Home Windows 11 PCA Artifac
Post
Cancel

Windows 11 PCA Artifac

.hidden-from-title { display: none !important; }

/* Show the image in the actual post content */ .post-content .hidden-from-title { display: block !important; }

GUI Execution Artifact - Program Compatibility Assistant


In the rapidly evolving landscape of digital forensics, the discovery of new artifacts is a rare and exciting event. Windows 11 version 22H2 introduced a significant new forensic artifact that has captured the attention of the DFIR (Digital Forensics and Incident Response) community: the Program Compatibility Assistant (PCA) artifact

What is the PCA Artifact?

The Program Compatibility Assistant (PCA) is not entirely new to Windows – it has existed since Windows Vista as a mechanism to detect and fix compatibility issues in legacy applications when they are executed on newer versions of Windows. However, what’s revolutionary about Windows 11 22H2 is that the PCA service (PcaSvc) now stores additional execution data in text files, creating a new source of evidence for digital forensic investigators

This artifact provides evidence of execution specifically for GUI-based programs, making it a valuable addition to the forensic analyst’s toolkit alongside traditional artifacts like Prefetch, Amcache, and ShimCache23.

Artifact Location and Structure

The PCA artifact resides in the following directory:

C:\Windows\appcompat\pca\

This location contains three key files

  • PcaAppLaunchDic.txt
  • PcaGeneralDb0.txt
  • PcaGeneralDb1.txt

PcaAppLaunchDic.txt: The Primary Artifact

The most significant file for forensic analysis is PcaAppLaunchDic.txt.This pipe-delimited text file contains a simple but powerful format:

[Full Executable Path] | [Last Execution Timestamp] For example: C:\Program Files\Everything\Everything.exe|2022-12-28 16:06:24.212

The timestamp represents the last time the specified executable was executed and is stored in UTC format. Importantly, this timestamp is recorded when the process terminates, not when it starts

PcaGeneralDb0.txt: Extended Execution Details

The PcaGeneralDb0.txt file contains more detailed information about executed programs, including:

  • Runtime timestamp

  • Run status

  • Full path to the binary

  • Description of the file

  • Software vendor

  • File version

  • Program ID (which can be cross-referenced with Amcache for enhanced analysis

PcaGeneralDb1.txt: Secondary Database

The PcaGeneralDb1.txt file appears to serve as a secondary database, though research indicates it may not always be populated or updated in all testing scenarios.

Forensic Value and Analysis

Evidence of Execution

The PCA artifact provides reliable evidence of program execution similar to other well-established artifacts like Prefetch and Amcache. This is particularly valuable for:

  • Timeline analysis of program execution

  • Identifying malicious software that has been run on a system

  • Incident response investigations where understanding program execution history is crucial

  • Cross-referencing with other artifacts for comprehensive analysis

Integration with Existing Artifacts

One of the most powerful aspects of the PCA artifact is its ability to be correlated with Amcache. The Program ID field in PcaGeneralDb0.txt can be matched with Amcache entries, allowing investigators to create a more complete picture of program execution and installation history.

Limitations and Considerations

While the PCA artifact is valuable, it’s important to understand its limitations:

  • Windows 11 22H2 specific: This artifact only exists in Windows 11 version 22H2 and later.
  • GUI programs only: It primarily tracks graphical user interface applications
  • Process termination timing: Timestamps reflect when processes end, not when they begin
  • Limited deployment: As Windows 11 22H2 adoption is still growing (currently at 42.66% globally), this artifact may not be present in all investigations

Practical Implementation

Tool Support

The forensic community has quickly adapted to support this new artifact:

  • Velociraptor has developed specific artifacts for PCA analysis6

  • KAPE includes targets for collecting PCA files7

  • Custom parsing tools have been developed by the community8

Investigation Workflow

When analyzing PCA artifacts, forensic investigators should:

  1. Collect all three PCA files from the target system

  2. Parse PcaAppLaunchDic.txt for basic execution evidence

  3. Analyze PcaGeneralDb0.txt for detailed program information

  4. Cross-reference with Amcache using Program IDs

  5. Integrate findings into timeline analysis and case documentation

Future Implications

The discovery of the PCA artifact represents a significant advancement in Windows forensics1. As Windows 11 22H2 becomes more prevalent in enterprise environments, this artifact will become increasingly valuable for:

  • Incident response teams investigating security breaches

  • Malware analysis and threat hunting activities

  • Corporate investigations requiring evidence of program execution

  • Timeline reconstruction in complex forensic cases

Conclusion

The Windows 11 22H2 PCA artifact fills an important gap in digital forensics by providing clear, text-based evidence of GUI program execution2. Its simple format makes it easily parseable, while its integration capabilities with existing artifacts like Amcache enhance its investigative value16.

As the digital forensics community continues to research and develop tools for this artifact, it promises to become a cornerstone of Windows 11 forensic analysis9. For DFIR professionals, understanding and leveraging the PCA artifact will be essential as Windows 11 deployment continues to expand across enterprise environments.

The discovery and documentation of this artifact by researchers like Andrew Rathbun and Lucas Gonzalez, along with continued research by teams at Sygnia, demonstrates the importance of ongoing forensic research in keeping pace with evolving operating systems and their investigative potential12.

  1. https://www.sygnia.co/blog/new-windows-11-pca-artifact/
  2. https://aboutdfir.com/new-windows-11-pro-22h2-evidence-of-execution-artifact/
  3. https://www.youtube.com/watch?v=rV8aErDj06A
  4. https://www.linkedin.com/posts/stephan-berger-59575a20a_im-playing-around-with-the-program-compatibility-activity-7283872364231049216-09wE
  5. https://www.forensic-cheatsheet.com/EN/Artifact/(EN)+PCA
  6. https://www.linkedin.com/posts/idan-abramovich-b16a4211a_new-windows-11-pro-22h2-evidence-of-execution-activity-7320449133717155840-s6_H
  7. https://github.com/EricZimmerman/KapeFiles/blob/master/Targets/Windows/AppCompatPCA.tkape
  8. http://windowsir.blogspot.com/2023/04/program-execution.html
  9. https://www.techzine.eu/blogs/security/114162/digging-deeper-into-software-artifacts/
  10. https://blog.1234n6.com/available-artifacts-evidence-of-execution/
  11. https://github.com/Psmths/windows-forensic-artifacts/blob/main/execution/program-compatibility-assistant.md
  12. https://blog.1234n6.com/available-artifacts-indicators-of-execution-updated/
  13. https://www.linkedin.com/posts/sygnia_incidentresponse-windows11-windows11-activity-7160666212413157377-MqdZ
  14. https://mjolnirsecurity.com/the-mjolnir-security-threat-report-unearthing-uncharted-artifacts-in-windows-11/
  15. https://neuroimage.usc.edu/brainstorm/Tutorials/ArtifactsSsp
  16. https://docs.velociraptor.app/artifact_references/pages/windows.kapefiles.targets/
  17. https://www.cybertriage.com/blog/shimcache-and-amcache-forensic-analysis-2025/

This post is licensed under CC BY 4.0 by the author.

Dissecting RDP Activity

RADAR – An Obscure Execution Artifact