Appendix N 42
Appendix N 42
Table of Contents
Appendix N: Locating Forensic Data in Windows Registries.....................................................1
Appendix N: Locating Forensic Data in Windows
Registries
ICQ
ICQ NTUSER.DAT \Software\Mirabilis\ICQ\*
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 2
Internet Explorer
IE Auto Logon and NTUSER.DAT \Software\Microsoft\Protected Storage System Provider\SID\Internet
Password Explorer\Internet Explorer—URL: StringData
MSN Messenger
MSN Messenger NTUSER.DAT \Software\Microsoft MessengerService\ListCache\.NET MessngerServi
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 3
Window Messenger
Contact List NTUSER.DAT \Software\Microsoft\MessengerService\ ListCache\.NET Messenger Se
YAHOO Messenger
Chat Rooms NTUSER.DAT \Software\Yahoo\Pager\profiles\screen name\Chat
System Information
Computer Name SYSTEM \ControlSet###\Control\ComputerName\ComputerName
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 5
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 6
Networking
Local Croups SAM \Domains\Builtin\Aliases\Names
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 7
NTUSER.DAT \printers
User Data
EPS NTUSER.DAT Software\Microsoft\WindowsNT\CurrentVersion\EFS\CurrentKeys
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 8
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 9
SOFTWARE \Microsoft\WindowsNT\CurrentVersion\ProfileList\
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 10
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 11
NTUSER.DAT \Software\Microsoft\Windows\CurrentVersion\RunOnce
SOFTWARE \Microsoft\Windows\CurrentVersion\Run
SOFTWARE \Microsoft\Windows\CurrentVersion\RunOnce
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition 12
Reprinted for isaca537453, ISACA CRC Press, Taylor & Francis Group, LLC (c) 2008, Copying Prohibited