{
    "componentChunkName": "component---src-templates-blog-post-js",
    "path": "/Timeline_Analysis_using_UsnJrnl",
    "result": {"data":{"markdownRemark":{"id":"1ea4a452-ffb7-5660-aee0-15bdd251ec7f","html":"<p>According to Locard's Exchange Principle, every interaction leaves a trace, a concept that applies equally well in digital forensics. In this field, timeline analysis plays a vital role in identifying a user's past activities. It can reconstruct the sequence of events on a machine, revealing what occurred and the actions taken, which is invaluable for tracking an adversary's presence within a system.</p>\n<h2>So now what is Time Analysis?</h2>\n<p>Timeline Analysis is a technique used in Digital Forensics or Incident Response with the help of a tool that provides insight into activities performed on a machine. It compiles and organizes various artifacts—such as registry entries, program executions, file system changes, file downloads, browser history, and other operating system artifacts—into a time-ordered sequence. This chronological arrangement of data enables investigators to trace user activities and understand the events that transpired in the system.</p>\n<p>Timeline Analysis helps identify adversaries' footprints, detect the use of anti-forensic tools, and uncover other activities that occurred during an incident. This technique provides you very wealth of information at the same time timeline analysis is cumbersome as results will provide you with a lot of noise (System File Artifacts, Event Logs, etc) so it is the task of the investigator to remove system noise from the timeline results.</p>\n<p><strong>So in this post, we are going to cover basic timeline analysis techniques using $USNJrnl Artifacts with the help of a fictional case study.</strong></p>\n<h3>What is USNJrnl?</h3>\n<blockquote>\n<p>“The USN Journal (Update Sequence Number Journal), or Change Journal,[1] is a feature of the Windows NT file system (NTFS) which maintains a record of changes made to the volume.”</p>\n<p>- Wikipedia</p>\n</blockquote>\n<p>It is a high-level summary of changes to files and directories, along with codes indicating the types of changes, is recorded. This information is also used by the Windows Backup Application to identify recently modified files and determine which files need to be backed up.</p>\n<p>USNJrnl Reason code will help the investigator analyze so one must be aware of this below-mentioned reason code to analyze the timeline activity using USNJrnl</p>\n<p>USNJrnl Location: $Extend$UsnJrnl</p>\n<p>Reason Code: <a href=\"https://learn.microsoft.com/en-us/windows/win32/api/winioctl/ns-winioctl-usn_record_v3\">https://learn.microsoft.com/en-us/windows/win32/api/winioctl/ns-winioctl-usn_record_v3</a></p>\n<p><strong>Case Study:</strong></p>\n<p>LEA have detained Hacker committed computer hacking and identity theft violations in conjunction with the theft and release of personally identifiable information (PII) of Government service members and federal employees. As alleged in the criminal complaint, also known by his hacking moniker “Jinmori,” is believed to be the leader of an internet hacking group called Elite Hunters Group.</p>\n<p>As per intelligence arrested person was working on Malware that Targets SCADA which was programmable logic controllers (PLCs) and he used Living off the Land Wipers to wipe the  traces of Malware before arrest.</p>\n<p>Now I'm going to use one of the best and my favourite tools by Eric Zimmerman.</p>\n<p><strong>The tool used for the Analysis:</strong></p>\n<p><strong>FTK Imager:</strong> It is used to extract the $USNJrnl from the file system</p>\n<p><strong>PECMD by Eric Zimmerman -</strong> prefetch parser (You can refer my previous post on prefetch for more details)</p>\n<p><strong>MFTECmd</strong> is also capable of parsing the $J, $Boot and $LogFile</p>\n<p><strong>Timeline Explorer -</strong> To Analyze the extracted Journal File.</p>\n<p>Here is below procedure to analyze prefetch artifacts for more details on <a href=\"https://4n6shetty.in/How-Windows-Artifact-Prefetch-Can-Help-in-Digital-Forensics-Investigations-in-Windows-11-Machine\">prefetch you can refer my previous article</a></p>\n<p><figure class=\"gatsby-resp-image-figure\" style=\"\">\n    <span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 1024px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 36.32812499999999%; position: relative; bottom: 0; left: 0; background-image: url('data:image/svg+xml,%3csvg%20xmlns=\\'http://www.w3.org/2000/svg\\'%20width=\\'400\\'%20height=\\'145\\'%20viewBox=\\'0%200%20400%20145\\'%20preserveAspectRatio=\\'none\\'%3e%3cpath%20d=\\'M12%2073v62h379V11H12v62m2%200v60h375V13H14v60m48-35c-20%2010-16%2042%207%2045%2011%201%2023-7%2026-17l1-5h49v2c0%207%209%2017%2017%2019%2013%203%2026-5%2029-17l1-3%2028-1h28l1%205c4%2013%2018%2020%2030%2016%208-3%2014-10%2016-18v-4h30c28%200%2029%200%2029%202%200%203%201%203%205%200s4-3%200-6-5-3-5%200c0%202-1%202-29%202h-30l-1-4c-6-24-37-24-45-1l-2%206h-55l-1-3c-4-19-24-26-38-14-4%203-8%2010-8%2014v2H96l-1-5c-4-14-19-21-33-15m205%2016l-2%202c1%202%205%202%204%200l2-1c2%200%203%202%201%203l-2%201%202%201%201%202c0%202-4%201-4-1-1-3-3-2-4%201s6%205%2011%203c2-1%203-4%201-5v-3c3-4-7-7-10-3m-104%200l-1%204c1%202%205%201%204-1%200-2%202-3%203-1l-3%205c-5%204-5%205%201%205%205%201%208-1%208-3l-2-1-4%201c-3%200-2-2%202-2%203-1%205-4%203-7h-11\\'%20fill=\\'%23d3d3d3\\'%20fill-rule=\\'evenodd\\'/%3e%3c/svg%3e'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"prefetch\"\n        title=\"Prefetch Extraction Analysis\"\n        src=\"/static/7a728eb864abcdd435ba5d63ac681235/2bef9/prefetch.png\"\n        srcset=\"/static/7a728eb864abcdd435ba5d63ac681235/6f3f2/prefetch.png 256w,\n/static/7a728eb864abcdd435ba5d63ac681235/01e7c/prefetch.png 512w,\n/static/7a728eb864abcdd435ba5d63ac681235/2bef9/prefetch.png 1024w,\n/static/7a728eb864abcdd435ba5d63ac681235/71c1d/prefetch.png 1536w,\n/static/7a728eb864abcdd435ba5d63ac681235/8cf85/prefetch.png 1685w\"\n        sizes=\"(max-width: 1024px) 100vw, 1024px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n        decoding=\"async\"\n      />\n    </span>\n    <figcaption class=\"gatsby-resp-image-figcaption\">Prefetch Extraction Analysis</figcaption>\n  </figure></p>\n<p>We can observe , the results fetched by the PECMD command for the SDELETE.EXE-A37B56B2.pf prefetch file concludes that SDelete has touched File's and Directory of the Stuxnet (Source Code Folder) within 10 seconds. SDelete application is Living off the Land Wipers which was used by user Jinmori to wipe Traces of Stuxnet Source Code.(i.e: SDelete has Wiped Stuxnet Source Code Folder which was saved in the Desktop)</p>\n<blockquote>\n<p><strong>Stuxnet</strong>, a <a href=\"https://www.britannica.com/technology/computer-worm\">computer worm</a>, discovered in June 2010, that was specifically written to take over certain programmable industrial control systems and cause the equipment run by those systems to malfunction, all the while feeding false <a href=\"https://www.britannica.com/dictionary/data\">data</a> to the systems monitors indicating the equipment to be running as intended.</p>\n<p>- britannica.com</p>\n</blockquote>\n<p><figure class=\"gatsby-resp-image-figure\" style=\"\">\n    <span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 1024px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 40.625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/svg+xml,%3csvg%20xmlns=\\'http://www.w3.org/2000/svg\\'%20width=\\'400\\'%20height=\\'162\\'%20viewBox=\\'0%200%20400%20162\\'%20preserveAspectRatio=\\'none\\'%3e%3cpath%20d=\\'M0%2081v79h396V2H0v79m73%2018h-3l-1%201a118%20118%200%200038%201c0%202%204%201%205-1h1l1%201h1l1%201h2c3-3-5-5-9-3h-1l-3-1-3%201h-7c-3-1-6-1-5%201h-1c-3-2-2-2-4%200h-2c0-2-6-2-10-1m-16%2022h-1l-1%201h-1l-1-1-1%201c0%202%202%202%2011%202l11-1h16c1%201%204%201%205-1h1l1%201h1l1%201h1c1%201%201%200%201-1l-1-2H75c-2-1-2-1-2%201h-1c-2-1-4-1-5%201l-1-1c0-2%200-2-2-1h-7m1%206h-3l-3%201c0%201%201%202%204%201h37l1%201c1-2%204-2%204-1l1%201%201-1%201-1%202-1-5-1-6%201H66l-4-1-4%201m-1%205h-1l-1%201h-1l-1-1-1%201c0%202%202%202%2011%202l11-1h16c1%201%204%201%205-1h1l1%201h1l1%201h1c1%201%201%200%201-1l-1-2H75c-2-1-2-1-2%201h-1c-2-1-4-1-5%201l-1-1c0-2%200-2-2-1h-7m0%2011h-1l-1%201h-2c-3%201%200%202%2010%202l11-1h16c1%201%204%201%205-1l-2-1H75c-2-1-2-1-2%201h-1c-2-1-4-1-5%201l-1-1c0-2%200-2-2-1h-7m-28%2011h-2l-2%201h-2c0%202%2011%203%2014%201h2l6%201%206-1h1a136%20136%200%200038%200h5c0-1%202-1%204%201h14l12-1h1c0%201%2032%202%2032%200h1c0%202%209%201%209%200l-2-2h-6c-2-1-3%200-3%201h-3c0%202-2%201-1%200%200-2-1-2-3%200h-2l-2-1h-3c-3-1-6-1-7%201h-1c0-1-3-2-4-1H91l-3-1c-5%202-6%202-6%201h-2l-3%201c-1-2-4-2-4%200h-2c-1-2-2-2-2-1l-1%201h-2c0-2%200-2-2-1h-8l-1%201h-1c-1-2-5-2-4%200h-1l-2-1H29\\'%20fill=\\'%23d3d3d3\\'%20fill-rule=\\'evenodd\\'/%3e%3c/svg%3e'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"prefetch1\"\n        title=\"Prefetch Results fetched by PECMD Tool\"\n        src=\"/static/ae1f867950bf8ab2166e8076d8675e1d/2bef9/prefetch1.png\"\n        srcset=\"/static/ae1f867950bf8ab2166e8076d8675e1d/6f3f2/prefetch1.png 256w,\n/static/ae1f867950bf8ab2166e8076d8675e1d/01e7c/prefetch1.png 512w,\n/static/ae1f867950bf8ab2166e8076d8675e1d/2bef9/prefetch1.png 1024w,\n/static/ae1f867950bf8ab2166e8076d8675e1d/71c1d/prefetch1.png 1536w,\n/static/ae1f867950bf8ab2166e8076d8675e1d/a878e/prefetch1.png 2048w,\n/static/ae1f867950bf8ab2166e8076d8675e1d/3c1d3/prefetch1.png 5970w\"\n        sizes=\"(max-width: 1024px) 100vw, 1024px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n        decoding=\"async\"\n      />\n    </span>\n    <figcaption class=\"gatsby-resp-image-figcaption\">Prefetch Results fetched by PECMD Tool</figcaption>\n  </figure></p>\n<p>Now we know wiper name, we can further use timeline analysis technique using <strong>USNJrnl.</strong> We follow below process to extract <strong>USNJrnl</strong> and analyze it using <strong>MFTECmd</strong>  and <strong>Timeline Explorer.</strong></p>\n<p><figure class=\"gatsby-resp-image-figure\" style=\"\">\n    <span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 1024px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 35.15625%; position: relative; bottom: 0; left: 0; background-image: url('data:image/svg+xml,%3csvg%20xmlns=\\'http://www.w3.org/2000/svg\\'%20width=\\'400\\'%20height=\\'141\\'%20viewBox=\\'0%200%20400%20141\\'%20preserveAspectRatio=\\'none\\'%3e%3cpath%20d=\\'M5%2069v63h386V6H5v63m2%200v61h382V8H7v61m52-37c-17%207-21%2028-9%2040%2013%2013%2035%206%2040-11l1-4%2024-1h25l1%203c3%2015%2017%2023%2031%2019%208-3%2016-13%2016-19%200-2%202-2%2029-2h29v4c3%2014%2022%2022%2035%2015%206-4%2011-10%2012-16v-4h31c29%200%2030%200%2030%202%200%203%201%202%205-1l3-2-4-3-3-3-1%202v3h-60l-2-6c-2-6-5-11-11-14-12-7-32%201-35%2014-1%208%202%207-30%207h-28v-3c0-7-8-17-16-19-14-5-28%203-31%2018l-1%203H91l-1-5c-4-13-19-21-31-17m7%2012l-2%201h-3v1l-1%201c-1-1-1-1%200%200l-1%201c-1-1-1-1%200%200l-1%201c-1-1-1-1%200%200l-1%201-1%201v7c1-1%201-1%201%201v1l1%201v1h1v1h1v1h1v1h3l2%201%201%201v-1l2-1h4l1-1c-1-1-1-1%200%200l1-1c-1-1-1-1%200%200l1-1v-1l1-1v-1l1-4-1-4v-1l-1-1v-1h-1v-1l-1-1h-2v-1l-2-1h-2l-1-1-1%201m202%200h-2l-2%201v1c-1-1-1-1%200%200l-1%201h-2l-1%201v3l-1%201v6l1%202c1%202%202%204%203%203l1%201v1h6l6-1v-1h1l1-1c-1-1-1-1%200%200l1-1v-1l1-5-1-5v-1h-1v-1h-1v-1h-1v-1l-1-1h-3l-2-1-1-1-1%201m-109%202h-1v1l-1%201c-1-1-1-1%200%200l-1%201h-1l-1%206v6l1%201h1c0%201%205%204%209%204h3l1-1h2l1-1v-1h1c-1-1%201-5%202-5v-7l-1-1c-1%201-1%201%200%200l-1-1-1-1c-1-2-1-2-8-2h-5m106%203c-3%202-2%205%201%205%202-1%205%202%205%204-2%202-5%201-4-1%200-2%200-2-2-2l-2%202c0%204%206%206%2011%204%202-1%203-4%201-5v-3c3-4-6-8-10-4m-105%200c-2%201-3%205-1%206%201%200%204-2%203-3l1-1c3%200%202%203-1%204-3%202-4%204-4%206s12%201%2012-1c2-2%201-3-3-2h-3l3-2c4-2%205-4%202-6-1-2-7-2-9-1\\'%20fill=\\'%23d3d3d3\\'%20fill-rule=\\'evenodd\\'/%3e%3c/svg%3e'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"usn\"\n        title=\"USNJrnl Analysis Process\"\n        src=\"/static/b2fcd1b711a9ce06389cc3fcf579ab38/2bef9/usn.png\"\n        srcset=\"/static/b2fcd1b711a9ce06389cc3fcf579ab38/6f3f2/usn.png 256w,\n/static/b2fcd1b711a9ce06389cc3fcf579ab38/01e7c/usn.png 512w,\n/static/b2fcd1b711a9ce06389cc3fcf579ab38/2bef9/usn.png 1024w,\n/static/b2fcd1b711a9ce06389cc3fcf579ab38/71c1d/usn.png 1536w,\n/static/b2fcd1b711a9ce06389cc3fcf579ab38/81315/usn.png 1656w\"\n        sizes=\"(max-width: 1024px) 100vw, 1024px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n        decoding=\"async\"\n      />\n    </span>\n    <figcaption class=\"gatsby-resp-image-figcaption\">USNJrnl Analysis Process</figcaption>\n  </figure></p>\n<p>We can observe from below figure MFT Entry which is assigned for the Stuxnet Source Code Folder is subjected to the renaming mentioned in the update reasons of the USNJRNL entries with successive alphabetic character naming scheme as mentioned in official Microsoft Page. This concludes the usage of the SDelete Tool to wipe the Source Code Folder of Stuxnet.</p>\n<blockquote>\n<p>To overwrite file names of a file that you delete, SDelete renames the file 26 times, each time replacing each character of the file's name with a successive alphabetic character. For instance, the first rename of \"foo.txt\" would be to \"AAA.AAA\".</p>\n<p><a href=\"https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete\">-Microsoft</a></p>\n</blockquote>\n<p><figure class=\"gatsby-resp-image-figure\" style=\"\">\n    <span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 1024px; \"\n    >\n      <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 56.25%; position: relative; bottom: 0; left: 0; background-image: url('data:image/svg+xml,%3csvg%20xmlns=\\'http://www.w3.org/2000/svg\\'%20width=\\'400\\'%20height=\\'225\\'%20viewBox=\\'0%200%20400%20225\\'%20preserveAspectRatio=\\'none\\'%3e%3cpath%20d=\\'M264%2049l-9%201-10%201%2017%201a134%20134%200%200119%200h4l4-1c0-1-9-3-10-2l-6%201h-7c0%201-1%201-1-1h-1m15%207l-17%201-17%201%2017%201%2027-1c0-1-9-3-10-2m-131%201l-7%201a1902%201902%200%200197-1h-90m6%208a912%20912%200%200079-1h-7l-1%201-2-1-2%201-1-1h-12l-1%201c-1-2-4-2-4-1h-9c0-1-3-1-4%201l-1-1h-12l-1%201-2-1-2%201-1-1h-8c0-1-3-1-4%201l-1-1c0-1-4-1-4%201m0%207c-1%201-6%201%2044%201%2039%200%2042%200%2041-1l-3-1h-10l-1%201c-1-2-4-2-4-1h-26l-1%201-2-1-2%201-1-1h-12l-1%201c-1-2-4-2-4-1h-13l-1%201c-1-2-4-2-4%200m-1%206l-2%201c0%201%2010%202%2045%202%2041%200%2045%200%2043-2a1524%201524%200%2000-86-1m0%207v1l-1%201c-2-2-11-2-11%200l50%201c47%200%2050%200%2048-2l-44-1h-42m-10%208l-2%201a700%20700%200%200097-1l-42-1a304%20304%200%2000-53%201m8%2028l-7%201h-3c0%202%207%202%209%201h1a543%20543%200%200088-1%20982%20982%200%2000-88-1m2%207v1l-1%201c-2-2-11-2-11%200l50%201c48%200%2050%200%2048-2l-43-1h-43m-12%209l50%201c45%200%2050%200%2048-1a674%20674%200%2000-98%200m12%2050l44%201a913%20913%200%200041-2%20597%20597%200%2000-85%201m1%2013h-7l-6%201c0%202%202%202%209%201h3a1555%201555%200%200084-2l-1-1-1%201h-81m-3%207h-7l-3%201c0%202%207%202%209%201h1a625%20625%200%200088-1c-1-1-77-2-88-1m4%207l-2%201-1%201a428%20428%200%200039%201c40%200%2049-1%2048-2s-74-2-84-1m-14%209l50%201c40%200%2049-1%2048-2a746%20746%200%2000-98%201\\'%20fill=\\'%23d3d3d3\\'%20fill-rule=\\'evenodd\\'/%3e%3c/svg%3e'); background-size: cover; display: block;\"\n  ></span>\n  <img\n        class=\"gatsby-resp-image-image\"\n        alt=\"copy of anti forensics by manjesh dsci 2 \"\n        title=\"USNJrnl Results using Timeline Explorer\"\n        src=\"/static/367cf01f9011e6f8924a9a3aa1b0e253/2bef9/copy-of-anti-forensics-by-manjesh-dsci-2-.png\"\n        srcset=\"/static/367cf01f9011e6f8924a9a3aa1b0e253/6f3f2/copy-of-anti-forensics-by-manjesh-dsci-2-.png 256w,\n/static/367cf01f9011e6f8924a9a3aa1b0e253/01e7c/copy-of-anti-forensics-by-manjesh-dsci-2-.png 512w,\n/static/367cf01f9011e6f8924a9a3aa1b0e253/2bef9/copy-of-anti-forensics-by-manjesh-dsci-2-.png 1024w,\n/static/367cf01f9011e6f8924a9a3aa1b0e253/71c1d/copy-of-anti-forensics-by-manjesh-dsci-2-.png 1536w,\n/static/367cf01f9011e6f8924a9a3aa1b0e253/a878e/copy-of-anti-forensics-by-manjesh-dsci-2-.png 2048w,\n/static/367cf01f9011e6f8924a9a3aa1b0e253/dc232/copy-of-anti-forensics-by-manjesh-dsci-2-.png 6000w\"\n        sizes=\"(max-width: 1024px) 100vw, 1024px\"\n        style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n        loading=\"lazy\"\n        decoding=\"async\"\n      />\n    </span>\n    <figcaption class=\"gatsby-resp-image-figcaption\">USNJrnl Results using Timeline Explorer</figcaption>\n  </figure></p>\n<p>Using timeline analysis with USNJrnl, we were able to prove that the Sdelete application was used to wipe the Stuxnet source code. This is a brief example of how timeline analysis can aid forensic experts in identifying patterns of the perpetrators.</p>\n<p><strong>In the future, we'll explore more on timeline analysis and delve into supertimeline concepts.</strong></p>","excerpt":"According to Locard's Exchange Principle, every interaction leaves a trace, a concept that applies equally well in digital forensics. In this field…","frontmatter":{"date":"August 19, 2024","slug":"/Timeline_Analysis_using_UsnJrnl","title":"Timeline Analysis using $UsnJrnl (Living off the land Wipers - Stuxnet Casestudy)","description":"This blog is dedicated to law enforcement agencies (LEA) and focuses on timeline analysis using USNJrnl with Eric Zimmerman's tools. It includes a case study where a living-off-the-land wiper was used to erase malware.ddet, uncovering the wiper's patterns.","featuredImage":{"childImageSharp":{"gatsbyImageData":{"layout":"fullWidth","backgroundColor":"#080808","images":{"fallback":{"src":"/static/b7105a7f9b788c5b09977b889b9a6ba0/afa5c/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.png","srcSet":"/static/b7105a7f9b788c5b09977b889b9a6ba0/0dee1/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.png 750w,\n/static/b7105a7f9b788c5b09977b889b9a6ba0/8beaa/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.png 1080w,\n/static/b7105a7f9b788c5b09977b889b9a6ba0/d079a/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.png 1366w,\n/static/b7105a7f9b788c5b09977b889b9a6ba0/afa5c/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.png 1920w","sizes":"100vw"},"sources":[{"srcSet":"/static/b7105a7f9b788c5b09977b889b9a6ba0/a66aa/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.webp 750w,\n/static/b7105a7f9b788c5b09977b889b9a6ba0/65dd5/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.webp 1080w,\n/static/b7105a7f9b788c5b09977b889b9a6ba0/4fad6/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.webp 1366w,\n/static/b7105a7f9b788c5b09977b889b9a6ba0/c512e/timeline-analysis-using-usnjrnl-living-off-the-land-wipers-stuxnet-casestudy-.webp 1920w","type":"image/webp","sizes":"100vw"}]},"width":1,"height":0.5625}}}}}},"pageContext":{"id":"1ea4a452-ffb7-5660-aee0-15bdd251ec7f","previous":{"id":"68f022ee-3390-5c2f-b713-debd47df9843","frontmatter":{"slug":"/How-Windows-Artifact-Prefetch-Can-Help-in-Digital-Forensics-Investigations-in-Windows-11-Machine","template":"blog-post","title":"Uncovering Hidden Clues: How Windows  Artifact Prefetch Can Help in Digital Forensics Investigations in Windows 11 Machine"}},"next":{"id":"851abebc-cf90-596f-8e7b-53d94ebf92d3","frontmatter":{"slug":"/Memory-Forensics-with-Volatility-3-Recovering-Monero-Wallet-Addresses-from-Tor-in-Dark-Web-Investigations","template":"blog-post","title":"Memory Forensics with Volatility 3: Recovering Monero Wallet Addresses from Tor in Dark Web Investigations"}}}},
    "staticQueryHashes": ["228695001","2744905544","358227665"]}