Skip to content

Shadow Copy as CSV

Evidence: Shadow Copy as CSV
Description: Dump Latest Shadow Copy Files Information in CSV Format
Category: DiskFilesystem
Platform: windows
Short Name: shdwcopy
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Volume Shadow Copy Service (VSS) creates point-in-time snapshots of volumes. These snapshots preserve the state of files at the time the snapshot was created, allowing access to previous versions of files even if they have been modified or deleted.

Shadow copies can contain previous versions of files before ransomware encryption, deleted files, and historical system state. They provide a way to recover data and analyze system state from a specific point in time.

This collector gathers structured data about shadow copy as csv.

FieldDescriptionExample
ModifiedFile modification timestamp2023-10-15T14:30:00Z
AccessedFile access timestamp2023-10-15T15:45:00Z
CreatedFile creation timestamp2023-10-01T10:00:00Z
IsDirectoryWhether entry is directory+ or empty
FileSizeFile size in bytes1048576
AttributesFile attributes (R=ReadOnly, H=Hidden, S=System, C=Compressed, E=Encrypted)RHS
FilePathFull path within shadow copy\?\HarddiskVolumeShadowCopy1\Users\user\Documents\file.txt

This collector:

  • Identifies the most recent shadow copy using GetLatestSnapshotDeviceName
  • Enumerates all files recursively in the shadow copy
  • Captures file metadata (timestamps, size, attributes)
  • Exports to CSV format for analysis

Shadow copies are accessed via special device paths like \\?\HarddiskVolumeShadowCopy{N}\.

Shadow copies are invaluable for recovering evidence and analyzing historical system state. Investigators use this data to recover files before ransomware encryption, access deleted files preserved in snapshots, analyze previous system configurations, compare current state with historical snapshots, recover overwritten evidence, and establish what files existed at snapshot time.