Restore Point ForensicsNotes for the Forensic Processing of Windows XP Restore Points Note: All screenshots on this page may be viewed in a separate window (enlarged) by clicking on them!
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Return to Main Forensics Help Page
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Beginning with Windows ME & XP, Windows started a process of creating "Restore Points". These restore points are contained in numbered folders in the folder: \System Volume Information\-restore{GUID}\RP## (where ## are sequential numbers as restore points are created) Notes:
The purpose of these restore points is to allow the user to recover to a specific point in time on which a restore point was created. The typical user interface is located at Start > Program Files > Accessories > System Tools > System Restore. From this interface (shown below), the user may create restore points or recover to specific dates and times. System Restore Point settings are found in the following registry key:
Restore points are created, by default, every 24 hrs (XP) as set in the following value:
Restore points are retained, by default, for 90 days, as set in the following value:
System Restore points may be disabled, as set in the following value:
As restore points are deleted, it is done by a "first in first out" basis. This deletion process is tracked by a file in the root of folder \System Volume Information\-restore{GUID}\ named fifo.log. This file is a plain text file, listing:
Regarding restore point names:
Restore point files are created as "snapshots" of the files necessary to restore a system to a given point. Regarding those files:
Restore point snapshots capture the registry hive files. The following apply:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The question is often asked, "If I create a restore point, install software, do a bad deed, and then restore the system to the original state, is the evidence of the software installation gone?" The answer is yes and no! The answer is "Yes" if you are looking at the current mounted registry for the information. The answer is "No" if you are looking at the registry within a specific restore point. When a system is restored using "System Restore", before reverting back to the chosen restore point, system restore creates yet another restore point capturing a snapshot of the system before the system restore. This restore point will be named "Restore Operation", which can be found at byte offset 2 in the "rp.log" file. It is this restore point that will contain the software binaries and the registry information as it was at the time of the "bad deed". If you know when the bad deed occurred, you could go directly to the restore points created around that time. If you had no idea when or if such an event occurred, you could search all "rp.log" files for the string "Restore Operation". Once found, simply mount the registry files and begin your examination. Remember to look for the renamed program binaries as well. Another forensic bonus lies in the fact that "system restorals" are recorded in the Windows event logs. For those of you who think that because Windows XP logging is dismal out of the box, guess again because certain events are recorded regardless, with system restorals being such an item. The event record will be found in the system event log file and will appear as event id "110". Thus you could filter your system event log files for event id "110" and determine when the system was restored. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
This web site was created to provide assistance to computer forensics examiners engaging in cyber-crime investigations. This field is rapidly evolving and changing as technology marches forward. It is, therefore, intended to be a growing and evolving resource. As you conduct your examinations and investigations, if you encounter information, links, or have suggestions that would help others, please let me know so I can add it to this site. My email address is sbunting@udel.edu . Thank you.
This site created and maintained by:
|
||
Steve Bunting |
||
Email: sbunting@udel.edu
|