Key Considerations for ScreenSharing

  • User vs. System Actions: Not every Registry change is malicious or user-initiated. Correlate Registry key LastWriteTimes with other artifacts (Prefetch, Journal, Event Logs) to establish context. Look for manual access via regedit.exe/reg.exe.

  • Permissions: HKLM modifications typically require administrator privileges. HKCU changes are user-specific.

  • Timestamps: Focus on the "Last Write Time" of keys, indicating the last modification within that key.

  • Deleted Values/Keys: Finding deleted entries, especially in BAM, UserAssist, or OpenSavePidlMRU, via tools like Registry Explorer is a very strong indicator of deliberate evidence clearing/tampering.

Last updated