Amcache
Windows DFIR notes are no longer maintained on InfoSec-Notes. Updated versions can be found on: artefacts.help.
Overview
Location: %systemroot%\AppCompat\Programs\Amcache.hve
Amcache is a replacement of the RecentFileCache (that was linked to DLL version 6.1.7600).
Yield information related to programs execution.
Very complex artefact, linked to an application compatibility feature that aim to maintain support of existing software to new versions of the Windows operating system (like the Shimcache artefact). ProgramDataUpdater (a task associated with the Application Experience Service) uses the registry file Amcache.hve to store data during process creation. The Amcache is a standalone registry hive, with multiple root keys that contain various types of data.
The Amcache behavior depends on the version of the associated libraries, and not the version of the operating system. The Amcache on an up-to-date Windows 7 and Windows 10 will thus behave the same way.
For a very comprehensive analysis of the Amcache artefact, and its evolution across different release of the underlying DLL, refer to the ANSSI's ANALYSIS OF THE AMCACHE v2 white paper.
Information of interest
The Amcache.hve registry hive is split in a number of root keys, with keys being added, changed, or removed depending on the Amcache DLLs versions.
The following notable root keys can be of forensic interest:
FilethenInventoryApplicationFilestarting from the version10.0.14913.1002of theAmcachelibraries (AmcacheParseroutputsAssociatedFileEntriesandUnassociatedFileEntries):Data about program executions if they are shimmed, programs part of an installed application, or programs part of scanned directories (with out requiring execution of the associated programs).
Data available (depending on the
Amcachelibraries version): executable full path, program size,SHA1of the first 30MB of the executable in theFileIdvalue, binary type (x86 versus x64), the compilation date of the program in theLinkDatevalue.Additional data for entries associated with an installed application is available in the
InventoryApplicationkey. TheProgramIdvalue from theInventoryApplicationFilesubkey of a given program matches the subkey's name under theInventoryApplicationkey of the associated application. TheInventoryApplicationkey provide metadata information about the application: name, publisher, install date, etc.For non up-to-date systems still using a
Filekey, the last write time of an entry key under theFilekey coincides with the execution time of an executable that is not associated to an application. For executables that are part of an application, the last write time coincides with either the application installation time or the first execution if the executable needed shimming. For entries under the newerInventoryApplicationFilekey, the last write time of the keys always coincides with an execution ofMicrosoft Compatibility Appraiserand is thus no longer a timestamp of execution time.AmcacheParser'sAssociatedFileEntriesoutput references programs associated with an application andUnassociatedFileEntriesoutput references "loose" programs (that are not associated with an installed application).
InventoryDeviceContainerandInventoryDevicePnp(AmcacheParseroutputsDeviceContainersandDevicePnp):Data about devices plugged in on the system.
Data available: device type (usb; Bluetooth, media, etc.), device friendly name, self reported description, manufacturer, associated driver, etc.
InventoryDriverBinary(AmcacheParseroutputDriveBinaries):Data about installed drivers.
Data available: driver name, full path, size, associated service name, compilation timestamp (
DriverTimestamp), driver file last write timestamp, etc.
InventoryDriverPackage(AmcacheParseroutputDriverPackages):Data about drivers package file (INF file) that contains information about the driver.
Data available: driver package file name, path, last write timestamp, etc.
ProgramsthenInventoryApplication(AmcacheParseroutputProgramEntries):Data about installed programs, as referenced in the
Uninstalland / or aRunkey of theSOFTWAREhive.Data available: application name, executable full path and SHA1, publisher, install date, etc.
InventoryApplicationShortcut(AmcacheParseroutputShortCuts):Data about the shortcuts (
LNKfiles) that were present at one time (and that may still be present or may have been removed) from a subset of scanned folders (Start Menu and / or Desktop folders).Data available: full path of the shortcut. The last write timestamp of the associated subkey can also be a general indicator of when the activity occurred but does not seem to match any
MACBtimestamps of the shortcut file.
Parsing
The PowerShell cmdlet Get-ForensicAmcache of the PowerForensics suite can be used to parse the Amcache.hve registry hive. The AmcacheParser, supporting Windows 10, utility can be used to parse exported Amcache.hve registry hive.
# Deploy the PowerShell PowerForensics module
.\PowerForensics.psd1
Import-Module .\PowerForensics.psd1
# Default to C:\Windows\AppCompat\Programs\Amcache.hve
Get-ForensicAmcache | Out-File <OUTPUT_FILE>
# From hive / mounted disk image
Get-ForensicAmcache -HivePath "<C:\Windows\AppCompat\Programs\Amcache.hve | EXPORTED_HIVE_PATH>" | Out-File <OUTPUT_FILE>
AmcacheParser.exe -f "<C:\Windows\AppCompat\Programs\Amcache.hve | EXPORTED_HIVE_PATH>" -i on --csv <OUTPUTDIR_PATH>Last updated