SlideShare a Scribd company logo
1 of 8
WHAT IS REGEDIT?
• Is a hierarchical database that stores low-level settings
for the Microsoft Windows operating system and for
applications that opt to use the registry.
• The registry is a database file or presentation that is
used by all windows operating systems that followed
Win95.
• The registry is used by the Windows OS to store
hardware and software configuration information, user
preferences and setup information.
• The correct registry is essential for correct windows
performance and functioning, this is why the registry is
usually attacked by viruses and other malicious
software.
• HKEY_CLASSES_ROOT - The software settings about the file
system, shortcut information, information on file associations
and other user interface information are stored in this hive. The
file association information are essentially used by Windows to
invoke the correct program when a file is opened using Windows
Explorer.
• HKEY_USERS – The configuration settings for each hardware
and software item in the computer system, corresponding to
each of the users of the computer system are stored in this hive.
The information on the user's folders, user's choices of themes,
colors and Control Panel settings are stored here as user's
profile. This hive has a subkey for each user storing his/her
user's profile.
• HKEY_CURRENT_USER - The configuration settings for each hardware
and software item in the computer system, corresponding to the
currently logged-on user are stored in this hive. This hive is dynamic, i.e.
whenever a user logs-on into the system, the settings corresponding to
the user are retrieved from the respective subkey of H_KEY_USERS as
user profile and stored in this hive. If a currently active item modifies a
registry entry in its course of operation, the change will affect only the
current user.
• HKEY_LOCAL_MACHINE - The configuration settings for hardware
and software for all users of the computer are stored in this hive. The
information stored here is computer specific and not user specific.
• HKEY_CURRENT_CONFIG - The current hardware configuration
settings, pointing to HKEY_LOCAL_MACHINE Config are stored in this
hive. This hive is dynamic, meaning it is built on the run.
WINDOWS REGISTRY ANALYSIS
• Computer forensics is the process of methodically examining computer
media (hard disks, diskettes, tapes, etc.) for evidence . When considering
computer forensics, registry forensics plays a huge role because of the
amount of the data that is stored on the registry and the importance of
the stored data. The extraction of this data is therefore highly important
when investigating.
• The Windows registry is a central hierarchical database intended to store
information that is necessary to configure the system for one or more
users, applications or hardware devices . There are four
main registry files: System, Software, Security and SAM registry.
• Registry analysis involves:
• Extracting information and context from a largely untapped source
of data
• Extracting relevant information only (Dan Purcell, CEIC 2009)
• Knowing the context which creates or modifies Registry data, as
that you do find can significantly impact your overall analysis
RegEdit

More Related Content

Similar to RegEdit

operating system ondesktop computer ( laptop)
operating system ondesktop  computer ( laptop)operating system ondesktop  computer ( laptop)
operating system ondesktop computer ( laptop)
BandaruGowtham1
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
EPAM Systems
 

Similar to RegEdit (20)

Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)
 
File Management
File ManagementFile Management
File Management
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
fileanddirectory-PID.pptx
fileanddirectory-PID.pptxfileanddirectory-PID.pptx
fileanddirectory-PID.pptx
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech)
 
operating system ondesktop computer ( laptop)
operating system ondesktop  computer ( laptop)operating system ondesktop  computer ( laptop)
operating system ondesktop computer ( laptop)
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
System admin virtualization
System admin   virtualizationSystem admin   virtualization
System admin virtualization
 
Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
Operating System 2.pptx
Operating System 2.pptxOperating System 2.pptx
Operating System 2.pptx
 
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
 
Os
OsOs
Os
 
Database management systems components
Database management systems componentsDatabase management systems components
Database management systems components
 
Database management system lecture notes
Database management system lecture notesDatabase management system lecture notes
Database management system lecture notes
 
Windows forensic
Windows forensicWindows forensic
Windows forensic
 
Db envi
Db enviDb envi
Db envi
 
Db Envi
Db EnviDb Envi
Db Envi
 
1. Unit 1_Introduction to OS.pptx
1. Unit 1_Introduction to OS.pptx1. Unit 1_Introduction to OS.pptx
1. Unit 1_Introduction to OS.pptx
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

RegEdit

  • 2. • Is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry. • The registry is a database file or presentation that is used by all windows operating systems that followed Win95. • The registry is used by the Windows OS to store hardware and software configuration information, user preferences and setup information. • The correct registry is essential for correct windows performance and functioning, this is why the registry is usually attacked by viruses and other malicious software.
  • 3. • HKEY_CLASSES_ROOT - The software settings about the file system, shortcut information, information on file associations and other user interface information are stored in this hive. The file association information are essentially used by Windows to invoke the correct program when a file is opened using Windows Explorer. • HKEY_USERS – The configuration settings for each hardware and software item in the computer system, corresponding to each of the users of the computer system are stored in this hive. The information on the user's folders, user's choices of themes, colors and Control Panel settings are stored here as user's profile. This hive has a subkey for each user storing his/her user's profile.
  • 4. • HKEY_CURRENT_USER - The configuration settings for each hardware and software item in the computer system, corresponding to the currently logged-on user are stored in this hive. This hive is dynamic, i.e. whenever a user logs-on into the system, the settings corresponding to the user are retrieved from the respective subkey of H_KEY_USERS as user profile and stored in this hive. If a currently active item modifies a registry entry in its course of operation, the change will affect only the current user. • HKEY_LOCAL_MACHINE - The configuration settings for hardware and software for all users of the computer are stored in this hive. The information stored here is computer specific and not user specific. • HKEY_CURRENT_CONFIG - The current hardware configuration settings, pointing to HKEY_LOCAL_MACHINE Config are stored in this hive. This hive is dynamic, meaning it is built on the run.
  • 5.
  • 6. WINDOWS REGISTRY ANALYSIS • Computer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence . When considering computer forensics, registry forensics plays a huge role because of the amount of the data that is stored on the registry and the importance of the stored data. The extraction of this data is therefore highly important when investigating. • The Windows registry is a central hierarchical database intended to store information that is necessary to configure the system for one or more users, applications or hardware devices . There are four main registry files: System, Software, Security and SAM registry.
  • 7. • Registry analysis involves: • Extracting information and context from a largely untapped source of data • Extracting relevant information only (Dan Purcell, CEIC 2009) • Knowing the context which creates or modifies Registry data, as that you do find can significantly impact your overall analysis