Skip to content

Forensic Artifact Reference

A working catalog of digital forensic artifacts — what they are, where to find them, and how they help investigators. Curated from real-world DFIR practice.

35 artifacts documented - updated as validated coverage expands.

Windows

13 artifacts
HighRegistry

Shell Bags

Windows Explorer view preferences recorded per-folder in UsrClass.dat. Shell Bags prove a user navigated to a folder, even after the folder or attached volume is long gone.

T1083
CriticalExecution

Amcache.hve

Compatibility database introduced in Windows 8 that records every PE file executed on the system, including SHA-1 hash, full path, publisher, and first-seen timestamp.

T1204.002T1059
HighExecution

UserAssist

Per-user registry key recording GUI-launched programs with ROT13-obfuscated paths, focus count, and last execution time — proving interactive user execution of a binary.

T1204.002
MediumExecution

MUICache

Per-user cache of application display names written the first time a binary runs. Every entry is evidence that the user ran that binary at least once.

T1204.002
CriticalExecution

Prefetch Files

Windows Prefetch stores up to the last 8 execution times of a binary along with loaded DLLs and volume information — a foundational timeline artifact for Windows investigations.

T1204.002T1036
CriticalExecution

Shimcache (AppCompatCache)

Application Compatibility Cache stores up to 1024 executed binary records with full path and last-modified timestamp. Persists even when a binary is deleted.

T1059T1204.002
HighExecution

BAM / DAM

Background Activity Moderator and Desktop Activity Moderator record last-execution timestamps per user SID for every binary the system considers interactive.

T1204.002
MediumBrowser

TypedURLs

Internet Explorer / Edge Legacy registry key storing the last 25 URLs a user typed manually into the address bar — stronger evidence than a general visit record.

T1071.001
MediumSystem

RecentDocs

Explorer tracks recently opened files per extension in HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs, including files on removed storage.

T1083
MediumExecution

AppCompatCache Flags

Application compatibility flags set per-binary by Windows and optionally by malware to modify how executables run. Layered onto Shimcache telemetry.

T1546.011
HighNetwork

WiFi Profile Registry

Windows stores every SSID a machine has connected to under HKLM, along with connection timestamps and MAC address of the AP — strong location evidence.

T1016
MediumNetwork

Windows Bluetooth Pairings

Windows records paired Bluetooth devices under HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Devices, preserving MAC and name after unpairing.

T1011.001
CriticalNetwork

USB Device Connection History

Windows records every USB mass-storage device plugged in, keyed by vendor/product ID and serial number, with first- and last-connection timestamps.

T1052.001T1091

macOS

6 artifacts

iOS

4 artifacts

Android

4 artifacts

Cross-platform

3 artifacts

Linux

5 artifacts

Ready to analyze your evidence?

unJaena AI parses every artifact in this catalog — and 200+ more — automatically, and writes the incident report for you.

Start free analysis