Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 568

Jump Lists

What is Jump Lists?

Jump ListsPer-application history files keyed by Windows AppID that record the recent files and tasks a user opened, providing strong evidence of file access tied to a specific program.


Jump Lists store the recent and frequently used items a user accessed through each application's taskbar context menu. Windows maintains two stores under each user profile: AutomaticDestinations (*.automaticDestinations-ms), generated by Windows, and CustomDestinations (*.customDestinations-ms), populated by applications. Each file is named with the application's AppID hash and uses a compound OLE structured-storage container that wraps LNK-style ShellLink streams with full path, MAC times, file size, and network or volume metadata. Forensic analysts use Jump Lists to prove that a user opened a particular document with a particular program, recover names of since-deleted files, and tie activity to a specific account. JLECmd is the standard parser.

Examples

  1. 01

    Proving that confidential.docx was opened in Microsoft Word by the user before exfiltration.

  2. 02

    Recovering URLs that a user visited in a browser whose history was wiped, via the browser's Jump List.

Frequently asked questions

What is Jump Lists?

Per-application history files keyed by Windows AppID that record the recent files and tasks a user opened, providing strong evidence of file access tied to a specific program. It belongs to the Forensics & IR category of cybersecurity.

What does Jump Lists mean?

Per-application history files keyed by Windows AppID that record the recent files and tasks a user opened, providing strong evidence of file access tied to a specific program.

How does Jump Lists work?

Jump Lists store the recent and frequently used items a user accessed through each application's taskbar context menu. Windows maintains two stores under each user profile: AutomaticDestinations (*.automaticDestinations-ms), generated by Windows, and CustomDestinations (*.customDestinations-ms), populated by applications. Each file is named with the application's AppID hash and uses a compound OLE structured-storage container that wraps LNK-style ShellLink streams with full path, MAC times, file size, and network or volume metadata. Forensic analysts use Jump Lists to prove that a user opened a particular document with a particular program, recover names of since-deleted files, and tie activity to a specific account. JLECmd is the standard parser.

How do you defend against Jump Lists?

Defences for Jump Lists typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Jump Lists?

Common alternative names include: JumpLists, AutomaticDestinations, CustomDestinations.

Related terms

See also