ShellFolders
Overview
Evidence: ShellFolders Description: Enumerate ShellFolders Category: System Platform: windows Short Name: shelldirs Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Background
Windows Shell Folders are special directories that have specific purposes in the operating system (e.g., Desktop, Documents, Start Menu, AppData). Windows stores the configured paths for these folders in the registry, and users or applications can customize these locations.
Tracking these paths is important for forensic analysis because evidence artifacts may be in non-default locations if users have redirected their shell folders.
Data Collected
This collector gathers structured data about shellfolders.
ShellFolders Data
Folder
Shell folder name
Personal
Path
Configured folder path
C:\Users\user\Documents
Username
User account name
user
KeyPath
Registry key path
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
LastWriteTime
Registry key last write time
2023-10-15T14:30:00
RegPath
Path to registry hive
Registry/ntuser.dat
Collection Method
This collector:
Collects user registry hives (ntuser.dat)
Searches for shell folder keys:
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell FoldersSoftware\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Enumerates all folder name-path pairs
Records configured paths for each shell folder
Common shell folders include: Desktop, Personal (Documents), AppData, Start Menu, Favorites, SendTo, Recent, Startup, and many others.
Forensic Value
Shell folder paths are essential for locating user artifacts in correct locations. Investigators use this data to identify custom artifact locations (non-default), track folder redirection policies, locate user data on network shares, find redirected AppData or Desktop locations, and understand user profile configuration.
Last updated
Was this helpful?

