📂 File System Artifacts
- $MFT (Master File Table): NTFS metadata; shows all files and timestamps.
- $LogFile: Records filesystem changes; useful for file creation/deletion events.
- $UsnJrnl (Change Journal): Tracks file changes; helpful for ransomware investigations.
- Recycle Bin:
C:\$Recycle.Bin\<SID>
; tracks deleted files. - LNK (Shortcut) Files: User activity on opened files and programs.
- Thumbcache: Stores thumbnails of viewed images/files.
C:\Users\<User>\AppData\Local\Microsoft\Windows\Explorer
- Recent Files:
C:\Users\<User>\AppData\Roaming\Microsoft\Windows\Recent
🧾 Log Files
- Event Logs:
- Security: Logon, privilege use →
Security.evtx
- System: Device & driver logs →
System.evtx
- Application: Program-specific logs →
Application.evtx
- PowerShell: Script execution logs →
Microsoft-Windows-PowerShell/Operational.evtx
- Sysmon (if installed): High-fidelity telemetry
- Security: Logon, privilege use →
- Windows Firewall Logs:
C:\Windows\System32\LogFiles\Firewall\pfirewall.log
- Windows Update Logs:
C:\Windows\WindowsUpdate.log
🧬 Registry Artifacts
- Hives:
NTUSER.DAT
: User-specific settingsSAM
: Security Account ManagerSYSTEM
: System configurationSOFTWARE
: Installed applications & configs
- UserAssist: Tracks GUI-based program execution
- Run / RunOnce Keys: Persistence points
- ShimCache (AppCompatCache): Execution artifacts stored in SYSTEM hive
- Amcache.hve: Application execution and install metadata
- MRU Lists: Tracks most recently used files/locations
- TypedURLs: URLs typed into Internet Explorer
💻 Execution & Persistence
- Prefetch Files: Tracks program executions (last 8 executions)
C:\Windows\Prefetch
- Scheduled Tasks:
schtasks /query
- Services:
services.msc
,sc query
- WMI Persistence:
wmic /namespace:"\\root\subscription" PATH __EventFilter
- Startup Folder:
C:\Users\<User>\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
- Registry Run Keys: Persistence across reboots
🌐 Network Artifacts
- DNS Cache:
ipconfig /displaydns
- ARP Cache:
arp -a
- Netstat Output: Active connections →
netstat -ano
- RDP Connection Logs:
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
👤 User Artifacts
- Browser Artifacts:
- Chrome:
C:\Users\<User>\AppData\Local\Google\Chrome\User Data\Default
- Edge/IE:
C:\Users\<User>\AppData\Local\Microsoft\Edge\User Data
- Chrome:
- Email Clients: Outlook PST/OST files
- USB Device History:
SYSTEM
hive →Enum\USBSTOR
- Mounted Devices: Tracks drive mounts
- Shellbags: Folder view preferences (can indicate accessed directories)
✅ Use tools like KAPE
, RECmd
, MFTECmd
, Eric Zimmerman's Tools
, Volatility
, and Plaso
for collection and analysis.
Happy Hunting!