Portable Passmark OSForensics Professional v7.0.10016 (x64)

passmark osforensics portable

 

 

OSForensics portable is a new digital investigation tool which lets you extract forensic data or uncover hidden information from computers. OSForensics has a number of unique features which make the discovery of relevant forensic data even faster, such as high-performance deep file searching and indexing, e-mail and e-mail archive searching and the ability to analyze recent system activity and active memory. OSForensics can build and let you view an events timeline which shows you the context and time of activities. You can even recover data and files that have been deleted by users. OSForensics comes with a built-in file viewer which lets you examine a file contents, properties and meta-data, as well as an e-mail viewer which is compatible with most popular mail client formats.

Features:
Discover Forensic Evidence Faster

Find files faster, search by filename, size and time
Search within file contents using the Zoom search engine
Search through email archives from Outlook, ThunderBird, Mozilla and more
Recover and search deleted files
Uncover recent activity of website visits, downloads and logins
Collect detailed system information
Password recovery from web browsers, decryption of office documents
Discover and reveal hidden areas in your hard disk
Browse Volume Shadow copies to see past versions of files

Identify Suspicious Files and Activity
Verify and match files with MD5, SHA-1 and SHA-256 hashes
Find misnamed files where the contents don’t match their extension
Create and compare drive signatures to identify differences
Timeline viewer provides a visual representation of system activity over time
File viewer that can display streams, hex, text, images and meta data
Email viewer that can display messages directly from the archive
Registry viewer to allow easy access to Windows registry hive files
File system browser for explorer-like navigation of supported file systems on physical drives, volumes and images
Raw disk viewer to navigate and search through the raw disk bytes on physical drives, volumes and images
Web browser to browse and capture online content for offline evidence management
ThumbCache viewer to browse the Windows thumbnail cache database for evidence of images/files that may have once been in the system
SQLite database browser to view the and analyze the contents of SQLite database files
ESEDB viewer to view and analyze the contents of ESE DB (.edb) database files, a common storage format used by various Microsoft applications
Prefetch viewer to identify the time and frequency of applications that been running on the system, and thus recorded by the O/S’s Prefetcher
Plist viewer to view the contents of Plist files commonly used by MacOS, OSX, and iOS to store settings
$UsnJrnl viewer to view the entries stored in the USN Journal which is used by NTFS to track changes to the volume

Manage Your Digital Investigation
Case management enables you to aggregate and organize results and case items
HTML case reports provide a summary of all results and items you have associated with a case
Centralized management of storage devices for convenient access across all OSForensics’ functionality
Drive imaging for creating/restoring an exact copy of a storage device
Rebuild RAID arrays from individual disk images
Install OSForensics on a USB flash drive for more portability
Maintain a secure log of the exact activities carried out during the course of the investigation

Professional and Bootable Editions
The professional and bootable editions of OSForensics have many features not available in the free edition, including:
Import and export of hash sets
Customizable system information gathering
No limits on the amount of cases being managed through OSForensics
Restoration of multiple deleted files in one operation
List and search for alternate file streams
Sort image files by colour
Disk indexing and searching not restricted to a fixed number of files
No watermark on web captures
Multi-core acceleration for file decryption
Customizable System Information Gathering
View NTFS directory $I30 entries to identify potential hidden/deleted files

 

New in V7
• Ability to boot an image as a Virtual Machine from OSForensics.
• Addition of System Resource Usage Monitor (SRUM) database scanning for User Activity collection
• OCR (Optical character recognition) allows you to search for text within PDF files
• New built in hash sets for: Keyloggers, VPN Software, Peer to Peer (P2P) software, Cryptocurrency
• Support for importing Project VIC hash sets

  • Create/Search Index
    • Fixed file extension count at end of summary. Previously the count of files indexed, per file type, wasn’t always accurate when files where found in container files, like ZIP and CHM files.
    • Fixed crash bug in Create Index Log window stack corruption, when there was very long lines in the log.
    • Fixed bug in “Search Index” stopping search prematurely, not returning the full set of search results for large datasets
  • Create Signature
    • Support for counting NTFS hard links for OSF devices using direct access. This avoids double counting of hard linked files.
  • Deleted Files
    • Apply Filter button will be enabled as long as MFT has been scanned even if Search was cancelled during carving (a warning message will be visible that results are incomplete).
  • File viewer
    • Fixed crash that could occur when rebuilding thumbnails (triggered by using an “Open file location” right click menu item in recent activity items)
  • User Activity
    • Rewrote export to CSV function to export data as seen in each item’s list rather than trying to have each item match a preformatted output. The new CSV file will have a section for each item type with a heading row and will be separated with a blank line (eg MRU item headings, MRU items, blank line, USB item headings, usb items etc). This means a lot more data will now be exported to CSV.
    • USB, Fixed parsing of Unknown USB device in registry
    • USB, Added parsing of “Properties\\{83DA6326-97A6-4088-9453-A1923F573B29}” registry key to determine USB first installed, last connected, and removal times
    • USB, Added parsing of Microsoft-Windows-Partition/Diagnostic.evtx event log for USB connection/disconnection events
    • USB, Added parsing of archived setupapi.dev.xxxxxxxx_xxxxxx.log
    • USB, Added scanning of SYSTEM\CurrentControlSet\Enum\SCSI for USB connected SCSI disks
    • Added scanning for files in “Downloads” folder and scanning drive for “Zone.Identifier” alternate stream and reading the “ReferrerUrl” and “HostUrl” fields. This can help identify files that were downloaded but moved to a new folder.
    • Shellbags, started processing some more item types to retrieve more information when available
    • Shellbags, fixed a bug where the top level of the disk path wasn’t being cleared correctly in some cases when recursively processing the ShellBagMRU leading to malformed disk path such as Desktop\A:\B\C:\ instead of Desktop\C:\
    • Windows search, fixed a crash that could occur in some older versions of the windows.edb database
    • Windows search, stopped directory entries from being filtered out automatically, will now be displayed in the “directory” sub type
  • Misc
    • Reduced program start-up time by deferring window initialization for each module to when they are first opened. OSF should launch around 3x quicker now.
    • Fixed default drive not set properly on startup
    • Fixed handling split image files, where the number of split file parts was > 1000 (.999 -> .1000 or .999 -> .A00). It really doesn’t make sense to create split files with this many parts, but someone did it.

 

X-7010016PMOSFPx64.rar – 149.8 MB