🖥️
Windows DFIR
Ctrlk
  • Introduction
  • Windows Artifacts
    • Windows Quick Tips
    • Account Usage
    • Browser Usage
    • Processes
    • Cloud Storage
    • Deleted File or File Knowledge
    • File Download
    • Folder/File Opening/Creation
    • Persistence
    • Physical Location
    • Program Execution
    • Shadow Copies
    • USB Usage
      • Key Identification
      • Drive Letter and Volume Name
      • Connection Timestamps
      • User
      • Volume Name
      • Plug & Play Event Log
    • Windows Services
    • System Information
    • Event IDs
  • Windows DFIR & MITTR
    • Initial Access
    • Execution
    • Persistence
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
    • Discovery
    • Lateral Movement
    • Collection
    • Command and Control
    • Exfiltration
    • Impact
  • SOC Related
    • Cached Credentials
    • Domain Controller Password Spraying
Powered by GitBook
Page cover
On this page

Was this helpful?

  1. Windows Artifacts

USB Usage

Key IdentificationDrive Letter and Volume NameConnection TimestampsUserVolume NamePlug & Play Event Log
PreviousEvent ID 8193: Volume Shadow Copy Service ErrorNextKey Identification

Last updated 1 year ago

Was this helpful?