Shellbags
ShellBags contain information about folders and network shares - but not files or sub directories access. This excludes ZIP folders that are opened directly through Windows Explorer
as they are stored as folders (including their recursive files).
Entries are also generated by accessing Control Panel
. Good to detect possible Windows Firewall
(Control Panel\All Control Panel Items\Windows Defender Firewall\Customize Settings
) or Credential Manager
(Control Panel\User Accounts\Credential Manager
) operations.
Shellbags can be used for confirming access to tied to a specific user. Shellbag entries also keep deleted files so can be used for historical information also. The following forensic interests can be found:
Target name and Absolute path
the Target
Modified, Access and Created (MAC) timestamps (UTC)
.each entry in
ShellBags
BagMRU
maintain aMRUListEx
list, which records the order in which the sub targets of a target were accessed (the last sub target accessed having aMRU position
of 0).
Files:
Registry keys:
Each Shellbag
BagMRU
registry key also contains a MRUListEx
value, that maintains the entries visited order, i.e the order in which the sub targets of a target were accessed (the last sub target accessed having a MRU position
of 0).
For example, My Computer
will be associated with the topmost BagMRU
key, C:
to BagMRU\0
if it was access first, C:\Users
to BagMRU\0\2
if it was accessed third, and so on and so forth. A hierarchical view of the Shellbag
entries can thus be established.
Parse:
Last updated