This document summarizes research into analyzing artifacts from the Tor browser on Windows systems. It describes how the Tor browser leaves various artifacts that can be analyzed, including prefetch files, the UserAssist registry key, thumbnail cache, Windows search database, bookmarks, pagefile.sys, and memory dumps. A real case example is provided where analysis of these artifacts from a laptop revealed that the Tor browser was used to access a blog and publish confidential company information. The researchers were able to determine the Tor browser version, installation date, and timing of the activities related to the information leak. Ongoing research areas are also outlined.
Related topics: