Windows 7 → 11 · Server
NTFS, ReFS, registry hives, $MFT, USN journal, Event Logs, ShimCache, AmCache and SRUM analysed end-to-end.
- NTFS
- Registry
- Event Logs

We image computers and servers, recover deleted records, reconstruct user activity and produce reports that withstand cross-examination — across Windows, macOS, Linux and virtualised infrastructure.
Modern computers leave traces in dozens of places — disk, memory, registry, logs, sync services. We work each one methodically and reconcile them into a single chronological view a court can follow.
Bit-for-bit acquisition of HDDs, SSDs, NVMe and removable media — write-blocked, hash-verified, defensible.
RAM acquisition for credentials, encryption keys, running processes and malware indicators that vanish on shutdown.
Carving, MFT and journal analysis recover deleted documents, images and records — even after wipe attempts.
Firewall, proxy, DNS, EDR and Windows event logs reconstructed into a single defensible timeline.
BitLocker, FileVault, VeraCrypt and APFS encrypted containers — examined where lawful keys or recovery is possible.
PST, OST, mbox and Exchange archives parsed and searched at scale, with full metadata and attachments preserved.
From a single laptop to a clustered virtual environment — we work to the highest forensic standard the platform and its security state allow.
NTFS, ReFS, registry hives, $MFT, USN journal, Event Logs, ShimCache, AmCache and SRUM analysed end-to-end.
APFS imaging, FileVault handling where lawful, Unified Logs, KnowledgeC, Spotlight metadata and Time Machine analysis.
ext4, XFS, ZFS, journald, auditd and bash history — with LVM and encrypted volume reconstruction.
Onsite imaging of running servers, ESXi and Hyper-V snapshots, RAID 0/1/5/6/10 reconstruction.
Our examinations are built around industry-standard forensic platforms — write-blocked acquisition hardware, validated imaging tools, and analytical suites used by Australian law enforcement and corporate investigators.
Every step is documented. Every file is hashed. Nothing is opened on a live drive. The output is an exhibit pack a magistrate, judge or arbitrator can rely on.
30+
Live & paged
BitLocker · FileVault
Hash-verified
Confidential brief, lawful authority confirmed, devices and custodians scoped, fixed-fee quote provided.
Write-blocked imaging onsite or in our lab. Hashes captured. Chain of custody opened.
Artefacts parsed, deleted data carved, timelines and user activity reconstructed across systems.
Plain-English findings with annotated exhibits. Expert testimony available where required.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.