Tag Archives: Windows Registry Forensics

Registry Key Last Write Time

Windows Registry keys keep a time stamp embedded within them. This cannot easily be seen using regedit.exe, so instead we turn to our trusty Forensic tool kit. First off I used FTK Imager to capture locked files. This allowed the … Continue reading

Posted in Windows Forensics, Windows Registry Forensics | Tagged , | 4 Comments

Windows Registry – The basics

The Windows registry is made up of individual files, known as ‘hives’, these hives contain ‘keys’ (folders) and ‘values’ (data). There are four root keys: HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USERS   It is possible to access the registry while Windows is … Continue reading

Posted in Windows Forensics | Tagged , | Leave a comment