Source: https://www.ijert.org/research/forensic-analysis-of-jump-lists-in-windows-operating-system-IJERTV4IS030028.pdf