
Actively looking roles in cybersecurity. If you have a reference or a job opportunity, your support would mean the world to me!

Windows Forensic Artifacts: Unveiling Key Evidence
Pages Count
28 Pages
Links for the courses
Overview of the differences between various forensic artifacts:Â Â Click Me
-----------------------------------------------------------------------------------------------------------
All combined Artifacts to Confirm Application Execution:
Guide to Identifying Application Execution in Windows Forensics : Â Click Me
All combined Artifacts to Confirm File and Folder Access:
Guide to Identifying File and Folder Access in Digital Forensics : Click Me
All combined Artifacts to Confirm Deleted Items and File Existence:
Uncovering Deleted Items and File Existence in Digital Forensics. : Click Me
All combined Artifacts to Confirm External Device/USB Usage:
USB Forensics : Click Me
-----------------------------------------------------------------------------------------------------------
Prefetch Files
Windows Prefetch Files: A Tracking Program Execution Blog Link Click me
Prefetch Analysis with PECmd and WinPrefetchView Tool link Click me
-----------------------------------------------------------------------------------------------------
Shell Bags
Understanding ShellBags: A Goldmine in Investigations Blog Link Click Me
ShellBags Analysis ShellBags Explorer(SBE)/SBECmd Tool Link Click Me
-----------------------------------------------------------------------------------------------------
Lnk Files
Windows LNK Files: A Treasure Forensic Investigators Blog Link Click Me
LECmd: A Powerful Tool for Investigating LNK Files Tool Link Click Me
---------------------------------------------------------------------------------------------------------
JumpList
Windows Taskbar Jump Lists: A Forensic Goldmine Blog Link Click Me
Mastering JLECmd for Windows Jump List Forensics Tool Link Click Me
----------------------------------------------------------------------------------------------------------
RecycleBin
Windows Recycle Bin Forensics: Recovering Deleted Files Blog Link  Click Me
Analyzing Recycle Bin Metadata with RBCmd and $I_Parse Tool Link  Click Me
----------------------------------------------------------------------------------------------------------
AppCompactCache(Shimcache)
Understanding Microsoft’s (ShimCache) in Digital Forensics Blog Link Click me
Understanding AppCompatCache tool Forensic Analysis Tool Link Click Me
-----------------------------------------------------------------------------------------------------------
Amcache.Hiv
Understanding Amcache.hve: A Powerful Forensic Artifact Blog link  Click meÂ
AmcacheParser and appcompatprocessor.py for Analysis Tool Link Click Me
---------------------------------------------------------------------------------------------------------
Hibernation File
Windows Hibernation Files: Artifact Forensic Investigations Blog Link Click Me
---------------------------------------------------------------------------------------------------------
Windows Search Database/Indexing
Unlocking Windows Search Indexing for Forensics: A Deep Dive : Click Me
A Deep Dive into Windows Search Database Parsing
(WinSearchDBAnalyzer / SQLite / SIDR) : Click Me
---------------------------------------------------------------------------------------------------------
Application Execution
Tracking Microphone and Camera Usage in Windows : Click Me
BAM and DAM in Windows Forensics: Tracking Executed Applications : Click Me
TaskBar FeatureUsage: Tracking executed Applications : Click Me
UserAssist: A Powerful Artifact for Tracking Application Execution : Click Me
Using RADAR and MUICache for Evidence of Execution in Windows : Click Me
Evidence of Execution: Program Compatibility Assistant (PCA) : Click Me
-------------------------------------------------------------------------------------------------------------
Forensic Useful Articles
Uncovering Autostart Locations in Windows (RECmd) : Click Me
Lateral Movement: User Access Logging (UAL) Artifact : Click Me Â
​Windows Knows Files Came from the Internet: ADS (Zone.Identifier) : Click Me
Forensic Analysis of Universal Windows Platform (UWP) Applications : Click Me
----------------------------------------------------------------------------------------------------------------
Your Instructor
Dean
