Windows 7 → 11
NTFS, ReFS, registry hives, $MFT, USN, Event Logs, ShimCache, AmCache and SRUM analysed end-to-end.
- NTFS
- Registry
- Event Logs

We image Windows desktops, laptops and servers, parse the registry and Event Logs, recover deleted records and reconstruct user activity — with reports that withstand cross-examination.
Windows leaves traces in dozens of places — registry hives, Event Logs, $MFT, USN journal, ShimCache, AmCache, SRUM and browser history. We work each one and reconcile them chronologically.
Bit-for-bit acquisition of HDDs, SSDs, NVMe and removable media — write-blocked, hash-verified, defensible.
Memory acquisition for credentials, encryption keys, running processes and malware indicators that vanish on shutdown.
Registry hives, $MFT, USN journal, ShimCache, AmCache and SRUM analysed for execution and access history.
Logon/logoff, shellbags, jumplists, prefetch, browser history and Recents reconstructed chronologically per user.
PST, OST, mbox and Exchange archives parsed and searched at scale, with full metadata and attachments preserved.
Every USB stick, external drive and connected peripheral documented — when, where and by which account.
From a single laptop through to clustered virtual servers, we work to the highest forensic standard the platform and security state allow.
NTFS, ReFS, registry hives, $MFT, USN, Event Logs, ShimCache, AmCache and SRUM analysed end-to-end.
Onsite imaging of running servers, Active Directory artefacts, IIS and SQL Server logs preserved.
Snapshot acquisition of virtual Windows hosts — minimal disruption to production environments.
Lawful examination where the recovery key, TPM unlock or credentials are available — including AD-recovered keys.
Our Windows examinations are built around industry-standard forensic platforms — write-blocked acquisition hardware, validated imaging tools, and analytical suites used by Australian law enforcement.
Every step is documented. Every file is hashed. Nothing is opened on a live drive without a documented reason. The output is an exhibit pack a magistrate, judge or arbitrator can rely on.
Windows 7 → 11
Live & paged
BitLocker
Hash-verified
Confidential brief, lawful authority confirmed, devices and custodians scoped, fixed-fee quote provided.
Write-blocked imaging onsite or in our lab. Hashes captured. Chain of custody opened.
Registry, logs and journals parsed; deleted data carved; timelines and user activity reconstructed across systems.
Plain-English findings with annotated exhibits. Expert testimony available where required.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.