JLECmd
Part of Eric Zimmerman’s Tools. JLECmd.exe is the industry standard for parsing Jumplist files, offering high-speed processing and detailed CSV output.
The primary philosophy behind Jumplists is user productivity. When a user right-clicks an application icon on the taskbar or Start menu, the resulting list of files or tasks is populated by Jumplist data.
Unlike the file system’s “Last Accessed” timestamp, which can be unreliable or disabled by default in modern Windows environments, Jumplists are actively maintained by the operating system whenever a user interacts with a file through an application’s standard dialogue handlers.
When a file is opened via an application (e.g., opening a .docx file via WINWORD.EXE), the Windows Shell registers this interaction. It generates or updates a binary file specific to both the user and the application, storing rich metadata about the target file as an embedded LNK File stream.
Jumplist artifacts are stored within the user’s profile and are categorized into two distinct types based on how they are generated.
These are populated automatically by the Windows operating system as users interact with files.
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\[AppID].automaticDestinations-msThese are generated by the application itself to pin specific files or provide custom application tasks.
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\[AppID].customDestinations-msJumplist files are not simple text logs; they are complex OLE Compound Files (OLECF). Analyzing them reveals highly structured metadata, as each entry contains embedded LNK streams (DestList):
Jumplists answer the critical DFIR question: “What exactly did the user or attacker do with this program?”
While Prefetch (.pf) Files prove that an executable (like powershell.exe) ran, they do not inherently show the arguments or files it interacted with. By analyzing the PowerShell Jumplist, an investigator can identify the exact .ps1 script that was executed by the threat actor.
During the staging phase of an attack, adversaries often compress data before exfiltration. If tools like 7-Zip, WinRAR, or FTP clients like FileZilla are used, their respective Jumplists will log the specific directories and files the attacker manipulated.
Because Jumplists maintain an independent database of metadata, they preserve the historical record of files and folders long after the actual data has been securely wiped or removed by an attacker.
Due to their complex binary nature, manual analysis of Jumplists is impractical. DFIR analysts rely on specialized parsing utilities.
AutomaticDestinations and CustomDestinations directories from the suspect user’s profile.JLECmd
Part of Eric Zimmerman’s Tools. JLECmd.exe is the industry standard for parsing Jumplist files, offering high-speed processing and detailed CSV output.
JumpLister
Developed by Digital Forensics Corp, this provides a GUI-based approach for analysts who prefer visual exploration of Jumplist contents and AppID resolution.