USB Forensics

To make this tutorial actionable, here are the exact commands you saw in your screenshot, organized by the forensic phase they satisfy. You can copy and paste these into an Administrative Command Prompt.


Phase 1: Identify the Hardware

Goal: Extract the unique Serial Number of the device to prove its physical identity.

  • List all USB history:

reg query HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR
  • Get specific device details (Serial Number):


Phase 2: Map to a Drive Letter

Goal: Determine which drive letter (E:, F:, G:) the device was assigned so you can track file activity.

  • View drive letter assignments:

Note: Look for the hex data in \DosDevices\F: that matches the ParentIdPrefix or Serial Number found in Phase 1.

We need to convert hex to ADCII and match serial numbers


Phase 3: Establish the Timeline

Goal: Find the exact date and time the device was first or most recently connected.

  • Query Driver Logs for USB activity:

or if does not work

Or even better


Phase 4: Verify Current State

Goal: Check if the device is currently "Live" (plugged in right now) and see its Volume Name.

  • List active removable disks:


Last updated