

The identification of files which no longer exist on a local machine. The user knowledge of specific files opened whether those files were stored on the local system, attached removable devices, or network storage. The information contained in LNK files are invaluable to forensic analysts in investigating user file activity (FOR500 Windows Forensic Analysis Textbook, Volume 3 Core Windows Forensics II: USB Devices and Shell Items 2018, 13) including:Ī USB investigation to identify files opened from a specific removable USB device but never saved locally to the system. Windows generated LNK files are stored in the folder C:\Users\\AppData\Roaming\Microsoft\Windows\Recent. LNK files are user profile specific in that LNK files are recorded per user on the system. Whether the target is stored on a local or remote system.
Windows 10 directory list save serial#
The system name, volume name, volume serial number, and sometimes the MAC address of the system where the target is stored. The Attributes associated with the target file (i.e. Timestamps for both the target file and the LNK file itself. The original file system path where the target file is stored. Some of these pieces of information include: Within a LNK file, Windows records several pieces of information about the target file of which the LNK file is designed to access (13Cubed 2017). Windows creates these LNK files on a frequent basis and their creation is performed in the background without the explicit knowledge of the user. In addition to user created LNK files, the Windows operating system automatically creates LNK files when a user opens a non-executable file or document. Shortcut files are most often referred to as Link files by forensic analysts based on their. A shortcut file is a small file which has information used to access or point to another file (Lee, FOR500 Windows Forensic Analysis Textbook, Volume 3 Core Windows Forensics II: USB Devices and Shell Items 2018, 8). Windows users can create shortcut files on the systems they use.

Since Windows 7, Jump Lists and LNK Files have been a valuable source for computer user activity to forensic investigators. Tools: Magnet Forensics AXIOM version 4.7
