

- PRODISCOVER FORENSICS SERIAL NUMBER SERIAL NUMBER
- PRODISCOVER FORENSICS SERIAL NUMBER DRIVERS
- PRODISCOVER FORENSICS SERIAL NUMBER WINDOWS
Last Assigned Drive Letter: Identifies the drive letter that was last assigned to the device. The Device Class ID, Serial Number, and Friendly Name are used to identify the connected USB device.Īssociated User Account: Identifies any user accounts that connected the USB device. If examiners sort or filter the “Class” column to show only DiskDrive, they can narrow the search results to display only USB Mass Storage Devices. DiskDrive is the most common entry for USB Mass Storage Devices. Here are some details about the USB device artifact columns found in Magnet Forensics tools:Ĭlass: Identifies the type of USB device being connected. The amount of information recovered for a USB device will vary depending on the type of device.

PRODISCOVER FORENSICS SERIAL NUMBER WINDOWS
Magnet Forensics tools will recover USB history artifacts for Windows XP, Vista, 7, and 8. USB Device Recovery with Magnet Forensics

Unlike the other timestamps mentioned (which are stored in UTC), the setupapi log stores data in the system’s local time and therefore must be converted before performing a timeline analysis.
PRODISCOVER FORENSICS SERIAL NUMBER SERIAL NUMBER
Using the last write time on the key of the device serial number, examiners can identify the last time it was connected.Īdditionally, examiners can identify when the device was first connected to the system (in local time) by searching for the serial number in the setupapi log. The USB key from the SYSTEM hive provides examiners with vendor and product ID information for a given device, and also identifies the last time the USB device was connected to the system. MountPoints2 lists all of the device GUIDs that a particular user connected, so you may need to search through each NTUSER.dat hive on the system to identify which user connected a particular device. The MountPoints2 key will reveal which user was logged in and active when the USB device was connected. If several USB devices have been added, examiners may not be able to identify the drive letter since the mapped drive letter will only display the serial number for the most recently mounted device. The MountedDevices key allows investigators to match the device serial number to the given drive letter or volume that was mounted when the USB device was inserted. USBSTOR contains details on the vendor and brand of the USB device connected, along with the serial number of the device (which can be used to match the mounted drive letter, user, and the first and last connected times of the device). Typically, for USB Mass Storage Devices, examiners need to collect details from multiple locations in order to analyze USB activity on a Windows PC. Most commonly, examiners will find valuable evidence in USB Mass Storage devices, but should still be familiar with other device types and how they are handled.
PRODISCOVER FORENSICS SERIAL NUMBER DRIVERS
The type of device will dictate which drivers have been installed on the system and how Windows handles the device. USB Mass Storage Device, Removable Storage, or MTP device). 7) and the type of USB device connected (ex. USB device analysis can vary depending on the operating system (ex. It can also help investigators understand how USB devices have been used on a given system, and possibly explain how a suspect might have used a USB device in the commission of a crime or incident. USB device history can be a great source of evidence when an examiner needs to determine if and why an external device was connected to a system. NTUSER.DAT/Software/Microsoft/Windows/CurrentVersion/Explorer/MountPoints2
