SlideShare ist ein Scribd-Unternehmen logo
1 von 60
MS DOS
• “config.sys” and “autoexec.bat”.
• “Config.sys” was used to load the device drivers and
• “autoexec.bat” was used to store the configurations of running
programs and other environmental variables
Win 3.0
• two files used in MS-DOS were replaced by INI files. These
files were used to store the configuration settings of the computers.
Windows 95
• In Windows 95, a hierarchical database named Registry was
introduced
• Although the Registry of Windows 95/98 has the similar structure as
Windows XP/Vista/7,
• the amount of data in Windows XP/Vista/7 Registry has grown
tremendously.
• The Registry in Windows XP/Vista/7 has a more stable and complex
structure than Windows 98/95/2000.
• In addition, the structure of Windows XP registry could be considered
as the basis of modern Windows
• The Windows Registry Editor is divided into two panels, the left one is
key panel and the right one is value panel. In the left panel,
KEY
• here are five root keys,
• HKEY_CLASSES_ROOT,
• HKEY_CURRENT_USER,
• HKEY_LOCAL_MACHINE,
• HKEY_USERS,
• HKEY_CURRENT_CONFIG
Keys
• this structure is just a logical
structure
• Among these five root
keys, only two root keys, These
two keys are called master keys.
HKEY_LOCAL_MACHINE
HKEY_USERS,
• Keys have physical files or hives
Derived keys
• The other three keys are derived keys since they are derived from the
two master keys and their subkeys .
HKEY_LOCAL_MACHINE ( HKLM)
• It contains all of the configuration settings of a computer.
• When a computer startups, the local machine settings will boot
before the individual user settings.
• Five Hives are
• HARDWARE,
• SAM,
• SECURITY,
• SOFTWARE,
and
• SYSTEM.
• HARDWARE is used to store the information of hardware devices that a computer
detects when the computer starts up. So, the subkeys in HARDWARE are also created
during the booting process.
• SAM is the abbreviation of Security Account Manager which is a local security database.
Subkeys in SAM contain the setting data of users and work groups.
• SECURITY includes a local security database in SAM and a strict ACL is used to manage
the users who could access the database.
• SOFTWARE includes all of the configuration settings of programs. Information on the
programs is stored in a standard format: HKLMSoftwareVendorProgramVersion.
• SYSTEM contains the configuration settings of hardware drivers and services. The key
path is
HKEY_LOCAL_MACHINESYSTEMControlSetXXX,
where XXX is a three digital number from 000,
HKEY_USERS (HKU)
• HKU is another master key. It
contains all of the per-user
settings
• current console user and other
users who logged on this
computer before
• 3 Basic Sub keys
• Defult
• SID
• SID_Classes
• Usually, we could see
• S-1-5-18, Local System Account
• S-1-5-19, Local Service Account,
• S-1-5-20, Network Service Account
HKEY_CLASSES_ROOT (HKCR).
oHKCR contains two keys:
HKLMSOFTWAREClasses & HKCUSoftwareClasses
HKEY_CURRENT_USER (HKCU).
• HKCU links to a subkey of HKU,
HKUSID.
• This key allows all of the Windows
programs and applications to
create, access, modify, and store
the information of current console
user without determining which
user is logging in.
• Have basic 5 Subkeys
• Environment is about the environmental configurations.
• Identities are related to Outlook Express.
• Network contains settings to connect the mapped network drive.
• Software refers to the user application settings.
• Volatile Environment is used to define the environmental variables
according to different users who logon a computer
Environment
Identities
Network
Software
Volatile Environment
HKEY_CURRENT_CONFIG (HKCC).
• HKCC is an image of the
hardware configuration profiles.
HKLMSYSTEMCurrentControlS
etHardwareCurrent, is also a
link to
HKLMSYSTEMControlSetHard
ware ProfielsXXXX, where XXXX
is a four digital number from
0000.
Values
• Just like a file of Windows, a value also has its properties.
Name, type, and data are the three components of a value. Every
value has a unique name. The naming regulations are also similar to
those of files. Some special characters such as “?”, “”, and so on
could not appear in the name of a value.
• here are six major types of values:
string, multistring, expandable string, binary, Dword, and Qword.
• String values are the easiest to understand because data in this type is
recorded in plain text in English.
• Multistring values include a list of strings with ASCII code 00 separating
these strings.
• Expandable string is another variant of string value. Expandable string
contains special variables such as %SYSTEMROOT%, %USERPROFILE% and
so on. These variables could replace some special path easily. For example,
if we want to locate the folder
X:Documents and SettingsusernameDesktop,
• The %USERPROFIEL%Desktop could be used no matter on which drive
windows are installed and which user logs on.
• Binary value also stores string but the data is displayed in hex format
and the information stored is always related to hardware.
• Unlike the above value types, the data stored in Dword and Qword
are not strings of characters. There are two numbers in Dword and
Qword types: 1 and 0 (usually 1 for enable and 0 for disable). In some
cases, numbers within 60 are used to indicate data related to timeout
settings. However, the difference between Dword and Qword is that
Dword stores 32-bit data and Qword stores 64-bit data
• If we use forensic tools to view the Windows Registry in an
offline environment or view the Registry remotely, only the two
master keys will be listed. So only the two master keys and their
subkeys have hives. The hives of HKLM’s subkeys are stored at
%SYSTEMROOT%System32config, and the hives of HKU’s subkeys
are stored at %USERPFOFILE%.
Cont…
Other Important Path
• HKLMSOFTWAREMicrosoftWindowsCurrentVersionApp Path
HKLMSOFTWARMicrosoftWindowsCurrentVersionUninstal
• Under HKLMSOFTWARE, the last logon user could also be found and
the exact key path is
HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionWinlogon
HKLMSOFTWAREMicrosoftSecurity Center
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServices,
• Each subkey of the Services key has
a DWORD value named “Start”
which
indicates the ways of booting.
• If the data is 2, this service will
start up with the boot of
Windows.
• If the data is 3, the service will be
started manually.
• If the data is 4, the service is
disabled

Weitere ähnliche Inhalte

Was ist angesagt?

Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 

Was ist angesagt? (20)

File system security
File system securityFile system security
File system security
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
File System Interface
File System InterfaceFile System Interface
File System Interface
 
File Systems
File SystemsFile Systems
File Systems
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
OSCh11
OSCh11OSCh11
OSCh11
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Ch11
Ch11Ch11
Ch11
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya Jyothi
 
OSCh13
OSCh13OSCh13
OSCh13
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
File management
File managementFile management
File management
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
Ch12
Ch12Ch12
Ch12
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
File system implementation
File system implementationFile system implementation
File system implementation
 

Ähnlich wie Registry Forensic

Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows Programs
Natraj G
 

Ähnlich wie Registry Forensic (20)

RegEdit
RegEditRegEdit
RegEdit
 
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows Programs
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSIONFORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
 
CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
4. Centos Administration
4. Centos Administration4. Centos Administration
4. Centos Administration
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
Windows internals
Windows internalsWindows internals
Windows internals
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
Windows_Installation.pptx
Windows_Installation.pptxWindows_Installation.pptx
Windows_Installation.pptx
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
 
Mba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsMba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systems
 
Mba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsMba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systems
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech)
 
Ch07
Ch07Ch07
Ch07
 

Kürzlich hochgeladen

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Kürzlich hochgeladen (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Registry Forensic

  • 1. MS DOS • “config.sys” and “autoexec.bat”. • “Config.sys” was used to load the device drivers and • “autoexec.bat” was used to store the configurations of running programs and other environmental variables
  • 2. Win 3.0 • two files used in MS-DOS were replaced by INI files. These files were used to store the configuration settings of the computers.
  • 3. Windows 95 • In Windows 95, a hierarchical database named Registry was introduced
  • 4. • Although the Registry of Windows 95/98 has the similar structure as Windows XP/Vista/7, • the amount of data in Windows XP/Vista/7 Registry has grown tremendously. • The Registry in Windows XP/Vista/7 has a more stable and complex structure than Windows 98/95/2000. • In addition, the structure of Windows XP registry could be considered as the basis of modern Windows
  • 5. • The Windows Registry Editor is divided into two panels, the left one is key panel and the right one is value panel. In the left panel,
  • 6. KEY • here are five root keys, • HKEY_CLASSES_ROOT, • HKEY_CURRENT_USER, • HKEY_LOCAL_MACHINE, • HKEY_USERS, • HKEY_CURRENT_CONFIG
  • 7. Keys • this structure is just a logical structure • Among these five root keys, only two root keys, These two keys are called master keys. HKEY_LOCAL_MACHINE HKEY_USERS, • Keys have physical files or hives
  • 8. Derived keys • The other three keys are derived keys since they are derived from the two master keys and their subkeys .
  • 9. HKEY_LOCAL_MACHINE ( HKLM) • It contains all of the configuration settings of a computer. • When a computer startups, the local machine settings will boot before the individual user settings. • Five Hives are • HARDWARE, • SAM, • SECURITY, • SOFTWARE, and • SYSTEM.
  • 10.
  • 11. • HARDWARE is used to store the information of hardware devices that a computer detects when the computer starts up. So, the subkeys in HARDWARE are also created during the booting process. • SAM is the abbreviation of Security Account Manager which is a local security database. Subkeys in SAM contain the setting data of users and work groups. • SECURITY includes a local security database in SAM and a strict ACL is used to manage the users who could access the database. • SOFTWARE includes all of the configuration settings of programs. Information on the programs is stored in a standard format: HKLMSoftwareVendorProgramVersion. • SYSTEM contains the configuration settings of hardware drivers and services. The key path is HKEY_LOCAL_MACHINESYSTEMControlSetXXX, where XXX is a three digital number from 000,
  • 12. HKEY_USERS (HKU) • HKU is another master key. It contains all of the per-user settings • current console user and other users who logged on this computer before • 3 Basic Sub keys • Defult • SID • SID_Classes
  • 13. • Usually, we could see • S-1-5-18, Local System Account • S-1-5-19, Local Service Account, • S-1-5-20, Network Service Account
  • 14. HKEY_CLASSES_ROOT (HKCR). oHKCR contains two keys: HKLMSOFTWAREClasses & HKCUSoftwareClasses
  • 15. HKEY_CURRENT_USER (HKCU). • HKCU links to a subkey of HKU, HKUSID. • This key allows all of the Windows programs and applications to create, access, modify, and store the information of current console user without determining which user is logging in. • Have basic 5 Subkeys
  • 16. • Environment is about the environmental configurations. • Identities are related to Outlook Express. • Network contains settings to connect the mapped network drive. • Software refers to the user application settings. • Volatile Environment is used to define the environmental variables according to different users who logon a computer
  • 22. HKEY_CURRENT_CONFIG (HKCC). • HKCC is an image of the hardware configuration profiles. HKLMSYSTEMCurrentControlS etHardwareCurrent, is also a link to HKLMSYSTEMControlSetHard ware ProfielsXXXX, where XXXX is a four digital number from 0000.
  • 23. Values • Just like a file of Windows, a value also has its properties. Name, type, and data are the three components of a value. Every value has a unique name. The naming regulations are also similar to those of files. Some special characters such as “?”, “”, and so on could not appear in the name of a value. • here are six major types of values: string, multistring, expandable string, binary, Dword, and Qword.
  • 24. • String values are the easiest to understand because data in this type is recorded in plain text in English. • Multistring values include a list of strings with ASCII code 00 separating these strings. • Expandable string is another variant of string value. Expandable string contains special variables such as %SYSTEMROOT%, %USERPROFILE% and so on. These variables could replace some special path easily. For example, if we want to locate the folder X:Documents and SettingsusernameDesktop, • The %USERPROFIEL%Desktop could be used no matter on which drive windows are installed and which user logs on.
  • 25. • Binary value also stores string but the data is displayed in hex format and the information stored is always related to hardware. • Unlike the above value types, the data stored in Dword and Qword are not strings of characters. There are two numbers in Dword and Qword types: 1 and 0 (usually 1 for enable and 0 for disable). In some cases, numbers within 60 are used to indicate data related to timeout settings. However, the difference between Dword and Qword is that Dword stores 32-bit data and Qword stores 64-bit data
  • 26. • If we use forensic tools to view the Windows Registry in an offline environment or view the Registry remotely, only the two master keys will be listed. So only the two master keys and their subkeys have hives. The hives of HKLM’s subkeys are stored at %SYSTEMROOT%System32config, and the hives of HKU’s subkeys are stored at %USERPFOFILE%.
  • 27.
  • 28.
  • 29.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Other Important Path • HKLMSOFTWAREMicrosoftWindowsCurrentVersionApp Path
  • 53. • Under HKLMSOFTWARE, the last logon user could also be found and the exact key path is HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionWinlogon
  • 60. HKLMSYSTEMCurrentControlSetServices, • Each subkey of the Services key has a DWORD value named “Start” which indicates the ways of booting. • If the data is 2, this service will start up with the boot of Windows. • If the data is 3, the service will be started manually. • If the data is 4, the service is disabled