On Windows, LNK files poiting to recently modified files are stored in the AppData\Roaming\Microsoft\Windows\Recent directory. This module retrieves these LNK's and parse them in order to extract source files which can be useful during internal assessments to retrieve recently modified and potentially juicy files:
Note: source files are not downloaded because accessing them without knowing their content is something I consider dangerous AND/OR could end up having the EDR being triggered (let's say someone tried to open SAM/SECURITY for exemple. So I don't intend on adding this feature.
On Windows, LNK files poiting to recently modified files are stored in the AppData\Roaming\Microsoft\Windows\Recent directory. This module retrieves these LNK's and parse them in order to extract source files which can be useful during internal assessments to retrieve recently modified and potentially juicy files:
Note: source files are not downloaded because accessing them without knowing their content is something I consider dangerous AND/OR could end up having the EDR being triggered (let's say someone tried to open SAM/SECURITY for exemple. So I don't intend on adding this feature.