Artifact |
Location |
Investigation Tool |
System Registry Hive |
C:\Windows\System32\config\SYSTEM |
Registry Explorer |
Software Registry Hive |
C:\Windows\System32\config\SOFTWARE |
Registry Explorer |
SAM Registry Hive |
C:\Windows\System32\config\SAM |
Registry Explorer |
User Registry Hive |
C:\Users\<USER>\NTUSER.dat |
Registry Explorer |
User Classes Registry Hive |
C:\Users\<user>\Local Settings\Application Data:\Microsoft\Windows\UsrClass.dat |
Registry Explorer |
Amcache Hive |
C:\Windows\appcompat\Programs\Amcache.hve |
Registry Explorer |
Security Event Log |
C:\Windows\winevt\Logs\Security.evtx |
Event Logs Explorer / Event Viewer |
System Event Log |
C:\Windows\winevt\Logs\SYSTEM.evtx |
Event Logs Explorer / Event Viewer |
Application Event Log |
C:\Windows\winevt\Logs\Application.evtx |
Event Logs Explorer / Event Viewer |
Task Scheduler Event Log |
Microsoft-Windows-TaskScheduler%4Operational.evtx |
Event Logs Explorer / Event Viewer |
Artifact |
Description |
Tool |
$MFT, $LogFile, $UsnJrnl:$J |
NTFS File System Metadata |
NTFS Log Tracker - Timeline explorer |
$I30 |
Directory Index |
INDXRipper |
Security.evtx |
File Access Events (Event IDs: 4656, 4660, 4663, 4658) |
Event Log Explorer |
NTUSER.dat |
User Registry (Recent Files, RunMRU, TypedPaths) |
Registry Explorer |
Shellbags |
Folder Access History |
Shellbags Explorer |
LNK Files |
Shortcut Files |
LECmd |
JumpLists |
Recent File/Application Access |
JumpLists Explorer |
Task |
Plugin |
Command Line |
Identifying OS Version |
imageinfo |
Python vol.py -f <memdump> imageinfo |
Analyzing KDBG Signatures |
kdbgscan |
Python vol.py -f <memdump> kdgbscan |
Processes List |
pslist |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> pslist |
Parent/Child Process Relation |
pstree |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> pstree |
Hidden Processes |
psxview |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> psxview |
Examining Process Details |
psinfo |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> psinfo -o <processs physical location> |
Process Privilege |
getsides |
python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> getsids -o <process physical location> |
Network Connections |
netscan |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> netscan |
Registry Keys/Values |
printkey |
Python vol.py -f <memdump> --profile=<profile> -g <kdbg addr> printkey -K <key_path> |