SlideShare une entreprise Scribd logo
1  sur  22
Windows 7
Thumbnail Cache
Troy Larson
Principal Forensics Program Manager
TWC Network Security Investigations
NSINV-R3– Research|Readiness|Response
Windows 7 Thumbnail Cache
Thumbnail cache:
• Supplies the
thumbnails
shown in
Explorer, etc.
• File based:
– Thumbcache_*
• Local
– Thumbs.db
• Remote
Windows 7 Thumbnail Cache
• Created automatically when folders opened in Explorer in Icon
view.
• Thumbnail cache files retain thumbnail images long after the
source file has been deleted.
• Thumbs.db indicates a folder that has been shared.
Content of Folder
Content of Thumbcache_256.db
Windows 7 Thumbnail Cache
• Thumbnail cache files are likely to be worth investigating when:
– There is a concern about illicit images.
– There is a concern that graphic files have been deleted.
• Comprehensive review of Thumbnail cache files can be efficiently
performed.
– Number of tools scan and present the contents of thumbcache and
thumbs.db files, but some tools only work on certain versions of
Windows.
Windows 7 Thumbnail Cache
What is a thumbnail?
• It is an image that is used to represent an item.
– Picture or graphical items.
– But also, other files with images.
• Distinguished from a mere icon:
– Thumbnails are per item, rather than type, and
– Dynamically generated, based on item content.
– Stored separate from icon caches.
Windows 7 Thumbnail Cache
Per account, local based, thumbnail caches are found at
C:Users[Profile]AppDataLocalMicrosoftWindowsExplorer.
Windows 7 Thumbnail Cache
The local, account specific, thumbnail cache consists of an
index and 4 data files.
• Thumbcache_.idx—Index of which data files cache
each image.
• Image cache files:
– Based on thumbnail size.
• thumbcache_32.db, bitmap based, 32x32.
• thumbcache_96.db, bitmap based, 96x96.
• thumbcache_256.db, JPEG based, 256x256.
• thumbcache_1024.db, JPEG based, special instances.
– New thumbnails usually appended to a thumbcache file.
Windows 7 Thumbnail Cache
C:UserstroylaPictures
atomic-explosion.jpg
Chrysanthemum.jpg
Desert.jpg
ThumbnailCacheIds
• 0x81A9D28BFA8E4E59
• 0xEE0CAA5E28390724
• 0xDF17189B15C5C9CD
thumbcache_idx.db
thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db
ThumbnailcacheID
used to lookup
thumbnail address in
the Thumbcache_idx
Thumbcache_idx
provides offsets to
thumbcache_*.db
Thumbcache_*.db
provides thumbnails
to Explorer.
1
2
3
Windows 7 Thumbnail Cache
Thumbcache information does not point to any file.
• File information—ThumbnailcacheID—is used to find
thumbnail from the original file.
• No file name or path information in the thumbcache* files.
thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db
C:UserstroylaPictures
atomic-explosion.jpg
Chrysanthemum.jpg
Desert.jpg
Windows 7 Thumbnail Cache
Most Windows 7
thumbnail cache
viewers display the
thumbnail and the
ThumbnailcacheID.
0xEE0CAA5E28390724
http://www.thumbnailexpert.com/
Windows 7 Thumbnail Cache
Linking a thumbcache file thumbnail to its source:
• The Windows Search index maintains both path
and ThumbnailcacheID, and can be used to link
thumbnail to source.
0xEE0CAA5E28390724
Windows 7 Thumbnail Cache
• File header.
• Record header.
• ThumbnailcacheID.
• Image fileheader.
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F
00000000 43 4D 4D 4D 15 00 00 00 01 00 00 00 18 00 00 00 CMMM
00000010 E0 E6 1C 00 3A 00 00 00 43 4D 4D 4D 88 6C 00 00 àæ : CMMMˆl
00000020 24 07 39 28 5E AA 0C EE 20 00 00 00 02 00 00 00 $ 9(^ª î
00000030 36 6C 00 00 00 00 00 00 47 07 D9 39 67 BF AF D5 6l G Ù9g¿¯Õ
00000040 EE B6 79 3E E2 C4 B8 56 65 00 65 00 30 00 63 00 î¶y>âĸV e e 0 c
00000050 61 00 61 00 35 00 65 00 32 00 38 00 33 00 39 00 a a 5 e 2 8 3 9
00000060 30 00 37 00 32 00 34 00 00 00 42 4D 36 6C 00 00 0 7 2 4 BM6l
00000070 00 00 00 00 36 00 00 00 28 00 00 00 60 00 00 00 6 ( `
00000080 48 00 00 00 01 00 20 00 00 00 00 00 00 00 00 00 H
00000090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
000000A0 0A 10 C3 FF 14 40 E3 FF 1C 6B FA FF 1B 78 FC FF Ãÿ @ãÿ kúÿ xüÿ
000000B0 18 7A FE FF 05 63 F9 FF 05 47 EE FF 02 3A E5 FF zþÿ cùÿ Gîÿ :åÿ
Windows 7 Thumbnail Cache
Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F
00004460 32 31 E0 63 15 05 8C 6C D2 96 8B 70 21 B2 08 ED 21àc ŒlÒ–‹p!² í
00004470 58 57 84 6B C6 F7 B1 B5 2A 72 A6 94 13 D0 FF D9 XW„kÆ÷±µ*r¦” ÐÿÙ
00004480 43 4D 4D 4D D3 2E 00 00 CD C9 C5 15 9B 18 17 DF CMMMÓ. ÍÉÅ › ß
00004490 20 00 00 00 00 00 00 00 83 2E 00 00 00 00 00 00 ƒ.
000044A0 47 A2 78 FB FC F1 96 88 11 0B DF E7 10 20 64 B8 G¢xûüñ–ˆ ßç d¸
000044B0 64 00 66 00 31 00 37 00 31 00 38 00 39 00 62 00 d f 1 7 1 8 9 b
000044C0 31 00 35 00 63 00 35 00 63 00 39 00 63 00 64 00 1 5 c 5 c 9 c d
000044D0 FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 00 ÿØÿà JFIF
000044E0 00 00 00 00 FF DB 00 43 00 05 03 04 04 04 03 05 ÿÛ C
000044F0 04 04 04 05 05 05 06 07 0C 08 07 07 07 07 0F 0B
00004500 0B 09 0C 11 0F 12 12 11 0F 11 11 13 16 1C 17 13
00004510 14 1A 15 11 11 18 21 18 1A 1D 1D 1F 1F 1F 13 17 !
00004520 22 24 22 1E 24 1C 1E 1F 1E FF DB 00 43 01 05 05 "$" $ ÿÛ C
00004530 05 07 06 07 0E 08 08 0E 1E 14 11 14 1E 1E 1E 1E
• Record header.
• ThumbnailcacheID.
• Image fileheader.
Windows 7 Thumbnail Cache
Thumbcache_32.db
Windows 7 Thumbnail Cache
Thumbcache_96.db
Windows 7 Thumbnail Cache
Thumbcache_256.db
Windows 7 Thumbnail Cache
Thumbcache_1024.db
Windows 7 Thumbnail Cache
Buffy-1C$UserstroylaPictures
Opening a shared folder using an icon view creates a thumbs.db file
in the shared folder.
Thumbs.db is independent of the user thumbnail caches on host
and client.
Existence of a thumbs.db file indicates a folder was remotely
accessed.
Windows 7 Thumbnail Cache
Note: Different UIDs
Windows 7 Thumbnail Cache
Internals: The venerable structured storage file format.
Windows 7 Thumbnail Cache
Internals: The venerable structured storage file format.
Questions?

Contenu connexe

Tendances

Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
Conferencias FIST
 
Advances in File Carving
Advances in File CarvingAdvances in File Carving
Advances in File Carving
Rob Zirnstein
 

Tendances (20)

글로벌 고객 사례를 통하여 소개하는 혁신적인 데이터 웨어하우스 - 김형일 (AWS 솔루션즈 아키텍트)
글로벌 고객 사례를 통하여 소개하는 혁신적인 데이터 웨어하우스 - 김형일 (AWS 솔루션즈 아키텍트)글로벌 고객 사례를 통하여 소개하는 혁신적인 데이터 웨어하우스 - 김형일 (AWS 솔루션즈 아키텍트)
글로벌 고객 사례를 통하여 소개하는 혁신적인 데이터 웨어하우스 - 김형일 (AWS 솔루션즈 아키텍트)
 
AWS Black Belt Online Seminar 2016 Amazon VPC
AWS Black Belt Online Seminar 2016 Amazon VPCAWS Black Belt Online Seminar 2016 Amazon VPC
AWS Black Belt Online Seminar 2016 Amazon VPC
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
Event Viewer
Event ViewerEvent Viewer
Event Viewer
 
20150925171021015 9 2015년분류체계
20150925171021015 9 2015년분류체계20150925171021015 9 2015년분류체계
20150925171021015 9 2015년분류체계
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Advances in File Carving
Advances in File CarvingAdvances in File Carving
Advances in File Carving
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
 
イマドキの現場で使えるJavaライブラリ事情
イマドキの現場で使えるJavaライブラリ事情イマドキの現場で使えるJavaライブラリ事情
イマドキの現場で使えるJavaライブラリ事情
 
AWS Lambda@Edge でできること!
AWS Lambda@Edge でできること!AWS Lambda@Edge でできること!
AWS Lambda@Edge でできること!
 
データ活用を加速するAWS分析サービスのご紹介
データ活用を加速するAWS分析サービスのご紹介データ活用を加速するAWS分析サービスのご紹介
データ活用を加速するAWS分析サービスのご紹介
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
Preprocessing of Web Log Data for Web Usage Mining
Preprocessing of Web Log Data for Web Usage MiningPreprocessing of Web Log Data for Web Usage Mining
Preprocessing of Web Log Data for Web Usage Mining
 
성능 최대화를 위한 CloudFront 설정 Best Practice
성능 최대화를 위한 CloudFront 설정 Best Practice성능 최대화를 위한 CloudFront 설정 Best Practice
성능 최대화를 위한 CloudFront 설정 Best Practice
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
DNS DDoS mitigation using Amazon Route 53 and AWS Shield
DNS DDoS mitigation using Amazon Route 53 and AWS ShieldDNS DDoS mitigation using Amazon Route 53 and AWS Shield
DNS DDoS mitigation using Amazon Route 53 and AWS Shield
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 

En vedette

Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registry
Chandra Pr. Singh
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
somutripathi
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 

En vedette (20)

Thumbnail Summarization Techniques For Web Archives
Thumbnail Summarization Techniques For Web ArchivesThumbnail Summarization Techniques For Web Archives
Thumbnail Summarization Techniques For Web Archives
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
File carving tools
File carving toolsFile carving tools
File carving tools
 
Raidprep
RaidprepRaidprep
Raidprep
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
Accessioning-Based Metadata Extraction and Iterative Processing: Notes From t...
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 
www.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registrywww.indonezia.net Hacking Windows Registry
www.indonezia.net Hacking Windows Registry
 
Installation of Joomla on Windows XP
Installation of Joomla on Windows XPInstallation of Joomla on Windows XP
Installation of Joomla on Windows XP
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
Netcat cheat sheet
Netcat cheat sheetNetcat cheat sheet
Netcat cheat sheet
 

Similaire à Windows 7 forensics thumbnail-dtl-r4

SANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysis
mooyix
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
Quek Lilian
 
Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...
pycontw
 
How to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezHow to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew Suarez
Shakacon
 
Building OpenDNS Stats
Building OpenDNS StatsBuilding OpenDNS Stats
Building OpenDNS Stats
George Ang
 

Similaire à Windows 7 forensics thumbnail-dtl-r4 (20)

Debugging TV Frame 0x16
Debugging TV Frame 0x16Debugging TV Frame 0x16
Debugging TV Frame 0x16
 
SANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry AnalysisSANS Forensics 2009 - Memory Forensics and Registry Analysis
SANS Forensics 2009 - Memory Forensics and Registry Analysis
 
Windows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R BarriosWindows7 Overview_MVP Jay R Barrios
Windows7 Overview_MVP Jay R Barrios
 
Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...Panoramic Video in Environmental Monitoring Software Development and Applica...
Panoramic Video in Environmental Monitoring Software Development and Applica...
 
ambil aja
ambil aja ambil aja
ambil aja
 
nullcon 2011 - Memory analysis – Looking into the eye of the bits
nullcon 2011 - Memory analysis – Looking into the eye of the bitsnullcon 2011 - Memory analysis – Looking into the eye of the bits
nullcon 2011 - Memory analysis – Looking into the eye of the bits
 
Nsd, il tuo compagno di viaggio quando Domino va in crash
Nsd, il tuo compagno di viaggio quando Domino va in crashNsd, il tuo compagno di viaggio quando Domino va in crash
Nsd, il tuo compagno di viaggio quando Domino va in crash
 
How to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezHow to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew Suarez
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
Building OpenDNS Stats
Building OpenDNS StatsBuilding OpenDNS Stats
Building OpenDNS Stats
 
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
44CON 2013 - Browser bug hunting - Memoirs of a last man standing - Atte Kett...
 
Stellar Drive ToolBox2
Stellar Drive ToolBox2Stellar Drive ToolBox2
Stellar Drive ToolBox2
 
Backups
BackupsBackups
Backups
 
Cucu video log
Cucu video logCucu video log
Cucu video log
 
smartdc by Ruby
smartdc by Rubysmartdc by Ruby
smartdc by Ruby
 
Debugging TV Frame 0x12
Debugging TV Frame 0x12Debugging TV Frame 0x12
Debugging TV Frame 0x12
 
MUS2020 - Putting Together the RDPieces
MUS2020 - Putting Together the RDPiecesMUS2020 - Putting Together the RDPieces
MUS2020 - Putting Together the RDPieces
 
Debugging TV Frame 0x34
Debugging TV Frame 0x34Debugging TV Frame 0x34
Debugging TV Frame 0x34
 
MySQL Monitoring 101
MySQL Monitoring 101MySQL Monitoring 101
MySQL Monitoring 101
 
MeetBSD2014 Performance Analysis
MeetBSD2014 Performance AnalysisMeetBSD2014 Performance Analysis
MeetBSD2014 Performance Analysis
 

Plus de CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
CTIN
 
M Compevid
M CompevidM Compevid
M Compevid
CTIN
 
L Scope
L ScopeL Scope
L Scope
CTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
CTIN
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
CTIN
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic Investigations
CTIN
 
K Ai
K AiK Ai
K Ai
CTIN
 

Plus de CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Networking Overview
Networking OverviewNetworking Overview
Networking Overview
 
M Compevid
M CompevidM Compevid
M Compevid
 
L Scope
L ScopeL Scope
L Scope
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Law Enforcement Role In Computing
Law Enforcement Role In ComputingLaw Enforcement Role In Computing
Law Enforcement Role In Computing
 
Level1 Part7 Basic Investigations
Level1 Part7 Basic InvestigationsLevel1 Part7 Basic Investigations
Level1 Part7 Basic Investigations
 
K Ai
K AiK Ai
K Ai
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Windows 7 forensics thumbnail-dtl-r4

  • 1. Windows 7 Thumbnail Cache Troy Larson Principal Forensics Program Manager TWC Network Security Investigations NSINV-R3– Research|Readiness|Response
  • 2. Windows 7 Thumbnail Cache Thumbnail cache: • Supplies the thumbnails shown in Explorer, etc. • File based: – Thumbcache_* • Local – Thumbs.db • Remote
  • 3. Windows 7 Thumbnail Cache • Created automatically when folders opened in Explorer in Icon view. • Thumbnail cache files retain thumbnail images long after the source file has been deleted. • Thumbs.db indicates a folder that has been shared. Content of Folder Content of Thumbcache_256.db
  • 4. Windows 7 Thumbnail Cache • Thumbnail cache files are likely to be worth investigating when: – There is a concern about illicit images. – There is a concern that graphic files have been deleted. • Comprehensive review of Thumbnail cache files can be efficiently performed. – Number of tools scan and present the contents of thumbcache and thumbs.db files, but some tools only work on certain versions of Windows.
  • 5. Windows 7 Thumbnail Cache What is a thumbnail? • It is an image that is used to represent an item. – Picture or graphical items. – But also, other files with images. • Distinguished from a mere icon: – Thumbnails are per item, rather than type, and – Dynamically generated, based on item content. – Stored separate from icon caches.
  • 6. Windows 7 Thumbnail Cache Per account, local based, thumbnail caches are found at C:Users[Profile]AppDataLocalMicrosoftWindowsExplorer.
  • 7. Windows 7 Thumbnail Cache The local, account specific, thumbnail cache consists of an index and 4 data files. • Thumbcache_.idx—Index of which data files cache each image. • Image cache files: – Based on thumbnail size. • thumbcache_32.db, bitmap based, 32x32. • thumbcache_96.db, bitmap based, 96x96. • thumbcache_256.db, JPEG based, 256x256. • thumbcache_1024.db, JPEG based, special instances. – New thumbnails usually appended to a thumbcache file.
  • 8. Windows 7 Thumbnail Cache C:UserstroylaPictures atomic-explosion.jpg Chrysanthemum.jpg Desert.jpg ThumbnailCacheIds • 0x81A9D28BFA8E4E59 • 0xEE0CAA5E28390724 • 0xDF17189B15C5C9CD thumbcache_idx.db thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db ThumbnailcacheID used to lookup thumbnail address in the Thumbcache_idx Thumbcache_idx provides offsets to thumbcache_*.db Thumbcache_*.db provides thumbnails to Explorer. 1 2 3
  • 9. Windows 7 Thumbnail Cache Thumbcache information does not point to any file. • File information—ThumbnailcacheID—is used to find thumbnail from the original file. • No file name or path information in the thumbcache* files. thumbcache_32.db thumbcache_96.db thumbcache_256.db thumbcache_1024.db C:UserstroylaPictures atomic-explosion.jpg Chrysanthemum.jpg Desert.jpg
  • 10. Windows 7 Thumbnail Cache Most Windows 7 thumbnail cache viewers display the thumbnail and the ThumbnailcacheID. 0xEE0CAA5E28390724 http://www.thumbnailexpert.com/
  • 11. Windows 7 Thumbnail Cache Linking a thumbcache file thumbnail to its source: • The Windows Search index maintains both path and ThumbnailcacheID, and can be used to link thumbnail to source. 0xEE0CAA5E28390724
  • 12. Windows 7 Thumbnail Cache • File header. • Record header. • ThumbnailcacheID. • Image fileheader. Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F 00000000 43 4D 4D 4D 15 00 00 00 01 00 00 00 18 00 00 00 CMMM 00000010 E0 E6 1C 00 3A 00 00 00 43 4D 4D 4D 88 6C 00 00 àæ : CMMMˆl 00000020 24 07 39 28 5E AA 0C EE 20 00 00 00 02 00 00 00 $ 9(^ª î 00000030 36 6C 00 00 00 00 00 00 47 07 D9 39 67 BF AF D5 6l G Ù9g¿¯Õ 00000040 EE B6 79 3E E2 C4 B8 56 65 00 65 00 30 00 63 00 î¶y>âĸV e e 0 c 00000050 61 00 61 00 35 00 65 00 32 00 38 00 33 00 39 00 a a 5 e 2 8 3 9 00000060 30 00 37 00 32 00 34 00 00 00 42 4D 36 6C 00 00 0 7 2 4 BM6l 00000070 00 00 00 00 36 00 00 00 28 00 00 00 60 00 00 00 6 ( ` 00000080 48 00 00 00 01 00 20 00 00 00 00 00 00 00 00 00 H 00000090 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 000000A0 0A 10 C3 FF 14 40 E3 FF 1C 6B FA FF 1B 78 FC FF Ãÿ @ãÿ kúÿ xüÿ 000000B0 18 7A FE FF 05 63 F9 FF 05 47 EE FF 02 3A E5 FF zþÿ cùÿ Gîÿ :åÿ
  • 13. Windows 7 Thumbnail Cache Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F 00004460 32 31 E0 63 15 05 8C 6C D2 96 8B 70 21 B2 08 ED 21àc ŒlÒ–‹p!² í 00004470 58 57 84 6B C6 F7 B1 B5 2A 72 A6 94 13 D0 FF D9 XW„kÆ÷±µ*r¦” ÐÿÙ 00004480 43 4D 4D 4D D3 2E 00 00 CD C9 C5 15 9B 18 17 DF CMMMÓ. ÍÉÅ › ß 00004490 20 00 00 00 00 00 00 00 83 2E 00 00 00 00 00 00 ƒ. 000044A0 47 A2 78 FB FC F1 96 88 11 0B DF E7 10 20 64 B8 G¢xûüñ–ˆ ßç d¸ 000044B0 64 00 66 00 31 00 37 00 31 00 38 00 39 00 62 00 d f 1 7 1 8 9 b 000044C0 31 00 35 00 63 00 35 00 63 00 39 00 63 00 64 00 1 5 c 5 c 9 c d 000044D0 FF D8 FF E0 00 10 4A 46 49 46 00 01 01 01 00 00 ÿØÿà JFIF 000044E0 00 00 00 00 FF DB 00 43 00 05 03 04 04 04 03 05 ÿÛ C 000044F0 04 04 04 05 05 05 06 07 0C 08 07 07 07 07 0F 0B 00004500 0B 09 0C 11 0F 12 12 11 0F 11 11 13 16 1C 17 13 00004510 14 1A 15 11 11 18 21 18 1A 1D 1D 1F 1F 1F 13 17 ! 00004520 22 24 22 1E 24 1C 1E 1F 1E FF DB 00 43 01 05 05 "$" $ ÿÛ C 00004530 05 07 06 07 0E 08 08 0E 1E 14 11 14 1E 1E 1E 1E • Record header. • ThumbnailcacheID. • Image fileheader.
  • 14. Windows 7 Thumbnail Cache Thumbcache_32.db
  • 15. Windows 7 Thumbnail Cache Thumbcache_96.db
  • 16. Windows 7 Thumbnail Cache Thumbcache_256.db
  • 17. Windows 7 Thumbnail Cache Thumbcache_1024.db
  • 18. Windows 7 Thumbnail Cache Buffy-1C$UserstroylaPictures Opening a shared folder using an icon view creates a thumbs.db file in the shared folder. Thumbs.db is independent of the user thumbnail caches on host and client. Existence of a thumbs.db file indicates a folder was remotely accessed.
  • 19. Windows 7 Thumbnail Cache Note: Different UIDs
  • 20. Windows 7 Thumbnail Cache Internals: The venerable structured storage file format.
  • 21. Windows 7 Thumbnail Cache Internals: The venerable structured storage file format.