06 - Microsoft File Systems and The Windows Registry

Class: CYBR-405


Notes:

Artifacts of Interest: MFT

The $I30 System File

This is directory-level artifact persistence.

Experienced CTF Users:

Notes:

$UsnJrnl System File

The Update Sequence Number Journal logs file system changes.

CTF Users: C:\Windows\system32> fsutil usn readjournal c:

Pasted image 20260216092600.png|500

Notes:

Artifacts of Interest: Registry

Understanding the Windows Registry

Notes:

Data Types in the Registry

Registry Organization

Pasted image 20260216093117.png

Exploring the Organization of the Windows Registry

File name and location Purpose of file
Users\user-account\Ntuser.dat User-protected storage area; contains the list of most recently used files and desktop configuration settings
Windows\system32\config\Default.dat Contains the computer's system settings
Windows\system32\config\SAM.dat Contains user account management and security settings
Windows\system32\config\Security.dat Contains the computer's security settings
Windows\system32\config\Software.dat Contains installed programs' settings and associated usernames and passwords
Windows\system32\config\System.dat Contains additional computer system settings
Windows\system32\config\systemprofile Contains additional ntuser information

User Assist

UserAssist tracks:

This answers:

https://www.youtube.com/shorts/0CkIo3FAW_U

Notes:

LNKs

This is one of the best Windows artifacts.

A .Ink file can contain:

Even if:

Provides:

Notes:


LNK files are one of the best tools for the forensic investigator because they show which files a user accessed and when even if the file is no longer on the computer

LNK files can be found in multiple locations

Artifacts of Interest: Prefetch

Prefetch

Prefetch is: execution evidence.

Notes:

Artifacts of Interest: Logs

Event Logs

Logs maintain a historical record of things that happen on a computer or other information system.

Most computers (OS) have several different types of event logs but the 4 that are used the most often:

Security log is often most important:

This answers: WHO logged in and WHEN

Browser Logs

Each web browser keeps a set of activity logs which contain

And some record file activity -

Pasted image 20260216094052.png|600

Notes:

Browser History Logs

Location File Name
C:\Users[username]\AppData\Local\Google\Chrome\User Data\Default\History History (sqlite)
C:\Users[username]\AppData\Roaming\Mozilla\Firefox\Profiles[profile folder name] places.sqlite
C:\Users[username]\AppData\Local\Microsoft\Edge\User Data\Default History (sqlite)
SQLite (battle field tested):
https://www.youtube.com/shorts/2vx6FTvzRCI

Notes:

Artifacts of Interest: Memory

RAM Acquisition

Now we move into volatile memory.
RAM capture contains:

Memory is:

Important: If you power off a system, you lose this.

Notes:

Pasted image 20260216094554.png|600

Hiberfil\Pagefile.sys

Hiberfil.sys:

Pagefile.sys:

Why investigators care:

Artifacts of Interest: Shadow

Volume Shadow Snapshots

Windows automatically creates restore points.

These are snapshots in time.

This is extremely valuable for: Timeline reconstruction.

https://www.youtube.com/shorts/gAMaeyLOKYY

Notes:

Recycle Bin

Deleted files go to: $Recycle.Bin

Windows:

Artifacts include:

Even if user empties recycle bin:

Investigative Questions

This is Forensics

EVERYTHING ties back to:

Each artifact answers different pieces of that puzzle.

EVERYTHING ties back to:

BitLocker

BitLocker / Whole Disk Encryption

Notes:

Examining Microsoft BitLocker

Examining Third-Party Dick Encryption Tools