code> data structure) references:<br><br>- The owner of the file (as a pointer to a <code>SID</code> structure).<br><br>- The access rights to the file in the <code>Discretionary Access Control List (DACL)</code> attribute.<br><br>- The audit rights that control how access is audited (which access will generate events) in the <code>System Access Control List (SACL)</code> attribute.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | `$Secure`                                                                                                                                                                                                                                                                                  | [`Secure2Csv`](https://github.com/jschicht/Secure2Csv)                                                                |
| `NTFS index attributes` (`$I30`) | Filesystem                 | <p>The <code>NTFS</code> <code>index attributes</code> are <code>MFT</code> attributes, of two distincts types, that index all the files / directories in a given directory (in a B-Tree data structure). Each directory contains one or more <code>index attributes</code>. The files and folders information displayed by the <code>Windows Explorer</code> are based on the index attribute(s) of the directory being accessed.<br><br>The entries (files or subdirectories) in a directory's <code>index attribute(s)</code> are stored as <code>index records</code> structures, with one dedicated record for every entry. The <code>index record</code> structure contains a <code>$FILE\_NAME</code> (<code>0x30</code>) attribute, in which are stored the information about the file or folder.<br><br>There is two types of <code>index attributes</code>:<br><br>- <code>$INDEX\_ROOT</code>: for directories with a small number of entries. The <code>$INDEX\_ROOT</code> attribute is always resident to the <code>MFT</code> and contains a small list of <code>index records</code>. A directory has at most one <code>$INDEX\_ROOT</code> attribute.<br><br>- <code>$INDEX\_ALLOCATION</code>: additional structure for larger directories, with no limitation on the number of entries. The <code>$INDEX\_ALLOCATION</code> attribute is non-resident and contains one or more <code>index records</code>. The <code>INDEX\_ALLOCATION</code> structure starts with the <code>INDX</code> signature. The <code>$INDEX\_ALLOCATION</code> attribute should not exist without an associated <code>$INDEX\_ROOT</code> attribute.<br><br>The <code>$Bitmap</code> attribute keep track of the index allocations.<br><br>The <code>$INDEX\_ROOT</code>, <code>$INDEX\_ALLOCATION</code>, and <code>$Bitmap</code> attributes are collectively refered to as <code>$I30</code>.</p> | <p>Each <code>index record</code> contains information on the file it references in a <code>$FILE\_NAME</code> (<code>0x30</code>) attribute:<br><br>- Filename and parent directory.<br><br>- File size.<br><br>- A set of <code>MACB</code> timestamps.<br><br>The <code>$FILE\_NAME</code> attribute of a <code>index record</code> in a directory <code>index attribute</code> should be kept in sync with the <code>MFT</code> file record's <code>$STANDARD\_INFORMATION</code> attribute of the corresponding entry. However, disparities may sometime occur, with the <code>index record</code> referencing older information.<br><br>Due to their B-Tree data structure format and their frequent rebalancing, <code>$INDEX\_ALLOCATION</code> attributes often contain a significant amount of slack space. <code>Index records</code> for deleted files no longer present in the <code>MFT</code> may be carvable from this slack space.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | `MFT`'s `$INDEX_ROOT`, `$INDEX_ALLOCATION`, and `$Bitmap` attributes.                                                                                                                                                                                                                      | <p><code>MFTECmd.exe</code><br><br><a href="https://github.com/harelsegev/INDXRipper"><code>INDXRipper</code></a></p> |
| `$LogFile`                       | Filesystem                 | <p>The <code>$LogFile</code> is part of a journaling feature of <code>NTFS</code>, activated by default, which maintains a low-level record of changes made to the <code>NTFS</code> volume.<br><br>Every disk operation is journalized prior to being committed. In case of failure, such as a crash during an update, the <code>$LogFile</code> can be used to revert disk operations.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | As low-level operations are journalized, the `$LogFile` contains very limited historical data, usually only of the last few hours at most.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | `$LogFile`                                                                                                                                                                                                                                                                                 |                                                                                                                       |
| `UsnJrnl`                        | Filesystem                 | The `UsnJrnl` is part of a journaling feature of `NTFS`, activated by default on Vista and later, which maintains a record of changes made to the `NTFS` volume. The creation, deletion or modification of files or directories are, among other operations, journalized.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | <p>The records in the <code>UsnJrnl</code> are progressively overwritten once the max size of the journal has been reached. The <code>UsnJrnl</code> usually contains historical data on the last few days (1-3 days for system full time use, < 7 days for regular system use).<br><br>The <code>UsnJrnl</code> is composed of two named data streams:<br><br>- The <code>$Max</code> stream stores the meta data of the change.<br><br>- The <code>$J</code> stream stores the actual change log records.<br><br>Each change log record is notably composed of:<br><br>- an <code>Update Sequence Number (USN)</code>.<br><br>- The timestamp of the change. - The reason / operation of the record (<code>USN\_REASON\_FILE\_CREATE</code>, <code>USN\_REASON\_FILE\_DELETE</code>, <code>USN\_REASON\_DATA\_OVERWRITE</code>, <code>USN\_REASON\_RENAME\_NEW\_NAME</code>, etc.).<br><br>- MFT reference and reference sequence number.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | `$Max` and `$J` named data streams under `\$Extend\$UsnJrnl`                                                                                                                                                                                                                               | `MFTECmd.exe`                                                                                                         |
| `Windows Search` database        | Filesystem                 | <p>The <code>Windows Search</code> database provides an index to the Windows Search feature to improve search speed by indexing content. The Windows Search index is used for searches made through Windows taskbar, the Windows Explorer, and some <code>Universal Windows Platform (UWP)</code> applications (such as Outlook, OneDrive, etc.).<br><br>By default, only a subset of folders and files are indexed (to reduce the Windows Search database size and CPU usage). The folders scanned and number of items indexed can be consulted in the "Windows search settings" menu.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       | <p>By default, only items from the following sources are scanned and indexed:<br><br>- Files and folders from the Users folders.<br>> Data available: file name, path, size, attributes, <code>MAC</code> timestamps. For small file, part of the content of the file may be indexed as well.<br><br>- Outlook mail data (with timestamp of reception, possible mail content).<br><br>- OneNote notes title.<br><br>- Internet explorer history (URLs, timestamp of last visit).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <p>Windows XP:<br><code>%SystemDrive%:\Documents and Settings\All user\Application Data\Microsoft\Search\Data\Application\Windows\Windows.edb</code><br><br>Starting from Windows 7:<br><code>%SystemDrive%:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb</code></p> |                                                                                                                       |
| `Recycle Bin`                    | Filesystem (Deleted files) | Deleted files and folders (if deleted through a recycle bin aware application).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>The deleted files are placed in a subfolder (under <code>%SystemDrive%:$Recycle.Bin</code>) named after the <code>SID</code> of the user that performed the deletion. Deleted files can thus be associated with a given user.<br><br>Two kind of files are present in the <code>Recycle Bin</code>:<br><br>- <code>$I</code> (for "Information") files, which contain the path and timestamp of deletion of the original file.<br><br>- <code>$R</code> (for "Resource") files, which contain the original file content.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | `%SystemDrive%:\$Recycle.Bin\<USER_SID>\*`                                                                                                                                                                                                                                                 |                                                                                                                       |

### Program execution

| Name                                                                                                                                                                                                                                            | Type                                                                                           | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | Location                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | Tool(s)                                                                                                                                                                     |   |
| ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | - |
| <p><code>EVTX</code><br>-<br><code>Security.evtx</code><br>-<br>Process creation</p>                                                                                                                                                            | Programs execution                                                                             | <p>For more information:<br><a href="ttps_analysis/program_execution">Program execution note</a>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>Event <code>4688</code>: <code>A new process has been created</code><br>Event <code>4689</code>: <code>Process Termination: Success and Failure</code><br><br>Requires <code>Audit Process Creation</code> to be enabled.<br><br>If the <code>ProcessCreationIncludeCmdLine\_Enabled</code> audit policy is enabled, the command line specified at the process creation will be logged.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | `Security.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   |                                                                                                                                                                             |   |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>Application Compatibility Cache</code> (<code>Shimcache</code>)</p>                                                                                                                                   | <p>Programs execution (before Windows 10 / Windows Server 2016)<br><br>Executable presence</p> | <p>Application compatibility feature that aim to maintain support of existing software to new versions of the Windows operating system.<br><br>A <code>Shimcache</code> entry is created whenever a program is executed from a specific path. However, starting from the Windows Vista and Windows Server 2008 operating systems, entries may also be created for files in a directory that is accessed interactively.<br><br><code>Shimcache</code> entries are only written to the registry upon shutdown of the system. The <code>Shimcache</code> entries generated since the last system boot are thus only stored in memory.<br><br>Limited to 96 entries on Windows XP / Windows Server 2003, and 1024 entries starting from Windows Vista.<br><br>For more information: <a href="_artefacts_overview/shimcache">Shimcache note</a>.</p>                                                         | <p>Each <code>Shimcache</code> entries contain the following notable information:<br><br>- The associated file full path.<br><br>- On Windows 2003 / XP 64-bit and older, the file size.<br><br>- The <code>LastModifiedTime</code> (<code>$Standard\_Information</code>) timestamp of the file, <strong>which does not necessarily reflect the execution time. Indeed, <code>Shimcache</code> entries are not directly associated with an insert / executed timestamp.</strong><br><br>- The cache entry position, as a numerical value starting from 0, which represents the insertion position in the <code>Shimcache</code>. \*\*The lower the value, the more recently the program was shimmed.<br><br>- From Windows Vista / Windows Server 2008 to Windows 8.1 / Windows Server 2012 R2, the (undocumented) <code>Insert Flag</code> flag which, when set, seems to indicate that the entry was executed. <strong>This flag is no longer present starting from Windows 10 / Windows Server 2016, and thus a <code>Shimcache</code> entry does not necessarily reflect an execution</strong> (as entries may also be created for files in a directory that is accessed interactively).<br><br>- On <code>Windows XP 32-bit</code>, the file <code>Last Update Time</code> timestamp.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p><code>AppCompatCacheParser.exe</code><br><br>For entries present in memory:<br><code>Volatility2</code>'s <code>shimcache</code> plugin.</p>                             |   |
| <p><code>Amcache</code><br><br><code>RecentFileCache</code><br><em>For <code>DLL</code> 6.1.7600, replaced by <code>Amcache.hve</code> on up-to-date systems.</em><br><br>Starting from Windows 7 & Windows Server 2008 R2</p>                  | <p>Programs execution (for non up-to date system)<br><br>Executable presence</p>               | <p>Very complex artefact, linked to an application compatibility feature that aim to maintain support of existing software to new versions of the Windows operating system (like the <code>Shimcache</code> artefact). The <code>Amcache</code> is a standalone registry hive, with multiple root keys that contain various types of data.<br><br>The <code>Amcache</code> behavior depends on the version of the associated libraries, and not the version of the operating system. The <code>Amcache</code> on an up-to-date Windows 7 and Windows 10 will thus behave the same way.<br><br>A <code>Amcache</code> entry is created whenever a program is executed from a specific path. However, entries may also be created for files in "scanned" directory.<br><br>For more information: <a href="_artefacts_overview/amcache">Amcache note</a>.</p>                                              | <p>The <code>Amcache.hve</code> registry hive is split in a number of root keys, with keys being added, changed, or removed depending on the <code>Amcache</code> <code>DLLs</code> versions.<br><br>The following notable root keys can be of forensic interest:<br><br>- <code>File</code> then <code>InventoryApplicationFile</code> starting from the version <code>10.0.14913.1002</code> of the <code>Amcache</code> libraries (<code>AmcacheParser</code> outputs <code>AssociatedFileEntries</code> and <code>UnassociatedFileEntries</code>):<br><br>> Data about program executions if they are shimmed, programs part of an installed application, and programs part of scanned directories (with out requiring execution of the associated programs).<br><br>> <code>AmcacheParser</code>'s <code>AssociatedFileEntries</code> output references programs associated with an application and <code>UnassociatedFileEntries</code> output references "loose" programs (that are not associated with an installed application).<br><br>> Data available (depending on the <code>Amcache</code> libraries version): executable full path, program size, <strong><code>SHA1</code> of the first 30MB of the executable</strong> in the <code>FileId</code> value, binary type (x86 versus x64), the compilation date of the program in the <code>LinkDate</code> value.<br><br>> Additional data for entries associated with an installed application is available in the <code>InventoryApplication</code> key. The <code>ProgramId</code> value from the <code>InventoryApplicationFile</code> subkey of a given program matches the subkey's name under the <code>InventoryApplication</code> key of the associated application. The <code>InventoryApplication</code> key provide metadata information about the application: name, publisher, install date, etc.<br><br>> For non up-to-date systems still using a <code>File</code> key, the last write time of an entry key under the <code>File</code> key coincides with the execution time of an executable or the application installation time. For entries under the newer <code>InventoryApplicationFile</code> key, the last write time of the keys always coincides with an execution of <code>Microsoft Compatibility Appraiser</code> and is thus no longer a timestamp of execution time.<br><br>- <code>InventoryDeviceContainer</code> and <code>InventoryDevicePnp</code> (<code>AmcacheParser</code> outputs <code>DeviceContainers</code> and <code>DevicePnp</code>):<br><br>> Data about devices plugged in on the system.<br><br>> Data available: device type (usb; Bluetooth, media, ...), device friendly name, self reported description, manufacturer, associated driver, ...<br><br>- <code>InventoryDriverBinary</code> (<code>AmcacheParser</code> output <code>DriveBinaries</code>):<br><br>> Data about installed drivers.<br><br>> Data available: driver name, full path, size, associated service name, compilation timestamp (<code>DriverTimestamp</code>), driver file last write timestamp, ...<br><br>- <code>InventoryDriverPackage</code> (<code>AmcacheParser</code> output <code>DriverPackages</code>):<br><br>> Data about drivers package file (INF file) that contains information about the driver.<br><br>> Data available: driver package file name, path, last write timestamp, ...<br><br>- <code>Programs</code> then <code>InventoryApplication</code> (<code>AmcacheParser</code> output <code>ProgramEntries</code>):<br><br>> Data about installed programs, as referenced in the <code>Uninstall</code> and / or a <code>Run</code> key of the <code>SOFTWARE</code> hive.<br><br>> Data available: application name, executable full path and SHA1, publisher, install date, ...<br><br><code>InventoryApplicationShortcut</code> (<code>AmcacheParser</code> output <code>ShortCuts</code>):<br><br>> Data about the shortcuts (<code>LNK</code> files) that were present at one time (and that may still be present or may have been removed) from a subset of scanned folders (Start Menu and / or Desktop folders).<br><br>> Data available: full path of the shortcut. The last write timestamp of the associated subkey can also be a general indicator of when the activity occurred but does not seem to match any <code>MACB</code> timestamps of the shortcut file.</p> | <p><code>DLL</code> 6.1.7600:<br><code>%SystemRoot%\AppCompat\Programs\RecentFileCache.bcf</code><br><br><code>%SystemRoot%\AppCompat\Programs\Amcache.hve</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | `AmcacheParser.exe`                                                                                                                                                         |   |
| <p><code>PCA</code><br><br>Introduced in Windows 11 22H2.</p>                                                                                                                                                                                   | Programs execution (GUI programs only)                                                         | <p>The <code>Program Compatibility Assistant (PCA)</code> is another application compatibility feature that aim to maintain support of existing desktop applications to new versions of the Windows operating system (like the <code>Shimcache</code> and <code>Amcache</code> artefacts). <code>PCA</code> is linked to the <code>pcasvc</code> service.<br><br>Executions of programs with a graphical interface, installed or from a portable executable. Command line programs executed as GUI programs (such as by double clicking on the CLI executable from <code>Windows Explorer</code>) will also generate an entry.</p>                                                                                                                                                                                                                                                                      | <p>The information stored by the <code>PCA</code> is split in 3 text based files:<br><br>- <code>PcaAppLaunchDic.txt</code>:<br>> Most valuable file from a forensic standpoint and reliable source of program execution.<br>> One entry per line, containing the full path of the executable and the timestamp of execution in <code>UTC</code> (in a pipe separated string).<br>> Example: <code>%SystemRoot%\FOLDER\executable.exe                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       | 2023-05-25 01:20:30.123</code>.<br><br>- <code>PcaGeneralDb0.txt</code> and <code>PcaGeneralDb1.txt</code>:<br>> Less entries than in the <code>PcaAppLaunchDic.txt</code> file, with most entries seemingly related to non <code>0x0</code> execution exit code.<br>> One entry per line, containg the following information in a pipe delimited string:<br>\* Execution timestamp.<br>\* Execution status.<br>\* Full path of the executable.<br>\* Description of the executable and its vendor name.<br>\* File version.<br>\* <code>ProgramId</code> referenced in the <code>Amcache</code> registry hive (<code>InventoryApplicationFile</code> key).<br>\* Exit code of the execution.</p> | <p>Files under <code>%SystemRoot%\appcompat\pca</code>:<br><br><code>PcaAppLaunchDic.txt</code><br><br><code>PcaGeneralDb0.txt</code><br><code>PcaGeneralDb1.txt</code></p> |   |
| <p><code>Prefetch</code><br><br>Not present by default on Windows Server Operating Systems.</p>                                                                                                                                                 | Programs execution                                                                             | <p><code>Prefetch</code> is a performance enhancement feature that enables prefetching of applications to make system boots or applications startups faster.<br><br>Limited to 128 entries (<code>Prefetch</code> files) on Windows XP to Windows 7, and 1024 entries starting from Windows 8.<br><br>For more information: <a href="_artefacts_overview/prefetch">Prefetch note</a>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | <p>The <code>Prefecth</code> filenames are based on the executed program name and a hash, computed using a proprietary algorithm and based on the full path (and for some binaries, such as <code>dllhost.exe</code> or <code>svchost.exe</code>, command line parameters) of the executed program.<br><br>Each <code>Prefecth</code> file can yield the following information:<br><br>- The file name and size of the binary executed.<br><br>- The first and, starting from Windows 8, the last eight executions timestamps<br><br>- The <code>Prefecth</code> file <code>NTFS</code> created and last modified timestamps also indicate the first and last time the program was executed.<br><br>- The run count (number of time the binary was executed).<br><br>- The list of files and directories accessed during the first ten seconds of execution (including the eventual <code>DLL</code> loaded or PowerShell scripts for PowerShell execution).<br><br>Whether the <code>Prefect</code> feature is enabled is configured by the <code>EnablePrefetcher</code> registry key:<br>- <code>0x0</code> / undefined: disabled (default on Windows Server Operating Systems).<br>- <code>0x1</code>: Partially enabled (application prefetching only).<br>- <code>0x2</code>: Partially enabled (boot prefetching only).<br>- <code>0x3</code>: Enabled (application and boot prefetching).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       | <p><code>Prefetch</code> files (<code>.PF</code>) in:<br><code>%SystemRoot%\Prefetch\*</code><br><br><code>EnablePrefetcher</code>:<br><code>HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                | `PECmd.exe`                                                                                                                                                                 |   |
| <p><code>System Resource Usage Monitor (SRUM)</code><br><br>Introduced in Windows 8.</p>                                                                                                                                                        | Programs execution                                                                             | <p><code>SRUM</code> is a feature that records numerous metrics of system activities, with a limited subset of the available information displayed within the Windows <code>Task Manager</code> ("App history" tab).<br><br>The <code>SRUM</code> database is a <code>ESE</code> database that notably yields information related to programs execution and executed programs' network usage.<br><br>The <code>SRUM</code> database only stores data for the last 30 to 60 days.<br><br>Entries are not associated with their timestamp of occurrence but with the timestamp of insertion in the <code>SRUM</code> database. As entries are only written to the <code>SRUM</code> database every hour, timestamps are thus precise to the hour (with multiple entries usually sharing the same insertion timestamp).<br><br>For more information: <a href="_artefacts_overview/srum">SRUM note</a>.</p> | <p>Related to program execution, the <code>Application Resource Usage</code> (GUID <code>{D10CA2FE-6FCF-4F6D-848E-B2E99266FA89}</code>) and <code>App Timeline Provider</code> (GUID <code>{5C8CF1C7-7257-4F13-B223-970EF5939312}</code>) tables track programs execution.<br><br><br>For each entry in the <code>Application Resource Usage</code> table (<code>SrumECmd</code>'s <code>AppResourceUseInfo</code> output), the following information may be recorded:<br><br>- Timestamp of the <code>SRUM</code> entry creation.<br><br>- Full path of the executable or application information / description for built-in components.<br><br>- User <code>SID</code> of the user executing the process.<br><br>- Metrics on CPU usage (CPU time in foreground and background).<br><br>- Metrics on I/O operations (foreground / background number of read / write operations and bytes read / written).<br><br><br>For each entry in the <code>Application Resource Usage</code> table (<code>SrumECmd</code>'s <code>AppTimelineProvider</code> output), the following information may be recorded:<br><br>- Timestamp of the <code>SRUM</code> entry creation.<br><br>- Name of the executable and description for built-in components.<br><br>- Timestamp of compilation of the executable.<br><br>- User <code>SID</code> of the user executing the process.<br><br>- Timestamp of seemingly approximate end of execution.<br><br>- Total duration of execution (in milliseconds).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | `%SystemRoot%\System32\SRU\SRUDB.dat`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | `SrumECmd`                                                                                                                                                                  |   |
| <p>Windows 10 Timeline / <code>ActivitiesCache.db</code><br><br>Introduced in Windows 10's version 1803.</p>                                                                                                                                    | Programs execution                                                                             | <p>The Windows Activity history tracks a number of operations on the system: programs used, local files opened, SharePoint documents consulted, and websites browsed (using Internet Explorer / Microsoft Edge Legacy). The Activity history can be consulted in the Windows Timeline (Windows + Tab keys).<br><br>The <code>ActivitiesCache.db</code> is a <code>SQLite</code> database that locally stores the activity for its associated user.<br><br>The <code>ActivitiesCache.db</code> only stores data for the last 30 days by default.</p>                                                                                                                                                                                                                                                                                                                                                     | <p>The <code>ActivitiesCache.db</code> is composed of a number of tables, with the following tables being of interest:<br><br>- <code>Activity</code> / <code>ActivityOperation</code> tables: data about various activities for different operation / activity type: program execution and opening of a file (5, <code>ExecuteOpen</code>), copy-pasting from a program (<code>CopyPaste</code>), application "in focus" (<code>InFocus</code>), ...<br>> Data available, varying depending on the activity type: the activity ID (GUID), executable full path for program execution, display text and content info that may contain file name / SharePoint link, start (<code>startedDateTime</code>) and end (<code>lastActiveDateTime</code>) of the activity (in <code>UTC</code>), created and last modified timestamp of the associated file (local or on SharePoint), the user's device timezone, ...<br>> An activity data can be present in either or both tables depending on the activity lifecycle. For example, a new activity will only be present in the <code>Activity</code> table, while an activity in the "upload queue" will be placed in the <code>ActivityOperation</code> table.<br><br>- <code>Activity\_PackageId</code>: data about the application(s) / program(s) linked to a specific activity (identified by its activity ID).<br>> Data available: the activity ID (GUID), the application name / program filename, eventual program full path, activity expiration timestamp (timestamp of occurrence + 30 days by default).<br>> Upon occurrence of an activity, one or multiple entries sharing the same activity ID will be created in the <code>Activity\_PackageId</code> table, one for each program / application related to the activity.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     | `%SystemRoot%\Users\<USERNAME>\AppData\Local\ConnectedDevicesPlatform\[L.<USERNAME> \| *]\ActivitiesCache.db`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     |                                                                                                                                                                             |   |
| <p><code>NTUSER</code><br>-<br><code>UserAssist</code></p>                                                                                                                                                                                      | Programs execution (GUI programs only)                                                         | <p>The purpose of the <code>UserAssist</code> registry key is not officially documented.<br><br>The registry key references executions of programs with a graphical interface, installed or from a portable executable.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | <p>One or two main registry subkeys can be found depending on the Windows OS version:<br><br>- On Windows Xp, <code>{75048700-EF1F-11D0-9888-006097DEACF9}</code> linked to execution of executable files<br><br>- Starting from Windows 7, <code>{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}</code> linked to execution of executable files and <code>{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}</code> linked to execution of shortcut files.<br><br>Keys are <code>ROT13</code> encoded, and contains the following notable information:<br><br>- Full path of the executed program / shortcut.<br><br>- Sometimes, the timestamp of the last execution.<br><br>- An unreliable run counter and focus time.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\&#x3C;GUID>\Count</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      |                                                                                                                                                                             |   |
| <p><code>UsrClass</code><br>-<br><code>MUICache</code></p>                                                                                                                                                                                      | Programs execution (GUI programs only)                                                         | <p><code>Multilanguage User Interface (MUI)</code> is a feature to allow applications to have a single executable for multiple languages. <code>MUI</code> files can be created, one per supported language, to switch the application display language.<br><br>The registry key references executions of programs with a graphical interface, installed or from a portable executable.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | <p>Each execution is associated with two values under the <code>MUICache</code> registry key, both starting with the executable full path.<br><br>The values data reference information retrieved from the executable's <code>Version</code> information from its resources section (<code>.rsrc</code>):<br><br>- <code>\<PE\_FULL\_PATH>.FriendlyAppName</code>: references the executable <code>FileDescription</code>. This can be used to identify renamed executable, as the original filename is likely going to be referenced by the <code>FileDescription</code> attribute.<br><br>- <code>\<PE\_FULL\_PATH>.ApplicationCompany</code>: references the executable <code>CompanyName</code>.<br><br><strong>The <code>MUICache</code> does not provide a timestamp of execution</strong>, and the last write timestamp of the key cannot be used to infer the timestamp of execution (as the entries are stored directly as registry values).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File:<br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat</code><br><br>Registry keys:<br><code>HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\MUICache</code><br><code>HKCU\Local Settings\MuiCache</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                  |                                                                                                                                                                             |   |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>Background Activity Moderator (BAM)</code><br>/<br><code>Desktop Activity Moderator (DAM)</code><br><br>Introduced in Windows 10's Fall Creators update - version 1709.</p>                           | Programs execution                                                                             | `BAM` is a mostly undocumented feature that controls the programs executed in the background. `DAM` is a feature for devices supporting the "Connected Standby" mode (i.e when a device is turned on, but its display will be turned off). As a result, the `BAM` registry keys will contain data on any devices, while `DAM` registry keys will only contain data on mobile devices.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>The <code>BAM</code> registry key contains multiple subkeys under <code>bam\State\UserSettings</code>, with one subkey per user, identified with the user <code>SID</code>. While the key is in the <code>SYSTEM</code> registry hive, program executions can thus still be tied to a specific user using this <code>SID</code>.<br><br>Each user-specific key contains a list of executed programs, with their full path and timestamp of last execution.<br><br>If a file is deleted, the eventual associated entry in the <code>BAM</code> is deleted as well after the system reboot. Additionally, <code>BAM</code> entries older than 7 days are deleted upon system boot. The <code>BAM</code> thus provides limited information on historic execution of programs.<br><br>No entries are created in the <code>BAM</code> keys for executables on removable media and/or on network shares.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br><br>Registry key:<br><code>HKLM\SYSTEM\CurrentControlSet\Services\bam\UserSettings\&#x3C;SID>\*</code><br>After from Win10 1809: <code>HKLM\SYSTEM\CurrentControlSet\Services\bam\State\UserSettings\&#x3C;SID>\*</code><br><br><code>HKLM\SYSTEM\CurrentControlSet\Services\dam\UserSettings\&#x3C;SID>\*</code><br>After from Win10 1809: <code>HKLM\SYSTEM\CurrentControlSet\Services\dam\State\UserSettings\&#x3C;SID>\*</code></p>                                                                                                                                                                                              |                                                                                                                                                                             |   |
| <p><code>NTUSER</code><br>-<br><code>FeatureUsage</code><br><br>Introduced in Windows 10's version 1903.</p>                                                                                                                                    | Programs execution                                                                             | Feature linked to the Windows Task, storing a number of metrics related to the Task bar usage.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | <p>Each operation (detailed below) is associated with an entry composed of the program full path and operation run count. No timestamp of execution is available.<br><br>Subregistry keys:<br><br>- <code>AppSwitched</code>: number of times an application was brought to focus (application left-clicked on the taskbar).<br><br>- <code>ShowJumpView</code>: number of times the jump menu of an application was opened (application right-clicked on the taskbar).<br><br>- <code>AppBadgeUpdated</code>: number of times an application on the taskbar has have its icon updated (for example for notifications).<br><br>- <code>AppLaunch</code>: number of times an application pinned on the taskbar has been executed.<br><br>- <code>TrayButtonClicked</code>: numer of times a default taskbar button (such as the Windows start button) was clicked.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br>Registry keys under <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage</code>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           |                                                                                                                                                                             |   |
| <p><code>EVTX</code><br>-<br>PowerShell activity events</p>                                                                                                                                                                                     | Programs execution and PowerShell activity                                                     | <p>For more information:<br><a href="ttps_analysis/powershell_activity">PowerShell activity note</a>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | <p><code>Microsoft-Windows-PowerShell%4Operational</code>:<br>- Event <code>4103</code>, related to PowerShell modules. Requires PowerShell <code>Module Logging</code> to be enabled.<br>- Event <code>4104</code>, related to PowerShell script block. Requires PowerShell <code>Script Block Logging</code> to be enabled. By default, events will however be logged for potentially-malicious commands execution.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | `Microsoft-Windows-PowerShell%4Operational`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       |                                                                                                                                                                             |   |
| <p>PowerShell console activity <code>ConsoleHost\_history.txt</code><br><br>Introduced in Windows 10 / PowerShell 5.</p>                                                                                                                        | Programs execution and PowerShell activity                                                     | <p>Starting with <code>PowerShell v5</code> on <code>Windows 10</code>, the commands entered in a PowerShell console will be logged by the <code>PSReadline</code> module to an user-scoped <code>ConsoleHost\_history.txt</code> file.<br><br>Console-less PowerShell sessions, such as the content of PowerShell script or commands execution through the <code>PowerShell ISE</code>, will not be logged in this file.<br><br>Bypassing <code>PSReadline</code> logging is also easy, as it simply requires to unload the <code>PSReadline</code> module (for instance with the <code>Remove-Module PSReadline</code> in an existing PowerShell session).</p>                                                                                                                                                                                                                                        | <p>The <code>ConsoleHost\_history.txt</code> file contains the commands entered, with one command per line and no associated timestamps (or any additional metadata).<br><br>By default, the last 4096 commands are conserved.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | `%SystemDrive%:\Users\<USERNAME>\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 |                                                                                                                                                                             |   |
| .NET CLR `UsageLogs`                                                                                                                                                                                                                            | Programs execution                                                                             | <p>Following the execution (or in-memory injection) of a .NET assembly, the <code>Common Language Runtime (CLR)</code> creates a <code>Usage Log</code> file whose named is based on the name of the executed assembly.<br><br>The file is written just prior the assembly execution terminate, and will thus not be written if the process does not gracefully exit.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | <p>The filename of the log file match the name of the assembly / binary executed.<br><br>The file creation timestamp corresponds to the first time the associated assembly was executed and the file last modification timestamp corresponds to the last execution time of the assembly.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | `%SystemDrive%:\Users\<USERNAME>\AppData\Local\Microsoft\CLR_v<VERSION>\UsageLogs\<BINARY_NAME>.exe.log`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          |                                                                                                                                                                             |   |
| <p><code>NTUSER</code><br>-<br><code>RecentApps</code><br><br>Introduced in Windows 10 1607 and removed in Windows 10 1709 (with the key not present on subsequent version).</p>                                                                | Programs execution                                                                             | Undocumented feature, added and (relatively) shortly after removed from the Windows operating system.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>Each subkey, identified with a GUID, under the <code>RecentApps</code> key correspond to an executed program. In these application GUID subkeys, the filename, last access timestamp, and run count of the application are stored.<br><br>Additionally, each application GUID subkey can have up to 10 subkeys, also identified with a GUID, that correspond to files accessed using the application. In these file GUID subkeys, the file name, file full path, and (on some OS version) an non-updated timestamp of last access.<br><br>The last write timestamp of an application subkey can indicate when the program was last executed. While the last write timestamp of a file subkey can indicate when the file was accessed (with the associated program).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Search\RecentApps\&#x3C;GUID></code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              |                                                                                                                                                                             |   |
| `Jumplist`                                                                                                                                                                                                                                      | Programs execution                                                                             | Detailed in `Files and folders access`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 |                                                                                                                                                                             |   |
| <p><code>NTUSER</code><br>-<br><code>Explorer</code><br>-<br>Common Dialogs<br>-<br><code>CIDSizeMRU</code></p>                                                                                                                                 | Programs execution                                                                             | Recently executed programs, linked to `Common Dialogs` activities (pop boxes to open / save file, print, find / replace, ...).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | <p>The key contains an ordered <code>Most Recently Used (MRU)</code> list of executed programs, identified through their filename.<br><br>The last write timestamp of the key thus corresponds to the timestamp of execution of the most recently executed program (first in the MRU list).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               |                                                                                                                                                                             |   |
| <p><code>NTUSER</code><br>-<br><code>Explorer</code><br>-<br>Common Dialogs<br>-<br><br><code>LastVisitedMRU</code><br>/<br><code>LastVisitedPidlMRU</code><br><code>LastVisitedPidlMRULegacy</code><br>Renamed in Windows Vista and later.</p> | Programs execution                                                                             | <p>Records the programs used to open / save (some of) the file tracked in the <code>OpenSaveMRU</code> / <code>OpenSavePidlMRU</code> registry key.<br><br>Notably used to track the last folder used by a given program in an "Open File" / "Save File" <code>Common Dialogs</code> window.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        | <p>Applications tracked are stored in an ordered <code>Most Recently Used (MRU)</code> list. The last write timestamp of the key thus corresponds to the timestamp of execution of the most recently executed program (first in the MRU list).<br><br>For each application, the full path of the folder can be constructed from information blocks on each subfolder in the location. For exemple, for the "%SystemRoot%\Users\Public\Documents" location, three blocks will be present: "Users", "Public", and "Documents". For each block, the created and last accessed timestamps and the MFT entry / sequence associated with the folder are referenced.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br>Registry key:<br><code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedMRU</code><br><code>HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU</code><br><code>HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRULegacy</code></p>                                                                                                                                                                                                                                                                                      |                                                                                                                                                                             |   |
| <p><code>NTUSER</code><br>-<br><code>RunMRU</code></p>                                                                                                                                                                                          | Programs execution                                                                             | <p>Tacks items (program, files / folders, <code>URL</code>, ...) launched from the <code>Windows Run</code> launcher (Windows + R shortcut).<br><br>Entries are added / updated in near real-time.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p>Each entry successfully launched trough the <code>Windows Run</code> launcher is stored in a dedicated value under the <code>Explorer\RunMRU</code> key.<br><br>The values are ordered in a <code>Most recently used (MRU)</code> list, specified in the <code>MRUList</code> value.<br>Example: <code>MRUList</code> equals to <code>ba</code> means that the entry tagged as <code>b</code> was launched last / the most recently, preceded by the entry tagged as <code>a</code>.<br><br>The last write timestamp of the key thus indicates the timestamp of the most recently entered item.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            |                                                                                                                                                                             |   |

### Files and folders access

| Name                                                                                                                                                                                            | Type                                    | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     | Location                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | Tool(s)                                                                                                                                                                             |   |
| ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | - |
| <p><code>NTUSER</code> & <code>UsrClass</code><br>-<br><code>Shellbag</code></p>                                                                                                                | Folders access                          | <p>Registry keys designed as an user experience enhancing feature to keep track of Windows explorer graphical display settings on a folder-by-folder basis. For instance, a <code>Shellbag</code> entry is used to store the "View" mode of a folder (details, list, small / medium / large icons) as well as the column displayed (entry names, dates, sizes, etc.) and their order.<br><br><code>Shellbags</code> contain folders and network shares to which a given user has navigated (using the <code>Windows Explorer</code>), but not files or subdirectories if they were not accessed. An exception is for <code>ZIP</code> files opened directly as folders through the <code>Windows Explorer</code>, that are stored as if they were folders (with their content thus partially referenced depending on the related activity). <code>Shellbags</code> entries are also generated for access to the <code>Control Panel</code> settings, on an interface-by-interface basis (<code>Windows Firewall</code>, <code>Credential Manager</code>).<br><br><code>Shellbags</code> entries are not deleted upon deletion of the related folders and can thus be a source of historical information.<br><br>For more information: <a href="_artefacts_overview/shellbags">Shellbags note</a>.</p> | <p>Various kinds of user activity may generate or update <code>Shellbag</code> entries (with different level of data depending on the activity):<br><br>- First access or renaming of folders, removable devices, or network shares through the Windows Explorer systematically generate a <code>Shellbag</code> entry.<br><br>- Graphical opening of compressed archives or ISOs.<br><br>- ...<br><br><br><code>Shellbag</code> entries are stored in registry as a tree-like data structure, with the root target having the topmost <code>BagMRU</code> key. Each sub-target (sub directory for example) of the parent target are then represented with both:<br><br>- A registry subkey, named with a numerical value (starting from <code>0</code>).<br><br>- A registry value (in the parent target's registry key), named with the same numerical value and associated with binary data that notably contains the target's name.<br><br>Each <code>Shellbag</code> <code>BagMRU</code> registry key also contains a <code>MRUListEx</code> value, that maintains the entries visited order, i.e the order in which the sub targets of a target were accessed (the last sub target accessed having a <code>MRU position</code> of 0).<br><br><br>Each <code>Shellbags</code> entry for a given target yield the following notable information:<br><br>- The target name and absolute path.<br><br>- The target modified, access, and created (<code>MAC</code>) timestamps (UTC), retrieved from the <code>$MFT</code> at the <code>Shellbag</code> entry creation (and not further updated).<br><br>- Additionally the <code>Shellbags</code> <code>BagMRU</code> hierarchical nature and <code>MRUListEx</code> list can be used to deduce the first and last interacted timestamps for some targets:<br><br>> For entries that do not have subkeys (i.e directory for which no subdirectory were accessed), the first interacted timestamp is equal to the key's <code>LastWriteTime</code> timestamp. This is due to the fact that the key is created when a target is first accessed, and further activity for that target (such as display settings modifications) will only update the key's values. When a subkey is created for the target (i.e when a subdirectory is accessed for that particular directory), the timestamp becomes unreliable as it reflect the creation of the subkey.<br><br>> The last interacted timestamp can be deducted for the sub target that was last interacted with (<code>MRU</code> position <code>0</code>), and is equal to the parent key's <code>LastWriteTime</code> timestamp.<br><br>Major updates of the Windows operating system may however result in modification of <code>ShellBags</code> entries, resulting in updated last written timestamp.</p> | <p><em>Locations starting from Windows 7:</em><br><br><code>Windows Explorer</code> activity:<br><br>File:<br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat</code><br><br>Registry keys:<br><code>HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU</code><br><code>HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags</code><br><br>Desktop and Network locations activity:<br><br>File:<br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br>Registry keys:<br><code>HKCU\Software\Microsoft\Windows\Shell\BagMRU</code><br><code>HKCU\Software\Microsoft\Windows\Shell\Bags</code></p>                                                                                                                                                         | <p><code>ShellBagsExplorer</code><br><br><code>SBECmd.exe</code></p>                                                                                                                |   |
| `Jumplist`                                                                                                                                                                                      | Files and folders access                | <p>Linked to a taskbar user experience-enhancing feature that allows users to "jump" to files, folders or others elements by right clicking on open applications in the <code>Windows taskbar</code>. The <code>Windows Explorer</code>'s <code>Quick Access</code> feature also stores entries in <code>Jumplists</code>.<br><br>Two forms of <code>Jumplists</code> are created:<br><br>- Automatic entries for items recently accessed through the application: <code>\<APP\_IDENTIFIER>.automaticDestinations-ms</code> files.<br><br>- Custom entries for application defined or manually "pinned" elements: <code>\<APP\_IDENTIFIER>.customDestinations-ms</code> files.<br><br>For both <code>Jumplist</code> types, the <code>\<APP\_IDENTIFIER></code> is a Windows set unique identifier that is used to link a particular application with its <code>Jumplists</code>. While no official mapping is documented, <code>JLECmd</code> maintains a list of known application identifiers.<br><br>For more information: <a href="_artefacts_overview/jumplist">Jumplist note</a>.</p>                                                                                                                                                                                                          | <p>An application is associated with one <code>AutomaticDestinations</code> file and one <code>CustomDestinations</code> file, that share the <code>\<APP\_IDENTIFIER></code> of the application.<br><br>A <code>JumpList</code> is assimilable to a series / list of <code>shortcut files (LNK)</code>, each entry in the <code>JumpList</code> being a <code>shortcut file</code> structure. Thus the same level of information found in a <code>shortcut file</code> is available for each item referenced in an application <code>AutomaticDestinations</code> and <code>CustomDestinations</code> <code>JumpLists</code>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | <p><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\*.automaticDestinations-ms</code><br><br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\*.customDestinations-ms</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  |                                                                                                                                                                                     |   |
| `LNK (shortcuts) Files`                                                                                                                                                                         | Files and folders access                | <p>Windows Shell Items that reference an original file, folder, or application.<br><br>While <code>shortcut files</code> can be created manually, the Windows operating system also creates <code>shortcut files</code> under numerous user activities, such as opening of a non-executable file. For instance, a <code>shortcut file</code> is created under <code>\[...]\AppData\Roaming\Microsoft\Windows\Recent\</code> whenever a file is opened from the <code>Windows Explorer</code>.<br><br>These automatically created and updated <code>shortcut files</code> are not deleted upon deletion of their associated files.<br><br>For more information: <a href="_artefacts_overview/lnkfile">LNKFile note</a>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            | <p>The creation and modification timestamps of the shortcut file itself will usually respectively indicate when the target file was first and last opened.<br><br>Each shortcut file additionally yield the following information:<br><br>- The target file's absolute path, size and attributes (hidden, read-only, etc.).<br><br>- The target file modified, access, and created (<code>MAC</code>) timestamps at the time of the last access to the target file.<br><br>- Whether the target file was stored locally or on a remote network share.<br><br>- Occasionally information on the volume of the target file: name, type (fixed vs removable storage media), serial number, and label / name if any.<br><br>- Occasionally information on the host of the target file: system's NetBIOS hostname and MAC address.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | <p>Automatically created <code>shortcut files</code> for files opened from the Windows Explorer:<br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Roaming\Microsoft\Windows\Recent\*.lnk</code><br><br>Documents opened using <code>Microsoft Office</code>:<br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Roaming\Microsoft\Office\Recent\*.lnk</code><br><br><code>Shortcut files</code> created automatically by the <code>Windows Explorer</code> are referenced in the <code>NTUSER.DAT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs</code> registry keys.<br><br><code>Startup folders</code> items:<br><code>%SystemDrive%:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp</code><br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup</code><br><br></p> | <p><code>LECmd</code><br><br><code>exiftool</code></p>                                                                                                                              |   |
| <p>Windows 10 Timeline / <code>ActivitiesCache.db</code><br><br>Introduced in Windows 10's version 1803.</p>                                                                                    | Files and folders access                | Detailed in `Program execution`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                |                                                                                                                                                                                     |   |
| `WebCacheV01.dat`                                                                                                                                                                               | Files and folders access                | <p>Access to local files may appear in the <code>WebCacheV01.dat</code> <code>ESE</code> database.<br><br>This database is mainly used to store browsing history, downloads, cache, and cookies (metadata) for the <code>Microsoft Internet Explorer</code> and <code>Microsoft Edge</code> (legacy) web browsers. However, access to local files, not necessarily through a web browser, may also appear in the <code>WebCacheV01.dat</code> database.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | Access to local files will be identifiable by the `file` `URI` scheme (such as `file:///<DRIVE_LETTER>:/folder/file`).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | `%LocalAppData%\Microsoft\Windows\WebCache\WebCacheV01.dat`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | [`NirSoft's BrowsingHistoryView`](https://www.nirsoft.net/utils/browsing_history_view.html)                                                                                         |   |
| <p><code>NTUSER</code><br>-<br><code>Explorer</code><br>-<br>Common Dialogs<br>-<br><br><code>OpenSaveMRU</code><br><br><code>OpenSavePidlMRU</code><br>Renamed in Windows Vista and later.</p> | Files and folders access                | Information on files opened or saved through the "Open File" or "Save File" `Common Dialogs` window.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p>The <code>OpenSaveMRU</code>/ <code>OpenSavePidlMRU</code> keys has multiple subkeys, one for each different file extensions (for the files opened / saved on the given system).<br><br>Each subkey contains an ordered <code>Most recently used (MRU)</code> list of opened / saved files (full path of the file). The list can go up to 20 entries, with entries over 20 being overwritten.<br><br>The last write timestamp of each subkey thus corresponds to the timestamp of opening / saving of the file in MRU position 0 (for a given file extension).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br>Registry key:<br><code>HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU</code><br><code>HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     |                                                                                                                                                                                     |   |
| <p><code>NTUSER</code><br>-<br><code>Explorer</code><br>-<br><code>RecentDocs</code></p>                                                                                                        | Files and folders access                | Non-executable files opened through the Windows Explorer, stored as one subkey per file extension.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <p>Each subkey contains the opened files of the given extension stored in a ordered <code>Most Recently Used (MRU)</code> list. The last written timestamp of the key correspond to the timestamp of the opening of the most recently accessed file (MRU position 0).<br><br>Entry created under the RecentDocs registry keys are associated with a shortcut file under <code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Roaming\Microsoft\Windows\Recent\</code>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       |                                                                                                                                                                                     |   |
| <p><code>NTUSER</code><br>-<br><code>Explorer</code><br>-<br><code>TypedPaths</code></p>                                                                                                        | Files and folders access                | <p>Paths entered (typed, pasted, or auto-completed) in the Windows Explorer location search bars.<br><br>Entries are not added / updated in real-time, but are seemingly added / updated on user logoff / system reboot.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | <p>The file paths are stored as <code>url1</code> to <code>url\[N]</code> in inversed chronological order.<br><br>The last write timestamp of the key is thus the timestamp of visit of the most recently visited path.<br><br>As program can be directly executed from the Windows Explorer search bar, traces of program executions may be found in the <code>TypedPaths</code> entries.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       |                                                                                                                                                                                     |   |
| <p><code>NTUSER</code><br>-<br><code>Explorer</code><br>-<br><code>WordWheelQuery</code><br><br>Starting from Windows 7 and not present on Windows Server Operating Systems.</p>                | Files and folders access                | Keywords searched in from the `Windows Explorer` search box, potentially resulting in files or folders access.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        | The entries are stored in a `Most Recently Used (MRU)` list. The last write timestamp of the key indicates the timestamp of the most recently searched keyword.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   |                                                                                                                                                                                     |   |
| `Windows Search` database                                                                                                                                                                       | Files and folders access                | Detailed in `Filesystem`.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                |                                                                                                                                                                                     |   |
| <p><code>NTUSER</code><br>-<br><code>RunMRU</code></p>                                                                                                                                          | Files and folders access                | Detailed in `Program execution`.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                |                                                                                                                                                                                     |   |
| <p><code>NTUSER</code><br>-<br><code>RecentApps</code><br><br>Introduced in Windows 10 1607 and removed in Windows 10 1709 (with the key not present on subsequent version).</p>                | Files and folders access                | Detailed in `Program execution`.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                |                                                                                                                                                                                     |   |
| <p><code>NTUSER</code><br>-<br><code>MountPoints2</code></p>                                                                                                                                    | Files and folders access                | Currently or previously mapped drives (such as the system drive, USB devices, or network shares) mounted by the associated user.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | <p>Each drives is represented by a subkey, which is named as either the <code>volume GUID</code>, a letter, or, for network shares, using a specific nomenclature (<code>##\<IP                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | HOSTNAME>#\<SHARE\_NAME></code>).<br><br>For more information on <code>MountPoints2</code> related to devices, refer to <code>Devices and USB activity</code>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br>Registry key:<br><code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2</code></p> |   |
| <p><code>NTUSER</code><br>-<br><code>Map Network Drive MRU</code></p>                                                                                                                           | Files and folders access                | Recently used network shares.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br>Registry key:<br><code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Map Network Drive MRU</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     |                                                                                                                                                                                     |   |
| <p><code>EVTX</code><br>-<br><code>Security.evtx</code><br>- Network share access:<br><code>Audit File Share</code></p>                                                                         | Network shared files and folders access | <p>Events related to network shares: creation, deletion, modification, and access attempts of network shares. Do not track access to folders and files hosted on network shares.<br><br>As there are no <code>System Access Control Lists</code> (<code>SACLs</code>) for shares, access to all shares on the system are audited.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | <p>Event <code>5140</code>: <code>A network share object was accessed</code><br>Generated every time a network share is accessed, but only once per session (upon first access attempt).<br><code>Object Type</code> is always <code>File</code> for this event.<br><br>Event <code>5140</code>: <code>A network share object was accessed</code><br><br>Event <code>5142</code>: <code>A network share object was added</code><br><br>Event <code>5143</code>: <code>A network share object was modified</code><br><br>Event <code>5144</code>: <code>A network share object was deleted</code><br><br>All events include information about the account that performed the operation: username, domain, and <code>SID</code> as well as the <code>Logon ID</code> associated with the logon.<br>Events <code>5140</code> also include network information: source IP address and port.<br><br>Requires <code>Audit File Share</code> to be enabled.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | `Security.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  |                                                                                                                                                                                     |   |
| <p><code>EVTX</code><br>-<br><code>Security.evtx</code><br>-<br>Network share access:<br><code>Audit Detailed File Share</code></p>                                                             | Network shared files and folders access | <p>Event related to access to folders and files hosted on network shares. The event is generated upon every access to a network shared file or folder.<br><br>Failure events are generated only when access is denied at the file share level. <strong>The event may thus not indicate that the access to the shared folder or file was successful.</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | <p>Event <code>5145</code>: <code>A network share object was checked to see whether client can be granted desired access</code><br><br>Includes information about the account that performed the operation: username, domain, and <code>SID</code>, the <code>Logon ID</code> associated with the logon, and the source IP address and port.<br><br>Requires <code>Audit Detailed File Share</code> to be enabled.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | `Security.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  |                                                                                                                                                                                     |   |

### Remote Access / Lateral movements

| Name                                                                                                                                                                                             | Type                              | Description                                                                                                                                                                                                                                                                                                                                                   | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | Location                                                                                                                                                                                                                                                                                                                     | Tool(s)                                                                                                                                                                                                                                                                                                                                                                                                                                     |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | --------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------- | - |
| <p>Authentication<br>-<br><code>EVTX</code><br>-<br><code>Security.evtx</code><br><br><em>Destination host</em></p>                                                                              | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/accounts_usage">accounts usage note</a>.</p>                                                                                                                                                                                                                                                               | <p>Event <code>4624</code>: <code>An account was successfully logged on</code><br><br>Event <code>4625</code>: <code>An account failed to log on</code><br><br>Event <code>4672</code>: <code>Special privileges assigned to new logon</code><br><br>Event <code>4647</code>: <code>User initiated logoff</code> (used for logoffs from <code>Interactive</code> or <code>RemoteInteractive</code> logons)<br><br>Event <code>4634</code>: <code>An account was logged off</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | `Security.evtx`                                                                                                                                                                                                                                                                                                              |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Authentication<br>-<br><code>EVTX</code><br>-<br><code>Security.evtx</code><br><br><em>Source host</em></p>                                                                                   | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/accounts_usage">accounts usage note</a>.</p>                                                                                                                                                                                                                                                               | <p>Only logged whenever alternate credentials are used:<br><br>Event <code>4648: A logon was attempted using explicit credentials</code><br>The <code>TargetServerName</code> and <code>TargetInfo</code> fields can reference information about the remote server and service (such as <code>TargetInfo</code> set to <code>TERMSRV/\<HOSTNAME></code> for outgoing <code>RDP</code>).<br><br>For <code>runas /NetOnly</code> (and similar) process execution:<br><br>Event <code>4624</code>: <code>An account was successfully logged on</code><br>With <code>Logon Type</code> <code>9</code> and the specified alternate credentials as <code>Network Account Domain</code> and <code>Network Account Name</code>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | `Security.evtx`                                                                                                                                                                                                                                                                                                              |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Authentication<br>-<br><code>EVTX</code><br>-<br><code>Security.evtx</code><br><br><em>AD DS Domain Controller</em></p>                                                                       | Remote Access / Lateral movements | <p>For authentication attempts from a source host to a Active Directory domain-joined destination host (which is not the Domain Controller).<br><br>For more information:<br><a href="ttps_analysis/accounts_usage">accounts usage note</a>.</p>                                                                                                              | <p>For <code>NTLM</code> successful or failed authentication attempts:<br><br>Event <code>4776</code>: <code>The domain controller attempted to validate the credentials for an account</code><br><em>If the <code>Result Code</code> field is not equal to <code>0x0</code> the authentication failed. The event is associated with the computer from which the logon attempt originated and does not identify the target service. This event is also logged for non Domain Controllers, on the target computer, for logon attempts with local <code>SAM</code> accounts.</em><br><br>For <code>Kerberos</code> authentication:<br><br>If the user has not already retrieved a <code>TGT</code> during the session opening on the source host:<br><br>Event <code>4768</code>: <code>A Kerberos authentication ticket (TGT) was requested</code><br><em>If the <code>Result Code</code> field is not equal to <code>0x0</code> the request failed (but not for a failed authentication).</em><br><br>Event <code>4769</code>: <code>A Kerberos service ticket was requested</code><br>The <code>ServiceName</code> and <code>ServiceSid</code> fields indicate the service the <code>service ticket</code> is requested for. However, for lateral movement, the service and service <code>SID</code> are often set to the destination machine account, with no information on the actual service targeted (<code>RPC</code>, <code>CIFS</code>, etc.).<br><br>Event <code>4771</code>: <code>Kerberos pre-authentication failed</code><br><em>For authentication failures.</em><br><br><strong>As the Domain Controller only handles the authentication, and will not open a login session in this scenario, no <code>4624</code> or <code>4625</code> events will be logged.</strong> However, for a remote interactive logon on the destination host, a <code>4624</code> event of logon type <code>3</code> (and <code>4768</code> + <code>4769</code> events) will be logged on a Domain Controller (potentially different than the one that processed the authentication from the source host) originating from the destination host (as part of the interactive session opening process).</p> | `Security.evtx`                                                                                                                                                                                                                                                                                                              |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Authentication<br>-<br><code>User Access Logging (UAL)</code><br><br><em>AD DS Domain Controller and destination host</em><br><br>Windows Server only, introduced in Windows Server 2012.</p> | Remote Access / Lateral movements | <p>Feature that consolidates data on client activity.<br><br>On Domain Controllers, yield information on sessions opening on domain-joined computers (if the given DC was reached for authentication / <code>Group Policy</code> retrieval).<br><br>For more information: <a href="_artefacts_overview/user_access_logging">User Access Logging note</a>.</p> | <p>The information is stored locally in up to five <code>Extensible Storage Engine (ESE)</code> database files (<code>.mdb</code>), including:<br><br>- The <code>Current.mdb</code> file which contains data for the last 24-hour.<br><br>- Up to three <code>\<GUID>.mdb</code> files, which contain data for an entire year (first to last day), going back to 2 years.<br><br>The <code>CLIENTS</code> table of the aforementioned databases contain notable information:<br><br>- Accessed Windows Server role <code>GUID</code> and description (<code>AD DS</code>, <code>AD CS</code>, <code>SMB / CIFS</code> service notably)<br><br>- The client domain and username.<br><br>- Total number of access.<br><br>- First, last, and daily access timestamps.<br><br>- Client <code>IPv4</code> or <code>IPv6</code> address.<br><br>On Domain Controllers, the hostname associated with a given <code>IP</code> address at that time may be retrievable as machine accounts of domain-joined computers also authenticate to <code>AD DS</code>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | Database files (`.mdb`) in `%SystemRoot%\System32\Logfiles\SUM\`                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Remote Desktop<br>-<br><code>EVTX</code><br><br><em>Destination host</em></p>                                                                                                                 | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/lateral_movement">lateral movement note</a>.</p>                                                                                                                                                                                                                                                           | <p><code>Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx</code>:<br>- Event <code>1149</code>: <code>Remote Desktop Services: User authentication succeeded</code>. Access to the Windows login screen, not necessarily a successful session opening. This event is however only generated upon successful authentication if <code>Network Level Authentication (NLA)</code> is required.<br><br><code>Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational</code>:<br>- Event <code>21</code>: <code>Remote Desktop Services: Session logon succeeded</code>.<br>- Event <code>22</code>: <code>Remote Desktop Services: Shell start notification received</code><br>- Event <code>23</code>: <code>Remote Desktop Services: Session logoff succeeded</code><br>- Event <code>25</code>: <code>Remote Desktop Services: Session reconnection succeeded</code><br>Events with a source network address set to <code>LOCAL</code> can sometimes be generated for console, non RDP login.<br><br><code>Microsoft-WindowsRemoteDesktopServicesRdpCoreTS%4Operational.evtx</code>:<br>- Event <code>131</code>: <code>The server accepted a new TCP connection from client \<IP></code>. Introduced in <code>>= Windows Server 2012</code>, only indicate a network access to the RDS service.<br><br>For the aforementioned events, a <code>Source Network Address</code> of <code>::%16777216</code> could indicate that a <code>ngrok</code> tunnel was used to make RDP access.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | <p><code>Microsoft-Windows-TerminalServices-RemoteConnectionManager%4Operational.evtx</code><br><br><code>Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational</code><br><br><code>Microsoft-WindowsRemoteDesktopServicesRdpCoreTS%4Operational.evtx</code></p>                                               |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Remote Desktop<br>-<br><code>HKLM\SYSTEM</code><br>-<br><code>ProfileList</code><br><br><em>Destination host</em></p>                                                                         | Remote Access / Lateral movements | `SID` to username correspondence for accounts that have interactively logged on the system (including for domain accounts).                                                                                                                                                                                                                                   | The last write timestamp of each key indicates was the associated user last logged on the system.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <p>File: <code>%SystemRoot%\System32\config\SOFTWARE</code><br>Registry key: <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList</code></p>                                                                                                                                                                  |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Remote Desktop<br>-<br><code>EVTX</code><br><br><em>Source host</em></p>                                                                                                                      | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/lateral_movement">lateral movement note</a>.</p>                                                                                                                                                                                                                                                           | <p><code>Microsoft-WindowsTerminalServicesRDPClient%4Operational.evtx</code>:<br>- Event <code>1024</code>: <code>RDP ClientActiveX is trying to connect to the server (\<HOSTNAME>)</code><br>- Event <code>1102</code>: <code>The client has initiated a multi-transport connection to the server \<IP></code><br>- Event <code>1029: Base64(SHA256(UserName)) is = \<HASH></code><br><a href="https://gchq.github.io/CyberChef/#recipe=Decode_text(&#x27;UTF-8%20(65001)&#x27;)Encode_text(&#x27;UTF-16LE%20(1200)&#x27;)SHA2(&#x27;256&#x27;,64,160)From_Hex(&#x27;Space&#x27;)To_Base64(&#x27;A-Za-z0-9%2B/%3D&#x27;)&#x26;input=QWRtaW5pc3RyYXRvcg">This <code>CyberChef</code> formula</a> can be used to compute the hash.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               | `Microsoft-WindowsTerminalServicesRDPClient%4Operational.evtx`                                                                                                                                                                                                                                                               |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Remote Desktop<br>-<br><code>NTUSER</code><br>-<br><code>Terminal Server Client\Servers</code><br><br><em>Source host</em></p>                                                                | Remote Access / Lateral movements | -                                                                                                                                                                                                                                                                                                                                                             | <p>Each remote host the user connected to (from the local system) is referenced as a dedicated subkey under <code>Terminal Server Client\Servers\&#x3C;IP></code>. This subkey is named after the IP address of the remote host.<br><br>For each host, the associated subkey references:<br><br>- The eventual saved username for the connection in the <code>UsernameHint</code> value.<br><br>Additionally, the last written timestamp may be an indicator of the first access to the remote host (but may have also be updated for various other reasons).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\SOFTWARE\Microsoft\Terminal Server Client\Servers\&#x3C;IP></code></p>                                                                                                                                                     |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Remote Desktop<br>-<br><code>RDP Bitmap Cache</code><br><br><em>Source host</em></p>                                                                                                          | Remote Access / Lateral movements | <p>Partial captures of the remote desktop screen from the Remote Desktop Client for RDP sessions.<br><br>Implemented to reduce the amount of data sent by the server to save bandwidth usage.<br><br>Bitmap caching be deactivated client-side in the Remote Desktop Client.</p>                                                                              | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <p>Windows XP / Windows Server 2003:<br><code>%SystemDrive%:\Documents and Settings\&#x3C;USERNAME>\Local Settings\Application Data\Microsoft\Terminal Server Client\Cache\*</code><br><br>Windows 7 and later: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Local\Microsoft\Terminal Server Client\Cache\*</code></p> |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Windows services<br>-<br><code>EVTX</code><br><br><em>Destination host</em></p>                                                                                                               | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/local_persistence">local persistence note</a>.</p>                                                                                                                                                                                                                                                         | <p><code>System.evtx</code>:<br>- Event <code>7045</code>: <code>A service was installed in the system</code><br>- Event <code>7036</code>: <code>The \<SERVICE\_NAME> service entered the \<running/stopped> state</code><br><br><code>Security.evtx</code>:<br>- Event <code>4697</code>: <code>A service was installed in the system</code>. Introduced in Windows Server 2016 and Windows 10, and requires advanced auditing policy.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         | <p><code>System.evtx</code><br><br><code>Security.evtx</code></p>                                                                                                                                                                                                                                                            |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Windows scheduled tasks<br>-<br><code>EVTX</code><br><br><em>Destination host</em></p>                                                                                                        | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/local_persistence">local persistence note</a>.</p>                                                                                                                                                                                                                                                         | <p><code>Microsoft-Windows-TaskScheduler%4Operational.evtx</code>, events introduced in <code>Windows 7</code> / <code>Windows 2008</code>:<br>- Event <code>106</code>: <code>User "\<DOMAIN                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        | WORKGROUP>\&#x3C;USERNAME>" registered Task Scheduler task "\&#x3C;TASK\_NAME>"</code><br>- Event <code>140</code>: <code>User "\<DOMAIN                                                                                                                                                                                     | WORKGROUP>\&#x3C;USERNAME>" updated Task Scheduler task "\<TASKNAME>"</code><br>- Event <code>200</code>: <code>Task Scheduler launched action "\<EXECUTABLE>" in instance "\<GUID>" of task "\<TASKNAME>"</code><br>- Event <code>201</code>: <code>Task Scheduler successfully completed task "\<TASKNAME>", instance "\<GUID>", action "\<EXECUTABLE>" with return code \<INT>"</code><br>- Event <code>141</code>: <code>User "\<DOMAIN | WORKGROUP>\&#x3C;USERNAME>" deleted Task Scheduler task "\<TASKNAME>"</code><br><br><code>Security.evtx</code>, requires advanced auditing policy:<br>- Event <code>4698</code>: <code>A scheduled task was created</code><br>- Event <code>4700: A scheduled task was enabled</code><br>- Event <code>4701</code>: <code>A scheduled task was disabled</code><br>- Event <code>4702</code>: <code>A scheduled task was updated</code><br>- Event <code>4699</code>: <code>A scheduled task was deleted</code></p> | <p><code>Microsoft-Windows-TaskScheduler%4Operational.evtx</code><br><br><code>Security.evtx</code></p> |   |
| <p>PowerShell remoting (<code>WinRM</code>)<br>-<br><code>EVTX</code><br><br><em>Destination host</em></p>                                                                                       | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/powershell_activity">PowerShell activity note</a>.</p>                                                                                                                                                                                                                                                     | <p><code>Microsoft-Windows-PowerShell%4Operational</code>:<br>- Event <code>4103</code>, related to PowerShell modules. Requires PowerShell <code>Module Logging</code> to be enabled.<br>- Event <code>4104</code>, related to PowerShell script block. Requires PowerShell <code>Script Block Logging</code> to be enabled. By default, events will however be logged for potentially-malicious commands execution.<br><br><code>Microsoft-Windows-WinRM%4Operational.evtx</code>:<br>- Event <code>91</code>: <code>Creating WSMan shell on server with ResourceUri: <http://schemas.microsoft.com/[>...]</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | <p><code>Microsoft-Windows-PowerShell%4Operational</code><br><br><code>Microsoft-Windows-WinRM%4Operational.evtx</code></p>                                                                                                                                                                                                  |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>PowerShell remoting (<code>WinRM</code>)<br>-<br><code>wsmprovhost.exe</code> execution<br><br><em>Destination host</em></p>                                                                  | Remote Access / Lateral movements | <p>The PowerShell host process (<code>wsmprovhost.exe</code>) is executed to hosts the active remote session on the destination system.<br><br>If programs are executed through the <code>WinRM</code> session, they will be spawned as child of the <code>wsmprovhost.exe</code> process.</p>                                                                | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                                                                                                                                                                                                                                              |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>PowerShell remoting (<code>WinRM</code>)<br>-<br><code>EVTX</code><br><br><em>Source host</em></p>                                                                                            | Remote Access / Lateral movements | <p>For more information:<br><a href="ttps_analysis/powershell_activity">PowerShell activity note</a>.</p>                                                                                                                                                                                                                                                     | <p><code>Microsoft-Windows-WinRM%4Operational.evtx</code>:<br>- Event <code>6</code>: <code>Creating WSMan Session. The connection string is: \<REMOTE\_HOST>/wsman?PSVersion=XXX</code><br>- Event <code>33</code>: <code>Closing WSMan Session completed successfully</code><br>- Events <code>8</code>, <code>15</code>, <code>16</code>, and <code>31</code>: other events that occur during the life-cycle of the <code>WinRM session</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | `Microsoft-Windows-WinRM%4Operational.evtx`                                                                                                                                                                                                                                                                                  |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p><code>WMI</code><br>-<br><code>wmiprvse.exe</code> execution<br><br><em>Destination host</em></p>                                                                                             | Remote Access / Lateral movements | <p>The <code>WMI Provider Host</code> (<code>wmiprvse.exe</code>) process is executed to run <code>WMI</code> commands.<br><br>If programs are executed through <code>WMI</code>, they will be spawned as child of the <code>wmiprvse.exe</code> process.</p>                                                                                                 | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                                                                                                                                                                                                                                              |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p><code>SSH</code><br>-<br><code>SSHlogs</code><br><br><em>Destination host</em></p>                                                                                                            | Remote Access / Lateral movements | `OpenSSH` for Windows logs in a text format. Not enabled by default (requires `SyslogFacility LOCAL0` / `LogLevel Debug3`) to be set in the server `sshd_config`.                                                                                                                                                                                             | Contains information about users successful and unsuccessful authentication attempts (with the associated IP source).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                | `%ProgramData%\ssh\logs`                                                                                                                                                                                                                                                                                                     |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |
| <p>Port forwarding<br>-<br><code>HKLM\SYSTEM</code><br>-<br><code>PortProxy</code></p>                                                                                                           | Remote Access / Lateral movements | `netsh` port forwarding activity: listening host / port and remote host / port.                                                                                                                                                                                                                                                                               | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\tcp\*</code></p>                                                                                                                                                                    |                                                                                                                                                                                                                                                                                                                                                                                                                                             |                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                         |   |

### Network usage

| Name                                                                                     | Type          | Description                                                                                   | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | Location                                                                                                                                                   | Tool(s)    |
| ---------------------------------------------------------------------------------------- | ------------- | --------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------- |
| <p><code>System Resource Usage Monitor (SRUM)</code><br><br>Introduced in Windows 8.</p> | Network usage | Detailed in `Program execution`.                                                              | <p>The <code>Network Data Usage</code> table (GUID <code>{973F5D5C-1D90-4944-BE8E-24B94231A174}</code>) tracks programs execution and network usage of the executed programs.<br><br>For each entry in the <code>Network Data Usage</code> table (<code>SrumECmd</code>'s <code>NetworkUsages</code> output), the following information may be recorded:<br><br>- Timestamp of the <code>SRUM</code> entry creation.<br><br>- Full path of the executable or application information / description for built-in components.<br><br>- Metrics on network data usage (bytes sent and receive on a given network interface).</p> | `%SystemRoot%\System32\SRU\SRUDB.dat`                                                                                                                      | `SrumECmd` |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>NetworkList</code></p>                         | Network usage | Basic network historical information (network name and type, first and last connection, etc.) | -                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br>Registry key: <code>HKLM\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles\</code></p> |            |

### Local persistence

For artefacts on local persistence and `AutoStart Extensibility Point (ASEP)`, refer to:

* The [local persistence note](https://notes.qazeer.io/dfir/windows/ttps_analysis/local_persistence).
* The [persistence-info repository](https://persistence-info.github.io/).

### Web browsers usage

The web browsers related artefacts can be split in the following categories:

* User profile: web browsers, such as `Chronium`-based browsers and `Firefox`, implement a profile feature to store user's setttings, history, favourites, etc. The databases and files that store these information are usually stored under a user specific profile folder.
* History: web browsing history and download history.
* Cookies: web browsing cookies (session tokens).
* Cache: cache of resources downloaded from accessed websites (images, text content, `HTML`, `CSS`, `Javascript` files, etc.).
* Sessions: tabs and windows from a browsing session.
* Settings: configuration settings.

These files are often stored under `%LocalAppData%` (`%SystemDrive%:\Users\<USERNAME>\AppData\Local\`) and `%AppData%` (`%SystemDrive%:\Users\<USERNAME>\AppData\Roaming\`).

| Name                                                                | Type               | Description                                                                                                                                                                                                                                                                                                                                                          | Information / interpretation                                                                                                                                                                                                                  | Location                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | Tool(s)                                                                                                                                                   |                                                                                                          |                                                                                                                |                                                                                                         |                                                                                                            |                                   |                                                                                             |
| ------------------------------------------------------------------- | ------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------- | --------------------------------- | ------------------------------------------------------------------------------------------- |
| <p><code>NTUSER</code><br>-<br><code>TypedURLs</code></p>           | Web browsers usage | <p><code>URL</code> entered (typed, pasted, or auto-completed) in the <code>Internet Explorer (IE)</code> web browser search bar.<br><br>Web searches do not generate entries, only typing of an <code>URL</code> will.<br><br>Entries are added / updated in near real-time.</p>                                                                                    | <p>The <code>URL</code> are stored as <code>url1</code> to <code>url\[N]</code> in inversed chronological order.<br><br>The last write timestamp of the key is thus the timestamp of visit of the most recently visited <code>URL</code>.</p> | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br>Registry key: <code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\TypedURLs</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          |                                                                                                                                                           |                                                                                                          |                                                                                                                |                                                                                                         |                                                                                                            |                                   |                                                                                             |
| `Microsoft Internet Explorer`                                       | Web browsers usage | <p><code>Microsoft Internet Explorer</code> artefacts.<br><br>For more information: <a href="../common/browsers_forensics">Browsers forensics note</a>.</p>                                                                                                                                                                                                          | -                                                                                                                                                                                                                                             | <p>History, downloads, cache, and cookies metadata in a <code>ESE</code> database:<br><code>%LocalAppData%\Microsoft\Windows\WebCache\WebCacheV01.dat</code><br>> History: <code>History</code> table<br>> Downloads: <code>iedownload</code> table.<br>> Cache: <code>content</code> table<br>> Cookies metadata: <code>Cookies</code> table.<br><br>Local files access, not necessarily through the webbrowser, may also appear in the <code>WebCacheV01.dat</code> database with the <code>file</code> <code>URI</code> scheme (such as <code>file:///\<DRIVE\_LETTER>:/folder/file</code>).<br><br>Cookies:<br><code>%AppData%\Microsoft\Windows\Cookies</code><br><br>Sessions:<br><code>%LocalAppData%\Microsoft\Internet Explorer\Recovery\*.dat</code></p> | [`NirSoft's BrowsingHistoryView`](https://www.nirsoft.net/utils/browsing_history_view.html)                                                               |                                                                                                          |                                                                                                                |                                                                                                         |                                                                                                            |                                   |                                                                                             |
| <p><code>Microsoft Edge</code><br>(Legacy)</p>                      | Web browsers usage | <p><code>Microsoft Edge</code> (legacy version) artefacts.<br><br>For more information: <a href="../common/browsers_forensics">Browsers forensics note</a>.</p>                                                                                                                                                                                                      | -                                                                                                                                                                                                                                             | <p>User profile(s):<br><code>%LocalAppData%\Packages\Microsoft.MicrosoftEdge\_XXX\AC</code><br><br>History, downloads, cache, and cookies (file shared with <code>Microsoft Internet Explorer</code>):<br><code>%LocalAppData%\Microsoft\Windows\WebCache\WebCacheV01.dat</code><br><br>Cache:<br><code>%LocalAppData%\Packages\Microsoft.MicrosoftEdge\_XXX\AC#!XXX\MicrosoftEdge\Cache</code><br><br>Sessions:<br><code>%LocalAppData%\Packages\Microsoft.MicrosoftEdge\_XXX\AC\MicrosoftEdge\User\Default\Recovery\Active</code><br><br>Settings:<br><code>%LocalAppData%\Packages\Microsoft.MicrosoftEdge\_XXX\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\XXX\DBStore\spartan.edb</code></p>                                                         | [`NirSoft's BrowsingHistoryView`](https://www.nirsoft.net/utils/browsing_history_view.html)                                                               |                                                                                                          |                                                                                                                |                                                                                                         |                                                                                                            |                                   |                                                                                             |
| <p><code>Microsoft Edge</code><br>(<code>Chronium</code>-based)</p> | Web browsers usage | <p><code>Microsoft Edge</code> (<code>Chronium</code>-based) artefacts.<br><br>Since Edge version <code>v79</code> (January 2020), <code>Microsoft Edge</code> uses a <code>Chronium</code> backend and shares similar artefacts to <code>Google Chrome</code>.<br><br>For more information: <a href="../common/browsers_forensics">Browsers forensics note</a>.</p> | -                                                                                                                                                                                                                                             | <p>User profile(s):<br><code>%LocalAppData%\Microsoft\Edge\User Data\&#x3C;Default                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | Profile X>\*</code><br><em>With <code>X</code> ranging from one to n.</em><br><br>History:<br><code>%LocalAppData%\Microsoft\Edge\User Data\&#x3C;Default | Profile X>\History</code><br><br>Cookies:<br><code>%LocalAppData%\Microsoft\Edge\User Data\&#x3C;Default | Profile X>\Network\Cookies</code><br><br>Cache:<br><code>%LocalAppData%\Microsoft\Edge\User Data\&#x3C;Default | Profile X>\Cache</code><br><br>Sessions:<br><code>%LocalAppData%\Microsoft\Edge\User Data\&#x3C;Default | Profile X>\Sessions</code><br><br>Settings:<br><code>%LocalAppData%\Microsoft\Edge\User Data\&#x3C;Default | Profile X>\Preferences</code></p> | [`NirSoft's BrowsingHistoryView`](https://www.nirsoft.net/utils/browsing_history_view.html) |
| `Google Chrome`                                                     | Web browsers usage | <p><code>Google Chrome</code> artefacts.<br><br>For more information: <a href="../common/browsers_forensics">Browsers forensics note</a>.</p>                                                                                                                                                                                                                        | -                                                                                                                                                                                                                                             | <p>User profile(s):<br><code>%LocalAppData%\Google\Chrome\User Data\&#x3C;Default                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | Profile X>\*</code><br><em>With <code>X</code> ranging from one to n.</em><br><br>History:<br><code>%LocalAppData%\Google\Chrome\User Data\&#x3C;Default  | Profile X>\History</code><br><br>Cookies:<br><code>%LocalAppData%\Google\Chrome\User Data\&#x3C;Default  | Profile X>\Network\Cookies</code><br><br>Cache:<br><code>%LocalAppData%\Google\Chrome\User Data\&#x3C;Default  | Profile X>\Cache</code><br><br>Sessions:<br><code>%LocalAppData%\Google\Chrome\User Data\&#x3C;Default  | Profile X>\Sessions</code><br><br>Settings:<br><code>%LocalAppData%\Google\Chrome\User Data\&#x3C;Default  | Profile X>\Preferences</code></p> | [`NirSoft's BrowsingHistoryView`](https://www.nirsoft.net/utils/browsing_history_view.html) |
| `Mozilla Firefox`                                                   | Web browsers usage | <p><code>Mozilla Firefox</code> artefacts.<br><br>For more information: <a href="../common/browsers_forensics">Browsers forensics note</a>.</p>                                                                                                                                                                                                                      | -                                                                                                                                                                                                                                             | <p>User profile(s):<br><code>%AppData%\Mozilla\Firefox\Profiles\&#x3C;ID>.default-release\*</code><br><br>History, downloads, and bookmarks in a <code>SQLite</code> database:<br><code>%AppData%\Mozilla\Firefox\Profiles\&#x3C;ID>.default-release\places.sqlite</code><br><br>Cookies in a <code>SQLite</code> database:<br><code>%AppData%\Mozilla\Firefox\Profiles\&#x3C;ID>.default-release\cookies.sqlite</code><br><br>Cache:<br><code>%LocalAppData%\Mozilla\Firefox\Profiles\&#x3C;ID>.default-release\cache2\*</code><br><br>Sessions:<br><code>%AppData%\Mozilla\Firefox\Profiles\&#x3C;ID>.default-release\sessionstorebackups\*</code><br><br>Settings:<br><code>%AppData%\Mozilla\Firefox\Profiles\&#x3C;ID>.default-release\prefs.js</code></p>    | [`NirSoft's BrowsingHistoryView`](https://www.nirsoft.net/utils/browsing_history_view.html)                                                               |                                                                                                          |                                                                                                                |                                                                                                         |                                                                                                            |                                   |                                                                                             |

### Devices and USB activity

**Windows devices terminology:**

* The `vendor ID` identifies a specific vendor, with a mapping available on [devicehunt.com](https://devicehunt.com/all-usb-vendors). The `product ID (PID)` identifies a product from that vendor.
* The `device ID` or `hardware ID` is "a vendor-defined identification string that Windows uses to match a device to a driver package". The identifier references the vendor and product names as well as the revision version. Example for a `DataTraveler_3` USB key by Kingston: `Ven_Kingston&Prod_DataTraveler_3.0&Rev_PMAP`.
* The `instance ID` is "a device identification string that distinguishes a device from other devices of the same type on a computer". It contains the device `serial number`, if supplied, and otherwise "some kind of location information". Example of an `instance ID` for a device that does not supply a serial number: `5&2eab04ab&0&1`.
* The `device instance ID` is "a system-supplied device identification string that uniquely identifies a device in the system". It is notably composed of the device's `device ID` and `instance ID`.
* The `container ID` is "a system-supplied device identification string that uniquely groups the functional devices associated with a single-function or multifunction device installed in the computer". Starting with Windows 7, the `Plug and Play (PnP) manager` uses the `container ID` to group one or more device nodes (`devnodes`) that originated from a particular physical device.
* The `device interface class` represents the type of the device (storage devices, USB devices, Bluetooth devices, etc.). Each `device interface class` is associated with a unique `GUID`, defined by Microsoft. The list of `GUIDs` by category of device can be found [in the Microsoft documentation](https://learn.microsoft.com/en-us/previous-versions/ff553412\(v=vs.85\)).
  * External physical storage `GUID`: `{53f56307-b6bf-11d0-94f2-00a0c91efb8b}`.
  * Logical volumes `GUID`: `{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}`.

**Devices and USB activity forensics artefacts**

*The information below originates from tests on `Windows 10 Pro - 19045.2965` and `Windows 11 Pro - build 22621.1702` systems.*

| Name                                                                                                                          | Type                     | Description                                                                                                                                                                                                                                             | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | Location                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      | Tool(s)                                                                                                                                                                             |   |
| ----------------------------------------------------------------------------------------------------------------------------- | ------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | - |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>Enum\USB</code></p>                                                                 | Devices and USB activity | Contains system-wide information about the currently or previously connected USB devices.                                                                                                                                                               | <p>Each USB devices is associated with a dedicated subkey under the <code>Enum\USB</code> key. This subkey is named after the device <code>vendor ID (VID)</code> and <code>product ID (PID)</code> of the device. Example: <code>VID\_1B1C\&PID\_4242</code>.<br><br>Underneath the <code>VID</code> / <code>PID</code> subkey, another subkey is named after the <code>instance ID</code> of the device (referencing either the device's <code>serial number</code> or location information). This subkey references in turn information and parameters for the USB device as values and under the <code>Properties</code> and <code>Device Parameters</code> subkeys, notably:<br><br>- The <code>ClassGUID</code> key value references the <code>device interface class</code> <code>GUID</code> of the device.<br><br>- The <code>ContainerID</code> key value references the <code>container ID</code> of the device.<br><br>The <code>Properties{83da6326-97a6-4088-9453-a1923f573b29}</code> subkey notably references three child subkeys of interest, each containing a timestamp value:<br>> <code>0064</code> (starting from Windows 7): timestamp of when the device was first plugged-in / installed.<br>> <code>0066</code> (starting from Windows 8): timestamp of when the device was last connected.<br>> <code>0067</code> (starting from Windows 8): timestamp of when the device was last removed.<br><br><strong>This key can thus be used to:</strong><br><br><strong>- Identity the <code>vendor ID (VID)</code> and <code>product ID (PID)</code> of an USB device from its <code>serial number</code> or location information (and vice versa).</strong><br><br><strong>- Determine when the device was first and last plugged-in and last unplugged for Windows 7 / 8+.</strong></p>                                                                                                                                                                                                                                           | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br><br>Registry key:<br><code>HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                                                                                                     |   |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>Enum\USBSTOR</code></p>                                                             | Devices and USB activity | Contains system-wide information about the currently or previously connected USB devices **that are related to storage**.                                                                                                                               | <p>Each USB devices is associated with a dedicated subkey under the <code>Enum\USBSTOR</code> key. This subkey is named after the device <code>device ID</code> or <code>hardware ID</code> of the device, which references the vendor and product names. Example: <code>Disk\&Ven\_SanDisk\&Prod\_Extreme\&Rev\_0001</code>.<br><br>Underneath the <code>device ID</code> subkey, another subkey is named after the <code>instance ID</code> of the device (referencing either the device's <code>serial number</code> or location information). This subkey in turn references:<br><br>- The same information as the <code>Enum\USB</code> key.<br><br>- A <code>volume id</code> for one of the device volume in the <code>DiskId</code> key value under the <code>Device Parameters\Partmgr</code>.<br><br><strong>This key can thus be used to:</strong><br><br><strong>- Identity the <code>device id</code> (vendor and product names) of an USB device from its <code>serial number</code> or location information (and vice versa).</strong><br><br><strong>- Determine when the device was first and last plugged-in and last unplugged for Windows 7 / 8+.</strong><br><br><strong>- Retrieve a <code>volume id</code> for the (or one of the) volume(s) of the device.</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br><br>Registry key:<br><code>HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR\</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                |                                                                                                                                                                                     |   |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>Enum\SWD\WPDBUSENUM</code></p>                                                      | Devices and USB activity | Contains system-wide information about the currently or previously .                                                                                                                                                                                    | <p>Each devices is associated with a dedicated subkey under the <code>WPDBUSENUM</code> key.<br><br>This key is named with a string containing either:<br><br>- The device's <code>device instance ID</code> (that includes the device's vendor and product names and <code>serial number</code>) and <code>device interface class</code> <code>GUID</code>. Example: <code>SWD#WPDBUSENUM#\_??\_USBSTOR#DISK\&VEN\_SAMSUNG\&PROD\_TYPE-C\&REV\_1100#0376022080001660&0#{53F56307-B6BF-11D0-94F2-00A0C91EFB8B}</code>.<br><br>- The <code>volume id</code>. Example: <code>SWD#WPDBUSENUM#{44B06C95-F0BA-11ED-9802-6C9466A63B90}#000000000C900000</code>.<br><br>This subkey references:<br><br>- The same information as the <code>Enum\USB</code> key.<br><br>- A "friendly name" or display name of the (or one of the) volume associated with the device in the <code>FriendlyName</code> key value.<br><br><strong>This key can thus be used to:</strong><br><br><strong>- Identity the <code>device id</code> (vendor and product names) of an USB device from its <code>serial number</code> or location information (and vice versa).</strong><br><br><strong>- Determine when the device was first and last plugged-in and last unplugged for Windows 7 / 8+.</strong><br><br><strong>- Retrieve a friendly name of the (or one of the) volume associated with the device.</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br><br>Registry key:<br><code>HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Enum\SWD\WPDBUSENUM</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                          |                                                                                                                                                                                     |   |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>MountedDevices</code></p>                                                           | Devices and USB activity | <p>The persistent database of the <code>Mount manager</code> (component responsible for managing volume names).<br><br>Contains system-wide information about the currently or previously mounted drives (such as the system drive or USB devices).</p> | <p>Each devices is associated with a separate binary value, composed of:<br><br>- The device <code>volume GUID</code> (as the key's value name).<br><br>- The <code>device / hardware ID</code>, <code>instance ID</code>, and <code>device interface class</code> <code>GUID</code> in a <code>#</code> separated string (as the key's value data).<br>> The <code>device ID</code> / <code>hardware ID</code> references the vendor and product names.<br>> The <code>instance ID</code> contains the device's <code>serial number</code> or location information.<br>> The <code>device interface class</code> represents the type of the device and each <code>class</code> is associated with a unique <code>GUID</code>.<br><br>Full example value for an USB key: <code>\_??\_USBSTOR#Disk\&Ven\_Kingston\&Prod\_DataTraveler\_3.0\&Rev\_PMAP#60A44C42568CB041B98902A4&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</code><br><br><strong>This key can thus be used to identity the <code>volume GUID</code> or the drive letter associated with the device from its <code>serial number</code> or location information (and vice versa).</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br><br>Registry key:<br><code>HKEY\_LOCAL\_MACHINE\SYSTEM\MountedDevices</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 |                                                                                                                                                                                     |   |
| <p><code>HKLM\SYSTEM</code><br>-<br><code>DeviceClasses</code><br><br>Introduced in Windows Vista.</p>                        | Devices and USB activity | Contains system-wide information about the currently or previously connected plug and play devices (such as storage devices, volumes, network devices, Bluetooth devices, etc.).                                                                        | <p>Contains subkeys for each <code>device classes</code> (physical disk, volume, USB devices, Bluetooth devices, etc.). The subkeys are named after the <a href="https://learn.microsoft.com/en-us/previous-versions/ff553412(v=vs.85)"><code>device classes</code> <code>GUID</code></a>.<br><br>Under each <code>GUID</code> subkeys, the devices of the given type are referenced as their own subkey, whose name is a <code>#</code> separated string composed of the <code>device / hardware ID</code>, <code>instance ID</code>, and <code>device interface class</code> <code>GUID</code> of the device.<br><br>An external physical storage would be referenced under the <code>{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</code> <code>GUID</code> subkey. The logical volumes on the device would be referenced in the <code>{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}</code> <code>GUID</code> subkey.<br><br>Example of a <code>{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</code> subkey: <code>##?#SCSI#Disk\&Ven\_Samsung\&Prod\_SSD\_870\_EVO\_2TB#4\&cd4f6d&0&040000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</code>.<br>Example of a <code>{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}</code> subkey: <code>##?#STORAGE#Volume#{d446d066-ade9-11ed-8679-eae9fe3c14cf}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}</code>.<br><br><strong>This key can thus be used to identity the <code>device id</code> (vendor and product names) of an USB device from its <code>serial number</code> or location information (and vice versa).</strong><br><br>The <strong>last written timestamp of a device subkey</strong> can be an indicator of <strong>when the device was last plugged on the system or the first time the device was plugged following a reboot</strong>. However, <strong>the subkey does not appear to be reliably written to</strong> on recent versions of the Windows operating system and thus <strong>the timestamp should not be considered by itself as a reliable indicator of the device's last activity</strong>.</p> | <p>File: <code>%SystemRoot%\System32\config\SYSTEM</code><br><br>Registry key:<br><code>HKEY\_LOCAL\_MACHINE\SYSTEM\CurrentControlSet\Control\DeviceClasses</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                        |                                                                                                                                                                                     |   |
| <p><code>HKLM\SOFTWARE</code><br>-<br><code>Windows Portable Devices</code></p>                                               | Devices and USB activity | Contains information on currently or previously attached media and storage devices, notably the device volume(s)'s "friendly name" or display name.                                                                                                     | <p>Each devices is associated with a dedicated subkey under the <code>Windows Portable Devices\Devices</code> key.<br><br>This key is named with a string containing either:<br><br>- The device's <code>device instance ID</code> (that includes the device's vendor and product names and <code>serial number</code>) and <code>device interface class</code> <code>GUID</code>. Example: <code>SWD#WPDBUSENUM#\_??\_USBSTOR#DISK\&VEN\_SAMSUNG\&PROD\_TYPE-C\&REV\_1100#0376022080001660&0#{53F56307-B6BF-11D0-94F2-00A0C91EFB8B}</code>.<br><br>- The <code>volume id</code>. Example: <code>SWD#WPDBUSENUM#{44B06C95-F0BA-11ED-9802-6C9466A63B90}#000000000C900000</code>.<br><br>The <code>FriendlyName</code> key value represents the "friendly name" or display name of the (or one of the) volume associated with the device.<br><br><strong>This key can thus be used to identity a volume friendly name from (a) a device <code>serial number</code> / location information or (b) a <code>volume id</code> (and vice versa).</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    | <p>File: <code>%SystemRoot%\System32\config\SOFTWARE</code><br><br>Registry key: <code>HKLM\SOFTWARE\Microsoft\Windows NT\Windows Portable Devices</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                 |                                                                                                                                                                                     |   |
| <p><code>HKLM\SOFTWARE</code><br>-<br><code>VolumeInfoCache</code></p>                                                        | Devices and USB activity | Contains information on currently or previously mounted volumes, notably a mapping between drive letters and the last associated volume(s)'s "friendly name" or display name.                                                                           | <p>Each previously referenced drive letter (<code>A:</code> to <code>Z:</code>, including <code>C:</code>) is associated with a dedicated subkey under the <code>VolumeInfoCache</code> key.<br><br>This subkey contains information about the volume last associated with the corresponding drive letter:<br>- The volume friendly name in the <code>VolumeLabel</code> value.<br>- The associated <a href="https://learn.microsoft.com/en-us/dotnet/api/system.io.drivetype">drive type</a> in the <code>DriveType</code> value. Both hard disks / SSDs and storage devices (such as USB keys) appear to be associated with the value <code>3</code> (on Windows 10).<br><br>The last written timestamp of the key is an indicator of when a volume was last associated with a given drive letter.<br><br><strong>This key can thus be used to:</strong><br><strong>- Identity a volume drive letter from a volume friendly name (and vice versa)</strong>, if the volume was the last one to be associated with the given letter.<br><strong>- Determine when a volume was last associated with a given drive letter.</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     | <p>File: <code>%SystemRoot%\System32\config\SOFTWARE</code><br><br>Registry key: <code>HKLM\SOFTWARE\Microsoft\Windows Search\VolumeInfoCache</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                      |                                                                                                                                                                                     |   |
| <p><code>HKLM\SOFTWARE</code><br>-<br><code>EMDMgmt</code><br><br>Only available if the system drive is not an SSD</p>        | Devices and USB activity | Related to the ReadyBoost feature.                                                                                                                                                                                                                      | <p>Each USB devices is associated with a dedicated subkey under the <code>EMDMgmt</code> key. This subkey is named after the device <code>device ID</code> or <code>hardware ID</code> of the device, which references the vendor and product names. Example: <code>Disk\&Ven\_SanDisk\&Prod\_Extreme\&Rev\_0001</code>.<br><br>The subkey contains:<br>- the device's <code>serial number</code><br>- The associtated volume <code>serial number</code><br>- Possibly the volume friendly name (if the mounted volume has a name).<br><br><a href="http://windowsir.blogspot.com/2013/04/plugin-emdmgmt.html">Example</a>:<br>Disk\&Ven\_Best\_Buy\&Prod\_Geek\_Squad\_U3\&Rev\_6.15<br>> LastWrite: Sun Jul 17 12:13:25 2011 Z<br>> SN: 0C90195032E36889&0<br>> Vol Name: TEST<br>> VSN: 6403-CD1C</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p>File: <code>%SystemRoot%\System32\config\SOFTWARE</code><br><br>Registry key: <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\EMDMgmt</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                   |                                                                                                                                                                                     |   |
| <p><code>NTUSER</code><br>-<br><code>MountPoints2</code></p>                                                                  | Devices and USB activity | Currently or previously mapped drives (such as the system drive, USB devices, or network shares) mounted by the associated user.                                                                                                                        | <p>Each drives is represented by a subkey, which is named as either the <code>volume GUID</code>, a letter, or, for network shares, using a specific nomenclature (<code>##\<IP                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | HOSTNAME>#\<SHARE\_NAME></code>).<br><br>For devices, the <code>volume GUID</code> can be used to retrieve more information on the device from the <code>HKLM\SYSTEM\MountedDevices</code> registry key, including the <code>device / hardware ID</code> (vendor and product name) and <code>instance ID</code> (with the <code>serial number</code> if existing).<br><br><strong>This key can be used to determine which user interacted with a given USB device. However entries are not reliably created, so the absence of an entry is not an indicator that the given user didn't interact with the device.</strong></p> | <p>File: <code>%SystemDrive%:\Users\&#x3C;USERNAME>\NTUSER.dat</code><br><br>Registry key:<br><code>HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2</code></p> |   |
| `setupapi` logs                                                                                                               | Devices and USB activity | <p>Plaintext log files that track installation of devices and drivers.<br><br>The logs are rotated and preserved, so historical data dating back to the system install should be available (if the logs were not deleted / tampered).</p>               | <p><strong>Device installation entries</strong> (generated when the device is plugged-in) <strong>contain various information, including the device:</strong><br><strong>- <code>serial number</code>.</strong><br><strong>- <code>Device id</code> (vendor and product names) or <code>vendor ID (VID)</code> + <code>product ID (PID)</code>.</strong><br><br>Extract of an entry for the first time an USB device was plugged-in:<br><em>>>> \[Device Install (Hardware initiated) - SWD\WPDBUSENUM\_??\_USBSTOR#Disk\&Ven\_USB\&Prod\_Flash\_Disk\&Rev\_1100#7\&d2713f&0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}]</em><br><em>>>> Section start 2021/02/07 19:11:17.101</em><br><br>Device are sometimes "deleted" through the <code>cleanmgr.exe</code> utility:<br><em>>>> \[Delete Device - USB\VID\_090C\&PID\_2000\8&1DBBAC39&0&3]</em><br><em>>>> Section start 2023/03/16 16:55:26.426</em><br><em>cmd: "%SystemRoot%\Windows\system32\cleanmgr.exe" /autoclean /d C:</em><br><em><<< Section end 2023/03/16 16:55:26.473</em><br><br>The timestamps in the <code>setupapi</code> logs are in the local timezone of the system.<br><br><strong>The logs can be used to determine when a device was first plugged (in the local timezone of the system).</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            | <p>Windows XP: <code>%SystemRoot%\setupapi.log</code><br><br>Starting from Windows 7:<br><code>%SystemRoot%\INF\setupapi.dev.log</code><br><code>%SystemRoot%\INF\setupapi.dev.\<YYYYMMDD-HMMSS>.log</code></p>                                                                                                                                                                                                                                                                                                                                                                                                               |                                                                                                                                                                                     |   |
| <p><code>EVTX</code><br>-<br><code>Microsoft-Windows-Storage-ClassPnP/Operational</code></p>                                  | Devices and USB activity | Provider: `Microsoft-Windows-StorDiag`.                                                                                                                                                                                                                 | <p>Event <code>507</code>: error events.<br>> Generated multiple times, for every connection, and sometimes safe removal and while the device is plugged-in. As the event is generated upon errors, it may however not be reliably logged.<br>Relevant information:<br>- Device's vendor and product names.<br>- Device <code>serial number</code> (which is however not the same as the one found in the registry and ofter shows up as <code>AA00000000000489</code> for different USB storage devices).<br>- Device number, which is an incremental number based on the number of devices plugged-in, for all devices, including the system drive (which would like be device number 1).<br>- Device's <code>DeviceGUID</code> which can be used for correlation with other events.<br><br>Other events, also generated upon errors and with similar information: <code>500</code>, <code>502</code>, <code>503</code>, <code>504</code>, <code>505</code>, <code>506</code>, and <code>510</code>.<br><br><strong>These events, especially <code>507</code>, can be used to:</strong><br><br><strong>- Determine when a device was plugged using the device vendor and product names or <code>serial number</code>.</strong><br><br><strong>- Retrieve (a version of) the device <code>serial number</code> (!= registry <code>serial number)</code> and its vendor and product names.</strong><br><br><strong>- Identify the device <code>DeviceGUID</code> for correlation with other events.</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          | `Microsoft-Windows-Storage-ClassPnP%4Operational.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        |                                                                                                                                                                                     |   |
| <p><code>EVTX</code><br>-<br><code>Microsoft-Windows-Kernel-PnP/Device Configuration</code></p>                               | Devices and USB activity | <p>Provider: <code>Microsoft-Windows-Kernel-PnP</code>.<br><br>Contains information for all plug and play devices, not limited to USB storage devices.</p>                                                                                              | <p>Event <code>400</code>: <code>Device \<DEVICE> was configured</code>.<br>Event <code>401</code>: <code>Device \<DEVICE> failed configuration</code>.<br>Event <code>410</code>: <code>Device \<DEVICE> was started</code>.<br>Event <code>411</code>: <code>Device \<DEVICE> had a problem starting</code>.<br>Event <code>430</code>: <code>Device \<DEVICE> requires further installation</code>.<br>> The events above appear to be generated when a device is first plugged-in to the system.<br><br>Event <code>420</code>: <code>Device \<DEVICE> was deleted</code>.<br><br>The <code>\<DEVICE></code> string is based on the event <code>DeviceInstanceId</code> field, which contains the device's <code>vendor ID (VID)</code>, <code>product ID (PID)</code> and (registry) <code>serial number</code> or location information.<br><br><strong>These events can be used to:</strong><br><br><strong>- Determine when a device was first plugged.</strong><br><br><strong>- Identity the <code>vendor ID (VID)</code> and <code>product ID (PID)</code> of the device from its <code>serial number</code> or location information (and vice versa).</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             | `Microsoft-Windows-Kernel-PnP%4Configuration.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            |                                                                                                                                                                                     |   |
| <p><code>EVTX</code><br>-<br><code>Microsoft-Windows-Kernel-PnP/Device Management</code><br><br>Introduced in Windows 11.</p> | Devices and USB activity | <p>Provider: <code>Microsoft-Windows-Kernel-PnP</code>.<br><br>Contains information for all plug and play devices, not limited to USB storage devices.</p>                                                                                              | <p>Event <code>1010</code>: <code>Device \<DEVICE> has been surprise removed as it is reported as missing on the bus</code>.<br><br>The event is reliably generated when a device is removed / unplugged without prior ejection. Additionally, subsequent immediate event(s) are generated for each of the device volume(s).<br><br>Relevant information:<br>- For USB storage device: <code>vendor ID (VID)</code>, <code>product ID (PID)</code>, (registry) <code>serial number</code> or location information. Example: <code>USB\VID\_18A5\&PID\_0302\1601000001586259</code>.<br>- For volumes: the <code>volume GUID</code> of the volume. Example: <code>STORAGE\Volume\&#x3C;GUID></code>.<br><br><strong>If a device has been removed without prior ejection, these events can be used to:</strong><br><br><strong>- Determine when a device was unplugged with out prior ejection, from the device (registry) <code>serial number</code> or location information.</strong><br><br><strong>- Identity the <code>vendor ID (VID)</code> and <code>product ID (PID)</code> of the device from its <code>serial number</code> or location information (and vice versa).</strong><br><br><strong>- Identify the <code>volumes GUID</code> associated with the device.</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | `Microsoft-Windows-Kernel-PnP%4Device Management.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        |                                                                                                                                                                                     |   |
| <p><code>EVTX</code><br>-<br><code>Microsoft-Windows-Partition/Diagnostic</code></p>                                          | Devices and USB activity | Provider: `Microsoft-Windows-Partition`.                                                                                                                                                                                                                | <p>Event <code>1006</code>.<br><br>The event is generated when a device is plugged and unplugged with or without prior ejection.<br><br><strong>This event contains key relevant information, and notably information that are not available in other sources:</strong><br><br><strong>- Vendor and product names of the device.</strong><br><br><strong>- <code>vendor ID (VID)</code>, <code>product ID (PID)</code>, and (registry) <code>serial number</code> or location of the device</strong> (in the <code>ParentId</code> field).<br><br><strong>- A <code>volume id</code> for one of the device volume</strong> in the <code>RegistryId</code> field.<br><br>- (A version of) the device serial number (!= registry serial number).<br><br>- The <code>DeviceGUID</code> of the device in the <code>DiskId</code>, for correlation with other events.<br><br><strong>- The size in bytes of the device in the <code>Capacity</code> field. The capacity is set to 0 if the event match a removal.</strong><br><br><strong>- Raw dumps of the partition table</strong> (field <code>PartitionTable</code>), <strong><code>Master Boot Record (MBR)</code></strong> (field <code>Mbr</code>), <strong>and / or <code>Volume Boot Record (VBR)</code></strong> (field <code>VbrX</code>) if available. The <strong><code>VBR</code> dump can be used to reconstruct the <code>Volume Serial Number</code></strong> of the device.<br><br><strong>This event can be used to determine when a drive was plugged / unplugged and to retrieve the aforementioned information.</strong></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                            | `Microsoft-Windows-Partition%4Diagnostic.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                |                                                                                                                                                                                     |   |
| <p><code>EVTX</code><br>-<br><code>Microsoft-Windows-Ntfs/Operational</code></p>                                              | Devices and USB activity | <p>Provider: <code>Microsoft-Windows-Ntfs</code>.<br><br>These events are only generated for devices that have a <code>NTFS</code> volume.</p>                                                                                                          | <p>Event <code>142</code>: <code>Summary of disk space usage, since last event</code>.<br><br>> This event is generated with a limited delay following the plugin of the device, one occurrence for each volume(s) of the device.<br><br>Relevant information:<br>- The volume friendly name and associated drive letter.<br>- A <code>volume id</code> for one of the device volume.<br><br><strong>This event can thus be used to determine the volume friendly name(s) and drive letter(s) associated with a device, either using the <code>volume GUIDs</code> of the volumes on the device or time correlation with other events.</strong><br><br><br>Starting from Windows 11:<br><br>Event <code>4</code>: <code>The NTFS volume has been successfully mounted</code>.<br>Event <code>9</code>: <code>NTFS scanned entire volume bitmap</code>.<br>Event <code>10</code>: <code>NTFS cached run statistics</code>.<br>Event <code>300</code>: <code>The NTFS volume dismount has started</code>.<br>Event <code>303</code>: <code>The NTFS volume has been successfully dismounted</code>.<br><br>> These events are reliably generated when a device is plugged and unplugged with or without prior ejection.<br><br>Relevant information:<br>- The volume friendly name and associated drive letter.<br>- Vendor and product names of the device.<br>- (A version of) the device serial number (!= registry serial number).<br>- <code>DeviceGuid</code> (for correlation with other events).<br>- Whether the drive was ejected ("Reason: Explicit lock") or directly unplugged ("Reason: Surprise removal").<br><br><strong>These events can thus be used to:</strong><br><br><strong>- Determine when a device was plugged / unplugged</strong> (and if it was with or without prior ejection) <strong>and its associated volumes mounted / dismounted</strong><br><br><strong>- Identity the volume friendly name(s) and drive letter(s) associated with a device</strong>.</p>                                                              | `Microsoft-Windows-Ntfs%4Operational.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    |                                                                                                                                                                                     |   |

### Anti-vius and Remote Administration/Access applications

The `ruler-project` references numerous [anti-virus products (20+)](https://ruler-project.github.io/ruler-project/RULER/av/) and [remote administration/access applications (15+)](https://ruler-project.github.io/ruler-project/RULER/remote/) artifacts.

### Other third-party applications

The [SANS institute "Windows Third-Party Apps Forensics" poster](https://www.sans.org/posters/windows-third-party-apps-forensics-poster/) can be consulted for a list of artefacts from a number of popular Windows third-party applications (also including anti-vius and remote administration/access applications).

| Name                                | Type                                                                           | Description                                                                                                                                                                                                                                                                                                                                                                                                   | Information / interpretation             | Location | Tool(s) |
| ----------------------------------- | ------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------- | -------- | ------- |
| `Azure`'s PowerShell / CLI activity | Interaction with Azure though the `Az` PowerShell module and `az` CLI utility. | <p>Folder <code>telemetry</code>: may contain information on <code>azurecli</code> commands (user Azure ID, raw command, etc.).<br><br>Folder <code>commands</code>: similar to <code>telemetry</code> folder, with less data on the executed <code>azure cli</code> commands.<br><br>Folder <code>ErrorRecords</code>: details on HTTP requests, and their associated response, that generated an error.</p> | `%SystemRoot%\Users\<USERNAME>\.azure\*` |          |         |

### Defense evasion

| Name                                                                                         | Type            | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | Information / interpretation                       | Location        | Tool(s) |
| -------------------------------------------------------------------------------------------- | --------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------- | --------------- | ------- |
| <p><code>EVTX</code><br>-<br><code>Security.evtx</code><br>-<br>Security event log clear</p> | Defense evasion | <p>Generated upon the deletion of events in the <code>Security</code> logs.<br><br>The absence of event <code>1102</code> should however not be taken as a sign of integrity of the <code>Security</code> events, as the generation of this event can be bypassed. For instance, the threads of the <code>Event Log</code> service threads (hosted by <code>svchost.exe</code>) can be suspended to prevent events generation while the threads are suspended (even though all events will be written upon resuming of the threads).</p> | Event `1102`: `The audit log was cleared`          | `Security.evtx` |         |
| <p><code>EVTX</code><br>-<br><code>System.evtx</code><br>-<br>Security event log clear</p>   | Defense evasion | <p>Generated upon the deletion of events from event logs files (other than <code>Security.evtx</code>).<br><br></p>                                                                                                                                                                                                                                                                                                                                                                                                                      | Event `104`: `The <PROVIDER> log file was cleared` | `System.evtx`   |         |

### Others

| Name                                                                                                                            | Type                         | Description                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           | Information / interpretation                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | Location                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | Tool(s)                                                                                                                                                                 |
| ------------------------------------------------------------------------------------------------------------------------------- | ---------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| <p><code>Thumbs.db</code><br><br><code>Thumbcache</code></p>                                                                    | Thumbnail previews of files  | <p>The <code>Thumbs.db</code> and <code>Thumbcache</code> files contain cached thumbnail previews for files (pictures, some document and media file types) in folders that were interactively accessed with the <code>Windows Explorer</code>. The thumbnail previews are stored in these databases as it takes less system resources (CPU time and memory) to retrieve an already generated thumbnail as opposed to generating it every time the directory is accessed.<br><br>For a <code>Thumbs.db</code> file to be generated in a given folder, or for entries to be added to the central <code>Thumbcache</code> files, the access must have been done with some sort of files' thumbnail / icon preview enabled.<br><br>The cached thumbnail previews persist even after deletion of the associated files. Some document types, such as <code>PDF</code> files, will have their first page as their thumbnail preview.</p>                                                     | <p>The <code>Thumbs.db</code> files are stored in their associated folders, with one individual <code>Thumbs.db</code> file per folder (that was interactively accessed with files preview). However, since Windows Vista, <code>Thumbs.db</code> files are only generated for access through <code>UNC</code> paths (such as <code>\\\<HOST>\&#x3C;SHARE\_NAME>\&#x3C;FOLDER></code> or <code>\\\<HOST>\c$\&#x3C;FOLDER></code>) in the remote / share directory.<br><br>Each thumbnail created in a directory is represented in the <code>Thumbs.db</code> file as a small <code>JPEG</code> file, regardless of the file's original format. The images are resized to 96 × 96 pixels by default. As each <code>Thumbs.db</code> file is associated with a given directory, the location of the cached thumbnails can be easily deduced.<br><br>Starting with Windows Vista, the <code>Thumbcache</code> files centralize thumbnails in a central location. Each <code>Thumbcache</code> file, labeled <code>thumbcache\_\<RESOLUTION>.db</code>, contains thumbnails from all locations. The <code>\<RESOLUTION></code> indicate the resolution of the thumbnail previews, such as the <code>thumbcache\_1280.db</code> file for thumbnails in 1280 x 720 pixels resolution.<br><br>The location of the file linked to a thumbnail is not stored in the <code>Thumbcache</code> file. However, each thumbnail in the <code>Thumbcache</code> file is associated with an unique identifier <code>ThumbnailcacheID</code>. This identifier / hash can be used to retrieve the location of the associated file, mostly for non deleted files:<br>- By scanning and computing the identifier for every files on the volume. This requires the file to still be present on the volume.<br>- By searching the <code>Windows Search</code> database (<code>Windows.edb</code>) for the <code>ThumbnailcacheID</code>, as a table of this database notably references the file original full path and size. As the <code>Windows Search</code> database is updated in near real time and does not store information on deleted files, this also requires the original file to still be present.</p> | <p><code>Thumbs.db</code>: individual hidden files in their associated folders.<br><br><code>Thumbcache</code>:<br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Local\Microsoft\Windows\Explorer\thumbcache\_\<RESOLUTION>.db</code> files.</p>                                                                                                                                                                                                                                                                                                                                                                                                                    | <p><a href="https://thumbsviewer.github.io/"><code>Thumbs Viewer</code></a><br><br><a href="https://thumbcacheviewer.github.io/"><code>Thumbcache Viewer</code></a></p> |
| <p><code>Windows Push Notifications (WPN)</code><br><br>Introduced in Windows 10.</p>                                           | Windows Push Notifications   | <p>The Windows Push Notification service allows applications to deliver / push notifications, in three differents forms:<br><br>- <code>Badge</code>, tiny symbol that appears in the corner of an application's taskbar / hidden icon. Examples: the number of unreaded messages on Teams, Discord or other instant messaging applications.<br><br>- <code>Tile</code>, rectangular shape that is displayed in the screen and linked to an application.<br><br>- <code>Toast</code>, rectangular shaped pop-up box that can appear for a limited time (5 seconds by default) at the bottom right of the screen or be sent directly to the Windows Action Center. Examples: instant message applications (such as Teams) notifying of a new message.<br><br>More information on the <code>Windows Push Notifications</code> can be found in the <a href="https://www.mdpi.com/2673-6756/2/1/7">"A Digital Forensic View of Windows 10 Notifications"</a> Digital Forensics paper.</p> | <p>Each notification is associated with a dedicated entry in the <code>Notification</code> table of the <code>wpndatabase.db</code> database. There are system-wide notifications and per-user notifications, stored in different databases (with one database per-user).<br><br>Each entry contains notably the arrival and expery time as well as a "payload" associated with the notification. For <code>toast notification</code>, the payload contains the content of the notification. For instant message application, or social media / instant message web application accessed through a webbrowser, the payload may contain the message received.<br><br>The notifications are short-lived and deleted from the database after their expiry time or following an end-user acknowledgement (closing of the pop-up or clearing from the Windows Action Center). The <code>wpndatabase.db</code> database thus provided very limited historical data. More information might be retrivable in the <code>Write-Ahead Logging (WAL)</code> file <code>wpndatabase.db-wal</code> and / or carved from the database (using tools such as <a href="https://github.com/bring2lite/bring2lite"><code>bring2lite</code></a> or <a href="https://github.com/pawlaszczyk/fqlite"><code>fqlite</code></a>).</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | <p>Per user database and <code>Write-Ahead Logging (WAL)</code> files:<br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Local\Microsoft\Windows\Notifications\wpndatabase.db</code><br><code>%SystemDrive%:\Users\&#x3C;USERNAME>\AppData\Local\Microsoft\Windows\Notifications\wpndatabase.db-wal</code><br><br>System-wide database and <code>Write-Ahead Logging (WAL)</code> files:<br><code>%SystemDrive%:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Notifications\wpndatabase.db</code><br><code>%SystemDrive%:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Notifications\wpndatabase.db-wal</code></p> |                                                                                                                                                                         |
| <p><code>EVTX</code><br>-<br><code>Microsoft-Windows-VHDMP-Operational.evtx</code><br>-<br><code>ISO</code> mounting events</p> | Phishing / malware execution | `ISO` image can be leveraged in phishing scenarios where the loader is packed in an `ISO` file to avoid the `Mark-of-the-Web` (on unpatched system).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p>Upon the mounting of an <code>ISO</code> image, the following events, containing the full path to the <code>ISO</code> and the responsible user, will be generated:<br><br>- Event <code>22</code>: <code>Starting to create the handle for the file backing virtual disk \<ISO\_PATH></code><br><br>- Event <code>23</code>: <code>Handle for the file backing virtual disk \<ISO\_PATH> created successfully</code><br><br>- Event <code>12</code>: <code>Handle for virtual disk \<ISO\_PATH> created successfully \[...]</code><br><br>- Event <code>25</code>: <code>Beginning to bring the \<ISO\_PATH> online (surface)</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   | `Microsoft-Windows-VHDMP-Operational.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               |                                                                                                                                                                         |
| <p><code>EVTX</code><br>-<br><code>Application.evtx</code><br>-<br><code>ESENT</code> events</p>                                | AD post exploitation         | Active Directory `ntds.dit` dump with `ntdsutil`.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                     | <p>Upon execution of the <code>ntdsutil</code> command to dump the Active Directory <code>ntds.dit</code> database, the following events (containing the <code>ntds</code> keyword) will be generated:<br><br>- Event <code>325</code>: <code>The database engine created a new database \[...]</code><br><br>- Event <code>326</code>: <code>The database engine attached a database \[...]</code><br><br>- Event <code>327</code>: <code>The database engine detached a database \[...]</code><br><br>- Event <code>206</code>: <code>A database location change was detected \[...]</code></p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              | `Application.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       |                                                                                                                                                                         |
| <p><code>EVTX</code><br>-<br><code>Security.evtx</code><br>-<br><code>DRSUAPI</code> replication</p>                            | AD post exploitation         | Active Directory `ntds.dit` dump through `DRSUAPI` replication functions (`DCSync`).                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  | <p>Upon replication operations, such as the retrieval of Active Directory secrets (<code>DCSync</code> attack), the following events will be generated <em>if the operation was not conducted under a <code>Domain Controller</code> identity</em>:<br><br>- Event <code>4662</code>: <code>An operation was performed on an object</code> with the <code>Property</code> attribute equal to the <code>1131f6aa-9c07-11d1-f79f-00c04fc2dcd2</code> or <code>1131f6ad-9c07-11d1-f79f-00c04fc2dcd2</code> <code>GUID</code>.</p>                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                 | `Security.evtx`                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          |                                                                                                                                                                         |

### TODO

* IconCache.db
* Hidden local account HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
* Bitsadmin
  * EVTX: Microsoft-Windows-Bits-Client%4Operational.evtx 59
  * Persistent files: %SystemRoot%\ProgramData\Microsoft\Network\Downloader\ <https://www.sans.org/white-papers/39195/>
* Syscache hive
* Small memory dumps: hiberfil.sys, pagefile.sys, swapfile.sys
* Registry LOG Files

***

### References

<https://nasbench.medium.com/a-primer-on-event-tracing-for-windows-etw-997725c082bf>

<https://blog.1234n6.com/2018/10/available-artifacts-evidence-of.html>

SANS posters Windows forensics - <https://www.sans.org/posters/windows-forensic-analysis/>

<https://www.scitepress.org/papers/2017/64167/64167.pdf>

<http://windowsir.blogspot.com/2013/07/howto-determine-program-execution.html>

<https://www.sans.org/blog/opensavemru-and-lastvisitedmru/>

<https://andreafortuna.org/2018/05/23/forensic-artifacts-evidences-of-program-execution-on-windows-systems/>

<https://dfir.ru/2020/04/08/bam-internals/>

<https://cellebrite.com/en/analyzing-program-execution-windows-artifacts/>

<https://blog.1234n6.com/2018/10/available-artifacts-evidence-of.html>

<https://crucialsecurity.wordpress.com/2011/03/14/typedurls-part-1/>

<https://www.crowdstrike.com/blog/how-to-employ-featureusage-for-windows-10-taskbar-forensics/>

<https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/>

<https://learn.microsoft.com/en-us/windows/win32/shell/app-registration>

<https://thinkdfir.com/2020/10/23/when-did-recentapps-go/>

<https://df-stream.com/2017/10/recentapps/>

<https://github.com/volatilityfoundation/community/blob/master/ThomasChopitea/autoruns.py>

<https://www.istrosec.com/blog/windows-10-timeline/>

<https://kacos2000.github.io/WindowsTimeline/WindowsTimeline.pdf>

<https://bohops.com/2021/03/16/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion/>

<https://www.youtube.com/watch?v=rioVumJB0Fo>

<https://www.youtube.com/watch?v=qxPoKNmnuIQ>

<https://www.13cubed.com/downloads/windows\\_registry\\_cheat\\_sheet.pdf>

<https://www.hecfblog.com/2013/08/daily-blog-67-understanding-artifacts.html>

<https://learn.microsoft.com/en-us/windows-hardware/drivers/storage/supporting-mount-manager-requests-in-a-storage-class-driver>

<https://www.sans.org/blog/computer-forensic-guide-to-profiling-usb-device-thumbdrives-on-win7-vista-and-xp/>

<http://windowsir.blogspot.com/2013/04/plugin-emdmgmt.html>

<https://www.hecfblog.com/2013/08/daily-blog-66-understanding-artifacts.html>

<http://website.bcmsystem.com/orion/wp-content/uploads/2019/05/Microsoft-Windows-10-USB-Forensic-Artefacts.pdf>

<https://lifars.com/wp-content/uploads/2020/04/LIFARS-WhitePaper-Windows-ShellBags-Forensics-Investigative-Value-of-Windows-ShellBags.pdf>

<https://aboutdfir.com/new-windows-11-pro-22h2-evidence-of-execution-artifact/>

<https://www.youtube.com/watch?v=rV8aErDj06A>

<https://www.netsurion.com/articles/following-a-users-logon-tracks-throughout-the-windows-domain>

<https://threathunterplaybook.com/hunts/windows/190511-RemotePwshExecution/notebook.html>

<https://www.ntfs.com/>

<https://github.com/jschicht/Secure2Csv>

<https://www.forensicsmyanmar.com/2022/08/ntfs-index-attributes.html>

<https://dfir.ru/2021/01/10/standard\\_information-vs-file\\_name/>

<https://en.wikipedia.org/wiki/Windows\\_thumbnail\\_cache>

<https://thumbcacheviewer.github.io/>

<https://papers.ssrn.com/sol3/papers.cfm?abstract\\_id=2429795>

<https://www.13cubed.com/downloads/windows\\_browser\\_artifacts\\_cheat\\_sheet.pdf>

<https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4776>

<https://mandiant.com/resources/blog/digging-up-the-past-windows-registry-forensics-revisited>

<https://www.mdpi.com/2673-6756/2/1/7>
