<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>4N6Post Artifacts on 4n6Post</title><link>https://4n6post.com/artifacts/</link><description>Recent content in 4N6Post Artifacts on 4n6Post</description><atom:link href="https://4n6post.com/artifacts/index.xml" rel="self" type="application/rss+xml"/><item><title>Registry - SAM</title><link>https://4n6post.com/artifacts/registrydb-sam/</link><pubDate>2025-10-14</pubDate><description>&lt;h2 id="sam-database---windows-security-account-manager"&gt;SAM Database - Windows Security Account Manager&lt;/h2&gt;
&lt;p&gt;Security Account Manager (SAM) database in short, is the critical components of Windows security architecture. It stores user account information, password hashes for local accounts, groups associations, and security policies for local accounts on Windows systems. When considering user accounts, the SAM database provides evidence about user accounts, authentication attempts, and insight on user activity and potential security compromises. Understanding how to properly extract, analyze, and interpret SAM data is essential for any serious Windows forensic investigation.&lt;/p&gt;</description></item><item><title>MACB Timestamp Reference</title><link>https://4n6post.com/artifacts/macb-time-updates/</link><pubDate>2024-12-16</pubDate><description>&lt;style&gt;
/* Modern table styling */
table {
width: auto!important;
max-width: 100%!important;
margin-bottom: 1.5em!important;
}
.macb-wrapper {
display: flex!important;
justify-content: center!important;
margin: 0.5em 0!important;
}
.macb-wrapper table {
border-collapse: collapse!important;
border-spacing: 0!important;
box-shadow: 0 2px 8px rgba(0,0,0,0.1)!important;
border-radius: 8px!important;
overflow: hidden!important;
font-size: 0.75em!important;
}
.macb-wrapper th {
background: linear-gradient(135deg, #667eea 0%, #764ba2 100%)!important;
color: #ffffff!important;
padding: 14px 18px!important;
text-align: center!important;
font-weight: 700!important;
font-size: 0.95em!important;
letter-spacing: 0.5px!important;
text-transform: uppercase!important;
border-bottom: 3px solid #5a67d8!important;
border-right: 1px solid rgba(255,255,255,0.1)!important;
position: relative!important ;
}
.macb-wrapper th:last-child {
border-right: none!important;
}
.macb-wrapper th::after {
content: '';
position: absolute!important;
bottom: 0!important;
left: 0!important;
right: 0!important;
height: 2px!important;
background: linear-gradient(90deg, transparent, rgba(255,255,255,0.3), transparent)!!important;
}
.macb-wrapper td {
padding: 10px 16px!important;
border-bottom: 1px solid #e0e0e0!important;
line-height: 1!important;
}
.macb-wrapper tr:last-child td {
border-bottom: none!important;
}
.macb-wrapper tr:hover {
background-color: rgba(52, 152, 219, 0.05)!important;
}
.macb-wrapper tbody tr:nth-child(even) {
background-color: rgba(0,0,0,0.02)!important;
}
/* MACB color indicators */
.m-green { color: #2ecc71; font-weight: 700!important; }
.m-yellow { color: #f39c12; font-weight: 700!important; }
.m-gray { color: #95a5a6; font-weight: 500!important; }
.m-purple { color: #9b59b6; font-weight: 700!important; }
.m-updated { color: #2ecc71; font-weight: 700!important; }
.m-inherited { color: #f39c12; font-weight: 700!important; }
.m-unchanged { color: #95a5a6; font-weight: 500!important; }
.m-varies { color: #9b59b6; font-weight: 700!important; }
&lt;/style&gt;
&lt;h1 id="macb-forensic-timestamp-reference"&gt;MACB Forensic Timestamp Reference&lt;/h1&gt;
&lt;p&gt;I put together a nice little post here detailing the behavior of MACB timestamps (Modified, Accessed, Changed, Birth) across various filesystems and common file operations. This is a great reference for digital forensics practitioners conducting timeline analysis.
I focused on Windows NTFS, FAT32/exFAT, Linux ext4/XFS, and macOS APFS since these are the most common filesystems encountered in investigations for 2025.&lt;/p&gt;</description></item><item><title>MRU (Most Recently Used)</title><link>https://4n6post.com/artifacts/mru/</link><pubDate>2024-10-02</pubDate><description>&lt;p&gt;The &lt;strong&gt;MRU (Most Recently Used)&lt;/strong&gt; registry is a database in Microsoft Windows that stores information about recently opened files, URLs, and other items. This information can be used for a variety of purposes, both benign and malicious. &lt;strong&gt;This is NOT the same as runMRU.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h2 id="normal-use-case"&gt;Normal Use Case&lt;/h2&gt;
&lt;p&gt;The MRU registry is commonly used by applications to keep track of recently opened files and other items. For example, a word processor might use the MRU registry to keep a list of the last ten documents a user has worked on. This information can be useful for the user, allowing them to quickly access the documents they have been working on.&lt;/p&gt;</description></item><item><title>Amcache.hve</title><link>https://4n6post.com/artifacts/amcache.hve/</link><pubDate>2024-10-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/SHIMCache-Logo.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;Amcache.hve is a forensic artifact that can be used to uncover valuable information about a computer system, both in normal and malicious use cases. The Amcache.hve file is a hive file that is located in the Windows operating system, and it provides a wealth of information about the software and files that have been executed on the system.&lt;/p&gt;
&lt;p&gt;In normal use cases, the Amcache.hve file can be used to track software installations and updates, as well as to determine which files were recently executed on the system. This information can be useful for system administrators and other IT professionals who need to manage and maintain their computer systems.&lt;/p&gt;</description></item><item><title>ShellBags Registry</title><link>https://4n6post.com/artifacts/shellbags/</link><pubDate>2024-01-02</pubDate><description>&lt;h2 id="understanding-shellbags-in-the-windows-registry-a-deep-dive"&gt;Understanding ShellBags in the Windows Registry: A Deep Dive&lt;/h2&gt;
&lt;p&gt;As my other posts likely portrais. The Windows operating system is a treasure of love and trove-like of forensic evidence. Along with the various artifacts, ShellBags stand out for their ability to provide valuable timeline and insights into a user&amp;rsquo;s general activity. Whether used for legitimate investigations or malicious purposes, understanding ShellBags is crucial for anyone dealing with digital forensics and even cybersecurity defenses like EDR.&lt;/p&gt;</description></item><item><title>KAPE to SOF-ELK</title><link>https://4n6post.com/artifacts/sof-elk_uploading/</link><pubDate>2024-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/artifacts/sof-elk_uploading/images/SOF-ELK.png" alt="SOF-ELK Logo"&gt;&lt;/p&gt;
&lt;h2 id="resources-and-help"&gt;Resources and Help&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;SOF-ELK from &lt;a href="https://github.com/philhagen/sof-elk/wiki/Virtual-Machine-README"&gt;GitHub&lt;/a&gt;&lt;/strong&gt; or &lt;strong&gt;&lt;a href="https://for572.com/sof-elk-vm"&gt;VM from FOR572&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Kroll - &lt;a href="https://s3.amazonaws.com/cyb-us-prd-kape/kape.zip"&gt;KAPE Direct Download&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;SOF-ELK &lt;a href="https://github.com/philhagen/sof-elk/wiki/KAPE-Support"&gt;KAPE Support&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;YouTube Video Guide by &lt;a href="https://www.youtube.com/watch?v=k-Kc0VhVjZg"&gt;SystemForensics&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="sof-elk-introduction"&gt;SOF-ELK Introduction&lt;/h2&gt;
&lt;p&gt;SOF-ELK, coupled with the powerful capabilities of the KAPE (Kroll Artifact Parser and Extractor) software, forms a dynamic duo in the realm of cybersecurity and digital forensics. KAPE, developed by Eric Zimmerman, serves as a versatile and efficient tool for acquiring and processing forensic artifacts, including Master File Table (MFT) and Event Log files. By seamlessly integrating KAPE into the SOF-ELK framework, security practitioners gain a comprehensive solution for extracting, parsing, and visualizing critical data. This synergy enhances the efficiency of incident response and forensic investigations by allowing analysts to harness the rich insights embedded within MFT and Event Log artifacts. Together, SOF-ELK and KAPE create a robust environment that empowers organizations to navigate the complex landscape of security data, enabling proactive threat detection and bolstering the overall resilience of their digital infrastructure.&lt;/p&gt;</description></item><item><title>Registry- SYSTEM Select</title><link>https://4n6post.com/artifacts/registry-system-select/</link><pubDate>2024-01-01</pubDate><description>&lt;h2 id="windows-registry-system-select-key-analysis"&gt;Windows Registry SYSTEM Select Key Analysis&lt;/h2&gt;
&lt;p&gt;The Windows Registry is a hierarchical database that stores configuration information for the operating system, applications, and hardware devices. One of the key branches in the registry is SYSTEM\Select, which contains information about the system&amp;rsquo;s hardware configuration and boot options.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h2 id="the-systemselect-subkeys-and-objects-are-as-follows"&gt;The &lt;strong&gt;SYSTEM\Select&lt;/strong&gt; subkeys and objects are as follows:&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/artifacts/registry-system-select/images/Select-Reg1.PNG" alt="Select Registry"&gt;&lt;/p&gt;
&lt;p&gt;Not all objects exist if they are not referred to, set or used in older versions.&lt;/p&gt;</description></item><item><title>Registry- Start, Shutdown, and Reboot</title><link>https://4n6post.com/artifacts/registry-start-shutdown-count/</link><pubDate>2023-10-01</pubDate><description>&lt;h2 id="windows-registry-system-start-shutdown-and-reboot-tracking"&gt;Windows Registry: System Start, Shutdown, and Reboot Tracking&lt;/h2&gt;
&lt;p&gt;The Windows registry is a hierarchical database that stores configuration settings for Windows operating systems, including Windows 10, Windows 8, and Windows 7. The registry is organized into five main components, namely HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG. Each of these components contains subkeys that store configuration data, including the data and time for when a computer turns on, shuts down, and restarts.&lt;/p&gt;</description></item><item><title>ShimCache</title><link>https://4n6post.com/artifacts/shimcache/</link><pubDate>2023-10-01</pubDate><description>&lt;h2 id="shimcache---windows-application-compatibility-cache-for-digital-forensics"&gt;ShimCache - Windows Application Compatibility Cache for Digital Forensics&lt;/h2&gt;
&lt;p&gt;Shimcache is a Windows artifact that stores information about programs that &lt;strong&gt;have been executed&lt;/strong&gt; on a Windows machine. The Shimcache can be used for both benign and malicious purposes, making it a useful tool for system administrators, digital forensics analysts, and attackers.&lt;/p&gt;
&lt;p&gt;You should keep in mind that ShimCache and &lt;a href="https://4n6post.com/artifacts/AMCACHE/"&gt;AMCache&lt;/a&gt; are very similar and depending on the version of Windows you are looking into, the AMCache might be more valuable to focus on. The ShimCache is in the registry where AmCache is a file on disk. So keep this in mind if you continue reading and notice similarities or relevance to it.&lt;/p&gt;</description></item><item><title>Windows Install Date &amp; Time</title><link>https://4n6post.com/artifacts/osinstalldatetime/</link><pubDate>2023-01-15</pubDate><description>&lt;p&gt;The Windows registry is a central repository of configuration data for the Windows operating system and its applications. One important aspect of the registry is the section involving the Windows install time. This information can be used in a variety of ways, both for normal system usage and for malicious purposes.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h2 id="finding-the-installdateinstalltime-registry"&gt;Finding the InstallDate/InstallTime Registry&lt;/h2&gt;
&lt;p&gt;To find the registry section involving the Windows install time and timezone, you can navigate to the following location in the file system:&lt;/p&gt;</description></item><item><title>Ad Disabling Tailored Experience</title><link>https://4n6post.com/artifacts/addisablingtailoredexperience/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h1 id="customizing-windows-ad-disabling-and-tailored-experience"&gt;Customizing Windows: Ad Disabling and Tailored Experience&lt;/h1&gt;
&lt;p&gt;In the realm of Windows customization, users often seek ways to tailor their experience to suit personal
preferences. This blog post explores a specific aspect of this customization - the modification of registry keys
to disable ads in Windows and control tailored experiences.&lt;/p&gt;
&lt;h2 id="disabling-ads-in-windows"&gt;Disabling Ads in Windows&lt;/h2&gt;
&lt;h3 id="what-is-it-about"&gt;What is it About?&lt;/h3&gt;
&lt;p&gt;Windows often displays ads and promotes certain apps to users. However, not everyone appreciates this feature.
To gain more control over your Windows experience, you can disable specific apps&amp;rsquo; promotional activities using
Registry Keys.&lt;/p&gt;</description></item><item><title>Enable Windows BSOD Detail</title><link>https://4n6post.com/artifacts/enablingwindowsbsoddetail/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;By default, Windows displays a simple emoticon (smiley face) when a Blue Screen of Death (BSOD) occurs. However,
if you prefer to see detailed information about the error, you can modify specific registry entries. This guide
will walk you through the process.&lt;/p&gt;
&lt;h2 id="disabling-ads-in-windows"&gt;Disabling Ads in Windows&lt;/h2&gt;
&lt;h3 id="what-is-it-about"&gt;What is it About?&lt;/h3&gt;
&lt;p&gt;Windows often displays ads and promotes certain apps to users. However, not everyone appreciates this feature.
To gain more control over your Windows experience, you can disable specific apps&amp;rsquo; promotional activities using
Registry Keys.&lt;/p&gt;</description></item><item><title>File and Folder Opening - Link Files (LNK)</title><link>https://4n6post.com/artifacts/shortcut-lnk/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/artifacts/shortcut-lnk/images/LNKFile.png" alt="LNK File Overview"&gt;&lt;/p&gt;
&lt;p&gt;Windows users are likely familiar with .lnk files, also known as LNK Link files. These files are shortcuts that point to another file or folder on the computer, allowing users to quickly access their desired content. While LNK files are a convenient feature in Windows, they can also be exploited by malicious actors. In this post, we&amp;rsquo;ll explore LNK files, their normal use cases, and how they can be exploited by cybercriminals.&lt;/p&gt;</description></item><item><title>JumpList Forensics</title><link>https://4n6post.com/artifacts/jumplist/</link><pubDate>2023-01-01</pubDate><description>&lt;h2 id="jumplist-forensics"&gt;JumpList Forensics&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/images/Windows11Explorer.png" alt="Explorer and Registry Block"&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;JumpList&lt;/strong&gt; is a feature of Microsoft Windows operating systems that allows users to quickly access frequently used files, folders, and applications. This feature can be accessed by right-clicking on the taskbar icon or start menu tile of the target application. The JumpList registry holds the information that is displayed in the JumpList. This can be found multiple ways via Explorer File paths as well as within the registry itself.&lt;/p&gt;</description></item><item><title>MFT</title><link>https://4n6post.com/artifacts/mft/</link><pubDate>2023-01-01</pubDate><description>&lt;h2 id="mft-analysis---master-file-table-forensics-guide"&gt;MFT Analysis - Master File Table Forensics Guide&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/artifacts/mft/images/MFTFile.png" alt="MFT File Overview"&gt;&lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;$MFT&lt;/strong&gt;, or Master File Table, plays a crucial role in the NTFS (New Technology File System) utilized by Windows operating systems. Essentially acting as a master index for all files and directories on an NTFS volume, understanding the nuances of the $MFT file is vital for various professionals, including forensic investigators, system administrators, and security experts. In this blog post, we&amp;rsquo;ll thoroughly explore the $MFT file, examining its structure, functions, and its applications in both normal and potentially malicious scenarios. Additionally, we&amp;rsquo;ll touch upon tools such as MFTECmd.exe by Eric Zimmerman and MACTIME in Linux, highlighting how these tools can be utilized in forensic analysis to parse the $MFT.&lt;/p&gt;</description></item><item><title>Prefetch</title><link>https://4n6post.com/artifacts/prefetch/</link><pubDate>2023-01-01</pubDate><description>&lt;h2 id="windows-prefetch-analysis---digital-forensics-execution-tracking"&gt;Windows Prefetch Analysis - Digital Forensics Execution Tracking&lt;/h2&gt;
&lt;p&gt;Windows Prefetch is a feature in the Windows operating system that was first introduced in Windows XP. It is a built-in tool that helps to speed up the loading of applications and other system processes by analyzing which files and libraries are most frequently used and then pre-loading them into memory. In this blog post, we will explore what Windows Prefetch is, how it works, and provide examples of both normal and malicious use cases.&lt;/p&gt;</description></item><item><title>Recycling.Bin / Recycler</title><link>https://4n6post.com/artifacts/recycling.bin-recycler/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/artifacts/recycling.bin-recycler/images/RecyclingBin.png" alt="Recycling Bin Overview"&gt;&lt;/p&gt;
&lt;p&gt;The Recycling Bin is a well-known feature in Windows operating systems that acts as a temporary storage location for deleted files. However, what many users may not know is that the Recycling Bin is also a valuable forensic artifact that can provide valuable information in both normal and malicious use cases. In this blog post, we will explore the Recycling Bin and its role as a forensic artifact, including the connection between the &amp;ldquo;$I&amp;rdquo; and &amp;ldquo;$R&amp;rdquo; values created in the &lt;strong&gt;Master File Table (MFT)&lt;/strong&gt;, the normal and malicious use cases of the Recycling Bin, and how to permanently delete files to skip the Recycling Bin, as well as how to set the Recycling Bin in the registry.&lt;/p&gt;</description></item><item><title>Registry- RunMRU</title><link>https://4n6post.com/artifacts/runmru/</link><pubDate>2023-01-01</pubDate><description>&lt;h2 id="understanding-the-runmru-registry-security-implications-and-forensic-value"&gt;Understanding the RunMRU Registry: Security Implications and Forensic Value&lt;/h2&gt;
&lt;p&gt;The RunMRU (Most Recently Used) registry is a key component of the Microsoft Windows operating system, storing information about the most recently executed applications and documents. This information is used to populate the &amp;ldquo;Recent Items&amp;rdquo; list in the Start menu, as well as for application compatibility purposes.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;p&gt;While the RunMRU registry serves a useful purpose for end users, it also presents a potential security risk if not properly managed. In this blog post, we will discuss the normal use case for the RunMRU registry, as well as several examples of malicious use of the RunMRU registry. We will also provide links to additional resources for further study, including a white paper on the RunMRU registry and a SANS poster with proof of execution.&lt;/p&gt;</description></item><item><title>Registry- UserAssist</title><link>https://4n6post.com/artifacts/userassist/</link><pubDate>2023-01-01</pubDate><description>&lt;h2 id="userassist-registry-analysis---windows-program-execution-tracking"&gt;UserAssist Registry Analysis - Windows Program Execution Tracking&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;UserAssist&lt;/strong&gt; is a feature of the Windows operating system that keeps track of the programs that are launched on a user&amp;rsquo;s profile. This information is stored in the registry, a database that contains configuration settings for the operating system and other software. In this blog post, we&amp;rsquo;ll explore what UserAssist is, its normal use cases, and how it can be abused by malicious actors.&lt;/p&gt;</description></item><item><title>SysInternals Tools Registry Forensics</title><link>https://4n6post.com/artifacts/registry-sysinternals/</link><pubDate>2023-01-01</pubDate><description>&lt;h2 id="sysinternals-tools---registry-forensics-and-analysis"&gt;SysInternals Tools - Registry Forensics and Analysis&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h2 id="what-is-sysinternals"&gt;What is SysInternals?&lt;/h2&gt;
&lt;p&gt;SysInternals is a suite of advanced system utilities for Microsoft Windows that provides deep technical insight into the operating system. These tools are designed to help IT professionals, system administrators, and software developers manage, troubleshoot, and diagnose Windows systems effectively. From process management to network monitoring, SysInternals offers a wide range of utilities that enhance system performance, security, and reliability.&lt;/p&gt;</description></item><item><title>TimeZone Information</title><link>https://4n6post.com/artifacts/timezoneinformation/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/4n6post-Analog-Clock.png" alt="Analog Clock"&gt;&lt;/p&gt;
&lt;p&gt;The Windows registry is a critical component of the Windows operating system. It stores important configuration data and settings that help the operating system function properly. One of the registry keys that play an important role in the functioning of the system is the TimeZoneInformation registry key. In this blog post, we&amp;rsquo;ll delve into the registry TimeZoneInformation, its connection with the Dynamic Link Library (DLL) it uses, and how it is used in both normal and malicious scenarios.&lt;/p&gt;</description></item><item><title>TypedPath Registry</title><link>https://4n6post.com/artifacts/typedpath/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h1 id="registry-section-of-typedpath-understanding-its-importance-in-digital-forensics"&gt;Registry Section of TypedPath: Understanding Its Importance in Digital Forensics&lt;/h1&gt;
&lt;p&gt;The registry is an important aspect of a computer&amp;rsquo;s operating system, as it stores information about the configuration, settings, and installed software. In digital forensics, the registry can provide valuable information to investigators, as it can reveal data about software execution and system changes. The registry section of &lt;strong&gt;TypedPath&lt;/strong&gt; is a digital forensics tool that can be used to extract information from the registry of a computer.&lt;/p&gt;</description></item><item><title>Windows Border Size Modification</title><link>https://4n6post.com/artifacts/windows_border_size/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h2 id="exploring-windows-border-size-modification"&gt;Exploring Windows Border Size Modification&lt;/h2&gt;
&lt;p&gt;Welcome to our exploration of a subtle yet impactful customization in the Windows operating system. Today, we&amp;rsquo;ll delve into the world of Windows Border size modification and how a few Registry Keys can unlock a realm of personalization.&lt;/p&gt;
&lt;h2 id="understanding-windows-border-customization"&gt;Understanding Windows Border Customization&lt;/h2&gt;
&lt;p&gt;Windows border size modification allows users to adjust the thickness of window borders in the Windows interface. This customization affects the visual appearance of application windows and can impact both usability and accessibility.&lt;/p&gt;</description></item><item><title>Windows Generic Installation Keys</title><link>https://4n6post.com/artifacts/windowsgenericinstallationkeys/</link><pubDate>2023-01-01</pubDate><description>&lt;h4 id="source"&gt;SOURCE:&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.windowsafg.com/keys.html"&gt;https://www.windowsafg.com/keys.html&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This is just a copy of the data from the source windowafg. I make a copy so that others can find it.&lt;/em&gt;&lt;/p&gt;
&lt;h2 id="generic-installation-keys"&gt;Generic Installation Keys&lt;/h2&gt;
&lt;p&gt;All of the examples provided are installation keys only; they will not activate your installed version of Windows. They are the default keys that are inserted if you choose to skip entering a Product Key during the installation process.&lt;/p&gt;
&lt;p&gt;The product keys listed in this section can be used with any of the answer files and scripted examples. They are blocked at the Microsoft clearinghouse and therefore cannot be used to activate any systems. They provide a number of days for you to complete the activation process. The keys supplied are not architecture dependent.&lt;/p&gt;</description></item><item><title>Windows USB Connection Analysis</title><link>https://4n6post.com/artifacts/windows-usb-connection/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;USB connections&lt;/strong&gt; are a commonly used method for transferring data between computers and other electronic devices. In Windows, the use of USB connections can affect the registry in several ways, including within the registry are the &lt;strong&gt;USB&lt;/strong&gt;, &lt;strong&gt;USBSTOR&lt;/strong&gt; and &lt;strong&gt;MountPoints&lt;/strong&gt; keys. In this post, we&amp;rsquo;ll explore the connection between USB Mountpoints and the setupapi.dev.log, and provide examples of both normal and malicious use cases.&lt;/p&gt;
&lt;h2 id="usb-forensics-overview"&gt;USB Forensics Overview&lt;/h2&gt;
&lt;p&gt;USB device forensics involves analyzing multiple Windows artifacts to track USB device usage, including:&lt;/p&gt;</description></item><item><title>WMI Filter Query Consumer</title><link>https://4n6post.com/artifacts/wmi-filter-query-consumer/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/WMI-Logo.png" alt="WMI Logo"&gt;&lt;/p&gt;
&lt;p&gt;Windows Management Instrumentation (WMI) is a Microsoft technology that provides a unified way of managing Windows operating systems and applications. WMI is a management infrastructure that is built into Windows operating systems, and it provides a standardized interface for accessing system management information. WMI is used by system administrators to gather information about the state of their systems, to automate system management tasks, and to perform remote administration. In this blog post, we will take a closer look at what WMI is, how it works, and some examples of its normal and malicious use cases.&lt;/p&gt;</description></item><item><title>WordWheelQuery</title><link>https://4n6post.com/artifacts/wordwheelquery/</link><pubDate>2023-01-01</pubDate><description>&lt;p&gt;&lt;img src="https://4n6post.com/images/featured/artifacts/RegistryBlock.png" alt="Registry Block"&gt;&lt;/p&gt;
&lt;h2 id="the-registry-section-of-wordwheelquery-an-overview-for-digital-forensic-investigators"&gt;The Registry Section of WordWheelQuery: An Overview for Digital Forensic Investigators&lt;/h2&gt;
&lt;p&gt;The WordWheelQuery registry section is a critical component for digital forensic investigations, as it contains information about the user&amp;rsquo;s search queries made using the Windows operating system. In this blog post, we&amp;rsquo;ll take a closer look at what exactly can be found in the WordWheelQuery registry section and its significance for both normal and malicious use cases.&lt;/p&gt;</description></item></channel></rss>