Artigo Acesso aberto Revisado por pares

Forensic Analysis of the Windows 7 Registry

2010; Association of Digital Forensics, Security and Law; Linguagem: Inglês

10.15394/jdfsl.2010.1081

ISSN

1558-7223

Autores

Khawla Alghafli, Andrew Jones, Thomas Martin,

Tópico(s)

Advanced Malware Detection Techniques

Resumo

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic analysis process and the recovery of digital evidence may take less time than would otherwise be required. In this paper, the Registry structure of Windows 7 is discussed together with several elements of information within the Registry of Windows 7 that may be valuable to a forensic investigator. These elements were categorized into five groups which are system, application, networks, attached devices and the history lists. We have discussed the values of identified elements to a forensic investigator. Also, a tool was implemented to perform the function of extracting these elements and presents them in usable form to a forensics investigator.

Referência(s)