In this module

The Windows Artifact Taxonomy

Module 0 · Free
Operational Objective
A forensic examiner investigating a Windows system faces hundreds of potential artifact sources — filesystem metadata, registry hives, event logs, application data, browser history, network records, volatile memory structures, and more. Without a systematic taxonomy, the examiner either wastes time analyzing irrelevant artifacts or misses critical evidence because they didn't know the artifact existed. The taxonomy problem is compounded by the fact that different investigation types require different artifact priorities: an insider threat investigation depends heavily on user activity artifacts (ShellBags, LNK files, Jump Lists) that are largely irrelevant to a ransomware investigation, which depends on execution artifacts (Prefetch, Amcache) and system artifacts (Event Logs, registry persistence). This subsection provides the complete taxonomy of Windows forensic artifacts organized by category, maps each artifact to the investigation types it serves, establishes the persistence and reliability characteristics of each category, and builds the artifact selection framework that ensures the examiner collects and analyzes the right evidence for each investigation.
Deliverable: Complete reference taxonomy of Windows forensic artifacts across six categories (filesystem, execution, user activity, system, network, volatile), with persistence duration, reliability rating, anti-forensic vulnerability, and investigation type mapping for each artifact. The artifact selection matrix that drives collection and analysis priorities for insider threat, ransomware, unauthorized access, and data exfiltration investigations.
Estimated completion: 40 minutes
WINDOWS FORENSIC ARTIFACT TAXONOMY — SIX CATEGORIES FILESYSTEM What happened to files and directories $MFT — file metadata, 4 timestamps per file $UsnJrnl — change log, every file operation $LogFile — NTFS transaction log $I30 — directory index (deleted file names) $Recycle.Bin — deleted file metadata Persistence: High · Reliability: Very High EXECUTION What programs ran, when, how often Prefetch — exec time, count, loaded files Amcache — SHA1, path, first exec Shimcache — compatibility lookup record BAM/DAM — execution with user SID UserAssist — GUI program execution (ROT13) Persistence: Medium · Reliability: High USER ACTIVITY What the user interacted with ShellBags — folder access history LNK files — file access with target metadata Jump Lists — per-app recent file history MRU lists — recent documents, typed paths TypedPaths — Explorer address bar history Persistence: High · Reliability: High SYSTEM OS events, configuration, persistence Event Logs — auth, process, service, PowerShell Registry — persistence, config, USB, accounts Scheduled Tasks — XML task definitions Services — service registration and config WMI Repository — event subscriptions Persistence: Medium · Reliability: Very High NETWORK Connectivity, transfer, external activity SRUM — app network usage, 30+ day history Browser history — URLs, downloads, cookies DNS cache — recent name resolutions Wi-Fi profiles — connection history Cloud sync logs — OneDrive, Dropbox, Teams Persistence: Medium · Reliability: Medium-High VOLATILE Memory-resident, lost at shutdown Process list — running processes, PIDs Network connections — active sessions Loaded DLLs — injected/reflective modules Registry keys — in-memory hive state Clipboard — recent copy/paste content Persistence: None · Reliability: Very High

Figure WF0.2 — The six categories of Windows forensic artifacts. Filesystem and user activity artifacts have the longest persistence. Volatile artifacts have the highest reliability but are lost at shutdown. System artifacts are the most frequently targeted by anti-forensics. Network artifacts fill the gap between endpoint activity and external communication.

Filesystem artifacts: what happened to files

Filesystem artifacts answer the fundamental forensic question: what files existed, when were they created, modified, accessed, or deleted, and how did they get there. On NTFS — the filesystem used by every modern Windows installation — the primary source is the Master File Table ($MFT), which contains a record for every file and directory on the volume. Each record stores multiple timestamps, the file path (via parent directory references), the file size, and for small files, the file content itself.

The $MFT is the single most important forensic artifact on a Windows system. It persists until the volume is formatted. It records files that have been deleted (the MFT record is marked as free but not zeroed). It provides nanosecond-precision timestamps that reveal the exact sequence of file operations. And it stores two independent sets of timestamps — $STANDARD_INFORMATION and $FILE_NAME — that can be compared to detect timestomping.

Supporting the $MFT are two change logs: the USN Journal ($UsnJrnl:$J) and the NTFS transaction log ($LogFile). The USN Journal records every change to every file on the volume — creation, modification, rename, deletion, security change — with a timestamp and a reason code that identifies the type of change. The $LogFile records NTFS transactions at a lower level, providing redo/undo operations that can recover file operations even when the USN Journal has been cleared.

The directory index ($I30) provides an additional source of deleted file evidence. When a file is deleted from a directory, its entry is removed from the active directory index, but the index slack space often retains the deleted entry — including the filename and timestamps. This evidence persists until the directory index is compacted or the slack space is overwritten.

Expand for Deeper Context

The persistence characteristics of filesystem artifacts deserve careful understanding. The $MFT persists for the life of the volume — an MFT record for a deleted file remains in the MFT until the entry is reallocated to a new file. On a typical enterprise workstation with a 256GB-1TB SSD and moderate file churn, a deleted file's MFT entry may persist for weeks to months before reallocation. On a server with low file churn, it may persist indefinitely.

The USN Journal has a configurable maximum size (default 32MB on the system volume, 32MB on data volumes). When the journal reaches its maximum size, the oldest entries are discarded. On a busy system generating significant file activity, the journal may retain only 24-48 hours of history. On a quiet system, it may retain weeks. The journal size is configurable via fsutil usn queryjournal and fsutil usn createjournal, which means forensic readiness programs can increase journal size to ensure longer retention.

The $LogFile has a fixed size (default 64MB) and wraps quickly — typically retaining only the most recent few hours of NTFS transactions. Its forensic value is primarily for recovering very recent operations or for situations where the USN Journal has been deliberately cleared. The $I30 directory index slack is unpredictable — it depends on directory activity and index compaction, and entries may persist for hours or months.

Execution artifacts: what programs ran

Execution artifacts answer the second fundamental question: what programs ran on this system, when did they run, how many times did they run, and what did they access during execution. Windows maintains multiple independent records of program execution, each capturing different aspects of the event.

Prefetch is the most commonly cited execution artifact. Located in C:\Windows\Prefetch\, each .pf file records the executable name, a hash of the executable path, the last 8 execution timestamps (Windows 8+), the total execution count, and a list of files and directories referenced during the first 10 seconds of each execution. Prefetch provides the strongest single-source evidence of program execution — the file is created by the Windows Task Scheduler service (SysMain/Superfetch), not by the program itself, and its existence is independent of user action.

Amcache.hve is a registry hive located at C:\Windows\appcompat\Programs\Amcache.hve. It records program metadata including the file path, SHA1 hash, file size, publisher, product name, and a timestamp. On Windows 10 and later, Amcache is populated when a program is first executed or installed. The SHA1 hash is particularly valuable — it provides a cryptographic identifier that can be compared against threat intelligence databases.

Shimcache (Application Compatibility Cache) is stored in the SYSTEM registry hive. It records executables that were evaluated by the Application Compatibility subsystem. On Windows 10 and 11, the cache includes an execution flag that indicates whether the program was actually executed. On earlier versions, presence in the Shimcache does not definitively prove execution — only that the executable was evaluated for compatibility.

Background Activity Moderator (BAM) and Desktop Activity Moderator (DAM) are registry keys introduced in Windows 10 version 1709. They record full executable paths with execution timestamps and are associated with specific user SIDs, providing user-level execution attribution that Prefetch and Amcache lack.

UserAssist records GUI program execution in the NTUSER.DAT registry hive. Entries are ROT13 encoded (a trivial obfuscation, not encryption) and include execution count and last execution timestamp. UserAssist specifically records programs launched through the Windows shell — Explorer, Start Menu, Desktop shortcuts — providing evidence of interactive user execution as opposed to automated or service-based execution.

User activity artifacts: what the user interacted with

User activity artifacts answer the question that matters most in insider threat and unauthorized access investigations: what did the user see, touch, and interact with? These artifacts record folder navigation, file opening, and application-specific file history — evidence that persists even after the files themselves are deleted.

ShellBags are registry entries stored in NTUSER.DAT and UsrClass.dat that record every folder the user navigated to in Windows Explorer. Each ShellBag entry includes the folder path (encoded as a shell item ID list), timestamps for first and last access, and the folder's view settings (icon size, sort order, column layout). ShellBags persist after the folder is deleted — the registry entry remains, providing evidence that the user accessed a folder that no longer exists.

LNK (shortcut) files are created automatically in the user's Recent folder when a file is opened. Each LNK file contains the target file's full path, three sets of timestamps (target file creation, modification, access), the target file's size, the volume serial number and type (local, removable, network), and the machine's NetBIOS name. LNK files persist after the target file is deleted — the shortcut remains in the Recent folder with the original file's metadata, including timestamps from the moment the file was last accessed.

Jump Lists are per-application recent file lists stored in the user's AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\ and CustomDestinations\ directories. Each Jump List is identified by an AppID (a hash of the application's path) and contains LNK entries for files recently accessed by that specific application. Jump Lists provide application-specific file history — proving not just that a file was accessed, but which application was used to access it.

System artifacts: what the operating system recorded

System artifacts capture operating system events — authentication, process execution, service management, scheduled tasks, and configuration changes. The primary system artifacts are Windows Event Logs and the Windows Registry.

Windows Event Logs (EVTX format) provide timestamped records of security events (logon/logoff, process creation, privilege use, object access), system events (service state changes, driver loading, shutdown/restart), and application events (including PowerShell script execution, Sysmon telemetry, and Windows Defender detections). Event Logs are the most commonly targeted artifact in anti-forensic operations — clearing the Security log is often the attacker's first post-compromise action.

The Windows Registry stores system configuration, user preferences, application settings, and — critically for forensics — evidence of persistence mechanisms, USB device connections, network history, user accounts, and installed software. Five hive files contain the bulk of forensic evidence: SYSTEM (hardware config, services, USB, network), SOFTWARE (installed programs, network profiles, OS info), SAM (user accounts, logon data), NTUSER.DAT (per-user settings, MRU lists, UserAssist, TypedPaths), and UsrClass.dat (per-user class registration, ShellBags).

Network artifacts: what external communication occurred

Network artifacts bridge the gap between endpoint activity and external communication. They answer questions about what the system connected to, how much data was transferred, and what external resources were accessed.

SRUM (System Resource Usage Monitor) is the most underutilized forensic artifact in most investigations. Stored in C:\Windows\System32\sru\SRUDB.dat, it records per-application network usage (bytes sent and received), CPU time, memory usage, and energy consumption — with hourly granularity over 30-60 days. In data exfiltration investigations, SRUM provides quantitative evidence of how much data was transferred by each application, replacing the imprecise "the user could have exfiltrated data" with "OneDrive.exe sent 4.7GB between March 1 and March 15."

Browser artifacts (history, downloads, cache, cookies) provide evidence of web-based activity. Cloud storage artifacts (OneDrive, Dropbox, Google Drive sync logs) provide evidence of cloud-based file transfer. DNS cache provides evidence of recent name resolution. Wi-Fi profiles provide evidence of network connections.

Volatile artifacts: what exists only in memory

Volatile artifacts exist only while the system is running. They are lost at shutdown and cannot be recovered from a powered-off disk image. Running processes, active network connections, loaded DLLs, clipboard contents, in-memory registry keys, and decrypted file contents — all are volatile.

Volatile artifacts have the highest reliability of any category — they represent the system's actual runtime state, unmediated by filesystem metadata or registry interpretation. A process running in memory with a specific PID, parent PID, command line, and loaded modules is direct evidence of execution. An active network connection to a specific IP on a specific port is direct evidence of communication.

The catch is that volatile evidence must be collected before the system is powered off, and the collection itself modifies the volatile state (the collection tool runs as a process, uses memory, generates network traffic). This is the first law of digital forensics: observation changes the observed system. The examiner must balance the forensic value of volatile collection against the risk of modifying evidence.

Decision point

You are scoping artifact collection for a suspected insider threat. The CISO wants results within 24 hours. You can collect either: (A) a comprehensive collection of all artifact categories from the suspect's workstation (filesystem, execution, user activity, registry, event logs, browser, network — approximately 6 hours of collection and 18 hours of analysis), or (B) a targeted collection of user activity artifacts (ShellBags, LNK, Jump Lists) plus filesystem artifacts (MFT, USN) — approximately 2 hours of collection and 8 hours of analysis, with time remaining for a preliminary report.

The correct approach depends on the investigation question. If the question is "did this person access and copy restricted files?" — option B answers it directly. ShellBags prove folder access, LNK files prove file opening, USN proves file copying. If the question is broader ("what has this person been doing for the last 6 months?"), option A is necessary. Match the collection scope to the investigation question, not to a maximum-collection default. You can always perform a supplementary collection after the initial findings.

Try It — Map Artifacts to an Investigation Type

Take the insider data exfiltration scenario (INC-NE-2026-0915): a departing engineer is suspected of copying proprietary files to USB and cloud storage over 6 weeks. Using the taxonomy above, identify which artifacts from each category are most relevant to this investigation.

Your analysis should answer: 1. Which filesystem artifacts prove files were copied? (Think: what operation does copying create in the USN Journal? What does the MFT show for files on a USB device?) 2. Which user activity artifacts prove the user navigated to the restricted folders? (Think: ShellBags for folder access, LNK files for file opening) 3. Which execution artifacts prove the user ran archive/copy tools? (Think: Prefetch for 7-zip, WinRAR, robocopy) 4. Which network artifacts quantify the data transferred externally? (Think: SRUM for OneDrive/browser upload volumes) 5. Which system artifacts corroborate the user's access times? (Think: Event Log authentication events, USB device connection events) 6. Would volatile artifacts add value to this investigation? (Think: the investigation is 6 weeks of historical activity — volatile evidence is only current state)

Build your artifact collection priority list for this scenario before checking the analysis methodology in WF0.12.

Compliance Myth: "We only need event logs for forensic investigations"

The myth: Event logs capture everything needed for incident investigation. Security logs record authentication. Sysmon logs record process creation and network connections. PowerShell logs record script execution. If an investigation needs more than event logs, the investigation is overscoped.

The reality: Event logs are essential but incomplete. They record what the operating system was configured to log — and most organizations run with default logging configurations that miss critical evidence. Default Security log settings don't capture process command lines (requires Advanced Audit Policy). Default PowerShell logging doesn't capture script block content (requires ScriptBlock logging). Without Sysmon, there are no process creation events with parent process information, no file creation monitoring, no network connection logging with process attribution, and no DNS query logging. Even with comprehensive event logging, event logs cannot answer "which folder did the user browse in Explorer" (ShellBags), "how many bytes did this application send to the internet" (SRUM), "what was the SHA1 hash of the executed file" (Amcache), or "did the user access this specific file via Word or via the file browser" (Jump Lists). A forensic investigation that relies solely on event logs will miss user activity evidence, quantitative data transfer evidence, and application-level execution evidence that other artifact categories provide.

Troubleshooting

"This taxonomy has too many artifact types — I can't learn them all." You don't analyze all artifact types in every investigation. The taxonomy is a reference that ensures you know what exists so you can select the right artifacts for each investigation type. An insider threat investigation focuses on user activity and network artifacts. A ransomware investigation focuses on execution and system artifacts. The selection matrix at the end of this subsection maps investigation types to artifact priorities.

"We use EDR — our EDR captures all of this." EDR captures process telemetry, file operations, network connections, and registry modifications in real time. What EDR does not capture: ShellBag history (folder browsing), SRUM data transfer volumes, Amcache SHA1 hashes for files that were deleted before EDR ingested them, LNK file metadata for files accessed before EDR was deployed, or MFT resident data for small files. EDR is a powerful current-state telemetry source. Forensic artifacts are a historical record that predates and extends beyond EDR's collection window.

"Volatile artifacts are too fragile — we should focus on disk artifacts." For historical investigations (what happened over the last 30 days), disk artifacts are primary. For active compromise investigations (what is the attacker doing right now), volatile artifacts are essential. The decision depends on the investigation timeline: if you're reconstructing past activity, prioritize disk artifacts. If you're investigating an ongoing compromise, collect volatile evidence first — then image the disk.

You are investigating a suspected insider data exfiltration case. The departing employee used a Windows 11 workstation. IT has already reimaged the workstation, but a KAPE triage collection was taken before reimaging. The KAPE collection includes MFT, USN Journal, registry hives, Prefetch, Event Logs, SRUM, and browser data. You need to prove which folders the user accessed on a restricted file share over the past month. Which artifact provides the most direct evidence of folder navigation?
The MFT from the workstation, because MFT records include parent directory references that show which folders contained files the user accessed — allowing you to reconstruct the folder access pattern from file-level metadata.
The Security Event Log (Event ID 4663 Object Access), because when Object Access auditing is enabled on the file server, every folder access generates an audit event with the user's identity, the object path, and the access type.
ShellBags from the user's UsrClass.dat registry hive, because ShellBags record every folder the user navigated to in Windows Explorer — including network shares — with timestamps for first and last access. ShellBags persist even after the folder itself is deleted or inaccessible, and they are stored on the workstation regardless of whether the file server has auditing enabled.
The USN Journal, because it records every file operation including directory traversal. By filtering USN entries for the restricted share's volume, you can identify all folder access events with nanosecond-precision timestamps.

You've built the foundations of artifact-level forensic analysis.

WF0 gave you the taxonomy, NTFS architecture, and the five-step methodology. WF1 took you inside the MFT at the binary level — every attribute, every timestamp, every edge case. From here, every artifact category gets the same raw-first treatment.

  • WF2–WF10: every major Windows artifact decoded at binary level — USN Journal, Prefetch, Amcache, Shimcache, ShellBags, LNK, Jump Lists, SRUM, Event Logs, and the Registry hives
  • INC-NE-2026-0915 (WF13) — Insider data exfiltration capstone. Work the complete investigation from USB history to OneDrive exfiltration evidence
  • INC-NE-2026-1022 (WF14) — Ransomware capstone. Three-host triage (FIN01 → IT03 → FS01) across the 72-hour attack chain
  • The lab pack — 25+ realistic evidence files in 10 formats, simulated KAPE triage pre-populated, both capstones deployable to your own VM
  • Anti-forensic detection methodology — defeat timestomping, log clearing, and Prefetch deletion with cross-artifact correlation
Unlock with Specialist — £25/mo See Full Syllabus

Cancel anytime