Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
The introduction of Jumplists in Windows 7 was an important feature from a forensic examiners viewpoint. Jumplist configuration files can provide the examiner with a wealth of information relating to file access and in particular: dates/times, Volume GUIDs and unique file object IDs relating to those files. Some of the information in the Jumplist could be used to build a more precise timeline relating to system and file usage. In this article, we analyse the structure of a Jumplist configuration file and in particular a record from a Jumplist configuration file and highlight some of the important entries therein.
References
Andersson, A., & Ottmann, T. (1991). Faster uniquely represented dictionaries. Paper presented at the Foundations of Computer Science.
Brönnimann, H., Cazals, F., & Durand, M. (2003). Randomized Jumplists: A Jump-and-Walk Dictionary Data Structure Lecture Notes in Computer Science, 2607/2003, 283-294.
Hedgehog. (2011). JumpList Launcher. Retrieved 18 April 2011, from http://en.www.ali.dj/jumplist-launcher/ MSDN. (2011a). Taskbar Extensions. Retrieved 18 April 2011, from http://msdn.microsoft.com/de-de/library/dd378460(vs.85).aspx#jump_lists
MSDN. (2011b). SHAddToRecentDocs Function. Retrieved 12 April 2011, from http://msdn.microsoft.com/en-us/library/bb762105(v=vs.85).aspx
Ottman, T. (1991). Trees — a personal view Lecture Notes in Computer Science, 555/1991, 243-255.
Regdat. (2011). Jumplist Backup Restore. Retrieved 12 April 2011, from http://www.regdat.com/
Smulikowski, P. (2009). First Look at the Windows 7 Forensics - Forensic implications of the new Windows 7. University of Strathclyde, Strathclyde.
Wilson, C. (2005). Volume Serial Numbers and Format Date/Time Verification. Retrieved 18 April 2011, from http://www.digitaldetective.co.uk/documents/Volume%20Serial%20Numbers.pdf
Recommended Citation
Lallie, Harjinder S. and Bains, Parmjit S.
(2012)
"An Overview of the Jumplist Configuration File in Windows 7,"
Journal of Digital Forensics, Security and Law: Vol. 7
, Article 2.
DOI: https://doi.org/10.15394/jdfsl.2012.1110
Available at:
https://commons.erau.edu/jdfsl/vol7/iss1/2
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons