Deleted Files & File Knowledge—DFIR Workflow & Cheatsheet
Quick Reference: Investigation Priority Matrix
HIGH
Recycle Bin
What deleted? When? By whom?
Until emptied
All
HIGH
Windows Search DB
What files existed? Content? Metadata?
Persistent
Vista+
HIGH
Recent Docs MRU
What files accessed? By what app?
Medium
All
MEDIUM
Thumbcache
What images/docs viewed? (even deleted)
High
Vista+
MEDIUM
IE File History
What files opened (local/network)?
Medium
All
MEDIUM
WordWheelQuery
What did user search for?
Medium
All
LOW
TypedPaths
What paths manually typed?
Low
All
LOW
Thumbs.db
What images in folder? (legacy)
High
XP/Legacy
Investigation Workflow
Phase 1: Deleted File Recovery (Critical Priority)
Goal: Recover deleted files and establish deletion timeline
1.1 Recycle Bin Analysis
What it tells you: Deleted files, original location, deletion time, file size
Location:
File Structure (Windows 7+):
$I files - Metadata (original filename, path, deletion date/time, size)
$R files - Actual deleted file content (renamed copy)
$I and $R share same 6-character identifier
Quick Investigation Commands:
PowerShell Collection:
Using Eric Zimmerman's RBCmd:
Key Investigation Points:
✓ Map SID to username via Registry (see SID Mapping section)
✓ $I file contains: Original path, filename, size, deletion timestamp
✓ $R file IS the actual deleted file (can be opened/analysed)
✓ Files persist until Recycle Bin is emptied
✓ Check file size - large files may not go to Recycle Bin
✓ Network deletions bypass Recycle Bin
✓ Shift+Delete bypasses Recycle Bin
Forensic Value:
Phase 2: File Existence & Metadata (High Priority)
Goal: Prove files existed, even if deleted and not in Recycle Bin
2.1 Windows Search Database (ESE Database)
What it tells you: Indexed file metadata, partial content, extensive file properties
Location:
Database Format: Extensible Storage Engine (ESE) - same as Active Directory
Key Investigation Points:
✓ Indexes 900+ file types (documents, emails, media, etc.)
✓ Stores extensive metadata: filename, path, size, dates, author, title
✓ May contain partial file content for text searching
✓ GatherLogs folder contains candidate files for indexing (24-hour cycles)
✓ Data persists even after file deletion
✓ Can prove file existed on system
✓ Timestamps: Created, Modified, Accessed
Required Tools:
Analysis Workflow:
Forensic Value:
Critical Notes:
⚠️ Indexing must be enabled (usually default)
⚠️ Some file types may not be indexed
⚠️ External drives only indexed if specifically configured
⚠️ Large database - focus on targeted searches
2.2 Internet Explorer File History
What it tells you: Local and network file access via file:/// protocol
Location:
Key Investigation Points:
✓ Tracks file access even on Windows 11 (no IE installed)
✓ Format:
file:///C:/directory/filename.ext✓ Does NOT mean file was opened in browser
✓ Tracks both local and UNC path access
✓ ESE database format (use ESEDatabaseView)
✓ Includes access timestamps
Common Scenarios Tracked:
Forensic Value:
Analysis Commands:
Phase 3: File Access & User Knowledge (Medium Priority)
Goal: Understand what files user accessed and how they knew about them
3.1 Recent Documents MRU (Most Recently Used)
What it tells you: Recent files accessed per application
Primary Locations:
RecentDocs (Overall):
LastVisitedPidlMRU (Application-specific):
OpenSavePidlMRU (Files opened/saved):
RunMRU (Commands executed via Run dialog):
Key Investigation Points:
✓ RecentDocs shows files accessed across all applications
✓ LastVisitedPidlMRU links applications to last folder accessed
✓ Shows executable + last file system location it touched
✓ OpenSavePidlMRU organized by file extension
✓ Reveals hidden and unusual directories
✓ MRU = Most Recently Used (temporal order)
✓ Last Write Time = Most recent activity in that key
Analysis Tools:
RegRipper Commands:
Forensic Value:
Investigation Tips:
✓ Check for suspicious directories (hidden folders, temp locations)
✓ Look for USB drive paths (E:, F:, etc.)
✓ Network share paths reveal lateral movement
✓ Uncommon applications accessing sensitive locations
✓ Cross-reference with LNK files and Jump Lists
3.2 WordWheelQuery (File Explorer Searches)
What it tells you: Keywords searched in Windows Explorer search bar
Location:
Key Investigation Points:
✓ Unicode formatted search terms
✓ MRU list (temporal order - most recent first)
✓ Last Write Time = Last search conducted
✓ Shows user's search intent and knowledge
✓ Reveals what user was looking for
Analysis Workflow:
Example Search Terms (Indicators):
Forensic Value:
3.3 TypedPaths (Manually Entered Paths)
What it tells you: Paths typed directly into Explorer address bar
Location:
Key Investigation Points:
✓ User manually typed path instead of browsing
✓ Indicates knowledge of specific location
✓ Reveals hidden, network, or external drive paths
✓ Shows familiarity with file system structure
✓ Limited number of entries stored
Common Typed Paths:
Forensic Value:
Analysis:
Phase 4: Visual Evidence (Medium Priority)
Goal: Recover thumbnail images as visual proof
4.1 Thumbcache (Windows Vista+)
What it tells you: Thumbnail previews of images, documents, folders
Location:
Database Files by Size:
Key Investigation Points:
✓ Persists after file deletion - visual evidence remains
✓ Created when folder viewed in thumbnail view
✓ Each size stored in separate database
✓ Thumbnail Cache ID cross-references to Windows Search DB
✓ Can extract actual thumbnail images
✓ Proves user viewed file/folder graphically
Cross-Reference Capability:
Analysis Tools:
Workflow:
Forensic Value:
Investigation Tips:
✓ Check ALL size databases (different views = different DBs)
✓ Thumbnails can exist for deleted files
✓ PDF, Office docs, videos also have thumbnails
✓ Folder thumbnails may show contained file previews
4.2 Thumbs.db (Legacy - Windows XP)
What it tells you: Thumbnail cache for images in specific folder
Location:
Key Investigation Points:
✓ Windows XP primary usage (hidden by default)
✓ Can be created on Win7+ when accessing UNC network paths
✓ Per-folder database (not centralized like Thumbcache)
✓ Persists after original file deletion
✓ Contains: Thumbnail image, Last Modification Time (XP), Original Filename (XP)
Analysis Tools:
Modern Relevance:
Forensic Value:
Advanced Investigation Techniques
SID to Username Mapping
Method 1: Registry (SOFTWARE Hive)
Method 2: Command Line
Method 3: Offline Registry
Timeline Correlation Strategy
Build Master Timeline:
Use Plaso/Log2Timeline:
Anti-Forensics Detection
Check for Cleaning Tools:
Indicators of Data Destruction:
Network Share & USB Evidence
TypedPaths Indicators:
Windows Search Database:
IE File History:
Investigation Checklists
Quick Triage Checklist
[ ] Identify all user accounts (via ProfileList)
[ ] Map SIDs to usernames
[ ] Check Recycle Bin for all users
[ ] Copy NTUSER.DAT for each user
[ ] Copy Windows Search Database (Windows.edb)
[ ] Copy Thumbcache databases for each user
[ ] Copy IE File History (WebCacheV*.dat)
[ ] Document current date/time and timezone
Deleted File Investigation
[ ] Parse Recycle Bin with RBCmd
[ ] Extract file metadata from $I files
[ ] Recover file contents from $R files
[ ] Map deletion times to incident timeline
[ ] Check for files too large for Recycle Bin
[ ] Review for Shift+Delete evidence
[ ] Cross-reference with MFT entries
File Knowledge Investigation
[ ] Parse Windows Search Database
[ ] Extract RecentDocs MRU
[ ] Review LastVisitedPidlMRU (app to folder)
[ ] Analyze WordWheelQuery searches
[ ] Check TypedPaths for manual navigation
[ ] Extract IE File History entries
[ ] Correlate all artifacts to timeline
Visual Evidence Recovery
[ ] Extract all Thumbcache databases
[ ] Use thumbcache_viewer to recover thumbnails
[ ] Cross-reference Cache IDs with Windows Search
[ ] Check for legacy Thumbs.db files
[ ] Document visual evidence with metadata
[ ] Preserve thumbnail images as exhibits
Network & External Access
[ ] Search TypedPaths for UNC paths
[ ] Check Windows Search for network shares
[ ] Review IE File History for file:/// UNC entries
[ ] Identify USB drive letters in artifacts
[ ] Correlate with USB device history
[ ] Map network share access timeline
Essential DFIR Tools
Registry Analysis
Recycle Bin
Windows Search Database
Thumbnails
Comprehensive Suites
Timeline Analysis
Quick Command Reference
PowerShell Collection Script
Batch Forensic Parsing
SID Enumeration
File Path Variables
Common Forensic Scenarios
Scenario 1: Prove File Existed (Deleted, Not in Recycle Bin)
Scenario 2: User Searched for Sensitive Terms
Scenario 3: USB Drive File Access
Scenario 4: Network Share Access
Investigation Gotchas & Notes
Recycle Bin
Windows Search Database
Thumbcache
MRU Lists
IE File History
Best Practices
Evidence Preservation
Analysis Methodology
Reporting
Critical Notes:
Always verify artifact locations per OS version
Use multiple artifacts to corroborate findings
Consider timestamp precision and timezone
Account for user anti-forensics actions
Map SIDs to usernames early in investigation
Key Principle: Files leave traces even after deletion - use multiple artifacts to build comprehensive proof of file existence, access, and user knowledge.
Last updated
