Investigating Windows 10
Investigating Windows 10
Investigating Windows 10
Mawadda S. Abuhamda
Author Note
One of the investigation items I used was Prefetch. Prefetch shows when your
applications were last run. It’s easy to get to prefetch. In Windows Explorer, you have to type
an application was last run can be used to investigate many different incidents. It showed me
when I last ran Teams, Zoom, Google Chrome, Zenmap, Vmware, VirtualBox and my other
applications. I noticed that most of the files were .pf files which means they’re password
protected. I don’t think it makes a different whether or not they’re password protected, because
the name and the time it was run is still visible, which is the information you would need during
an investigation.
The second investigation item I used was Wireshark. I captured data for around five
minutes with a VPN connection to a virtual machine open for work. I also reloaded pages that I
had open in Chrome for work and school. Throughout the capture, there was a lot of TCP packets
INVESTIGATING WINDOWS 10 3
which were from the VPN connection because the destination IP was one that I know belongs to
my work. I also noticed some packets that were using the QUIC protocol. I researched it and
found out that it was designed by Google and it connects Google Chrome browsers to Google’s
servers. It reduces round-trip time and encrypts payloads. There were a few QUIC handshake
packets followed by many encrypted packets. I also noticed that some packets were different
colors. I paid attention to a few black packets with red text. I looked at Wireshark’s coloring
rules and found that it was because of a bad TCP. This could be because of a bad connection.
The third investigation item I used was the vssadmin command to check for shadow
copies. The command I used was “vssadmin list shadows /for=C.” My disk didn’t have any
shadow copies so I wasn’t able to find any information from that command.
INVESTIGATING WINDOWS 10 4
The next investigation item I used was Event Viewer. I checked the Windows Security
logs first but there were only successful logins logged. This could be helpful if I was trying to
figure out if someone logged into my system without me knowing. In the system logs, I noticed
Kernel-Power events which tell you about power-source changes and about the system resuming
from sleep or going to sleep. I looked at the Application and Service logs next. There were zero
hardware events, 82 HP Analytics events, 76 Microsoft Office alerts, 66 TechSmith events, and
798 Widows PowerShell events. The Microsoft Office alerts were interesting because they
mentioned names of Word documents or Excel documents that I had been working on. They
showed the exact phrase used in the event, which was usually “Want to save your changes to
FILENAME?,” along with the time and date that it was logged. This can be helpful in finding out
Another investigation tool I used was Task Scheduler. I looked at Microsoft Office logs
and found that there were tasks scheduled to send error logs about Office to Microsoft. I also
found a task called startdvr which activates at the logon of any user. It has something to do with
my AMD CPU, but I wasn’t able to find much about it from looking it up. There was also a task
scheduled to run at the logon of any user and at 11:57pm every day to check for Microsoft
updates. Task manager can be used to find out if a hacker created tasks for malicious purposes.
INVESTIGATING WINDOWS 10 6
References
Luttgens, J. T., Pepe, M., & Mandia, K. (2014). Incident Response & Computer Forensics, Third
Networks Training. (2018). What is QUIC – This new Google Protocol makes Firewalls Blind.
protocol/