How to
Now Reading
Windows 10 Registry forensics

Windows 10 Registry forensics

We have found a good starter point for Windows 10 Registry forensic examination. It is Jason S. Shaver’s M.S. thesis entitled “Exposing vital forensic artifacts of USB devices in the Windows 10 Registry”.

Here is the abstract:

“Digital media devices are regularly seized pursuant to criminal investigations and Microsoft Windows is the most commonly encountered platform on seized computers.  Microsoft recently released a technical preview build of their Windows 10 operating system which can run on computers, smart phones, tablets, and embedded devices.  This work investigated the forensically valuable areas of the Windows 10 registry.  The focus was on the Windows Registry hives affected when USB storage devices are connected to a laptop configured with Windows 10.  Paths were identified that indicate the date/time of last insertion and removal of a thumb drive.  Live monitoring and post-mortem forensic methodologies were used to map Registry paths containing USB identifiers such as make/model information, serial numbers and GUIDs.  These identifiers were located in multiple paths in the allocated and unallocated space of the Registries analyzed.”

You can read it in full here.

Leave a Response

Please enter the result of the calculation above.