Accessing the Registry

Several tools allow viewing and interacting with the Registry:

  • Regedit (regedit.exe):

    • The built-in Windows graphical Registry Editor.

    • Accessed via Win+R -> regedit. Usually requires administrator privileges for full access.

    • Presents the Registry in a familiar tree structure (Hives > Keys > Subkeys). Values are displayed in the right pane.

    • Forensic Significance: Direct execution of regedit.exe logged in Prefetch/BAM strongly implies manual user interaction. Check the "LastWriteTime" on keys in Regedit (View > Display Key Last Write Time) to see when they were last modified. Regedit also remembers the last key accessed before closing, which can occasionally provide clues.

  • Reg.exe:

    • The command-line utility for Registry operations (reg query, reg add, reg delete, reg compare, etc.).

    • Forensic Significance: Execution logged in Prefetch/BAM or command history indicates scripted or manual command-line manipulation, often used for bypasses like clearing BAM entries or disabling security features.

  • Third-Party Tools (Registry Explorer, etc.):

    • Registry Explorer (Eric Zimmerman): A powerful, free, GUI-based forensic tool specifically designed for Registry analysis. It can parse live Registry hives or offline hive files (e.g., extracted from C:\Windows\System32\config or VSS).

    • Key Features for Screensharing:

      • Deleted Key/Value Indication: Often visually highlights (e.g., with a specific icon like a red circled warning) the presence of deleted keys or values within a loaded hive's structure. Finding recently deleted entries in forensically relevant hives like BAM or UserAssist during the current boot session is highly suspicious evidence of cleanup attempts.

      • Robust Search (CTRL+F): Allows searching across keys, value names, value data, and even slack space for specific strings, keywords, dates (in UTC), or data sizes.

      • Deleted Value Recovery: Can often recover and display the data of deleted keys/values (usually highlighted, often in red text).

      • Bookmarks: Includes predefined bookmarks pointing to common forensically significant locations (UserAssist, BAM, Run Keys, USBStor, etc.).

      • Timestamp Display: Clearly displays the "Last Write Time" for each key, indicating the last time any value or subkey within it was modified. Displays timestamps in UTC by default.

    • Usage Note: It's often recommended to launch Registry Explorer and load the necessary hives (NTUSER.DAT for user activity, SYSTEM/SOFTWARE for system config) early in the screenshare. It takes a snapshot at the time of loading and doesn't update live, preserving the state at that moment against further changes by the user or system. Requires administrator privileges.

    • Other Tools: RegScanner (Nirsoft) offers alternative search capabilities.

Last updated