Exposing vital forensic artifacts of USB devices in the Windows 10 registry

Approved for public release; distribution is unlimited === Digital media devices are regularly seized pursuant to criminal investigations and Microsoft Windows is the most commonly encountered platform on seized computers. Microsoft recently released a technical preview build of their Windows 10 ope...

Full description

Bibliographic Details
Main Author: Shaver, Jason S.
Other Authors: Rowe, Neil
Published: Monterey, California: Naval Postgraduate School 2015
Online Access:http://hdl.handle.net/10945/45940
Description
Summary:Approved for public release; distribution is unlimited === Digital media devices are regularly seized pursuant to criminal investigations and Microsoft Windows is the most commonly encountered platform on seized computers. Microsoft recently released a technical preview build of their Windows 10 operating system which can run on computers, smart phones, tablets, and embedded devices. This work investigated the forensically valuable areas of the Windows 10 registry. The focus was on the Windows Registry hives affected when USB storage devices are connected to a laptop configured with Windows 10. Paths were identified that indicate the date/time of last insertion and removal of a thumb drive. Live monitoring and post-mortem forensic methodologies were used to map Registry paths containing USB identifiers such as make/model information, serial numbers and GUIDs. These identifiers were located in multiple paths in the allocated and unallocated space of the Registries analyzed.