SlideShare une entreprise Scribd logo
1  sur  22
Windows 7
Thumbnail Cache
Troy Larson
Principal Forensics Program Manager
TWC Network Security Investigations
NSINV-R3– Research|Readiness|Response
Windows 7 Thumbnail Cache
Thumbnail cache:
• Supplies the
thumbnails
shown in
Explorer, etc.
• File based:
– Thumbcache_*
• Local
– Thumbs.db
• Remote
Windows 7 Thumbnail Cache
• Created automatically when folders opened in Explorer in Icon
view.
• Thumbnail cache files retain thumbnail images long after the
source file has been deleted.
• Thumbs.db indicates a folder that has been shared.
Content of Folder
Content of Thumbcache_256.db
Windows 7 Thumbnail Cache
• Thumbnail cache files are likely to be worth investigating when:
– There is a concern about illicit images.
– There is a concern that graphic files have been deleted.
• Comprehensive review of Thumbnail cache files can be efficiently
performed.
– Number of tools scan and present the contents of thumbcache and
thumbs.db files, but some tools only work on certain versions of
Windows.
Windows 7 Thumbnail Cache
What is a thumbnail?
• It is an image that is used to represent an item.
– Picture or graphical items.
– But also, other files with images.
• Distinguished from a mere icon:
– Thumbnails are per item, rather than type, and
– Dynamically generated, based on item content.
– Stored separate from icon caches.
Windows 7 Thumbnail Cache
Per account, local based, thumbnail caches are found at
C:Users[Profile]AppDataLocalMicrosoftWindowsExplorer.
Windows 7 Thumbnail Cache
The local, account specific, thumbnail cache consists of an
index and 4 data files.
• Thumbcache_.idx—Index of which data files cache
each image.
• Image cache files:
– Based on thumbnail size.
• thumbcache_32.db, bitmap based, 32x32.
• thumbcache_96.db, bitmap based, 96x96.
• thumbcache_256.db, JPEG based, 256x256.
• thumbcache_1024.db, JPEG based, special instances.
– New thumbnails usually appended to a thumbcache file.
Windows 7 Thumbnail Cache
C:UserstroylaPictures
atomic-explosion.jpg
Chrysanthemum.jpg
Desert.jpg
ThumbnailCacheIds
• 0x81A9D28BFA8E4E59
• 0xEE0CAA5E28390724
• 0xDF17189B15C5C9CD
thumbcache_idx.db
thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db
ThumbnailcacheID
used to lookup
thumbnail address in
the Thumbcache_idx
Thumbcache_idx
provides offsets to
thumbcache_*.db
Thumbcache_*.db
provides thumbnails
to Explorer.
1
2
3
Windows 7 Thumbnail Cache
Thumbcache information does not point to any file.
• File information—ThumbnailcacheID—is used to find
thumbnail from the original file.
• No file name or path information in the thumbcache* files.
thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db
C:UserstroylaPictures
atomic-explosion.jpg
Chrysanthemum.jpg
Desert.jpg
Windows 7 Thumbnail Cache
Most Windows 7
thumbnail cache
viewers display the
thumbnail and the
ThumbnailcacheID.
0xEE0CAA5E28390724
http://www.thumbnailexpert.com/
Windows 7 Thumbnail Cache
Linking a thumbcache file thumbnail to its source:
• The Windows Search index maintains both path
and ThumbnailcacheID, and can be used to link
thumbnail to source.
0xEE0CAA5E28390724
Windows 7 Thumbnail Cache
• File header.
• Record header.
• ThumbnailcacheID.
• Image fileheader.
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F
00000000 43 4D 4D 4D 15 00 00 00 01 00 00 00 18 00 00 00 CMMM
00000010 E0 E6 1C 00 3A 00 00 00 43 4D 4D 4D 88 6C 00 00 àæ : CMMMˆl
00000020 24 07 39 28 5E AA 0C EE 20 00 00 00 02 00 00 00 $ 9(^ª î
00000030 36 6C 00 00 00 00 00 00 47 07 D9 39 67 BF AF D5 6l G Ù9g¿¯Õ
00000040 EE B6 79 3E E2 C4 B8 56 65 00 65 00 30 00 63 00 î¶y>âĸV e e 0 c
00000050 61 00 61 00 35 00 65 00 32 00 38 00 33 00 39 00 a a 5 e 2 8 3 9
00000060 30 00 37 00 32 00 34 00 00 00 42 4D 36 6C 00 00 0 7 2 4 BM6l
00000070 00 00 00 00 36 00 00 00 28 00 00 00 60 00 00 00 6 ( `
00000080 48 00 00 00 01 00 20 00 00 00 00 00 00 00 00 00 H
00000090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
000000A0 0A 10 C3 FF 14 40 E3 FF 1C 6B FA FF 1B 78 FC FF Ãÿ @ãÿ kúÿ xüÿ
000000B0 18 7A FE FF 05 63 F9 FF 05 47 EE FF 02 3A E5 FF zþÿ cùÿ Gîÿ :åÿ
Windows 7 Thumbnail Cache
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F
00004460 32 31 E0 63 15 05 8C 6C D2 96 8B 70 21 B2 08 ED 21àc ŒlÒ–‹p!² í
00004470 58 57 84 6B C6 F7 B1 B5 2A 72 A6 94 13 D0 FF D9 XW„kÆ÷±µ*r¦” ÐÿÙ
00004480 43 4D 4D 4D D3 2E 00 00 CD C9 C5 15 9B 18 17 DF CMMMÓ. ÍÉÅ › ß
00004490 20 00 00 00 00 00 00 00 83 2E 00 00 00 00 00 00 ƒ.
000044A0 47 A2 78 FB FC F1 96 88 11 0B DF E7 10 20 64 B8 G¢xûüñ–ˆ ßç d¸
000044B0 64 00 66 00 31 00 37 00 31 00 38 00 39 00 62 00 d f 1 7 1 8 9 b
000044C0 31 00 35 00 63 00 35 00 63 00 39 00 63 00 64 00 1 5 c 5 c 9 c d
000044D0 FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 00 ÿØÿà JFIF
000044E0 00 00 00 00 FF DB 00 43 00 05 03 04 04 04 03 05 ÿÛ C
000044F0 04 04 04 05 05 05 06 07 0C 08 07 07 07 07 0F 0B
00004500 0B 09 0C 11 0F 12 12 11 0F 11 11 13 16 1C 17 13
00004510 14 1A 15 11 11 18 21 18 1A 1D 1D 1F 1F 1F 13 17 !
00004520 22 24 22 1E 24 1C 1E 1F 1E FF DB 00 43 01 05 05 "$" $ ÿÛ C
00004530 05 07 06 07 0E 08 08 0E 1E 14 11 14 1E 1E 1E 1E
• Record header.
• ThumbnailcacheID.
• Image fileheader.
Windows 7 Thumbnail Cache
Thumbcache_32.db
Windows 7 Thumbnail Cache
Thumbcache_96.db
Windows 7 Thumbnail Cache
Thumbcache_256.db
Windows 7 Thumbnail Cache
Thumbcache_1024.db
Windows 7 Thumbnail Cache
Buffy-1C$UserstroylaPictures
Opening a shared folder using an icon view creates a thumbs.db file
in the shared folder.
Thumbs.db is independent of the user thumbnail caches on host
and client.
Existence of a thumbs.db file indicates a folder was remotely
accessed.
Windows 7 Thumbnail Cache
Note: Different UIDs
Windows 7 Thumbnail Cache
Internals: The venerable structured storage file format.
Windows 7 Thumbnail Cache
Internals: The venerable structured storage file format.
Questions?

Contenu connexe

En vedette

Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaCTIN
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for InvestigatorsCase IQ
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsBrent Muir
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Mark Matienzo
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsMike Spaulding
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source ForensicsCTIN
 
www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows RegistryChandra Pr. Singh
 
Installation of Joomla on Windows XP
Installation of Joomla on Windows XPInstallation of Joomla on Windows XP
Installation of Joomla on Windows XPRupesh Kumar
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registrysomutripathi
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!Nearpod
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on TwitterYansi Keim
 

En vedette (20)

Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
File carving tools
File carving toolsFile carving tools
File carving tools
 
Raidprep
RaidprepRaidprep
Raidprep
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 
www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registry
 
Installation of Joomla on Windows XP
Installation of Joomla on Windows XPInstallation of Joomla on Windows XP
Installation of Joomla on Windows XP
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Netcat cheat sheet
Netcat cheat sheetNetcat cheat sheet
Netcat cheat sheet
 
Unit B Windows 7
Unit B Windows 7Unit B Windows 7
Unit B Windows 7
 

Similaire à Windows 7 forensics thumbnail-dtl-r4

SANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysismooyix
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosQuek Lilian
 
Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...pycontw
 
ambil aja
ambil aja ambil aja
ambil aja muxander
 
nullcon 2011 - Memory analysis – Looking into the eye of the bits
nullcon 2011 - Memory analysis – Looking into the eye of the bitsnullcon 2011 - Memory analysis – Looking into the eye of the bits
nullcon 2011 - Memory analysis – Looking into the eye of the bitsn|u - The Open Security Community
 
Nsd, il tuo compagno di viaggio quando Domino va in crash
Nsd, il tuo compagno di viaggio quando Domino va in crashNsd, il tuo compagno di viaggio quando Domino va in crash
Nsd, il tuo compagno di viaggio quando Domino va in crashFabio Pignatti
 
How to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezHow to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezShakacon
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 
Building OpenDNS Stats
Building OpenDNS StatsBuilding OpenDNS Stats
Building OpenDNS StatsGeorge Ang
 
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...44CON
 
smartdc by Ruby
smartdc by Rubysmartdc by Ruby
smartdc by Rubyogom_
 
MUS2020 - Putting Together the RDPieces
MUS2020 - Putting Together the RDPiecesMUS2020 - Putting Together the RDPieces
MUS2020 - Putting Together the RDPiecesBriMorLabs
 
MeetBSD2014 Performance Analysis
MeetBSD2014 Performance AnalysisMeetBSD2014 Performance Analysis
MeetBSD2014 Performance AnalysisBrendan Gregg
 

Similaire à Windows 7 forensics thumbnail-dtl-r4 (20)

Debugging TV Frame 0x16
Debugging TV Frame 0x16Debugging TV Frame 0x16
Debugging TV Frame 0x16
 
SANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysis
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
 
Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...
 
ambil aja
ambil aja ambil aja
ambil aja
 
nullcon 2011 - Memory analysis – Looking into the eye of the bits
nullcon 2011 - Memory analysis – Looking into the eye of the bitsnullcon 2011 - Memory analysis – Looking into the eye of the bits
nullcon 2011 - Memory analysis – Looking into the eye of the bits
 
Nsd, il tuo compagno di viaggio quando Domino va in crash
Nsd, il tuo compagno di viaggio quando Domino va in crashNsd, il tuo compagno di viaggio quando Domino va in crash
Nsd, il tuo compagno di viaggio quando Domino va in crash
 
How to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezHow to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew Suarez
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
Building OpenDNS Stats
Building OpenDNS StatsBuilding OpenDNS Stats
Building OpenDNS Stats
 
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
 
Stellar Drive ToolBox2
Stellar Drive ToolBox2Stellar Drive ToolBox2
Stellar Drive ToolBox2
 
Backups
BackupsBackups
Backups
 
Cucu video log
Cucu video logCucu video log
Cucu video log
 
smartdc by Ruby
smartdc by Rubysmartdc by Ruby
smartdc by Ruby
 
Debugging TV Frame 0x12
Debugging TV Frame 0x12Debugging TV Frame 0x12
Debugging TV Frame 0x12
 
MUS2020 - Putting Together the RDPieces
MUS2020 - Putting Together the RDPiecesMUS2020 - Putting Together the RDPieces
MUS2020 - Putting Together the RDPieces
 
Debugging TV Frame 0x34
Debugging TV Frame 0x34Debugging TV Frame 0x34
Debugging TV Frame 0x34
 
MySQL Monitoring 101
MySQL Monitoring 101MySQL Monitoring 101
MySQL Monitoring 101
 
MeetBSD2014 Performance Analysis
MeetBSD2014 Performance AnalysisMeetBSD2014 Performance Analysis
MeetBSD2014 Performance Analysis
 

Plus de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsCTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 
Nra
NraNra
NraCTIN
 
Live Forensics
Live ForensicsLive Forensics
Live ForensicsCTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Edrm
EdrmEdrm
EdrmCTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassCTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrimeCTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search WarrantsCTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007CTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking OverviewCTIN
 
M Compevid
M CompevidM Compevid
M CompevidCTIN
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The DayCTIN
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In ComputingCTIN
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsCTIN
 
K Ai
K AiK Ai
K AiCTIN
 

Plus de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 
L Scope
L ScopeL Scope
L Scope
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic Investigations
 
K Ai
K AiK Ai
K Ai
 

Dernier

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Dernier (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

Windows 7 forensics thumbnail-dtl-r4

  • 1. Windows 7 Thumbnail Cache Troy Larson Principal Forensics Program Manager TWC Network Security Investigations NSINV-R3– Research|Readiness|Response
  • 2. Windows 7 Thumbnail Cache Thumbnail cache: • Supplies the thumbnails shown in Explorer, etc. • File based: – Thumbcache_* • Local – Thumbs.db • Remote
  • 3. Windows 7 Thumbnail Cache • Created automatically when folders opened in Explorer in Icon view. • Thumbnail cache files retain thumbnail images long after the source file has been deleted. • Thumbs.db indicates a folder that has been shared. Content of Folder Content of Thumbcache_256.db
  • 4. Windows 7 Thumbnail Cache • Thumbnail cache files are likely to be worth investigating when: – There is a concern about illicit images. – There is a concern that graphic files have been deleted. • Comprehensive review of Thumbnail cache files can be efficiently performed. – Number of tools scan and present the contents of thumbcache and thumbs.db files, but some tools only work on certain versions of Windows.
  • 5. Windows 7 Thumbnail Cache What is a thumbnail? • It is an image that is used to represent an item. – Picture or graphical items. – But also, other files with images. • Distinguished from a mere icon: – Thumbnails are per item, rather than type, and – Dynamically generated, based on item content. – Stored separate from icon caches.
  • 6. Windows 7 Thumbnail Cache Per account, local based, thumbnail caches are found at C:Users[Profile]AppDataLocalMicrosoftWindowsExplorer.
  • 7. Windows 7 Thumbnail Cache The local, account specific, thumbnail cache consists of an index and 4 data files. • Thumbcache_.idx—Index of which data files cache each image. • Image cache files: – Based on thumbnail size. • thumbcache_32.db, bitmap based, 32x32. • thumbcache_96.db, bitmap based, 96x96. • thumbcache_256.db, JPEG based, 256x256. • thumbcache_1024.db, JPEG based, special instances. – New thumbnails usually appended to a thumbcache file.
  • 8. Windows 7 Thumbnail Cache C:UserstroylaPictures atomic-explosion.jpg Chrysanthemum.jpg Desert.jpg ThumbnailCacheIds • 0x81A9D28BFA8E4E59 • 0xEE0CAA5E28390724 • 0xDF17189B15C5C9CD thumbcache_idx.db thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db ThumbnailcacheID used to lookup thumbnail address in the Thumbcache_idx Thumbcache_idx provides offsets to thumbcache_*.db Thumbcache_*.db provides thumbnails to Explorer. 1 2 3
  • 9. Windows 7 Thumbnail Cache Thumbcache information does not point to any file. • File information—ThumbnailcacheID—is used to find thumbnail from the original file. • No file name or path information in the thumbcache* files. thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db C:UserstroylaPictures atomic-explosion.jpg Chrysanthemum.jpg Desert.jpg
  • 10. Windows 7 Thumbnail Cache Most Windows 7 thumbnail cache viewers display the thumbnail and the ThumbnailcacheID. 0xEE0CAA5E28390724 http://www.thumbnailexpert.com/
  • 11. Windows 7 Thumbnail Cache Linking a thumbcache file thumbnail to its source: • The Windows Search index maintains both path and ThumbnailcacheID, and can be used to link thumbnail to source. 0xEE0CAA5E28390724
  • 12. Windows 7 Thumbnail Cache • File header. • Record header. • ThumbnailcacheID. • Image fileheader. Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F 00000000 43 4D 4D 4D 15 00 00 00 01 00 00 00 18 00 00 00 CMMM 00000010 E0 E6 1C 00 3A 00 00 00 43 4D 4D 4D 88 6C 00 00 àæ : CMMMˆl 00000020 24 07 39 28 5E AA 0C EE 20 00 00 00 02 00 00 00 $ 9(^ª î 00000030 36 6C 00 00 00 00 00 00 47 07 D9 39 67 BF AF D5 6l G Ù9g¿¯Õ 00000040 EE B6 79 3E E2 C4 B8 56 65 00 65 00 30 00 63 00 î¶y>âĸV e e 0 c 00000050 61 00 61 00 35 00 65 00 32 00 38 00 33 00 39 00 a a 5 e 2 8 3 9 00000060 30 00 37 00 32 00 34 00 00 00 42 4D 36 6C 00 00 0 7 2 4 BM6l 00000070 00 00 00 00 36 00 00 00 28 00 00 00 60 00 00 00 6 ( ` 00000080 48 00 00 00 01 00 20 00 00 00 00 00 00 00 00 00 H 00000090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 000000A0 0A 10 C3 FF 14 40 E3 FF 1C 6B FA FF 1B 78 FC FF Ãÿ @ãÿ kúÿ xüÿ 000000B0 18 7A FE FF 05 63 F9 FF 05 47 EE FF 02 3A E5 FF zþÿ cùÿ Gîÿ :åÿ
  • 13. Windows 7 Thumbnail Cache Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F 00004460 32 31 E0 63 15 05 8C 6C D2 96 8B 70 21 B2 08 ED 21àc ŒlÒ–‹p!² í 00004470 58 57 84 6B C6 F7 B1 B5 2A 72 A6 94 13 D0 FF D9 XW„kÆ÷±µ*r¦” ÐÿÙ 00004480 43 4D 4D 4D D3 2E 00 00 CD C9 C5 15 9B 18 17 DF CMMMÓ. ÍÉÅ › ß 00004490 20 00 00 00 00 00 00 00 83 2E 00 00 00 00 00 00 ƒ. 000044A0 47 A2 78 FB FC F1 96 88 11 0B DF E7 10 20 64 B8 G¢xûüñ–ˆ ßç d¸ 000044B0 64 00 66 00 31 00 37 00 31 00 38 00 39 00 62 00 d f 1 7 1 8 9 b 000044C0 31 00 35 00 63 00 35 00 63 00 39 00 63 00 64 00 1 5 c 5 c 9 c d 000044D0 FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 00 ÿØÿà JFIF 000044E0 00 00 00 00 FF DB 00 43 00 05 03 04 04 04 03 05 ÿÛ C 000044F0 04 04 04 05 05 05 06 07 0C 08 07 07 07 07 0F 0B 00004500 0B 09 0C 11 0F 12 12 11 0F 11 11 13 16 1C 17 13 00004510 14 1A 15 11 11 18 21 18 1A 1D 1D 1F 1F 1F 13 17 ! 00004520 22 24 22 1E 24 1C 1E 1F 1E FF DB 00 43 01 05 05 "$" $ ÿÛ C 00004530 05 07 06 07 0E 08 08 0E 1E 14 11 14 1E 1E 1E 1E • Record header. • ThumbnailcacheID. • Image fileheader.
  • 14. Windows 7 Thumbnail Cache Thumbcache_32.db
  • 15. Windows 7 Thumbnail Cache Thumbcache_96.db
  • 16. Windows 7 Thumbnail Cache Thumbcache_256.db
  • 17. Windows 7 Thumbnail Cache Thumbcache_1024.db
  • 18. Windows 7 Thumbnail Cache Buffy-1C$UserstroylaPictures Opening a shared folder using an icon view creates a thumbs.db file in the shared folder. Thumbs.db is independent of the user thumbnail caches on host and client. Existence of a thumbs.db file indicates a folder was remotely accessed.
  • 19. Windows 7 Thumbnail Cache Note: Different UIDs
  • 20. Windows 7 Thumbnail Cache Internals: The venerable structured storage file format.
  • 21. Windows 7 Thumbnail Cache Internals: The venerable structured storage file format.