The Windows Recycle Bin is an important artifact in forensic investigations. When a user deletes a file using the graphical interface, it is not immediately erased. Instead, the file is moved to the Recycle Bin, where it remains until the user permanently deletes it or empties the Recycle Bin. This behavior makes it a great place to recover deleted files.
-------------------------------------------------------------------------------------------------------------
How the Recycle Bin Works
When a file is deleted, it is moved to a hidden system folder called $Recycle.Bin. Each user on the system has a separate folder within it, identified by their Security Identifier (SID). The deleted file is renamed, and metadata is stored alongside it. This metadata includes:
The original file name
The original file location
The time of deletion
Since Windows does not track file deletion timestamps at the file system level, the Recycle Bin metadata provides valuable forensic evidence
-------------------------------------------------------------------------------------------------------------
Ways to Bypass the Recycle Bin
Some users may try to avoid the Recycle Bin by using methods such as:
Shift + Delete: This permanently deletes a file without moving it to the Recycle Bin.
Command Prompt or PowerShell: Deleting files from the command line bypasses the Recycle Bin.
Third-Party Tools: Some applications delete files without sending them to the Recycle Bin.
Even with these methods, deleted files may still be recoverable using forensic tools.
-------------------------------------------------------------------------------------------------------------
Changes in Recycle Bin Architecture
Microsoft has modified the Recycle Bin over the years:
Windows XP and earlier: The Recycle Bin used a RECYCLER folder and an INFO2 database file to store metadata.
Windows Vista and later: The folder was renamed $Recycle.Bin, and metadata is now stored in separate $I files for each deleted item. This change prevents metadata corruption issues that were common in older versions.
-------------------------------------------------------------------------------------------------------------
What Happens When the Recycle Bin Is Emptied?
When a user empties the Recycle Bin, all files and their metadata are removed. However, forensic tools can often recover them by:
File carving: Searching for file remnants in unallocated space on the disk.
Recovering $I files: These metadata files might still be retrievable and can provide useful information.
-------------------------------------------------------------------------------------------------------------
Understanding $R and $I Files
Modern versions of Windows store each deleted file as two separate files:
$R files: These contain the actual deleted data.
$I files: These store metadata such as the original file name, location, and deletion timestamp.
![](https://static.wixstatic.com/media/5fb032_0e1d25a5385e43e0bd5bc012390e110a~mv2.png/v1/fill/w_801,h_356,al_c,q_85,enc_auto/5fb032_0e1d25a5385e43e0bd5bc012390e110a~mv2.png)
By analyzing these files, forensic investigators can piece together details about deleted files and their original locations.
-------------------------------------------------------------------------------------------------------------
Conducting Recycle Bin Forensics
Locate the Recycle Bin Folder: Check $Recycle.Bin on all available drives (e.g., C:\, D:\).
Extract Metadata: Parse $I files to find relevant information.
Recover Deleted Files: Copy $R files for further analysis.
Look for Deleted Evidence: If the Recycle Bin has been emptied, attempt file recovery using forensic tools.
-------------------------------------------------------------------------------------------------------------
As $R is recoverable files so no need for parsing but $I files need parsing tool use for that is $I Parse
Conclusion
The Windows Recycle Bin is a goldmine of forensic evidence. While users can attempt to bypass it, forensic tools can often recover deleted files and metadata. By understanding the Recycle Bin’s structure and metadata files, investigators can uncover valuable information during an investigation.
-------------------------------------------------Dean------------------------------------------------------
댓글