Deleted File or File Knowledge
Thumbs.db
Description: Hidden file in the directory where images on the machine exist stored in smaller thumbnail graphics. Thumbs.db catalogues pictures in a folder and stores a copy of the thumbnail even if the pictures were deleted.
Location:
Each folder maintains a separate Thumbs.db file after being viewed in thumbnail view (OS version dependent)
Interpretation:
Includes:
Thumbnail image of the original picture
Last Modification Time (XP Only)
Original Filename (XP Only)
Most relevant for XP systems, but Thumbs.db files can be created on more modern OS versions in unusual circumstances, such as when folders are viewed via UNC paths.
Thumbcache
Description: Thumbnails of pictures, documents, and folders exist in a set of databases called the thumbcache. It is maintained for each user based on the thumbnail sizes viewed (e.g., small, medium, large, and extra large). It can catalog the previous contents of a folder even upon file deletion. (Available in Windows Vista+)
Location:
%USERPROFILE%\AppData\Local\Microsoft\Windows\Explorer
Interpretation:
Database files are named similarly to: Thumbcache_256.db
Each database file represents thumbnails stored in different sizes or to fit different user interface components
Thumbnail copies of pictures can be extracted, and the Thumbnail Cache ID can be cross-referenced within the Windows Search Database to identify the filename, path, and additional file metadata
Tools:
thumbcache_viewer.exe
thumbs_viewer.exe
Recycle Bin
Description: When a user deletes a file, the file is moved into a temporary storage location for deleted files named Recycle Bin. Windows creates two files each time a file is placed in the Recycle Bin $I and $R with a string six-character identifier generated for each file. $R file is a renamed copy of the “deleted” file. While the $I file replaces the usage INFO2 file as the source of accompanying metadata.
Location:
Hidden System Folder
C:\$Recycle.Bin
Interpretation:
Each user is assigned a SID sub-folder that can be mapped to a user via the Registry
Win7+: Files preceded by $I###### contain original filename and deletion date/time
Win7+: Files preceded by $R###### contain original deleted file contents Deleted Items and File Existence Tools for investigation Browse Recycle Bin:
dir/a
cd $Recycle.Bin
dir/a
cd to SID of interest
dir
type $I******.png (show original location of file)
copy $R******.png \users\angliad\Desktop\filename.png (Copy file for further analysis)
Parse with Zimmerman Tool (RBCmd.exe)
RBCmd.exe -f \$Recycle.Bin\SID-Of-Interest\$Ifile-of-interest.png
RBCmd.exe -d C:\$Recycle.Bin\ -q --csv \Users\angliad\Desktop\ --csvf username-recycle-bin.csv
Forensic Value:
The original file name and path
The deleted file size
The date and time of deletion
Internet Explorer File
Description: Internet Explorer History databases have long-held information on local and remote (via network shares) file access, giving us an excellent means for determining files accessed on the system per user. Information can be present even on Win11+ systems missing the Internet Explorer application.
Location:
IE10-11 and Win10+: %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat
Interpretation:
- Entries are recorded as: file:///C:/<directory>/<filename>.<ext>
It does not mean the file was opened in a browser
WordWheelQuery
Description: WordWheelQuery is a registry key that stores keywords searched from the folder search menu bar. Keywords are added in Unicode and listed in the temporal order in an MRU list. It maintains an ordered list of terms in the File Explorer search dialog.
Location:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery
=
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery
Investigator Notes: Keywords are added in Unicode and listed in the temporal order in an MRU list User Typed Paths. Users can type a path directly into the File Explorer path bar instead of navigating the folder structure to locate a file. Folders accessed in this manner are recorded in the TypedPaths key.
Location:
NTUSER\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths
Interpretation:
This indicates a user had knowledge of a particular file system location
It can expose hidden and commonly accessed locations, including those present on external drives or network shares
Tools:
RegRipper (rr.exe)
RegistryExplorer.exe
Forensic Value:
User Activity
Last folder search conducted (Last Write Time
Keywords searched
Last Visited Most Recently Used (MRU)
Description: Tracks applications in use by the user and the directory location for the last file accessed by the application.
Location:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
Computer\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\
Note: The RecentDocs key is found at:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
Other items of interest are related to folders that are accessed by a Windows application using the common Open/Save dialog which is found at:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32
Or files that are accessed by a Windows application using the common Open File or Save File dialog found at:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU
Finally, items of interest regarding commands a user runs via the Windows Run utility are found at:
NTUSER.DAT\ Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
Interpretation:
We get two important pieces of information from this key: applications executed by the user, and the last place in the file system that those applications interacted with. Interesting and hidden directories are often identified via this registry key.
Tools for investigation:
Regedit or other registry viewer applications.
Windows Search Database
Description: Windows Search indexes more than 900 file types, including email and file metadata, allowing users to search based on keywords.
Location:
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex
Interpretation:
Database in Extensible Storage Engine format
Gather logs contain a candidate list for files to be indexed over each 24 hours
Extensive file metadata and even partial content can be present.
Last updated