Overview
Introduced in Windows 10
version 1803, the Windows Activity history
tracks a number of operations on the system: programs used, local files opened,
SharePoint documents consulted, and websites browsed (using Internet Explorer /
Microsoft Edge Legacy). The Activity history can be consulted in the Windows
Timeline (Windows + Tab keys).
The ActivitiesCache.db
is a SQLite
database that locally stores the
activity for its associated user.
The ActivitiesCache.db
only stores data for the last 30 days by default.
Information of interest
The ActivitiesCache.db
is composed of a number of tables, with the following
tables being of interest:
-
Activity
/ActivityOperation
tables.- Data about various activities for different operation / activity type:
- Program execution and opening of a file (5,
ExecuteOpen
) - Copy-pasting from a program (
CopyPaste
) - Application “in focus” (
InFocus
) - …
- Program execution and opening of a file (5,
- The data available depends on the activity type:
- Start (
startedDateTime
) and end (lastActiveDateTime
) timestamps of the activity (inUTC
). - The activity ID (GUID).
- Executable full path for program execution.
- For certain programs, the accessed file name and path and / or associated SharePoint link.
- Created and last modified timestamp of the associated file (local or on SharePoint).
- The user’s device timezone.
- …
- Start (
- An activity data can be present in either or both tables depending on the
activity lifecycle. For example, a new activity will only be present in
the
Activity
table, while an activity in the “upload queue” will be placed in theActivityOperation
table.
- Data about various activities for different operation / activity type:
-
Activity_PackageId
:-
Data about the application(s) / program(s) linked to a specific activity (identified by its activity ID).
-
Data available:
- The activity ID (GUID).
- The application name / program filename.
- Eventual program full path.
- Activity expiration timestamp (timestamp of occurrence + 30 days by default).
-
-
Upon occurrence of an activity, one or multiple entries sharing the same activity ID will be created in the
Activity_PackageId
table, one for each program / application related to the activity.
Clipboard activity
The Activity
/ ActivityOperation
tables reference clipboard activity
through two activity types: 10
and 16
. The events will be stored for
approximately 12 hours after the operation.
The activity type 16
tracks use of the clipboard by an application, and is
logged by default. The activity type 10
tracks the clipboard content, and is
only logged if the non-default “Clipboard history” and “Sync across your
devices” clipboard settings are both enabled. The later setting is only
available for Microsoft or Azure AD synchronized accounts (and thus not
available for local or simple Active Directory domain accounts).
If the prerequisites are meet, an activity type 10
should be logged
immediately after an activity type 16
, allowing correlation of the two
events.
The following information of interest is available for activity type 10
events:
-
The timestamp at which the data was copied (in the
CreatedTime
column, as anepoch
timestamp). -
The content of the clipboard, encoded in base64 (in the
ClipboardPayload
column).
The following information of interest is available for activity type 16
events:
-
The timestamp at which the data was copied (in the
CreatedTime
column, as anepoch
timestamp). -
The application from which the data was copied (in the
AppId
column). -
If the data was copied (
Copy
) or pasted (Paste
) (in theGroup
column). Only copy operation seem to generate an entry on recent versions of the Windows operating system however.
Tool(s)
The WxTCmd
utility (KAPE
WxTCmd
module) can parse and extract information from the
ActivitiesCache.db
database.
# Parses the specified ActivitiesCache database.
WxTCmd.exe -f <ActivitiesCache.db | ACTIVITIESCACHE_DB_FILE> --csv <OUTPUT_DIRECTORY>
References
-
kacos2000 - An examination of Win10 ActivitiesCache.db database
-
Istrosec - Zuzana Vargova - How to trace the user: Windows 10 Timeline
-
Forensic Focus - Windows 10 Activity Timeline: An Investigator’s Gold Mine
View on GitHub