SlideShare a Scribd company logo
Computer Forensics
Windows Artifacts
© Pearson Education Computer Forensics: Principles and Practices 2
Objectives
 Conduct efficient and effective investigations
of Windows systems
 Find user data and profiles in Windows
folders
 Locate system artifacts in Windows systems
© Pearson Education Computer Forensics: Principles and Practices 3
Introduction
In many cases you may have gigabytes or even
terabytes of data that must be searched for
evidence. Maximize efficiency of the search by
showing default locations of file storage.
© Pearson Education Computer Forensics: Principles and Practices 4
Investigating Windows Systems
 Activities of the user result in user data
 User profiles
 Program files
 Temporary files (temp files)
 Special application-level files
© Pearson Education Computer Forensics: Principles and Practices 5
Investigating Windows Systems
(Cont.)
 System data and artifacts are generated by
the operating system
 Metadata
 Windows system registry
 Event logs or log files
 Swap files
 Printer spool
 Recycle Bin
© Pearson Education Computer Forensics: Principles and Practices 6
Investigating Windows Systems
(Cont.)
 Identify the operating systems of a target
hard drive by:
 Operating system folder names
 The folder for the Recycle Bin
 The construction of the user root folders because
of the differences in the way user data is kept
© Pearson Education Computer Forensics: Principles and Practices 7
Finding User Data and Profiles in
Windows Folders
 Documents and Settings / Users folders
 Contains a user root folder for each user account
created on the computer
 Windows NT and above automatically install
 Administrator
 All users
 Default user (hidden)
© Pearson Education Computer Forensics: Principles and Practices 8
Finding User Data and Profiles in
Windows Folders (Cont.)
 Data stored in the user root folder:
 Desktop settings, such as wallpaper,
screensavers, color schemes, and themes
 Internet customizations, such as the homepage,
favorites, and history
 Application parameters and data, such as e-mail
and upgrades
 Personal files and folders, such as My
Documents, My Pictures, and so on
© Pearson Education Computer Forensics: Principles and Practices 9
Finding User Data and Profiles in
Windows Folders (Cont.)
 Some of the subfolders in the user root folder
include:
 Application data (hidden)
 Cookies
 Desktop
 Favorites
 Local Settings (hidden)
 My Documents
 NetHood (hidden)
© Pearson Education Computer Forensics: Principles and Practices 10
Finding User Data and Profiles in
Windows Folders (Cont.)
© Pearson Education Computer Forensics: Principles and Practices 11
Location of User Root Folders
Operating System
(Platform) User Root Folder Location
Windows 9x <partition>:WINDOWSProfilesuserid USER.DAT file
Windows NT <partition>:WINNTProfilesuserid NTUSER.DAT
file
Windows 2000 and
Windows XP
<partition>:Documents and
Settingsuserid
NTUSER.DAT
file
Windows 7/8/10 <partition>:Usersuserid NTUser.DAT
© Pearson Education Computer Forensics: Principles and Practices 12
Location of User Root Folders
© Pearson Education Computer Forensics: Principles and Practices 13
In Practice: Temp Internet Files
Provide Valuable E-Evidence
© Pearson Education Computer Forensics: Principles and Practices 14
Investigating System Artifacts
 Types of metadata
 Descriptive: describes a resource for purposes
such as discovery and identification
 Structural: indicates how compound objects are
put together
 Administrative: provides information to help
manage a resource, such as when it was created,
last accessed, and modified
© Pearson Education Computer Forensics: Principles and Practices 15
Investigating System Artifacts
(Cont.)
 Registry
 Can reveal current and past applications, as well
as programs that start automatically at bootup
 Viewing the registry requires a registry editor
 Event logs track system events
 Application log tracks application events
 Security log shows logon attempts
 System log tracks events such as driver failures
© Pearson Education Computer Forensics: Principles and Practices 16
Investigating System Artifacts
(Cont.)
 Swap file/page file
 Used by the system as virtual memory
 Can provide the investigator with a snapshot of
volatile memory
 Print spool
 May contain enhanced metafiles of print jobs
 Recycle Bin/Recycler
 Stores files the user has deleted
© Pearson Education Computer Forensics: Principles and Practices 17
Investigating System Artifacts
(Cont.) - Thumbs.DB
© Pearson Education Computer Forensics: Principles and Practices 18
Investigating System Artifacts
(Cont.) - Print spool
Select 41 bytes
© Pearson Education Computer Forensics: Principles and Practices 19
Investigating System Artifacts
(Cont.) - Print spool
© Pearson Education Computer Forensics: Principles and Practices 20
Investigating System Artifacts
(Cont.) - Recycle Bin/Recycler
© Pearson Education Computer Forensics: Principles and Practices 21
Investigating System Artifacts
(Cont.) – link files & recent used files
© Pearson Education Computer Forensics: Principles and Practices 22
Investigating System Artifacts
(Cont.) – Store points
© Pearson Education Computer Forensics: Principles and Practices 23
Investigating System Artifacts
(Cont.) – Logs
Windows NT, 2000, XP maintain log files
 System Log
 Application Log
 Security Log
© Pearson Education Computer Forensics: Principles and Practices 24
Investigating System Artifacts
(Cont.) – Logs
Live System:
 Use Event
Viewer
© Pearson Education Computer Forensics: Principles and Practices 25
Investigating System Artifacts
(Cont.) – Logs Event Viewer
 Event Viewer
© Pearson Education Computer Forensics: Principles and Practices 26
Investigating System Artifacts
(Cont.) – Logs from forensics duplicate
(Windows/System32/Config/)
 SecEvent.evt
 AppEvent.evt
 SysEvent.evt
© Pearson Education Computer Forensics: Principles and Practices 27
Investigating System Artifacts
(Cont.) – $ Logfile
 $Logfile entry in the MFT contains the log of
all file system transactions
 Deletion of a file leaves several entries in
$Logfile
 Not unusual to find files that are no longer on
the disk
 Shows that file was used by the system
© Pearson Education Computer Forensics: Principles and Practices 28
Investigating System Artifacts
(Cont.) – Temporary Files
 Temporary files
 Files with extension tmp
 Created by many applications
 Emails with large attachments:
 Attachments are probably stored as temp files.
(Depends on email system.)
 Look for file extensions .tmp
© Pearson Education Computer Forensics: Principles and Practices 29
Investigating System Artifacts
(Cont.) – Internet Explorer
 Internet Explorer (as well as other browsers)
use a cache.
 index.dat contains internet explorer cached
websites.
© Pearson Education Computer Forensics: Principles and Practices 30
Investigating System Artifacts
(Cont.) – Temporary Files
© Pearson Education Computer Forensics: Principles and Practices 31
Investigating System Artifacts
(Cont.) - Recycle Bin/Recycler
© Pearson Education Computer Forensics: Principles and Practices 32
Investigating System Artifacts
(Cont.) – Swap Files
 Windows 2000 & WinXP & Above
 Pagefile.sys
 Windows 98
 Win386.swp
© Pearson Education Computer Forensics: Principles and Practices 33
Summary
 Search times can be reduced through the use
of default folders and operating system
artifacts
 The skill level of the user will determine
whether this is an effective use of time in the
case
© Pearson Education Computer Forensics: Principles and Practices 34
34
Questions?
Majdi.Owda@aaup.edu

More Related Content

PDF
AntiForensics - Leveraging OS and File System Artifacts.pdf
ODT
Operating System Forensics
PDF
windows-forensics-analysis-v-1.0-4_2.pdf
PPT
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
PPTX
Digital Forensics (compter) lab 2 2023.pptx
PPS
Introduction to Forensics and Steganography by Pardhasaradhi C
PDF
CNIT 121: 11 Analysis Methodology
PPS
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
AntiForensics - Leveraging OS and File System Artifacts.pdf
Operating System Forensics
windows-forensics-analysis-v-1.0-4_2.pdf
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Digital Forensics (compter) lab 2 2023.pptx
Introduction to Forensics and Steganography by Pardhasaradhi C
CNIT 121: 11 Analysis Methodology
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009

Similar to Lecture-1-Windows-Artefacts.pdf (20)

PDF
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
PPTX
Computer forensics libin
PPTX
Computer forensics and its role
PPT
Windowsforensics
PPS
intro to forensics
PPTX
Latest presentation
PDF
MNSEC 2018 - Windows forensics
PPTX
Msra 2011 windows7 forensics-troyla
PDF
Computer Investigator - brief introduction
DOCX
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
PDF
Digital Forensics
PDF
11 Analysis Methodology
PPTX
Digital forensics for technology134.pptx
PPT
Basics of Digital Forensics, techniques and tools
PPT
DigitalForensicDigitalForensicDigitalForensic
PPT
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
PPTX
Computer Forensics
PPT
Computer Forensics
PPTX
DigitalForensics foundation and investigation tools
PPT
DigitalForensics.ppt
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
Computer forensics libin
Computer forensics and its role
Windowsforensics
intro to forensics
Latest presentation
MNSEC 2018 - Windows forensics
Msra 2011 windows7 forensics-troyla
Computer Investigator - brief introduction
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
Digital Forensics
11 Analysis Methodology
Digital forensics for technology134.pptx
Basics of Digital Forensics, techniques and tools
DigitalForensicDigitalForensicDigitalForensic
DigitalForensicsDigitalForensics.pptDigitalForensics.ppt
Computer Forensics
Computer Forensics
DigitalForensics foundation and investigation tools
DigitalForensics.ppt
Ad

Recently uploaded (20)

PPTX
Geodesy 1.pptx...............................................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Welding lecture in detail for understanding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
web development for engineering and engineering
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Sustainable Sites - Green Building Construction
PDF
Digital Logic Computer Design lecture notes
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Construction Project Organization Group 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Geodesy 1.pptx...............................................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Welding lecture in detail for understanding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Foundation to blockchain - A guide to Blockchain Tech
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
web development for engineering and engineering
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Lecture Notes Electrical Wiring System Components
Sustainable Sites - Green Building Construction
Digital Logic Computer Design lecture notes
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Construction Project Organization Group 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Automation-in-Manufacturing-Chapter-Introduction.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Ad

Lecture-1-Windows-Artefacts.pdf

  • 2. © Pearson Education Computer Forensics: Principles and Practices 2 Objectives  Conduct efficient and effective investigations of Windows systems  Find user data and profiles in Windows folders  Locate system artifacts in Windows systems
  • 3. © Pearson Education Computer Forensics: Principles and Practices 3 Introduction In many cases you may have gigabytes or even terabytes of data that must be searched for evidence. Maximize efficiency of the search by showing default locations of file storage.
  • 4. © Pearson Education Computer Forensics: Principles and Practices 4 Investigating Windows Systems  Activities of the user result in user data  User profiles  Program files  Temporary files (temp files)  Special application-level files
  • 5. © Pearson Education Computer Forensics: Principles and Practices 5 Investigating Windows Systems (Cont.)  System data and artifacts are generated by the operating system  Metadata  Windows system registry  Event logs or log files  Swap files  Printer spool  Recycle Bin
  • 6. © Pearson Education Computer Forensics: Principles and Practices 6 Investigating Windows Systems (Cont.)  Identify the operating systems of a target hard drive by:  Operating system folder names  The folder for the Recycle Bin  The construction of the user root folders because of the differences in the way user data is kept
  • 7. © Pearson Education Computer Forensics: Principles and Practices 7 Finding User Data and Profiles in Windows Folders  Documents and Settings / Users folders  Contains a user root folder for each user account created on the computer  Windows NT and above automatically install  Administrator  All users  Default user (hidden)
  • 8. © Pearson Education Computer Forensics: Principles and Practices 8 Finding User Data and Profiles in Windows Folders (Cont.)  Data stored in the user root folder:  Desktop settings, such as wallpaper, screensavers, color schemes, and themes  Internet customizations, such as the homepage, favorites, and history  Application parameters and data, such as e-mail and upgrades  Personal files and folders, such as My Documents, My Pictures, and so on
  • 9. © Pearson Education Computer Forensics: Principles and Practices 9 Finding User Data and Profiles in Windows Folders (Cont.)  Some of the subfolders in the user root folder include:  Application data (hidden)  Cookies  Desktop  Favorites  Local Settings (hidden)  My Documents  NetHood (hidden)
  • 10. © Pearson Education Computer Forensics: Principles and Practices 10 Finding User Data and Profiles in Windows Folders (Cont.)
  • 11. © Pearson Education Computer Forensics: Principles and Practices 11 Location of User Root Folders Operating System (Platform) User Root Folder Location Windows 9x <partition>:WINDOWSProfilesuserid USER.DAT file Windows NT <partition>:WINNTProfilesuserid NTUSER.DAT file Windows 2000 and Windows XP <partition>:Documents and Settingsuserid NTUSER.DAT file Windows 7/8/10 <partition>:Usersuserid NTUser.DAT
  • 12. © Pearson Education Computer Forensics: Principles and Practices 12 Location of User Root Folders
  • 13. © Pearson Education Computer Forensics: Principles and Practices 13 In Practice: Temp Internet Files Provide Valuable E-Evidence
  • 14. © Pearson Education Computer Forensics: Principles and Practices 14 Investigating System Artifacts  Types of metadata  Descriptive: describes a resource for purposes such as discovery and identification  Structural: indicates how compound objects are put together  Administrative: provides information to help manage a resource, such as when it was created, last accessed, and modified
  • 15. © Pearson Education Computer Forensics: Principles and Practices 15 Investigating System Artifacts (Cont.)  Registry  Can reveal current and past applications, as well as programs that start automatically at bootup  Viewing the registry requires a registry editor  Event logs track system events  Application log tracks application events  Security log shows logon attempts  System log tracks events such as driver failures
  • 16. © Pearson Education Computer Forensics: Principles and Practices 16 Investigating System Artifacts (Cont.)  Swap file/page file  Used by the system as virtual memory  Can provide the investigator with a snapshot of volatile memory  Print spool  May contain enhanced metafiles of print jobs  Recycle Bin/Recycler  Stores files the user has deleted
  • 17. © Pearson Education Computer Forensics: Principles and Practices 17 Investigating System Artifacts (Cont.) - Thumbs.DB
  • 18. © Pearson Education Computer Forensics: Principles and Practices 18 Investigating System Artifacts (Cont.) - Print spool Select 41 bytes
  • 19. © Pearson Education Computer Forensics: Principles and Practices 19 Investigating System Artifacts (Cont.) - Print spool
  • 20. © Pearson Education Computer Forensics: Principles and Practices 20 Investigating System Artifacts (Cont.) - Recycle Bin/Recycler
  • 21. © Pearson Education Computer Forensics: Principles and Practices 21 Investigating System Artifacts (Cont.) – link files & recent used files
  • 22. © Pearson Education Computer Forensics: Principles and Practices 22 Investigating System Artifacts (Cont.) – Store points
  • 23. © Pearson Education Computer Forensics: Principles and Practices 23 Investigating System Artifacts (Cont.) – Logs Windows NT, 2000, XP maintain log files  System Log  Application Log  Security Log
  • 24. © Pearson Education Computer Forensics: Principles and Practices 24 Investigating System Artifacts (Cont.) – Logs Live System:  Use Event Viewer
  • 25. © Pearson Education Computer Forensics: Principles and Practices 25 Investigating System Artifacts (Cont.) – Logs Event Viewer  Event Viewer
  • 26. © Pearson Education Computer Forensics: Principles and Practices 26 Investigating System Artifacts (Cont.) – Logs from forensics duplicate (Windows/System32/Config/)  SecEvent.evt  AppEvent.evt  SysEvent.evt
  • 27. © Pearson Education Computer Forensics: Principles and Practices 27 Investigating System Artifacts (Cont.) – $ Logfile  $Logfile entry in the MFT contains the log of all file system transactions  Deletion of a file leaves several entries in $Logfile  Not unusual to find files that are no longer on the disk  Shows that file was used by the system
  • 28. © Pearson Education Computer Forensics: Principles and Practices 28 Investigating System Artifacts (Cont.) – Temporary Files  Temporary files  Files with extension tmp  Created by many applications  Emails with large attachments:  Attachments are probably stored as temp files. (Depends on email system.)  Look for file extensions .tmp
  • 29. © Pearson Education Computer Forensics: Principles and Practices 29 Investigating System Artifacts (Cont.) – Internet Explorer  Internet Explorer (as well as other browsers) use a cache.  index.dat contains internet explorer cached websites.
  • 30. © Pearson Education Computer Forensics: Principles and Practices 30 Investigating System Artifacts (Cont.) – Temporary Files
  • 31. © Pearson Education Computer Forensics: Principles and Practices 31 Investigating System Artifacts (Cont.) - Recycle Bin/Recycler
  • 32. © Pearson Education Computer Forensics: Principles and Practices 32 Investigating System Artifacts (Cont.) – Swap Files  Windows 2000 & WinXP & Above  Pagefile.sys  Windows 98  Win386.swp
  • 33. © Pearson Education Computer Forensics: Principles and Practices 33 Summary  Search times can be reduced through the use of default folders and operating system artifacts  The skill level of the user will determine whether this is an effective use of time in the case
  • 34. © Pearson Education Computer Forensics: Principles and Practices 34 34 Questions? Majdi.Owda@aaup.edu