UsrClass.dat / ShellBags
WindowsUser ActivityDisk Image
Location
C:\Users\<username>\AppData\Local\Microsoft\Windows\UsrClass.datDescription
Per-user registry hive containing ShellBag entries that record folder view preferences for every folder a user browsed in Windows Explorer, including network shares, ZIP archives, removable media, and deleted folders.
Forensic Value
ShellBags persist evidence of folder access even after the folders are deleted. They record the full path of every directory browsed, including UNC paths for network shares, providing a map of what file locations the attacker explored. ShellBag timestamps include first and last interaction dates. This artifact is separate from NTUSER.DAT and often overlooked during collection. ZIP archive browsing entries prove the user opened archive files that may have contained malicious payloads.
Tools Required
KAPEShellBags Explorer (Eric Zimmerman)Registry Explorer (Eric Zimmerman)RegRipper
Collection Commands
KAPE
kape.exe --tsource C: --tdest C:\output --target RegistryHives
SBECmd
SBECmd.exe -d C:\output --csv C:\output --csvf ShellBags.csv
ShellBags Explorer
Load UsrClass.dat in ShellBags Explorer (GUI) for interactive analysis
RegRipper
rip.exe -r "C:\Users\<username>\AppData\Local\Microsoft\Windows\UsrClass.dat" -p shellbags
Collection Constraints
- •Availability, retention, and field coverage depend on the Windows release, SKU, per-host audit policy, and user activity. Treat absence as inconclusive unless you verified the feature was enabled.
MITRE ATT&CK Techniques
T1083T1005