Skip to content

Latest commit

 

History

History
31 lines (22 loc) · 1.59 KB

detectionhistory.md

File metadata and controls

31 lines (22 loc) · 1.59 KB

Windows Defender Detection History Files

Detection history files are an artifact present on endpoints with Windows Defender installed and with Real-Time Protection enabled. In the event that defender quarantines/removes a potentially malicious item, a detection history file is created to record the event.

Behavioral Indications

  • Behavioral - Execution (TA0002)

Analysis Value

  • Execution - Evidence of Execution
  • File - Path
  • File - Hash

Operating System Availability

  • Windows Defender

Artifact Location(s)

  • %ProgramData%\Microsoft\Windows Defender\Scans\History\Service\DetectionHistory\[0-9]*\

Artifact Parsers

Artifact Interpretation

The presence of this artifact indicates that the file the artifact was created for existed on the disk, and that it was flagged as malicious and quarantined/removed by Windows Defender. When parsed, it provides basic information such as what class of threat (Trojan, RAT, etc.) the file is, as well as additional metadata such as:

  • The file's SHA-256 and MD5 hash
  • The user responsible for the file's creation
  • The process responsible for the file's creation

In the event that the malicious item is a registry key, the registry key will be present in this artifact.

More detailed information regarding the structure of this artifact can be found here.