{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com\/fr\/","author_name":"Phil Froklage","author_url":"https:\/\/www.magnetforensics.com\/fr\/blog\/author\/phil-froklage\/","title":"Analyse criminalistique de shellbags (cl\u00e9s de registre) Windows - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YrfHJFLvzR\"><a href=\"https:\/\/www.magnetforensics.com\/fr\/blog\/analyse-judiciaire-de-shellbags-cles-de-registre-windows\/\">Analyse criminalistique de shellbags (cl\u00e9s de registre) Windows<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/fr\/blog\/analyse-judiciaire-de-shellbags-cles-de-registre-windows\/embed\/#?secret=YrfHJFLvzR\" width=\"600\" height=\"338\" title=\"&#8220;Analyse criminalistique de shellbags (cl\u00e9s de registre) Windows&#8221; &#8212; Magnet Forensics\" data-secret=\"YrfHJFLvzR\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2014\/08\/MF_Blog_ForensicAnalysisofWindowsShellbags_BlogHeader_1600x550.png","thumbnail_width":1600,"thumbnail_height":550,"description":"Voici le cinqui\u00e8me et dernier article de blog d\u2019une s\u00e9rie portant sur la r\u00e9cup\u00e9ration d\u2019applications professionnelles et art\u00e9facts de syst\u00e8mes d\u2019exploitation pour vos enqu\u00eates de criminalistique num\u00e9rique. Que sont les shellbags (cl\u00e9s de registre) ? Bien que les shellbags aient fait leur apparition avec Windows XP, ce n\u2019est que r\u00e9cemment qu\u2019ils sont devenus un art\u00e9fact &hellip; A continu\u00e9"}