Win 7 Registry Forensic
Win 7 Registry Forensic
5(4)
ABSTRACT
The recovery of digital evidence of crimes from storage media is an increasingly
time consuming process as the capacity of the storage media is in a state of
constant growth. It is also a difficult and complex task for the forensic investigator
to analyse all of the locations in the storage media. These two factors, when
combined, may result in a delay in bringing a case to court. The concept of this
paper is to start the initial forensic analysis of the storage media in locations that
are most likely to contain digital evidence, the Windows Registry. Consequently,
the forensic analysis process and the recovery of digital evidence may take less
time than would otherwise be required. In this paper, the Registry structure of
Windows 7 is discussed together with several elements of information within the
Registry of Windows 7 that may be valuable to a forensic investigator. These
elements were categorized into five groups which are system, application,
networks, attached devices and the history lists. We have discussed the values of
identified elements to a forensic investigator. Also, a tool was implemented to
perform the function of extracting these elements and presents them in usable
form to a forensics investigator..
Keywords: Windows Registry, Computer Forensics, Forensics investigator
1. INTRODUCTION
It is generally accepted nowadays that there is an ongoing evolution in
technologies (including computers, networks, the internet, smart homes, e-
commerce etc.) that are increasingly involved in most aspects of our life. Illegal
activities and crimes have also increased with this evolution. A large number of
organisations are suffering from these computer crimes and the criminals that
perpetrate them have a range of motivations. For example, criminals have
terrorism goals or may aim to gain money or seek to destroy the reputation and
customer confidence of organisations. Figure 1 shows several types of computer
crimes and the percentages of organisations affected by these crimes in the
Middle East for the period between 2007 and 2009.
5
Journal of Digital Forensics, Security and Law, Vol. 5(4)
Since crimes have moved into the computing environment, a new field in forensic
investigations has appeared which is called Computer Forensics, but this is now
more commonly referred to as digital forensics. There are several definitions for
Computer Forensic including the following:
“Computer forensic is the collection, preservation, analysis, and
presentation of computer-related evidence” (Vacca, 2010).
“Computer investigation and analysis techniques that involve in
the identification, preservation, extraction, documentation, and
interpretation of computer data to determine potential legal
evidence” (Solomon, Barrett, & Broom, 2005).
From these definitions it is clear that the aim of computer forensics is to find
digital evidence that is acceptable in the court. It is generally accepted that the
capacity of storage media is in a state of constant growth. Consequently, the
recovery of digital evidence of crimes from storage media is increasingly time
consuming and complex. One way to make the process faster and simpler is to
start searching for evidence in the locations that are most likely to contain
information that is of value to the forensics investigator. One of the best areas to
start such an investigation is in the Windows Registry.
The Windows Registry is one of the essential components of current Microsoft
Windows operating systems. The Windows registry performs two critical tasks
for the Microsoft Windows operating system. The first is that it is the repository
for settings for the Windows operating system and applications that are installed
on the system. The second is that it is the database of the configuration of all
installed hardware. The Windows Registry is defined as follows:
6
Journal of Digital Forensics, Security and Law, Vol. 5(4)
7
Journal of Digital Forensics, Security and Law, Vol. 5(4)
long way towards giving you insight into activity that occurred on the system”.
He analysed the Registry structure of Windows XP and did an excellent job of the
analysis of the registry structure within the hive files in physical memory. He also
provided useful information about the signature of hive files in memory. These
signatures can be used by a forensics investigator to carve registry keys and their
values from the unallocated space of an image or from a dump of the RAM. The
value of this book is the registry analysis and the considerable amounts of
valuable information that are identified for the forensics investigator within the
Windows Registry. For example time zone information, audit policy, wireless
SSIDs, locations of auto-start programs, user activities and mounted devices. I
believe that this book provides the forensics investigator with a deeper
understanding of the forensics elements within the Windows Registry.
Thomas and Marris said that “When a USB flash drive is plugged into a Windows
XP computer, a number of registry settings and log files are automatically
updated to reflect the use of the USB flash drive” (Thomas & Marris, 2008). The
purpose of their work was to understand information that identifies a USB flash
drive that has been used in the computer and to identify where the forensics
investigator should look to acquire this digital evidence.
3. WINDOWS REGISTRY STRUCTURE
In the Windows operating system, the Windows Registry is organised logically
into a number of root keys and tools such as, the Windows Registry editor can be
used to display the logical structure of the Windows Registry. There are five
logical root keys in the Windows Registry of Windows 7 which are:
1. HKEY_CLASSES_ROOT.
2. HKEY_CURRENT_USER.
3. HKEY_LOCAL_MACHINE.
4. HKEY_USERS.
5. HKEY_CURRENT_CONFIG.
Figure 2 shows the five root keys of the Registry in Windows 7 as displayed in
the Windows Registry Editor.
8
Journal of Digital Forensics, Security and Law, Vol. 5(4)
Actually there are only two root keys which are HKEY_LOCAL_MACHINE and
HKEY_USERS. These two root keys are stored on the hard disk of the system
and are not volatile data held in main memory. The other root keys are subsets of
these of keys. Figure 3 shows the relationship between root keys.
The Windows Registry editor displays the logical structure of the Registry. The
Windows operating system organises the Registry into a number of hive files. The
hive file is a binary file which consists of one or more Registry keys, together
with their values. These files have been modified with changes in the Windows
operating system. The changes have been made because each new Windows
operating system has new functionality. Figure 4 shows the changes in hive files
of the Windows Registry in several variants of the Windows operating system.
9
Journal of Digital Forensics, Security and Law, Vol. 5(4)
10
Journal of Digital Forensics, Security and Law, Vol. 5(4)
The information about the processors of the system is stored in the following
Windows Registry sub keys:
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralPro
cessor\0
HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralPro
cessor\1
This information includes the processor name, its speed and vendor identifier as
shown in Figure 6.
There are a number of elements of information about the user account that are
stored in the Registry. For example a list of user accounts, last login time of each
account, whether it requires a password, whether it is a disabled or enabled
account and the method used to hash the password of the user account. All of this
11
Journal of Digital Forensics, Security and Law, Vol. 5(4)
In addition the user account names are listed in the following Registry key:
HKEY_LOCAL_MACHINE\SAM\Domains\Account\Users\Names
Figure 8 shows the user account names as they viewed using the Access Data
Windows Registry viewer.
13
Journal of Digital Forensics, Security and Law, Vol. 5(4)
b. Registered Application
The list of registered application is showed in Figure 11 and listed in the
following Register key:
HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications
14
Journal of Digital Forensics, Security and Law, Vol. 5(4)
15
Journal of Digital Forensics, Security and Law, Vol. 5(4)
16
Journal of Digital Forensics, Security and Law, Vol. 5(4)
17
Journal of Digital Forensics, Security and Law, Vol. 5(4)
Figure 14. This key holds a great deal of information about the networks in
general rather than just about wireless networks.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\NetworkList\Signatures\Unmanaged
18
Figure 15: Created date and last connected date of Wireless network
Journal of Digital Forensics, Security and Law, Vol. 5(4)
The type of these values is binary data type. The following is an explanation how
to view these values as a normal date time (Decoding the DateCreated and
DateLastConnected SSID values From Vista/Win 7, 2010) :
19
Journal of Digital Forensics, Security and Law, Vol. 5(4)
b. USB Devices
Any time a new USB Device is connected to the system, it will leave information
about this USB device within the Registry. This information can uniquely identify
each USB device connected to the system. The Windows Operating system stores
vendor ID, product ID, Revision and Serial No. for each connected USB device.
This information can be found in the following Registry key (Carvey & Kleiman,
2007):
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\USBSTOR
Figure 18 shows how information about USB devices stored in the previous key.
5. HISTORY LIST
The history lists highlights the most recent activity on the system. For example
recently visited web pages or recently opened word files. There are several sub
20
Journal of Digital Forensics, Security and Law, Vol. 5(4)
keys in the Registry that show recent activity by the system users. Table 2
represents the history list with corresponding sub keys in the Windows Registry.
21
Journal of Digital Forensics, Security and Law, Vol. 5(4)
\Microsoft\Windows\CurrentVersion\Explorer\Rece
ntDocs\.jpg
Recent text files HKEY_USERS\S-1-5-21-[User Identifier]
\Software
\Microsoft\Windows\CurrentVersion\Explorer\Rece
ntDocs\.txt
Recent folders HKEY_USERS\S-1-5-21-[User Identifier]
\Software
\Microsoft\Windows\CurrentVersion\Explorer\Rece
ntDocs\Folder
Recent Zip files HKEY_USERS\S-1-5-21-[User Identifier]
\Software \Microsoft
\Windows\CurrentVersion\Explorer\RecentDocs\.zi
p
22
Journal of Digital Forensics, Security and Law, Vol. 5(4)
investigator will be interested to know whether the user of suspect machine used a
chat application such as Microsoft Windows Live Messenger and Skype. It is also
important to know the account name that the user of the suspect machine was
using. For example, in cases involving child abuse, the criminal may
communicate with the child using Microsoft Windows Live Messenger and
Skype. Knowing the criminal’s account name from the contact list of the child
and then finding the criminal account as a recent user or saved account in the
suspect machine is considered as potential digital evidence.
Network analysis will give the forensic investigator an overview of networking
activities that were performed by the suspect machine. From the list of network
cards, the forensic investigator can identify all of the cards that were used by the
system whether they were built in the system or externally attached to the system.
Also, he will gain any list intranets that the suspect machine was connected to.
Moreover, he will gain valuable information about the wireless networks that the
system connected to including the profile names of any wireless networks, the
created date and the last connected date.
The analysis of the attached devices will give the forensic investigator
information about the devices that have been connected to the system. It includes
two categories of attached devices, printers and USB devices. The list of printers
and their information such as model name and installed date are valuable
information to a forensic investigator and could be considered as potential digital
evidence. For instance in a counterfeiting crime, the criminal will normally use
high quality printers to produce a credit card that looks like the original.
Furthermore, it’s important to a forensic investigator to know what USB devices
have been attached to the system and information such as product ID and serial
No. especially in the case of the theft of data from a computer.
The history list provides the forensic investigator with the most recent activity on
the system by each user, such as typed URLs in Microsoft Internet Explorer and
most recently used Microsoft Word files. The typed URLs in Microsoft Internet
Explorer can provide the forensic investigator with potential digital evidence in
several types of computer crimes such as child abuse, computer intrusion, murder
and harassment. The recent .jpg files and recent .GIF files can provide the
forensic investigator with potential digital evidence about opened images in child
abuse crime. In identity theft, counterfeiting and terrorism crimes, the criminal
may store credit card information which has been used to transfer money in a text
or word files. I have mentioned the location of the most recent used word files or
.txt file with the Windows Registry in Table 2.
7. IMPLEMENTATION OF WINDOWS REGISTRY FORENSICS
TOOL
As a result of this research, a tool has been created to extract potentially
significant elements of information that may be valuable to forensic investigators
from the hive files of the Windows 7 Registry and present them in a form that is
23
Journal of Digital Forensics, Security and Law, Vol. 5(4)
useful to the investigator. The tool was implemented using Visual Basic .NET
programming language. The tool uses several API functions to retrieve data from
complex data structure of the Windows Registry hive files which are:
1. RegLoadKey
This function is used to load hive files into the live system to start
analysing them.
2. RegUnLoadKey
This function is used to unload the loaded hive files from live system.
Importing the Microsoft.Win32 name space into Visual Basic .NET project,
allows the use of various functions to deal with hive files that are loaded in the
live system such as (RegistryKey Methods, 2010):
1. OpenSubKey
This function allows the application to use a specified sub key in read-
only mode.
2. GetSubKeyNames
This function is used to retrieve a list of sub key names of the specified
key.
3. GetValue
This function is used to retrieve data of the specified value of a Registry
key.
4. GetValueNames
This function is used to retrieve a list of all values name of the specified
key.
5. Close
This function is used to close the Registry key that is opened previously
by OpenSubKey.
The following figures are snapshots from the Windows Registry Forensics Tool
which has been called the KUSTAR Windows Registry Forensics Tool. Figures
19 to 22 show screenshots of the tool.
24
Journal of Digital Forensics, Security and Law, Vol. 5(4)
25
Journal of Digital Forensics, Security and Law, Vol. 5(4)
26
Journal of Digital Forensics, Security and Law, Vol. 5(4)
27
Journal of Digital Forensics, Security and Law, Vol. 5(4)
8. CONCLUSION
The Windows Registry is a database that has been implemented in the Microsoft
Windows operating system to hold the settings and configuration of the system
hardware, applications and users profiles. It is generally accepted that the
Windows Registry holds several potentially significant elements of information
that may be valuable to forensic investigators.
The identification and recovery of evidence from storage media that is constantly
increasing in size is a time consuming process. There are several elements that
can be valuable to the forensic investigators that are contained within Windows
Registry, and it may help to reduce the time taken for an investigation if the
investigator carries out an initial search of this repository. Once the investigator
has found the relevant information, it may help to guide further work and provide
information that was not available from other sources. Consequently, the
investigation process could take less time and become simpler.
28
Journal of Digital Forensics, Security and Law, Vol. 5(4)
REFERENCES
(November 2009). An on the Scene Reference for First Responders. The
National Institute of Justice.
Carvey, H., & Kleiman, D. (2007). Windows Forensic Analysis. Syngress
Publishing.
Decoding the DateCreated and DateLastConnected SSID values From
Vista/Win 7. (2010, February 12). Retrieved August 5, 2010, from
securitybananas.com: http://securitybananas.com/?p=225
Dwyer, P. c. (2010, March 19). Cyber Crime in the middle east.
Farmer, D. J. (2008). A Windows Registry Quick-Reference.
Forrest, P., Denham, D., Prevost, S., & Klein, T. (2010, October 29). Starup
Application list. Retrieved November 1, 2010, from SYSINFO:
http://www.sysinfo.org/startuplist.php
Honeycutt, J. (2005). Microsoft Windows Registry Guide. Microsoft Press.
Kokoreva, O. (2002). Windows XP Registry. A-LIST.
Michael Solomon, D. B. (2005). Computer Forensics, jump start. SYBEX.
Microsoft Computer Dictionary. (2002). Microsoft Press.
MSN:P2P/Msnobj Description. (2009, June 22). Retrieved June 22, 2010, from
OpenIM wiki: http://imfreedom.org/wiki/MSN:P2P/Msnobj_Description
RegistryKey Methods. (n.d.). Retrieved August 21, 2010, from MSDN:
http://msdn.microsoft.com/en-
us/library/microsoft.win32.registrykey_methods.aspx
Solomon, M., Barrett, D., & Broom, N. (2005). In Computer Forensics
JumpStart (pp. 73-155). SYBEX.
Thomas, P., & Marris, A. (2008). An Investigation into Development of Anti-
Forensic Tool to Obscure USB Flash Drive Device Information on a Windows
XP Platform. Third International Annual Workshop on Digital Forensics and
Incident Analysis (pp. 60-66). IEEE.
Vacca, J. R. (2010). Computer Forensic, computer crime scene investigation.
Charles River Media.
29
Journal of Digital Forensics, Security and Law, Vol. 5(4)
30