Page cover

Deleted Files & File Knowledge—DFIR Workflow & Cheatsheet

Quick Reference: Investigation Priority Matrix

Priority
Artifact
Key Questions Answered
Data Retention
OS Version

HIGH

Recycle Bin

What deleted? When? By whom?

Until emptied

All

HIGH

Windows Search DB

What files existed? Content? Metadata?

Persistent

Vista+

HIGH

Recent Docs MRU

What files accessed? By what app?

Medium

All

MEDIUM

Thumbcache

What images/docs viewed? (even deleted)

High

Vista+

MEDIUM

IE File History

What files opened (local/network)?

Medium

All

MEDIUM

WordWheelQuery

What did user search for?

Medium

All

LOW

TypedPaths

What paths manually typed?

Low

All

LOW

Thumbs.db

What images in folder? (legacy)

High

XP/Legacy


Investigation Workflow

Phase 1: Deleted File Recovery (Critical Priority)

Goal: Recover deleted files and establish deletion timeline

1.1 Recycle Bin Analysis

What it tells you: Deleted files, original location, deletion time, file size

Location:

File Structure (Windows 7+):

  • $I files - Metadata (original filename, path, deletion date/time, size)

  • $R files - Actual deleted file content (renamed copy)

  • $I and $R share same 6-character identifier

Quick Investigation Commands:

PowerShell Collection:

Using Eric Zimmerman's RBCmd:

Key Investigation Points:

  • ✓ Map SID to username via Registry (see SID Mapping section)

  • ✓ $I file contains: Original path, filename, size, deletion timestamp

  • ✓ $R file IS the actual deleted file (can be opened/analysed)

  • ✓ Files persist until Recycle Bin is emptied

  • ✓ Check file size - large files may not go to Recycle Bin

  • ✓ Network deletions bypass Recycle Bin

  • ✓ Shift+Delete bypasses Recycle Bin

Forensic Value:


Phase 2: File Existence & Metadata (High Priority)

Goal: Prove files existed, even if deleted and not in Recycle Bin

2.1 Windows Search Database (ESE Database)

What it tells you: Indexed file metadata, partial content, extensive file properties

Location:

Database Format: Extensible Storage Engine (ESE) - same as Active Directory

Key Investigation Points:

  • Indexes 900+ file types (documents, emails, media, etc.)

  • ✓ Stores extensive metadata: filename, path, size, dates, author, title

  • ✓ May contain partial file content for text searching

  • GatherLogs folder contains candidate files for indexing (24-hour cycles)

  • ✓ Data persists even after file deletion

  • ✓ Can prove file existed on system

  • ✓ Timestamps: Created, Modified, Accessed

Required Tools:

Analysis Workflow:

Forensic Value:

Critical Notes:

  • ⚠️ Indexing must be enabled (usually default)

  • ⚠️ Some file types may not be indexed

  • ⚠️ External drives only indexed if specifically configured

  • ⚠️ Large database - focus on targeted searches


2.2 Internet Explorer File History

What it tells you: Local and network file access via file:/// protocol

Location:

Key Investigation Points:

  • ✓ Tracks file access even on Windows 11 (no IE installed)

  • ✓ Format: file:///C:/directory/filename.ext

  • Does NOT mean file was opened in browser

  • ✓ Tracks both local and UNC path access

  • ✓ ESE database format (use ESEDatabaseView)

  • ✓ Includes access timestamps

Common Scenarios Tracked:

Forensic Value:

Analysis Commands:


Phase 3: File Access & User Knowledge (Medium Priority)

Goal: Understand what files user accessed and how they knew about them

3.1 Recent Documents MRU (Most Recently Used)

What it tells you: Recent files accessed per application

Primary Locations:

RecentDocs (Overall):

LastVisitedPidlMRU (Application-specific):

OpenSavePidlMRU (Files opened/saved):

RunMRU (Commands executed via Run dialog):

Key Investigation Points:

  • RecentDocs shows files accessed across all applications

  • LastVisitedPidlMRU links applications to last folder accessed

  • ✓ Shows executable + last file system location it touched

  • OpenSavePidlMRU organized by file extension

  • ✓ Reveals hidden and unusual directories

  • ✓ MRU = Most Recently Used (temporal order)

  • ✓ Last Write Time = Most recent activity in that key

Analysis Tools:

RegRipper Commands:

Forensic Value:

Investigation Tips:

  • ✓ Check for suspicious directories (hidden folders, temp locations)

  • ✓ Look for USB drive paths (E:, F:, etc.)

  • ✓ Network share paths reveal lateral movement

  • ✓ Uncommon applications accessing sensitive locations

  • ✓ Cross-reference with LNK files and Jump Lists


3.2 WordWheelQuery (File Explorer Searches)

What it tells you: Keywords searched in Windows Explorer search bar

Location:

Key Investigation Points:

  • Unicode formatted search terms

  • MRU list (temporal order - most recent first)

  • ✓ Last Write Time = Last search conducted

  • ✓ Shows user's search intent and knowledge

  • ✓ Reveals what user was looking for

Analysis Workflow:

Example Search Terms (Indicators):

Forensic Value:


3.3 TypedPaths (Manually Entered Paths)

What it tells you: Paths typed directly into Explorer address bar

Location:

Key Investigation Points:

  • ✓ User manually typed path instead of browsing

  • Indicates knowledge of specific location

  • ✓ Reveals hidden, network, or external drive paths

  • ✓ Shows familiarity with file system structure

  • ✓ Limited number of entries stored

Common Typed Paths:

Forensic Value:

Analysis:


Phase 4: Visual Evidence (Medium Priority)

Goal: Recover thumbnail images as visual proof

4.1 Thumbcache (Windows Vista+)

What it tells you: Thumbnail previews of images, documents, folders

Location:

Database Files by Size:

Key Investigation Points:

  • Persists after file deletion - visual evidence remains

  • ✓ Created when folder viewed in thumbnail view

  • ✓ Each size stored in separate database

  • Thumbnail Cache ID cross-references to Windows Search DB

  • ✓ Can extract actual thumbnail images

  • ✓ Proves user viewed file/folder graphically

Cross-Reference Capability:

Analysis Tools:

Workflow:

Forensic Value:

Investigation Tips:

  • ✓ Check ALL size databases (different views = different DBs)

  • ✓ Thumbnails can exist for deleted files

  • ✓ PDF, Office docs, videos also have thumbnails

  • ✓ Folder thumbnails may show contained file previews


4.2 Thumbs.db (Legacy - Windows XP)

What it tells you: Thumbnail cache for images in specific folder

Location:

Key Investigation Points:

  • Windows XP primary usage (hidden by default)

  • ✓ Can be created on Win7+ when accessing UNC network paths

  • ✓ Per-folder database (not centralized like Thumbcache)

  • Persists after original file deletion

  • ✓ Contains: Thumbnail image, Last Modification Time (XP), Original Filename (XP)

Analysis Tools:

Modern Relevance:

Forensic Value:


Advanced Investigation Techniques

SID to Username Mapping

Method 1: Registry (SOFTWARE Hive)

Method 2: Command Line

Method 3: Offline Registry


Timeline Correlation Strategy

Build Master Timeline:

Use Plaso/Log2Timeline:


Anti-Forensics Detection

Check for Cleaning Tools:

Indicators of Data Destruction:


Network Share & USB Evidence

TypedPaths Indicators:

Windows Search Database:

IE File History:


Investigation Checklists

Quick Triage Checklist

  • [ ] Identify all user accounts (via ProfileList)

  • [ ] Map SIDs to usernames

  • [ ] Check Recycle Bin for all users

  • [ ] Copy NTUSER.DAT for each user

  • [ ] Copy Windows Search Database (Windows.edb)

  • [ ] Copy Thumbcache databases for each user

  • [ ] Copy IE File History (WebCacheV*.dat)

  • [ ] Document current date/time and timezone

Deleted File Investigation

  • [ ] Parse Recycle Bin with RBCmd

  • [ ] Extract file metadata from $I files

  • [ ] Recover file contents from $R files

  • [ ] Map deletion times to incident timeline

  • [ ] Check for files too large for Recycle Bin

  • [ ] Review for Shift+Delete evidence

  • [ ] Cross-reference with MFT entries

File Knowledge Investigation

  • [ ] Parse Windows Search Database

  • [ ] Extract RecentDocs MRU

  • [ ] Review LastVisitedPidlMRU (app to folder)

  • [ ] Analyze WordWheelQuery searches

  • [ ] Check TypedPaths for manual navigation

  • [ ] Extract IE File History entries

  • [ ] Correlate all artifacts to timeline

Visual Evidence Recovery

  • [ ] Extract all Thumbcache databases

  • [ ] Use thumbcache_viewer to recover thumbnails

  • [ ] Cross-reference Cache IDs with Windows Search

  • [ ] Check for legacy Thumbs.db files

  • [ ] Document visual evidence with metadata

  • [ ] Preserve thumbnail images as exhibits

Network & External Access

  • [ ] Search TypedPaths for UNC paths

  • [ ] Check Windows Search for network shares

  • [ ] Review IE File History for file:/// UNC entries

  • [ ] Identify USB drive letters in artifacts

  • [ ] Correlate with USB device history

  • [ ] Map network share access timeline


Essential DFIR Tools

Registry Analysis

Recycle Bin

Windows Search Database

Thumbnails

Comprehensive Suites

Timeline Analysis


Quick Command Reference

PowerShell Collection Script

Batch Forensic Parsing

SID Enumeration


File Path Variables


Common Forensic Scenarios

Scenario 1: Prove File Existed (Deleted, Not in Recycle Bin)

Scenario 2: User Searched for Sensitive Terms

Scenario 3: USB Drive File Access

Scenario 4: Network Share Access


Investigation Gotchas & Notes

Recycle Bin

Windows Search Database

Thumbcache

MRU Lists

IE File History


Best Practices

Evidence Preservation

Analysis Methodology

Reporting


Critical Notes:

  • Always verify artifact locations per OS version

  • Use multiple artifacts to corroborate findings

  • Consider timestamp precision and timezone

  • Account for user anti-forensics actions

  • Map SIDs to usernames early in investigation

Key Principle: Files leave traces even after deletion - use multiple artifacts to build comprehensive proof of file existence, access, and user knowledge.

Last updated