DriverFrameworks-UserMode/Operational.evtx
C:\Windows\System32\winevt\Logs\Microsoft-Windows-DriverFrameworks-UserMode%4Operational.evtxTo prevent a faulty third-party USB driver from taking down the entire OS, Microsoft isolates them from the kernel using the User-Mode Driver Framework (UMDF). This log tracks that isolation layer - and when enabled, it provides some of the most explicit USB connection and disconnection records available anywhere in the Windows event log stack.
Microsoft-Windows-DriverFrameworks-UserMode/Operational - written by the User-Mode Driver Framework host process
wevtutil.
General
The User-Mode Driver Framework (UMDF) hosts third-party drivers for device classes like USB storage, MTP (media transfer protocol for phones) and printers in a sandboxed user-mode process rather than the kernel. This log tracks the full lifecycle of those host processes - from driver load through to host process exit. When enabled, it is considered one of the most valuable USB forensic sources available because its events contain the Vendor ID, Product ID and serial number directly in the event text, without requiring any secondary lookup against registry entries or setupapi logs.
Traces
The most forensically significant Event IDs in the DriverFrameworks-UserMode Operational log are:
| Event ID | Description |
|---|---|
| 2003 | The PnP manager successfully loaded the user-mode driver. Contains the device instance path including Vendor ID, Product ID and serial number directly in the event data. |
| 2004 | The host process for a user-mode driver started. Marks the beginning of an active user-mode driver session for the attached device. |
| 2100 | Device went through power state transition. Records device power management events - useful for correlating device activity with system sleep and wake cycles. |
| 2102 | Host process exited. Records the termination of the user-mode driver host, corresponding to device disconnection. Combines with Event 2003 to bracket the full connection window. |
Forensic Value
- Direct Vendor ID and serial extraction: Event ID 2003 embeds the complete device hardware identifiers - including Vendor ID, Product ID and serial number - directly in the event text, eliminating the need for secondary registry correlation.
- Bracket precise connection windows: Pairing Event 2003 (driver loaded) with Event 2102 (host exited) provides the exact connection start and end timestamps for a user-mode-driven device such as a USB storage device or MTP phone.
- Track MTP device connections: Smartphone connections via MTP are invisible to standard USB storage registry keys but appear clearly in this log, providing forensic coverage for phone-based data exfiltration scenarios.
- Correlate with power events: Event 2100 power state transitions tied to a specific device allow investigators to determine whether a device was connected during a specific sleep/wake cycle, narrowing the exfiltration window.