| Artifact |
Location |
Investigation Tool |
| System Registry Hive |
C:\Windows\System32\config\SYSTEM |
Registry Explorer |
| Software Registry Hive |
C:\Windows\System32\config\SOFTWARE |
Registry Explorer |
| SAM Registry Hive |
C:\Windows\System32\config\SAM |
Registry Explorer |
| User Registry Hive |
C:\Users\<USER>\NTUSER.dat |
Registry Explorer |
| User Classes Registry Hive |
C:\Users\<user>\Local Settings\Application Data:\Microsoft\Windows\UsrClass.dat |
Registry Explorer |
| Amcache Hive |
C:\Windows\appcompat\Programs\Amcache.hve |
Registry Explorer |
| Security Event Log |
C:\Windows\winevt\Logs\Security.evtx |
Event Logs Explorer / Event Viewer |
| System Event Log |
C:\Windows\winevt\Logs\SYSTEM.evtx |
Event Logs Explorer / Event Viewer |
| Application Event Log |
C:\Windows\winevt\Logs\Application.evtx |
Event Logs Explorer / Event Viewer |
| Task Scheduler Event Log |
Microsoft-Windows-TaskScheduler%4Operational.evtx |
Event Logs Explorer / Event Viewer |
| Artifact |
Description |
Tool |
| $MFT, $LogFile, $UsnJrnl:$J |
NTFS File System Metadata |
NTFS Log Tracker - Timeline explorer |
| $I30 |
Directory Index |
INDXRipper |
| Security.evtx |
File Access Events (Event IDs: 4656, 4660, 4663, 4658) |
Event Log Explorer |
| NTUSER.dat |
User Registry (Recent Files, RunMRU, TypedPaths) |
Registry Explorer |
| Shellbags |
Folder Access History |
Shellbags Explorer |
| LNK Files |
Shortcut Files |
LECmd |
| JumpLists |
Recent File/Application Access |
JumpLists Explorer |
| Task |
Plugin |
Command Line |
| Identifying OS Version |
imageinfo |
Python vol.py -f <memdump> imageinfo |
| Analyzing KDBG Signatures |
kdbgscan |
Python vol.py -f <memdump> kdgbscan |
| Processes List |
pslist |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> pslist |
| Parent/Child Process Relation |
pstree |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> pstree |
| Hidden Processes |
psxview |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> psxview |
| Examining Process Details |
psinfo |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> psinfo -o <processs physical location> |
| Process Privilege |
getsides |
python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> getsids -o <process physical location> |
| Network Connections |
netscan |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> netscan |
| Registry Keys/Values |
printkey |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> printkey -K <key_path> |