Nytro Posted December 6, 2011 Report Posted December 6, 2011 Recovering deleted data from the Windows registryTimothy D. MorganVSR Investigations, LLC, Boston, Massachusetts, United Statesa b s t r a c tThe Windows registry serves as a primary storage location for system configurations and assuch provides a wealth of information to investigators. Numerous researchers have workedto interpret the information stored in the registry from a digital forensic standpoint, but nodefinitive resource is yet available which describes how Windows deletes registry data structuresunder NT-based systems. This paper explores this topic and provides an algorithm forrecovering deleted keys, values, and other structures in the context of the registry as awhole.ª 2008 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved.1. IntroductionThe Windows registry stores a wide variety of information,including core system configurations, user-specific configuration,information on installed applications, and user credentials.In addition, each registry key records a time stampwhen modified which can aid in event reconstruction. Thismakes the Windows registry a critical resource for digitalforensic investigations conducted against the Windows platform,as numerous researchers have shown.Little information has been published by Microsoft relatedto the specifics of how registry information is organized intodata structures on disk. Fortunately, various open sourceprojects have worked to understand and publish thesetechnical details in order to write software compatible withMicrosoft’s registry format. However, no public resourcewas yet available describing what happens to registry datawhen it is deleted under Windows NT-based systems, 1 letalone how a forensic examiner might reliably recover this informationin the context of a registry hive. Here, we attemptto shed light on questions related to the deletion of registrydata structures and suggest an algorithm for recovering thisinformation.Download:http://www.dfrws.org/2008/proceedings/p33-morgan.pdf Quote