Abstract
The Windows registry serves as a primary storage location for system configurations and as such provides a wealth of information to investigators. Numerous researchers have worked to interpret the information stored in the registry from a digital forensic standpoint, but no definitive resource is yet available which describes how Windows deletes registry data structures under NT-based systems. This paper explores this topic and provides an algorithm for recovering deleted keys, values, and other structures in the context of the registry as a whole.
Full paper (DFRWS print version) (355 kilobytes)
(Contrary to claims by Elsevier, this paper is Copyright (C) 2008 Timothy D. Morgan.)
DFRWS Presentation Slides (196 kilobytes)