Skip to content
WindowsNetworkCritical

USB Device Connection History

Windows records every USB mass-storage device plugged in, keyed by vendor/product ID and serial number, with first- and last-connection timestamps.

artifact_type: usb_connection

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR\
  • $HKLM\SYSTEM\CurrentControlSet\Enum\USB\
  • $C:\Windows\INF\setupapi.dev.log
  • $HKLM\SOFTWARE\Microsoft\Windows Portable Devices\Devices\

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Data exfiltration via USB drive
  • Insider threat — proving files copied to personal device
  • Malware — USB as initial access vector
  • USB serial number cross-referencing across multiple hosts

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
USBDeview (NirSoft)
RegRipper
KAPE

Related artifacts

References & further reading

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI