Computer Forensic Tool - Windows OS Artifact Finder

  • Unique Paper ID: 188220
  • PageNo: 1163-1182
  • Abstract:
  • This paper presents a Windows forensic artifact finder designed to assist investigators in extracting and analyzing critical system artifacts from memory, registry, disk, and network sources within the Windows OS environment. It leverages Volatility to extract crucial artifacts such as running processes, network connections, open files, and registry hives from memory dumps, uncovering hidden or tampered data. The integration of RegRipper allows the tool to extract valuable information from registry entries, providing insights into user behavior, system configuration, and potential malicious activities. This tool enables the investigator to extract crucial system information such as hidden directories, partition details and much more from the Windows file system. In addition to this, the tool also retrieves important network artifacts including DNS cache and routing tables. Along with this, the tool detects common network attacks and provides packet capture statistics and visualization. The tool also incorporates customizable artifact profiles and an intuitive UI, improving investigator efficiency by enabling rapid selection, analysis, and reporting of relevant artifacts. Overall, this work introduces a unified, customizable, and investigator-friendly forensic solution that enhances the reliability and completeness of digital investigations on Windows platforms.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{188220,
        author = {Prachiti Barge and Gauri Shewale and Meera Wadher and Prerna Jagesia},
        title = {Computer Forensic Tool - Windows OS Artifact Finder},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {12},
        number = {7},
        pages = {1163-1182},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=188220},
        abstract = {This paper presents a Windows forensic artifact finder designed to assist investigators in extracting and analyzing critical system artifacts from memory, registry, disk, and network sources within the Windows OS environment. It leverages Volatility to extract crucial artifacts such as running processes, network connections, open files, and registry hives from memory dumps, uncovering hidden or tampered data. The integration of RegRipper allows the tool to extract valuable information from registry entries, providing insights into user behavior, system configuration, and potential malicious activities. This tool enables the investigator to extract crucial system information such as hidden directories, partition details and much more from the Windows file system. In addition to this, the tool also retrieves important network artifacts including DNS cache and routing tables. Along with this, the tool detects common network attacks and provides packet capture statistics and visualization. The tool also incorporates customizable artifact profiles and an intuitive UI, improving investigator efficiency by enabling rapid selection, analysis, and reporting of relevant artifacts. Overall, this work introduces a unified, customizable, and investigator-friendly forensic solution that enhances the reliability and completeness of digital investigations on Windows platforms.},
        keywords = {Disk Forensics, Memory Artifacts, Network Attacks, Operating System, Registry Forensics, Windows OS},
        month = {December},
        }

Cite This Article

Barge, P., & Shewale, G., & Wadher, M., & Jagesia, P. (2025). Computer Forensic Tool - Windows OS Artifact Finder. International Journal of Innovative Research in Technology (IJIRT), 12(7), 1163–1182.

Related Articles