Registry, Event Logs, Prefetch & Artifacts
Section 4 of 12
Hierarchical database storing Windows configuration data, user settings, application info, and system preferences. Critical for forensic investigations.
SYSTEM
C:\Windows\System32\config\SYSTEM
SOFTWARE
C:\Windows\System32\config\SOFTWARE
SAM
C:\Windows\System32\config\SAM
NTUSER.DAT
C:\Users\[Username]\NTUSER.DAT
Tracks GUI-based programs run by user. Data is ROT13 encoded.
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist
Contains: Program names, run count, last execution time
Tracks recently opened documents and their locations.
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
Shows: File names, extensions, last access times
Programs configured to run at startup - common persistence mechanism for malware.
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Critical for: Malware persistence, autoruns analysis
Tracks various user activities like typed URLs, search terms, opened files.
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU
Reveals: User behavior, file interactions, typed paths
Event logs record system, security, and application events. Located at: C:\Windows\System32\winevt\Logs\
Authentication, logon/logoff events, privilege use
4624: Successful logon
4625: Failed logon
4672: Admin logon
4720: User created
System events, service starts/stops, driver issues
6005: System startup
6006: System shutdown
7036: Service status
7045: Service installed
Application errors, warnings, and information
1000: App crash
1001: App hang
1002: App error
Varies by application
Windows performance feature that tracks application execution. Creates .pf files to speed up program loading.
Forensic Value: Proves program execution, timestamps, run count
C:\Windows\Prefetch\
Files: [EXECUTABLE]-[HASH].pf
Tools for analysis:
Command-line Prefetch parser
GUI-based viewer
Integrated Prefetch parsing
Recent Items:
C:\Users\[User]\AppData\Roaming\Microsoft\Windows\Recent\
Desktop Shortcuts:
C:\Users\[User]\Desktop\
Windows 7+ feature tracking recently accessed files per application. Appears in taskbar right-click menus.
\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\
Automatically generated jump lists
\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\
User-pinned items
Change log that records all file system modifications. Part of NTFS, tracks creates, deletes, renames, and modifications.
$Extend\$UsnJrnl:$J
Alternate Data Stream on NTFS
Point-in-time snapshots of volumes. Can contain deleted files, previous versions, and historical data.
# List shadow copies
vssadmin list shadows
# Mount shadow copy
mklink /d C:\VSS \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\