top of page
Search

Uncovering Deleted Items and File Existence in Digital Forensics.

  • Feb 22, 2024
  • 2 min read

Updated: Feb 28

ree

When investigating digital forensics cases, confirming which files were deleted or previously existed is crucial. Whether tracking user activity or validating forensic evidence, understanding where and how to find artifacts plays a key role in uncovering the truth.

Many articles on my website discuss different deleted items and file existence artifacts.

However, putting them all together in a structured way helps streamline forensic investigations.

This article serves as a reference guide, consolidating various forensic artifacts that indicate deleted items and file existence, along with their advantages, disadvantages, and relevant analysis techniques.


----------------------------------------------------------------------------------------------------------


  1. Thumbnail Cache (Thumbs.db / Thumbcache)


  • Artifact: Thumbs.db (Windows XP) and Thumbcache (Windows Vista and later)

  • Forensic Importance: Stores thumbnail previews of images and documents, even after deletion.


Article:


----------------------------------------------------------------------------------------------------------

  1. Recycle Bin


  • Forensic Importance: Stores deleted files before permanent removal.


Article:


----------------------------------------------------------------------------------------------------------

  1. User Typed Paths


  • Registry Path: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths

  • Forensic Importance: Tracks file paths typed in the Windows Explorer address bar.


Article:


----------------------------------------------------------------------------------------------------------

  1. Windows Search Database


  • Artifact: Windows.edb

  • Forensic Importance: Stores indexed metadata of files searched on the system.


Article:


----------------------------------------------------------------------------------------------------------

  1. Search WordWheelQuery

Registry Hive: NTUSER.DAT


Registry
Key: NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery
Forensic Importance: 

Stores user-searched keywords from the Start menu.

Analysis Tool: 

Registry Explorer

ree

----------------------------------------------------------------------------------------------------------

Conclusion

Analyzing deleted files and file existence artifacts plays a vital role in forensic investigations. By leveraging Windows registry artifacts, cache files, and search history, investigators can reconstruct user activity, track deleted files, and build a strong case with digital evidence. A structured approach to investigating these artifacts ensures efficiency and thoroughness in forensic analysis.


When investigating digital forensics cases, confirming which files are deleted or file existed is crucial. Whether tracking user activity or validating forensic evidence, understanding where and how to find artifacts plays a key role in uncovering the truth.

-------------------------------------------------Dean------------------------------------------------------


 
 
 

Comments


bottom of page