As discussed in a previous post, the investigation process in a Windows machine has 8 steps that begins with gathering volatile data and ends with analyzing text-based logs and Windows event logs.
you can read about the first step here.
The focus of the second stage is collecting non-volatile data, or the data that persists even after the system has been shut down.
Hard drives are where non-volatile data is typically stored, however it can also be found in swap files, slack space, and unallocated storage space. Smart phones, USB storage devices, and CD-ROMs are other non-volatile data storage devices.
Examples of non-volatile data are: photos, emails, pdf and word documents, spreadsheets and other valuable “deleted” files.
You can use these steps to conduct non-volatile data collection:
dir /o:d
to check the time and date of the OS installation, check finished automatic update and to give priority to recently dated files.
ESE is used by many Microsoft software like Active Directory, Windows Mail, Windows Search, and Windows Update Client, etc.
· ESEDatabaseView (nirsoft.net)
to view and analyze ‘.edb’ files such as:
Windows Search Index:
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\windows.db
Windows updates information: C:\windows\SoftwareDistribution\DataStore\DataStore.edb
· DriveLetterView (nirsoft.net)
to list all the drives even currently unplugged.
· DevCon.exe (Microsoft)
to document devices that are attached to the system.
· DriveSpy (Digital Intelligence)
to collect all the slack space in an entire partition into a file.
5. Collecting Hidden Partition Information
· find & mount (findandmount.com) · Partition Logic (partitionlogic.org.uk)
to collect the information from the hidden partition and to perform many useful tasks on partitions.
· Chrome cache view (nirsoft.net) · MZ cache view (nirsoft.net) · Chrome cookies view (nirsoft.net) · MZ cookies view (nirsoft.net)
nirsoft.net offers efficient tools to view cache and cookies of most of web browsers.
· Thumbcache Viewer (github) · Thumbs Viewer (github)
to open thumbcache***.db files inside_ C:\Users\UserProfile]\AppData\Local\Microsoft\Windows\Explorer directory for example.