2115 words
11 minutes
NIST CFReDS Data Leakage Case Analysis May 2026

banner.png

Disk & Image Verification#

What are the hash values (MD5 & SHA-1) of all images?#

Does the acquisition and verification hash value match?#

ArtifactTypeMD5SHA-1Notes
PCSystemA49D1254C873808C58E6F1BCD60B5BDEAFE5C9AB487BD47A8A9856B1371C2384D44FD785Primary system image
RM#2Removable MediaB4644902ACAB4583A1D0F9F1A08FAA77048961A85CA3ECED8CC73F1517442D31D4DCA0A3USB / external device
RM#3 (Type1)Removable Media858C7250183A44DD83EB706F3F178990471D3EEDCA9ADD872FC0708297284E1960FF44F8Same as Type2
RM#3 (Type2)Removable Media858C7250183A44DD83EB706F3F178990471D3EEDCA9ADD872FC0708297284E1960FF44F8Duplicate of Type1
RM#3 (Type3)Removable MediaDF914108FB3D86744EB688EBA482FBDF7F3C2EB1F1E2DB97BE6E963625402A0E362A532CDifferent dataset
Image FileMD5SHA-256
cfreds_2015_data_leakage_pc.E017338dbed7d2293334801416613bc17b5e6365e44f1004252171acb73e6779be05277cbd57d09d7febed22d2463a956a9
cfreds_2015_data_leakage_pc.E0251675274ad9eb6a15d0e562d10a4913f3bc1c1cab227031e0a209972511d1e030f7cb60b76a89db0db7b412f56b660df
cfreds_2015_data_leakage_pc.E037a21bf1b6db3ce433c55ac76749f12d9f45a0cd89b1f1a6a805771014f2dcef42497ba421c7edf1597ee50b5ca6c0b3c
cfreds_2015_data_leakage_pc.E0462f6cce2ec9e1b1f7a21cef0d12e0e3833cd294e44be91c5147296675fdbb40c270471480c4a1998d3a59fea3d944099
cfreds_2015_data_leakage_rm#1.E017cd7bc148d3a1e5f329cb3580d4d4f8fa14150a21bc1e3700b51912c2ab20cd9587ad3e27ee67475af64508a7e760121
cfreds_2015_data_leakage_rm#2.E016cfbfdb14e0a504684a338b87362d75325215f9bcb51ceee9147886ed3f5c13ef148de634fc5114491e0f8dad8b15696
cfreds_2015_data_leakage_rm#3_type3.E01b49cb0c7dfccb8cd0e39424e3f1abc86336e1307721ef5f63679379961d1716b74f986e69df8c40117d9cea7858d512b

Partition & System Information#

Identify the partition information of PC image.#

Pasted image 20260501135013.png

No.BootableFile SystemStart SectorTotal SectorsSize
1NTFS2,048204,800100 MB
2*NTFS206,84841,734,14419.9 GB

Explain installed OS information in detail. (OS name, install date, registered ownerโ€ฆ)#

System Registry Hives#

Hive NameFile PathSHA-256 Hash
SYSTEMC:\Windows\System32\config\SYSTEMe896ef300843a3efd1c1f96b25fd2b209cd1ad28d653ab6bc05699f910bbd3d1
SOFTWAREC:\Windows\System32\config\SOFTWARE03422334efaca3c9cd2657518b5706fb9ef42ef7abe49cc3dddaa98dabb394ac
SAMC:\Windows\System32\config\SAM6aecc0b2b5fb86a71498cb688bb59df43f85547723bff898a534fadef26c428f
SECURITYC:\Windows\System32\config\SECURITY1170568731c717d4d8c84ae52bd9ade737c3b0d4173127c68c3cc2ea8ff3b143

User Registry Hives#

UserFile NameSHA-256 Hash
admin11admin11_NTUSER.DATb8e18d84ad84735998805a25e22ae7b3c696aba2ff36c73a1e294862805aaf4c
informantinformant_NTUSER.DAT2190b57e2908d36f835589cc530c8c471ea48952f8edea70cc91488d9b5d1f64
temporarytamporary_NTUSER.DAT0edc2037f4daf584f4142808aa52863262af746aa9ac2f1d415f5cc102649297
admin11admin11_UsrClass.datd3a120dfd44e275dfd16ecec14da3d770e462cf8966e740c812e6f9c5492a648
informantinformant_UsrClass.data26fe02da57e6c84a911edf9dd39021ecf200d66d168841331dae0be9dd2f1b7
temporarytamporary_UsrClass.datTd36330d2553c21e3df4708fc3d88d1ae1542be8c1c5154676994e92820e1c231

Pasted image 20260502173612.png

Pasted image 20260501140951.png

  • Opened the SOFTWARE hive in RegExplorer,
  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion

Pasted image 20260501161850.png

Pasted image 20260501140918.png

Installed OS Information#

FieldValue
OS NameWindows 7 Ultimate
EditionUltimate
Version6.1
Build Number7601
Service PackService Pack 1
ArchitectureMultiprocessor Free (64-bit)
Installation TypeClient
System RootC:\Windows
Registered Ownerinformant
Registered Organizationโ€”
Product ID00426-292-0000007-85262

What is the time zone setting?#

Pasted image 20260501141435.png

  • HKLM\SYSTEM\ControlSet###\Control\TimeZoneInformation

Time Zone Configuration#

FieldValue
Time Zone NameEastern Standard Time
Bias (UTC Offset)UTC -5 hours
Active BiasUTC -4 hours
Standard Bias0
Daylight Bias-60 minutes

Daylight Saving Time (DST) Rules#

SettingValue
DST Start2nd Sunday of March at 02:00
DST End1st Sunday of November at 02:00

Raw Interpretation (Important for Report)#

Registry FieldMeaning
Bias = 300Base offset = UTC -5 hours (300 minutes)
DaylightBias = -60DST adjustment = -1 hour โ†’ UTC -4
ActiveTimeBias = 240System was in DST at acquisition time
StandardStartDST ends โ†’ November
DaylightStartDST begins โ†’ March

What is the computer name?#

  • `HKLM\SYSTEM\ControlSet###\Control\ComputerName\ComputerName
  • `HKLM\SYSTEM\ControlSet###\Services\Tcpip\Parameters

Pasted image 20260501141823.png

Registry ValueDataPurpose
ComputerNameINFORMANT-PCPrimary system name
Hostnameinformant-PCNetwork hostname
NV Hostnameinformant-PCPersistent hostname (non-volatile)

User Accounts & Activity#

List all accounts in OS except system accounts. (Account name, login count, last logon dateโ€ฆ)#

  • HKLM\SAM\USERS

Pasted image 20260501142113.png

User NameUser ID (RID)Total Login CountLast Logon TimeCreated OnLast Password ChangeInvalid Login Count
informant1000102015-03-25 14:45:592015-03-22 14:33:542015-03-22 14:33:540
admin11100122015-03-22 15:57:022015-03-22 15:51:542015-03-22 15:52:100
ITechTeam10020โ€”2015-03-22 15:52:302015-03-22 15:52:451
temporary100312015-03-22 15:55:572015-03-22 15:53:012015-03-22 15:53:111

Who was the last user to logon into PC?#

User NameUser ID (RID)Total Login CountLast Logon TimeCreated OnLast Password ChangeInvalid Login Count
informant1000102015-03-25 14:45:592015-03-22 14:33:542015-03-22 14:33:540

When was the last recorded shutdown date/time?#

  • HKLM\SYSTEM\ControlSet###\Control\Windows (value: ShutdownTime)

Pasted image 20260501142436.png

Raw Value#

Terminal window
57-A9-48-B5-10-67-D0-01
  • This is a Windows FILETIME (little-endian, 64-bit).
FieldValue
Last Shutdown Time (UTC)2015-03-25 15:31:05
Time zone Applied (EDT, UTC-4)2015-03-25 11:31:05

Network Information#

Explain network interface(s) with DHCP assigned IP.#

  • HKLM\System\ControlSet00x\Services\Tcpip\Parameters\Interfaces\{GUID}

Pasted image 20260501142722.png

Pasted image 20260501142821.png

Network Interface (DHCP Assigned)#

FieldValue
IP Address10.11.11.129
Subnet Mask255.255.255.0
Default Gateway10.11.11.2
DHCP Server10.11.11.254
DNS Server10.11.11.2
Domainlocaldomain
DHCP EnabledYes

DHCP Lease Information#

FieldValue
Lease Obtained2015-03-25 13:59:50
Lease Expiry2015-03-25 14:29:50
Lease Duration1800 seconds (30 minutes)

Applications & Execution#

What applications were installed by the suspect after installing OS?#

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
  • 64-bit Systems: HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall

Pasted image 20260501143153.png

TimestampKey NameDisplay NameVersionPublisherInstall DateInstall SourceInstall LocationUninstall String
2009-07-14 04:53:25AddressBookโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25Connection Managerโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25DirectDrawExโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25Fontcoreโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2015-03-22 15:11:51Google ChromeGoogle Chrome41.0.2272.101Google Inc.20150322โ€”C:\Program Files (x86)\Google\Chrome\Applicationโ€C:\Program Files (x86)\Google\Chrome\Application\41.0.2272.101\Installer\setup.exeโ€ โ€”uninstall โ€”multi-install โ€”chrome โ€”system-level โ€”verbose-logging
2009-07-14 04:53:25IE40โ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25IE4Dataโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25IE5BAKEXโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25IEDataโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25MobileOptionPackโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25SchedulingAgentโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2009-07-14 04:53:25WICโ€”โ€”โ€”โ€”โ€”โ€”โ€”
2015-03-22 15:16:03{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}Google Update Helper1.3.26.9Google Inc.20150322C:\Program Files (x86)\Google\Update\1.3.26.9|โ€”MsiExec.exe /I{60EC980A-BDA2-4CB6-A427-B07A5498B4CA}
2015-03-23 20:02:46{6C36881B-0E51-4231-9D02-BF2149664D34}Google Drive1.20.8672.3137Google, Inc.20150323C:\Program Files (x86)\Google\Update\Install{FADF8BBF-DB89-448E-BC51-AFDB1CF3B0D1}|โ€”MsiExec.exe /X{6C36881B-0E51-4231-9D02-BF2149664D34}
2015-03-23 20:00:45{78002155-F025-4070-85B3-7C0453561701}Apple Application Support3.0.6Apple Inc.20150323C:\Users\INFORM~1\AppData\Local\Temp\IXP374.TMP|C:\Program Files (x86)\Common Files\Apple\Apple Application Support|MsiExec.exe /I{78002155-F025-4070-85B3-7C0453561701}
2015-03-23 20:01:01{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}Apple Software Update2.1.3.127Apple Inc.20150323C:\Users\INFORM~1\AppData\Local\Temp\IXP374.TMP|C:\Program Files (x86)\Apple Software Update|MsiExec.exe /I{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}

List application execution logs. (Executable path, execution time, execution countโ€ฆ)#

Artifact TypeSource TypeLocation / Registry PathData Extracted
Windows PrefetchFileC:\Windows\Prefetch\*.pfExecutable file paths, execution timestamps, execution counts
IconCacheFileC:\Users\informant\AppData\Local\IconCache.dbExecutable file paths, associated icon images
UserAssistRegistryHKU\informant\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\*\Count\Executable file paths, execution timestamps, execution counts
Application Compatibility (Shimcache)RegistryHKLM\SYSTEM\ControlSet###\Control\Session Manager\AppCompatCache\Executable file paths, last modified timestamps
Application Compatibility CacheRegistryHKU\informant\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Executable file paths, last modified timestamps
MuiCacheRegistryHKU\informant\Software\Classes\Local-Settings\Software\Microsoft\Windows\Shell\MuiCache\Executable file paths
  • UserAssist

Pasted image 20260501145534.png

  • Application Compatibility (Shimcache)

Pasted image 20260501145249.png

  • Application Compatibility Cache

Pasted image 20260501145654.png

  • (Some Windows executables and duplicated items are excluded)
  • Execution Count may not be accurate.
  • Timestamps of UserAssist and Prefetch: Execution Time
  • Timestamps of Shimcache: Last Modified Time from filesystem metadata
TimestampExecution PathCountSource
2015-03-22 11:11:04C:\Users\informant\Desktop\temp\IE11-Windows6.1-x64-en-us.exeN/AShimCache
2015-03-22 11:11:04C:\Users\informant\Desktop\Download\IE11-Windows6.1-x64-en-us.exeN/AShimCache
2015-03-22 11:12:32C:\Users\informant\Desktop\Download\IE11-Windows6.1-x64-en-us.exe1UserAssist
2015-03-23 15:56:33C:\Users\informant\Downloads\googledrivesync.exeN/AShimCache
2015-03-23 15:56:33C:\Users\informant\Downloads\icloudsetup.exeN/AShimCache
2015-03-23 15:56:33C:\Users\INFORM~1\AppData\Local\Temp\GUMA150.tmp\GoogleUpdateSetup.exeN/AShimCache
2015-03-23 16:00:59C:\Windows\Installer{GUID}\AppleSoftwareUpdateIco.exeN/AShimCache
2015-03-23 16:02:07C:\Users\INFORM~1\AppData\Local\Temp\GUMA150.tmp\GoogleUpdate.exeN/AShimCache
2015-03-23 16:02:09C:\Program Files (x86)\GUMA94B.tmp\GoogleUpdate.exeN/AShimCache
2015-03-23 16:26:50C:\Program Files\Microsoft Office\Office15\EXCEL.EXE1UserAssist
2015-03-23 16:27:33C:\Program Files\Microsoft Office\Office15\POWERPNT.EXE2UserAssist
2015-03-24 14:29:07C:\Program Files\Microsoft Games\Solitaire\solitaire.exe1Prefetch
2015-03-24 14:31:55C:\Windows\System32\StikyNot.exe2Prefetch
2015-03-24 14:31:55Microsoft.Windows.StickyNotes13UserAssist
2015-03-24 17:05:38C:\Program Files (x86)\Google\Chrome\Application\chrome.exe71Prefetch
2015-03-25 10:41:03C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE1Prefetch
2015-03-25 10:41:03C:\Program Files\Microsoft Office\Office15\OUTLOOK.EXE5UserAssist
2015-03-25 10:42:47C:\Program Files (x86)\Windows Media Player\wmplayer.exe1Prefetch
2015-03-25 10:42:47Microsoft.Windows.MediaPlayer321UserAssist
2015-03-25 10:47:40C:\Users\informant\Desktop\Download\Eraser 6.2.0.2962.exeN/AShimCache
2015-03-25 10:48:28C:\Users\informant\Desktop\Download\ccsetup504.exeN/AShimCache
2015-03-25 10:50:14C:\Users\informant\Desktop\Download\Eraser 6.2.0.2962.exe1Prefetch
2015-03-25 10:50:14C:\Users\informant\Desktop\Download\Eraser 6.2.0.2962.exe1UserAssist
2015-03-25 10:50:15C:\Users\INFORM~1\AppData\Local\Temp\eraserInstallBootstrapper\dotNetFx40_Full_setup.exeN/AShimCache
2015-03-25 10:50:15C:\Users\INFORM~1\AppData\Local\Temp\eraserInstallBootstrapper\dotNetFx40_Full_setup.exe1Prefetch
2015-03-25 10:57:56C:\Users\informant\Desktop\Download\ccsetup504.exe1Prefetch
2015-03-25 10:57:56C:\Users\informant\Desktop\Download\ccsetup504.exe1UserAssist
2015-03-25 11:12:28C:\Program Files\Eraser\Eraser.exe1UserAssist
2015-03-25 11:13:30C:\Program Files\Eraser\Eraser.exe2Prefetch
2015-03-25 11:15:50C:\Program Files\CCleaner\CCleaner64.exe1UserAssist
2015-03-25 11:15:50C:\Program Files\CCleaner\CCleaner64.exe2Prefetch
2015-03-25 11:16:00C:\Program Files (x86)\Google\Update\GoogleUpdate.exe38Prefetch
2015-03-25 11:18:29C:\Program Files\CCleaner\uninst.exe1Prefetch
2015-03-25 11:21:30C:\Program Files (x86)\Google\Drive\googledrivesync.exe1UserAssist
2015-03-25 11:21:31C:\Program Files (x86)\Google\Drive\googledrivesync.exe2Prefetch
2015-03-25 11:22:06C:\Program Files\Internet Explorer\iexplore.exe2Prefetch
2015-03-25 11:22:07C:\Program Files (x86)\Internet Explorer\iexplore.exe14Prefetch
2015-03-25 11:24:48C:\Program Files\Microsoft Office\Office15\WINWORD.EXE3Prefetch
2015-03-25 11:24:48C:\Program Files\Microsoft Office\Office15\WINWORD.EXE4UserAssist
2015-03-25 11:28:47C:\Windows\System32\xpsrchvw.exe1Prefetch
2015-03-25 11:28:47C:\Windows\System32\xpsrchvw.exe1UserAssist

System Activity Timeline#

List all traces about the system on/off and the user logon/logoff. (Time range: 09:00โ€“18:00)#

  • For this task, we have to carve all the Event logs from C:\Windows\System32\winevt\Logs\*,
  • So i carved all the logs include important one,
    • Application.evtx
    • Security.evtx
    • System.evtx
    • Setup.evtx
  • Parse all the important logs and convert it to csv using EvtxeCmd tool.
Terminal window
EvtxECmd.exe -f "Evtx Logs\<LogFileName>.evtx" --csv <DirectoryName>

Pasted image 20260501161620.png

Pasted image 20260501163229.png

Core Logon / System Events (your timeline ones)#

Event IDMeaningDFIR Insight
4608Windows is starting upSystem boot โ€” start of activity window
4624Successful logonUser/session access (interactive, RDP, service, etc.)
4634Logoff (session ended)Session terminated (not always user-initiated)
4647User initiated logoffClean logoff (user clicked sign out)
4637User account logoff (token ended)Less common, system-driven logoff
1100Event logging service shutdownSystem shutdown (or logging stopped)

Authentication / Credential / Privilege Events#

Event IDMeaningDFIR Insight
4648Logon using explicit credentialsrunas, lateral movement indicator
4672Special privileges assignedAdmin/root-level login important
4673Privileged service calledSensitive API usage
4674Operation on privileged objectAccess to sensitive system resources
4625 (not shown but important)Failed logonBrute force / incorrect creds

Account & Policy Changes#

Event IDMeaningDFIR Insight
4720User account createdPersistence / attacker account
4722Account enabledRe-activation
4724Password reset attemptPossible takeover
4728Added to privileged groupPrivilege escalation
4732Added to local groupLocal privilege change
4733Removed from groupCleanup / stealth
4735Group changedMembership modification
4738User account changedAttribute change

System & Logon/Logoff Event Timeline#

Time GeneratedEvent IDDescription
2015-03-22 10:51:144608Starting up
2015-03-22 11:00:084624Logon
2015-03-22 11:22:544624Logon
2015-03-22 12:00:084647Logoff
2015-03-22 12:00:091100Shutdown
2015-03-23 13:24:234608Starting up
2015-03-23 13:24:234624Logon
2015-03-23 14:36:074624Logon
2015-03-23 16:00:224624Logon
2015-03-23 16:01:024624Logon
2015-03-23 17:02:534647Logoff
2015-03-23 17:02:591100Shutdown
2015-03-24 09:21:294608Starting up
2015-03-24 09:21:294624Logon
2015-03-24 09:23:404624Logon
2015-03-24 11:14:304624Logon
2015-03-24 11:22:394624Logon
2015-03-24 11:46:144624Logon
2015-03-24 14:28:384624Logon
2015-03-24 16:58:524624Logon
2015-03-24 17:07:254647Logoff
2015-03-24 17:07:261100Shutdown
2015-03-25 09:05:414608Starting up
2015-03-25 09:05:414624Logon
2015-03-25 09:07:494624Logon
2015-03-25 09:23:594624Logon
2015-03-25 10:31:534624Logon
2015-03-25 10:45:594637Logoff
2015-03-25 10:50:284624Logon
2015-03-25 10:50:304624Logon
2015-03-25 10:50:504624Logon
2015-03-25 10:56:554624Logon
2015-03-25 10:57:184624Logon
2015-03-25 11:18:544624Logon
2015-03-25 11:30:574647Logoff
2015-03-25 11:31:001100Shutdown

Web & Browser Forensics#

What web browsers were used?#

  • HKLM\SOFTWARE\Microsoft\Internet Explorer (value: svcVersion)
  • HKU\informant\Software\Google\Chrome\BLBeacon (value: version)

Pasted image 20260501163626.png

Value NameValue / DataInterpretation
MkEnabledYesFeature enabled flag (likely Microsoft component active)
Version9.11.9600.17691Main software/version build identifier
Build99600Internal build number (Windows component)
W2kVersion9.11.9600.17691Compatibility version string
IntegratedBrowser1Internet Explorer integration enabled (1 = true)
svcKBFWLinkhttp://go.microsoft.com/fwlink/?LinkId=524482Microsoft update/help reference URL
svcVersion11.0.9600.17691IE/Windows service version
svcUpdateVersion11.0.17Update branch/version of service component
svcKBNumberKB3032359Installed KB patch identifier

Identify browser history paths.#

  • MS IE (9 or lower) :

    • C:\Users\informant\AppData\Local\Microsoft\Windows\History\
    • C:\Users\informant\AppData\Local\Microsoft\Windows\Temporary Internet Files\
    • C:\Users\informant\AppData\Roaming\Microsoft\Windows\Cookies\
  • MS IE 11 :

    • C:\Users\informant\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat
  • Chrome :

    • C:\Users\informant\AppData\Local\Google\Chrome\User Data\Default\History
    • C:\Users\informant\AppData\Local\Google\Chrome\User Data\Default\Application Cache\
    • C:\Users\informant\AppData\Local\Google\Chrome\User Data\Default\Media Cache\
    • C:\Users\informant\AppData\Local\Google\Chrome\User Data\Default\GPUCache\
    • C:\Users\informant\AppData\Local\Google\Chrome\User Data\Default\Cookies\
    • C:\Users\informant\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
    • C:\Users\informant\AppData\Local\Google\Chrome\User Data\Default\Extensions\
  • Considerations

    • History, Cache, Cookieโ€ฆ -
      • Windows Search database ([[Digital Forensics Investigation Questions#Windows Search Analysis]])
      • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb

What websites were accessed? (Timestamp, URL)#

  • To analyze Internet Explorer History,
  • C:\Users\informant\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat file, we need some kind of parser IE10Analyzer.

Pasted image 20260501171107.png

  • For Chrome Browser History,

Pasted image 20260501171343.png

Software Download / Installation#

TimestampActivityLinkBrowser
2015-03-22 11:10:50IE download pagehttp://windows.microsoft.com/en-us/internet-explorer/download-ieIE 8
2015-03-22 11:11:04IE11 installer downloadhttp://download.microsoft.com/download/7/1/7/7179A150-F2D2-4502-9D70-4B59EA148EAA/IE11-Windows6.1-x64-en-us.exeIE 8
2015-03-22 11:11:06Chrome installer downloadhttps://dl.google.com/update2/1.3.26.9/GoogleInstaller_en.applicationIE 8
2015-03-23 15:56:15Google Drive downloadhttps://www.google.com/drive/download/Chrome
2015-03-23 15:55:28iCloud setup pagehttps://www.apple.com/icloud/setup/pc.htmlChrome

Data Leakage / Suspicious Research#

TimestampActivityLink
2015-03-23 14:02:09Search: data leakage methodshttps://www.google.com/search?q=data+leakage+methods
2015-03-23 14:02:18Read SANS paperhttp://www.sans.org/reading-room/whitepapers/awareness/data-leakage-threats-mitigation_1931
2015-03-23 14:02:44Search: leaking confidential infohttps://www.google.com/search?q=leaking+confidential+information
2015-03-23 14:03:40Search: leakage caseshttps://www.google.com/search?q=information+leakage+cases
2015-03-23 14:05:55FBI IP theft pagehttp://www.fbi.gov/about-us/investigate/white_collar/ipr/ipr
2015-03-23 14:06:27Search: how to leak a secret โš ๏ธhttps://www.google.com/search?q=how+to+leak+a+secret
2015-03-23 14:06:53Research paper (leak secret)http://research.microsoft.com/en-us/um/people/yael/publications/2001-leak_secret.pdf

Forensics Awareness#

TimestampActivityLink
2015-03-23 14:10:03Search: email forensic investigationhttp://www.bing.com/search?q=Forensic+Email+Investigation
2015-03-23 14:10:27Search: Windows artifactshttp://www.bing.com/search?q=what+is+windows+system+artifacts
2015-03-23 14:11:12Read forensic articlehttp://resources.infosecinstitute.com/windows-systems-and-artifacts-in-digital-forensics-part-i-registry/
2015-03-23 14:12:35Search: event logshttp://www.bing.com/search?q=windows+event+logs
2015-03-23 14:12:52Event Viewer infohttp://en.wikipedia.org/wiki/Event_Viewer
2015-03-23 14:14:24USB forensic artifacthttp://www.forensicswiki.org/wiki/USB_History_Viewing

Data Exfiltration Methods#

TimestampActivityLink
2015-03-23 14:07:58Search: file sharinghttp://www.bing.com/news/search?q=file+sharing+and+tethering
2015-03-23 14:08:18File sharing articlehttp://sysinfotools.com/blog/tethering-internet-files-sharing/
2015-03-23 14:13:20Search: CD burninghttp://www.bing.com/search?q=cd+burning+method
2015-03-23 14:14:11Search: external deviceshttp://www.bing.com/search?q=external+device+and+forensics
2015-03-23 14:15:09Search: cloud storagehttps://www.google.com/search?q=cloud+storage
2015-03-23 14:15:32Compare cloud toolshttp://www.pcadvisor.co.uk/test-centre/internet/3506734/best-cloud-storage-dropbox-google-drive-onedrive-icloud/

Anti-Forensics (CRITICAL EVIDENCE)#

TimestampActivityLink
2015-03-23 14:17:14Search: anti-forensicshttps://www.google.com/search?q=antiforensics
2015-03-23 14:17:19Anti-forensic techniqueshttp://forensicswiki.org/wiki/Anti-forensic_techniques
2015-03-23 14:18:00DEFCON anti-forensics paperhttps://defcon.org/images/defcon-20/dc-20-presentations/Perklin/DEFCON20-Perklin-AntiForensics.pdf
2015-03-23 14:16:55Search: delete datahttps://www.google.com/search?q=how+to+delete+data
2015-03-23 14:19:03Search: data recovery toolshttps://www.google.com/search?q=data+recovery+tools

Evidence Destruction Tools#

TimestampActivityLink
2015-03-25 10:46:44Search: anti-forensic toolshttp://www.bing.com/search?q=antiforensic+tools
2015-03-25 10:46:59Eraser official sitehttp://eraser.heidi.ie/
2015-03-25 10:47:34Download Eraserhttp://iweb.dl.sourceforge.net/project/eraser/Eraser%206/6.2/Eraser%206.2.0.2962.exe
2015-03-25 10:47:51Search: CCleanerhttp://www.bing.com/search?q=ccleaner
2015-03-25 10:48:12Download CCleanerhttp://www.piriform.com/ccleaner/download

List browser search keywords.#

User Search Activity (Cleaned & Relevant)#

TimestampSearch QueryURLBrowser
2015-03-23 14:02:09data leakage methodshttps://www.google.com/webhp?hl=en#hl=en&q=data+leakage+methodsChrome
2015-03-23 14:02:44leaking confidential informationhttps://www.google.com/webhp?hl=en#hl=en&q=leaking+confidential+informationChrome
2015-03-23 14:03:40information leakage caseshttps://www.google.com/webhp?hl=en#hl=en&q=information+leakage+casesChrome
2015-03-23 14:05:48intellectual property thefthttps://www.google.com/search?q=intellectual+property+theftChrome
2015-03-23 14:06:27how to leak a secret โš ๏ธhttps://www.google.com/search?q=how+to+leak+a+secretChrome
2015-03-23 14:07:58file sharing and tetheringhttp://www.bing.com/news/search?q=file+sharing+and+tetheringIE 11
2015-03-23 14:08:31DLP DRMhttp://www.bing.com/search?q=DLP+DRMIE 11
2015-03-23 14:08:54email investigationhttp://www.bing.com/search?q=email+investigationIE 11
2015-03-23 14:10:03forensic email investigationhttp://www.bing.com/search?q=Forensic+Email+InvestigationIE 11
2015-03-23 14:10:27windows system artifactshttp://www.bing.com/search?q=what+is+windows+system+artifactsIE 11
2015-03-23 14:11:50investigation on windows machinehttp://www.bing.com/search?q=investigation+on+windows+machineIE 11
2015-03-23 14:12:35windows event logshttp://www.bing.com/search?q=windows+event+logsIE 11
2015-03-23 14:13:20CD burning methodhttp://www.bing.com/search?q=cd+burning+methodIE 11
2015-03-23 14:13:37CD burning in Windowshttp://www.bing.com/search?q=cd+burning+method+in+windowsIE 11
2015-03-23 14:14:11external device forensicshttp://www.bing.com/search?q=external+device+and+forensicsIE 11
2015-03-23 14:14:50cloud storagehttps://www.google.com/search?q=cloud+storageChrome
2015-03-23 14:15:44digital forensicshttps://www.google.com/search?q=digital+forensicsChrome
2015-03-23 14:16:55how to delete data โš ๏ธhttps://www.google.com/search?q=how+to+delete+dataChrome
2015-03-23 14:17:14anti-forensics โš ๏ธhttps://www.google.com/search?q=anti-forensicsChrome
2015-03-23 14:18:10system cleaner โš ๏ธhttps://www.google.com/search?q=system+cleanerChrome
2015-03-23 14:18:30how to recover datahttps://www.google.com/search?q=how+to+recover+dataChrome
2015-03-23 14:19:03data recovery toolshttps://www.google.com/search?q=data+recovery+toolsChrome
2015-03-23 15:55:09Apple iCloudhttps://www.google.com/webhp?hl=en#hl=en&q=apple+icloudChrome
2015-03-23 15:56:04Google Drivehttps://www.google.com/webhp?hl=en#hl=en&q=google+driveChrome
2015-03-24 17:06:50security checkpoint CD-Rhttps://www.google.com/#q=security+checkpoint+cd-rChrome
2015-03-25 10:46:44anti-forensic tools โš ๏ธhttp://www.bing.com/search?q=antiforensic+toolsIE 11
2015-03-25 10:46:54eraser (secure delete tool) โš ๏ธhttp://www.bing.com/search?q=eraserIE 11
2015-03-25 10:47:51CCleaner โš ๏ธhttp://www.bing.com/search?q=ccleanerIE 11

List all user keywords at the search bar in Windows Explorer. (Timestamp, Keyword)#

  • HKU\informant\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery\

Pasted image 20260501173313.png

secret, 2015-03-23 18:40:17

Email Investigation#

  • HKLM\SOFTWARE\Classes\mailto\shell\open\command (Microsoft Outlook)
  • HKLM\SOFTWARE\Clients\Mail (Microsoft Outlook)
  • HKU\informant\Software\Microsoft\Office\15.0\Outlook

What application was used for e-mail communication?#

Pasted image 20260501174141.png

Pasted image 20260501174051.png

Value NameDataForensic Relevance
(default)Microsoft OutlookConfirms Outlook is installed/configured
SupportUTF81UTF-8 support enabled (modern email handling)
DLLPathExC:\PROGRA1\MICROS2\Office15\OLMAPI32.DLLPoints to Outlook MAPI library (execution dependency)
DLLPathmapi32.dllCore MAPI DLL used by Outlook
MSIComponentID{6DB1921F-8B40-4406-A18B-E906DBEEF0C9}Unique Office installation component ID
MSIOfficeLCIDOffice language resources pathIndicates installed Office language settings
MSIApplicationLCIDOutlook UI language settingsTracks Outlook language usage
MSIInstallOnWTS0Not installed on Terminal Services

Where is the e-mail file located and List all e-mails (including deleted). What was the e-mail account used?#

  • File is located at,
  • C:\Users\informant\AppData\Local\Microsoft\Outlook\iaman.informant@nist.gov.ost

Pasted image 20260501174408.png

  • To read this email pff-tools this utility can be used,
Terminal window
sudo apt install pff-tools
pffexport iaman.informant@nist.gov.ost
  • I found 4 deleted messages under,
    • iaman.informant@nist.gov.ost.expor/Root - Mailbox/IPM_SUBTREE/
    • /Sent Items/
      • Message00001
        • ConversationIndex.txt
        • InternetHeaders.txt
        • Message.html
        • OutlookHeaders.txt
        • Recipients.txt
      • Message00002
        • โ€ฆ
    • /Inbox/
      • Message00001
        • ConversationIndex.txt
        • InternetHeaders.txt
        • Message.html
        • OutlookHeaders.txt
        • Recipients.txt
      • Message00002
        • โ€ฆ
      • Message00003
        • โ€ฆ
      • Message00004
        • โ€ฆ
      • Message00005
        • โ€ฆ
    • /Deleted Items/
      • Message00001
        • ConversationIndex.txt
        • InternetHeaders.txt
        • Message.html
        • OutlookHeaders.txt
        • Recipients.txt
      • Message00002
        • โ€ฆ
      • Message00003
        • โ€ฆ
      • Message00004
        • โ€ฆ

Sent Items#

Message00001#

Pasted image 20260501180607.png

Message00002#

Pasted image 20260501180618.png

Inbox messages#

Message00001#

Pasted image 20260501175938.png

Message00002#

Pasted image 20260501175947.png

Message00003#

Pasted image 20260501175958.png

Message00004#

Pasted image 20260501180007.png

Message00005#

Pasted image 20260501180026.png

Deleted Messages#

Message00001#

Pasted image 20260501175301.png

https://drive.google.com/file/d/0Bz0ye6gXtiZaVl8yVU5mWHlGbWc/view?usp=sharing
https://drive.google.com/file/d/0Bz0ye6gXtiZaVl8yVU5mWHlGbWc/view?usp=sharing

Message00002#

Pasted image 20260501175340.png

Message00003#

I am trying.
-----Original Message-----
From: spy
Sent: Tuesday, March 24, 2015 3:33 PM
To: iaman
Subject: Watch out!
USB device may be easily detected.
So, try another method.

Message00004#

Pasted image 20260501175413.png

spy.conspirator@nist.gov <-> iaman.informant@nist.gov
TimestampSourceFrom โ†’ ToSubjectKey Content / Insight
2015-03-23 13:29:27Inboxspy.conspirator@nist.gov โ†’ iaman.informant@nist.govHello, IamanInitial contact (โ€œHow are you doing?โ€)
2015-03-23 14:44:31Sentiaman.informant@nist.gov โ†’ spy.conspirator@nist.govRE: Hello, Iamanโ€œSuccessfully securedโ€ โ†’ โš ๏ธ Task acknowledgment
2015-03-23 15:14:58Inboxspy โ†’ iamanGood job, buddyRequests more detailed data
2015-03-23 15:20:41Inboxspy โ†” iamanRE: Good job, buddyiaman agrees to continue (โ€œIโ€™ll be in touchโ€)
2015-03-23 15:26:22Inboxspy โ†’ iamanImportant requestConfirms operation, asks for more data
2015-03-23 15:27:05Sentiaman โ†’ spyRE: Important requestNeeds time โ†’ possible hesitation
2015-03-23 16:38:47Recovered (OST slack)iaman โ†’ spyItโ€™s meโš ๏ธ Google Drive links shared (data exfiltration)
2015-03-23 16:41:19Deletedspy โ†” iamanRE: Itโ€™s meโ€œI got itโ€ โ†’ confirms receipt of data
2015-03-24 09:25:57Inboxspy โ†’ iamanLast requestRequests remaining data
2015-03-24 09:35:10Deletediaman โ†” spyRE: Last requestiaman: โ€œhard to transfer all data over internetโ€
2015-03-24 09:34:00 (approx)Threadspy โ†’ iamanRE: Last requestโš ๏ธ Suggests physical transfer (storage devices)
2015-03-24 15:34:02Deletediaman โ†” spyWatch out!โš ๏ธ Avoid USB โ†’ suggests detection awareness
2015-03-24 17:05:09Deletediaman โ†’ spyDoneโš ๏ธ Final confirmation (โ€œItโ€™s doneโ€)

External Devices & File Activity#

  • HKLM\SYSTEM\MountedDevices\
  • HKLM\SYSTEM\ControlSet###\Enum\USBSTOR\ -HKLM\SYSTEM\ControlSet###\Control\DeviceClasses\{a5dcbf10-6530-11d2-901f-00c04fb951ed}\
  • HKLM\SYSTEM\ControlSet###\Control\DeviceClasses\{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\
  • HKU\informant\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
  • HKLM\SOFTWARE\Microsoft\Windows Search\VolumeInfoCach

List external storage devices.#

Pasted image 20260501183114.png

TimestampDevice TypeDevice NameSerial NumberForensic Relevance
2015-03-24 13:37:59USBVID_0781&PID_5571 (SanDisk Cruzer Fit)4C530012450531101593USB inserted (first device)
2015-03-24 13:38:00USBSTORDisk&Ven_SanDisk&Prod_Cruzer_Fit4C530012450531101593Mass storage mounted
2015-03-24 13:58:32USBVID_0781&PID_5571 (SanDisk Cruzer Fit)4C530012550531106501Second USB device inserted
2015-03-24 13:58:33USBSTORDisk&Ven_SanDisk&Prod_Cruzer_Fit4C530012550531106501Second storage mounted
2015-03-24 13:58:34VolumeMounted Volume{A2F2048C-D228-11E4-B630-000C29FF2429}Volume created (data access)
2015-03-25 13:05:36USBVID_0E0F&PID_0003 (VMware Virtual USB)6&b77da92&0&1Virtual device (lab artifact, ignore operationally)

Pasted image 20260501183418.png

Device NameSerial NumberFirst Seen (System)First ConnectedLast ConnectedNotes
SanDisk Cruzer Fit USB Device4C5300124505311015932015-03-23 14:31:102015-03-24 09:38:002015-03-24 13:38:00First USB used, short session
SanDisk Cruzer Fit USB Device4C5300125505311065012015-03-24 09:58:322015-03-24 09:58:322015-03-24 13:58:33Second USB, likely main exfil device

Identify file renaming traces (Desktop, date range).#

  • (It should be considered only during a date range between 2015-03-23 and 2015-03-24.) [Hint: the parent directories of renamed files were deleted and their MFT entries were also overwritten. Therefore, you may not be able to find their full paths.]
  • NTFS journal file analysis (UsnJrnl) - \$Extend\$UsnJrnlยท$J (+ $MFT for identifying full paths of files)
  • With NTFS journal file only, it may be hard to find full paths.
  • We can consider the Registry ShellBags for further information.
  • I carved both UsnJournal and Master File Table files from \$Extend,

Pasted image 20260501185526.png

Pasted image 20260501185459.png

Converting MFTandMFT and J to CSV#

  • It can be parse using MFTECmd.exe,
  • By corelating it, we found the names.
Terminal window
MFTECmd.exe -f "$MFT" --csv MFT
MFTECmd.exe -f "$J" --csv J
TimestampUSN (Old โ†’ New)Original File (Sensitive)Renamed To (Cover File)
2015-03-23 14:41:4056306184 โ†’ 56306328[secret_project]_detailed_proposal.docxlandscape.png
2015-03-23 14:41:5556307712 โ†’ 56307848[secret_project]_design_concept.pptspace_and_earth.mp4
2015-03-23 16:30:4458506640 โ†’ 58506776(secret_project)_pricing_decision.xlsxhappy_holiday.jpg
2015-03-23 16:31:0258510288 โ†’ 58510424[secret_project]_final_meeting.pptxdo_u_wanna_build_a_snow_man.mp3
2015-03-24 09:49:5159801680 โ†’ 59801816[secret_project]_detailed_design.pptxwinter_weather_advisory.zip
2015-03-24 09:50:0859802408 โ†’ 59802544[secret_project]_revised_points.pptwinter_storm.amr
2015-03-24 09:50:4959803456 โ†’ 59803592[secret_project]_design_concept.pptspace_and_earth.mp4
2015-03-24 09:52:3559814352 โ†’ 59814488[secret_project]_final_meeting.pptxdo_u_wanna_build_a_snow_man.mp3
2015-03-24 09:52:5659814904 โ†’ 59815040(secret_project)_market_analysis.xlsxnew_years_day.jpg
2015-03-24 09:53:0859815232 โ†’ 59815360(secret_project)_market_shares.xlssuper_bowl.avi
2015-03-24 09:53:3859815536 โ†’ 59815680(secret_project)_price_analysis_#1.xlsxmy_favorite_movies.7z
2015-03-24 09:53:5259815968 โ†’ 59816104(secret_project)_price_analysis_#2.xlsmy_favorite_cars.db
2015-03-24 09:54:0559816312 โ†’ 59816448(secret_project)_pricing_decision.xlsxhappy_holiday.jpg
2015-03-24 09:54:2359816880 โ†’ 59817008[secret_project]_progress_#1.docxmy_smartphone.png
2015-03-24 09:54:4359817984 โ†’ 59818112[secret_project]_progress_#2.docxnew_year_calendar.one
2015-03-24 09:54:5259818320 โ†’ 59818448[secret_project]_progress_#3.docmy_friends.svg
2015-03-24 09:55:0859818624 โ†’ 59818768[secre\t_project]_detailed_proposal.docxa_gift_from_you.gif
2015-03-24 09:55:1759818976 โ†’ 59819096[secret_project]_proposal.docxlandscape.png
2015-03-24 09:55:3259819272 โ†’ 59819416[secret_project]_technical_review_#1.docxdiary_#1d.txt
2015-03-24 09:55:4259819592 โ†’ 59819736[secret_project]_technical_review_#1.pptxdiary_#1p.txt
2015-03-24 09:55:5359819912 โ†’ 59820056[secret_project]_technical_review_#2.docxdiary_#2d.txt
2015-03-24 09:56:0959823280 โ†’ 59823424[secret_project]_technical_review_#2.pptdiary_#2p.txt
2015-03-24 09:56:1459823600 โ†’ 59823744[secret_project]_technical_review_#3.docdiary_#3d.txt
2015-03-24 09:56:2059823920 โ†’ 59824064[secret_project]_technical_review_#3.pptdiary_#3p.txt

Network Drive Analysis#

  • HKU\informant\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU\
  • HKU\informant\Software\Microsoft\Windows\CurrentVersion\Explorer\Map Network Drive MRU\
  • HKU\informant\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\8\0\

IP address of company shared network drive?#

Pasted image 20260502172143.png

Terminal window
\\10.11.11.128\secured_drive : 2015-03-23 20:23:28

Directories traversed in RM#2.#

  • Timestamp may not be accurate.
  • E:\ can be inferred from external storage devices attached to PC in Question 22.
  • You can consider a created timestamp and a last accessed timestamp of each ShellBag entry.
  • HKU\informant\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\1~
  • We can open the UsrClass.dat into ShellBags Explorer.

Pasted image 20260502173154.png

TimestampDirectory PathSource
2015-03-24 10:00:19E:\Secret Project DataCreated
2015-03-24 10:01:11E:\Secret Project Data\technicalCreated
2015-03-24 10:01:14E:\Secret Project Data\proposalCreated
2015-03-24 10:01:15E:\Secret Project Data\progressCreated
2015-03-24 10:01:17E:\Secret Project Data\pricing decisionCreated
2015-03-24 10:01:29E:\Secret Project Data\designLast Accessed
2015-03-24 16:54:07E:\Secret Project DataLast Accessed
2015-03-24 16:54:07E:\Secret Project Data\progressLast Accessed

List all files that were opened in RM#2.#

Pasted image 20260502173154.png

Pasted image 20260502174545.png

TimestampPathActionSource
2015-03-24 10:01:23E:\Secret Project Data\design\winter_whether_advisory.zipAccessedJumpList
2015-03-24 10:01:29E:\Secret Project Data\design\winter_whether_advisory.zip\pptAccessedJumpList
2015-03-24 10:01:29E:\Secret Project Data\designCreatedShellBag

Directories in company network drive.#

  • โ€˜Timestampโ€™ may not be accurate.

  • V:\ is mapped on \\10.11.11.128

  • HKU\informant\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\8\0\~

  • \User\informant\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations

  • \User\informant\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations

  • \User\informant\AppData\Roaming\Microsoft\Windows\Recent\*.lnk

  • \User\informant\AppData\Roaming\Microsoft\Office\Recent\*.lnk

Pasted image 20260502175016.png

Pasted image 20260502175052.png

TimestampPathActionSource
2015-03-23 16:24:01\10.11.11.128\secured_drive\Common DataCreatedShellBag
2015-03-23 16:24:08\10.11.11.128\secured_drive\Past ProjectsCreatedShellBag
2015-03-23 16:24:12\10.11.11.128\secured_drive\Secret Project Data\designCreatedShellBag
2015-03-23 16:24:15\10.11.11.128\secured_drive\Secret Project Data\pricing decisionCreatedShellBag
2015-03-23 16:24:16\10.11.11.128\secured_drive\Secret Project Data\finalCreatedShellBag
2015-03-23 16:24:18\10.11.11.128\secured_drive\Secret Project Data\technical reviewCreatedShellBag
2015-03-23 16:24:20\10.11.11.128\secured_drive\Secret Project Data\proposalCreatedShellBag
2015-03-23 16:24:27\10.11.11.128\secured_drive\Secret Project Data\progressCreatedShellBag
2015-03-23 16:26:53\10.11.11.128\secured_drive\Secret Project Data\pricing decisionAccessedJumpList
2015-03-23 16:26:54\10.11.11.128\secured_drive\Secret Project Data\pricing decision\AccessedLNK File
2015-03-23 16:27:24V:\Secret Project DataCreatedShellBag
2015-03-23 16:27:29V:\Secret Project Data\finalCreatedShellBag
2015-03-23 16:27:33V:\Secret Project Data\final\AccessedJumpList
2015-03-23 16:27:33V:\Secret Project Data\final\AccessedLNK File
2015-03-23 16:28:17\10.11.11.128\secured_drive\Secret Project DataLast AccessedShellBag
2015-03-23 16:28:17\10.11.11.128\secured_drive\Secret Project Data\pricing decisionLast AccessedShellBag
2015-03-24 09:47:54\10.11.11.128\secured_driveLast AccessedShellBag
2015-03-24 09:47:54\10.11.11.128\secured_drive\Past ProjectsLast AccessedShellBag

Files opened in company network drive.#

Pasted image 20260502180020.png

Pasted image 20260502175850.png

Pasted image 20260502180122.png

TimestampFile PathActionSource
2015-03-23 16:26:53\10.11.11.128\SECURED_DRIVE\Secret Project Data\pricing decision(secret_project)_pricing_decision.xlsxAccessedJumpList
2015-03-23 16:26:53\10.11.11.128\SECURED_DRIVE\Secret Project Data\pricing decision(secret_project)_pricing_decision.xlsxAccessedLNK (Windows)
2015-03-23 16:26:53\10.11.11.128\SECURED_DRIVE\Secret Project Data\pricing decision(secret_project)_pricing_decision.xlsxAccessedLNK (Office)
2015-03-23 16:26:56\10.11.11.128\secured_drive\Secret Project Data\pricing decision(secret_project)_pricing_decision.xlsxAccessedRegistry (Office)
2015-03-23 16:27:33V:\Secret Project Data\final[secret_project]_final_meeting.pptxAccessedJumpList
2015-03-23 16:27:33V:\Secret Project Data\final[secret_project]_final_meeting.pptxAccessedLNK (Windows)
2015-03-23 16:27:37V:\Secret Project Data\final[secret_project]_final_meeting.pptxAccessedLNK (Office)
2015-03-23 16:27:37V:\Secret Project Data\final[secret_project]_final_meeting.pptxAccessedRegistry (Office)

Cloud Forensics#

  • Installation directory
  • Registry (Configuration, Uninstall Information, Autoruns, UserAssist, Classesโ€ฆ)

Pasted image 20260502180342.png

Pasted image 20260502180447.png

Pasted image 20260502180602.png

Pasted image 20260502180809.png

ServiceArtifact TypeLocation / PathDetails
Google DriveFile/DirC:\Program Files (x86)\Google\Drive|Installation directory
Google DriveFile/DirC:\Users\informant\AppData\Google\Drive\user_default|User config directory
Google DriveFileC:\Users\informant\AppData\Google\Drive\user_default\sync_config.dbDeleted
Google DriveFileC:\Users\informant\AppData\Google\Drive\user_default\snapshot.dbDeleted
Google DriveFileC:\Users\informant\AppData\Google\Drive\user_default\sync_log.logLog file
Google DriveFileC:\Users\informant\Downloads\googledrivesync.exeInstaller
Google DriveRegistryHKU\informant\Software\Google\DriveConfiguration
Google DriveRegistryHKU\informant\Software\Classes\GoogleDrive.*File associations
Apple iCloudFileC:\Users\informant\Downloads\icloudsetup.exeInstaller

Deleted files from Google Drive.#

Pasted image 20260502184059.png

Pasted image 20260502183554.png

2015-03-23 16:32:35.072 -0400ย INFOย pid=2576 4004:LocalWatcher common.change_buffer:1017
Adding event to change buffer: RawEvent(
ย ย CREATE, path=u'\\\\?\\C:\\Users\\informant\\Google Drive\\happy_holiday.jpg', time=1427142755.056, is_dir=False,
ย ย ino=4503599627374809L, size=440517L, mtime=1422563714.5256062, parent_ino=844424930207017L,
ย ย is_cancelled=<RawEventIsCancelledFlag.FALSE: 0>, backup=<Backup.NO_BACKUP_CONTENT: (False, False)>)
  • It indicates that C:\\Users\\informant\\Google Drive\\happy_holiday.jpg this file is uploaded to drive.
  • Another one,

Pasted image 20260502184321.png

File Metadata (Recovered / Observed Files)#

TimestampFile NameOriginal Modified Time
2015-03-23 16:42:17happy_holiday.jpg2015-01-30 11:49:20
2015-03-23 16:42:17do_u_wanna_build_a_snow_man.mp32015-01-29 15:35:14

Google Drive Sync Activity (LocalWatcher Events)#

TimestampFile PathActionSize
2015-03-23 16:32:35C:\Users\informant\Google Drive\happy_holiday.jpgCreated440,517 B
2015-03-23 16:32:35C:\Users\informant\Google Drive\do_u_wanna_build_a_snow_man.mp3Created6,844,294 B
2015-03-23 16:42:17C:\Users\informant\Google Drive\happy_holiday.jpgDeletedโ€”
2015-03-23 16:42:17C:\Users\informant\Google Drive\do_u_wanna_build_a_snow_man.mp3Deletedโ€”

Google Drive account information.#

Pasted image 20260502184732.png

Logon TimeAccount
2015-03-23 16:05:32iaman.informant.personal@gmail.com
NIST CFReDS Data Leakage Case Analysis May 2026
https://fuwari.vercel.app/posts/nist-cfreds-data-leakage-case-analysis/notes/
Author
0xB14CKY
Published at
2026-05-02
License
CC BY-NC-SA 4.0