![](https://static.wixstatic.com/media/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg/v1/fill/w_1920,h_1323,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_61151d0087ad418fa801687a88c78716~mv2.jpg)
![](https://static.wixstatic.com/media/nsplsh_d3e630d96efc4b32bff44537a6bb78dc~mv2.jpg/v1/fill/w_980,h_653,al_c,q_85,usm_0.66_1.00_0.01,enc_auto/nsplsh_d3e630d96efc4b32bff44537a6bb78dc~mv2.jpg)
Windows Forensic Artifacts: Unveiling Key Evidence
Pages Count
28 Pages
Links for the courses
Overview of the differences between various forensic artifacts:Â Â Click Me
----------------------------------------------------------------------------------------------------
Windows Prefetch Files: A Tracking Program Execution Blog Link Click me
Prefetch Analysis with PECmd and WinPrefetchView Tool link Click me
-----------------------------------------------------------------------------------------------------
Understanding ShellBags: A Goldmine in Investigations Blog Link Click Me
ShellBags Analysis ShellBags Explorer(SBE)/SBECmd Tool Link Click Me
-----------------------------------------------------------------------------------------------------
Windows LNK Files: A Treasure Forensic Investigators Blog Link Click Me
LECmd: A Powerful Tool for Investigating LNK Files Tool Link Click Me
---------------------------------------------------------------------------------------------------------
Windows Taskbar Jump Lists: A Forensic Goldmine Blog Link Click Me
Mastering JLECmd for Windows Jump List Forensics Tool Link Click Me
----------------------------------------------------------------------------------------------------------
Windows Recycle Bin Forensics: Recovering Deleted Files Blog Link  Click Me
Analyzing Recycle Bin Metadata with RBCmd and $I_Parse Tool Link  Click Me
---------------------------------------------------------------------------------------------------------
Shimcache   :  Blog Link Click me
Amcache.hiv :  Tool link  Click meÂ
---------------------------------------------------------------------------------------------------------
Hibernation Files :  Blog Link Click Me
-----------------------------------------------------------------------------------------------------
Artifacts File Opening/Creation P1Â : Click Me
Artifacts File Opening/Creation P2Â : Click Me
---------------------------------------------------------------------------
Artifacts file download P1Â : Click Me
Artifacts file download P2Â : Click Me
-------------------------------------------------------------------------------------------------------------
For a detailed investigation on USB, please refer to the link provided below.
https://www.cyberengage.org/courses-1/usb-forensics
-------------------------------------------------------------------------------------------------------------
Artifacts Program execution P1 : Â Click Me
Artifacts Program execution P2Â : Â Click Me
--------------------------------------------------------------------------
Artifacts Deleted file Knowledge P1:Â Â Click Me
Artifacts Deleted file Knowledge P2:  Click Me
---------------------------------------------------------------------------
 Artifacts for Account Usage : Click Me
---------------------------------------------------------------------------
Artifacts for Physical Location : Click Me
---------------------------------------------------------------------------
Uncovering Autostart Locations Win. : Click Me
User Access Logging (UAL) Artifact  : Click Me Â
Evidence of Execution: (PCA) Â Â Â Â Â : Click Me
​
Your Instructor
Dean
![Dean](https://static.wixstatic.com/media/5fb032_3db91b1fff95466183c4e25d0c5a3d22~mv2.jpg/v1/fill/w_110,h_153,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/Image-empty-state.jpg)