Skip to main content

8 Tools to Track Registry and File Changes by installing a software


1. Regshot unicode
Regshot is a long running utility that can quickly take a before and after snapshot of the system registry. Also in the more recent unicode version it’s gained the ability to monitor for file changes using CRC32 and MD5 file checksums although this function is turned off by default and you have to go to File -> Options -> Common Options -> and tick “Check files in the specified folders” to enable it. Only the Windows folder is entered into the list of watched folders so you have to enter any others yourself through the Folders tab. This version also added the Connect to remote registry option.
RegShot
Regshot is very much a “hands on” utility and is more for experienced or advanced users to quickly check for system changes between two different points in time. Simply create the 1st shot, install the software or run the program you want to watch, and then press 2nd shot. After comparing the differences in the 1st and 2nd shots, it will open an HTML log in your browser listing all the detected changes. Being only a few hundred KB and portable, Regshot is an extremely valuable tool to have around. The original Regshot is still very slowly being developed and there is a recent beta with separate 32 / 64-bit and ANSI / Unicode versions that can be found at SourceForge.

2. InstallWatch Pro
InstallWatch Pro is quite an old utility which works in a similar way to RegShot in that it tracks any changes made to your registry and files between 2 given points in time although this program is more specifically designed for tracking installs. The program is quite detailed in what it can track and includes additions, deletions, or modifications to files and directories, INI files and the system registry.
InstallWatch Pro
The good thing about InstallWatch is the easy to read way in which the results are displayed because it behaves just like a standard Explorer window with an expanding tree view of the sections on the left. While the program is running it will detect if you run a setup installer and ask to create a before snapshot, or you can simply click the Snapshot button on the toolbar. After install, it will ask to create the after snapshot or you can use the Analyze button. The result can then be browsed or individual sections can be exported to text or HTML. All installs are instantly accessible from the tree view and there is also a useful search function.

3. SpyMe Tools
This utility has something the others in the list don’t which is a function to monitor a drive or folder in real time for file changes and could prove a useful addition when doing a bit of troubleshooting. SpyMe Tools is a quite an old program but is still perfectly capable at creating before and after snapshots to watch an install or software for changes. It does have one drawback though because there is only the facility to snapshot either files or registry, not both together, changeable in the Current Mode option on the toolbar.
SpyMe Tools monitor installation
Like InstallWatch Pro the interface looks a lot like Explorer so you should feel at home navigating around. The way SpyMe Tools works is slightly awkward because you have to click the Scan button and save the snapshot, install or run the software to track, then click the Scan button again and save another snapshot with a different name. Both are then tested for changes using the Compare button and the results will show in the window. The differences between the 2 snapshots can be saved as a text file. SpyMe Tools is also a portable program.

4. InCtrl5
InCtrl5 is an incredibly old tool dating way back to the year 2000 but some users may have heard or used it before, and it can still do a job with a little bit of effort. There are one or two issues with it though which require a bit of knowledge to use the program effectively. First, unsurprisingly InCtrl5 will need to be run in compatibility mode for Windows Vista, 7 or 8. Secondly, there is an issue with it’s output results for 64-bit users as it won’t display the Software\Wow6432Node registry keys as coming from there, but will instead show them as coming from simply Software, something to watch out for.
InCtrl5
Using the program is pretty easy and it will track changes to the registry, drives and folders, ini files and also specific text files. Inclusions and exclusions can be configured by using the What to track buttons. After selecting the installer you want to track, it will create the before snapshot for you. Then you install the software and press the Install Complete button to create the after snapshot and the analysis, which could take a little while. The result will then open up a window where it can be viewed or saved as HTM, TXT or CSV files formats.

5. InstallSpy 2
Although not quite as old as InCtrl5 above, InstallSpy dates back to 2003 but could prove useful because of the massive amount of options available for monitoring. This tool is good for not just for tracking file and registry changes during an install, but also for general execution of programs through the monitoring of shell events like file type association or attribute changes, drive or media insertion and removal, server disconnect, folder sharing and a lot more.
InstallSpy
InstallSpy runs according to a series of wizard like steps from 1 to 7. The 1st step is used to load the setup installer or application to monitor, or if you just want to track changes between 2 points in time, click the Yes button. Then proceed through the steps following what it tells you to do until the before and after snapshots have been analyzed and the differences report file opened as an HTML document. There can be quite a lot of entries in the report file because of the amount of configuration options available so it might be a wise idea not to turn everything on thinking you’ll get a better report because of it.

6. SysTracer
The full version of SysTracer isn’t a free tool but there is a restricted free version available. Some things including the comparing and exporting of snapshots is limited and you also can only create 5 snapshots at a time, although you can reset that by using the portable version and deleting the folder after using the program, then extracting it again. Apart from the standard files and registry, SysTracer can track a number of other items during a snapshot including system services, drivers, startup applications, running processes and loaded dlls.
systracer
SysTracer can also has a remote scan option to take snapshots of network computers although it does need installing to use this mode. Simply go to the Snapshots tab and click Take snapshot to start the tracing process. You can then select the areas of the system to scan and once complete (it will take a minute or 2), install your application. Then click the Take Snapshot button again to create the the after snapshot, followed by the Compare button at the bottom. The Registry, Files and Applications tabs can be individually analyzed and exported, or the whole list can be exported to HTML from the Snapshots tab. There are separate 32-bit and 64-bit versions available.

7. WhatChanged
Although it’s a pretty basic tool, we thought WhatChanged was worth a mention because it’s a small self contained portable executable of under 100KB and can record the changes from selected parts of the registry and drives or folders from the single window. The program is quite similar to Regshot in its operation and easy to use, a text file with the differences will be created on completion.
whatchanged
By default both the registry and file scanning options are turned off, so you simply turn on what you need and configure the drives/folders or areas of the registry you want to track, then press the Step #1 baseline snapshot button. Then after the software install, press the Step #2 Compare button to get the after snapshot and comparison text file result. The downside of WhatChanged is the very slow speed of the 2nd snapshot and compare which can take several minutes. It will create 4 or 5 text snapshot files in the same folder as the executable which can be deleted afterwards or by using the Clean temp files button.

8. TrackWinstall
TrackWinstall offers two kinds of snapshot from its main window. The one click mode where it will create the before snapshot, ask you to install the software, and then create the after snapshot with the comparison between the two at the end. And the second mode offers a 2 phase process which will create the first snapshot and then save it. Then you can install the software or perform other tasks such as having to reboot, and then return to TrackWinstall when you’re ready to take the second snapshot and complete the process.
trackwinstall
You can choose to enable or disable registry tracking and custom locations can be set for file tracking. By default file tracking is horribly slow because 2 of the 3 default locations (\Windows and \Common Files) are set up to record MD5 checksums which adds several minutes to each snapshot creation. You can delete these folders and add them in again using the quicker time stamp mode but these changes never get saved and have to be re-entered next time you run the program. You can’t save the information in the compare differences window but can instead copy the data to a text editor etc, right clicking any entry will search Google for it. TrackWinstall is completely portable with separate 32 and 64-bit versions available.


Comments

  1. This is a blatant theft of https://www.raymond.cc/blog/tracking-registry-and-files-changes-when-installing-software-in-windows/. Get original content or delete your waste of a blog.

    ReplyDelete

Post a Comment

share your thoughts ....

Popular posts from this blog

13 websites to register your free domain

Register your Free Domain Now!! 1)  .tk Dot TK is a FREE domain registry for websites on the Internet. It has exactly the same power as other domain extensions, but it’s free! Because it’s free, millions of others have been using .TK domains since 2001 – which makes .TK powerful and very recognizable.  Your website will be like www.yourdomainname.tk . It is free for 1 year. It’s a ccTLD domain whixh having the abbreviation  Tokelau. To create a .tk domain, Visit   www.dot.tk 2) co.cc Co.cc is completely free domain which is mostly used by blogspot bloggers because of it’s easy to use DNS system. Creating a co.cc for blogger is simple ( for instructions- “click here”). Your website will be like www.yourdomainname.co.cc . To create a .co.cc domain, visit www.co.cc 3)   co.nr co.nr is too like co.cc. Your website will be like  www.yourdomainname.co.nr . You can add it for blogger also.. To create a .co.cc domain, vi...

How to Put Google Adsense Below Post Title in Blogger?

Adsense is used by majority of expert bloggers for their website monetization because it is a cookie based contextual advertising system that shows targeted ads relevant to the content and reader. As bloggers are paid on per click basis, they try various ad placements on the blog to  increase the revenue  and get maximum clicks on the ad units. Well, on some blogs, you might have seen Adsense ad units placed below the post title. Do you know why? It is because the area just below the post title gets the most exposure and is the best place to put AdSense ad units to increase  Click Through Rate (CTR). Even though ads below post title work like a charm but this doesn’t mean that it will work for you as well. If you want to find out the best AdSense ads placement for your blog, try experimenting by placing ads at various locations such as header, sidebar, footer, etc. You can try other  blog monetization methods  as well to effectively monetize y...

what is LOREM ipsum and why do designers use it

What is Lorem Ipsum? Lorem Ipsum  is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. Why do we use it? It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now...

Find Serial Key / Cracks for Any Software !

This time i am going to explain you that how you can "Find Serial Key / Cracks for Any Software !".I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and cracks for any program, but most of them aren't safe to use. Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your pc. This is the part of Hacking/Cracking using "Google hacking". Google Hacking : I will explain google hacking in details in next article very soon.But for now its enough to know that,Google hacking means..ho...

Binary to Decimal using Stack in C

CODE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 #include <stdio.h> #include <stdlib.h> #define SIZE 8 int STACK[SIZE],TOP =- 1 ; int power ( int i) { int res = 1 ; while (i -- ) { res = res * 2 ; } return res; } void push ( int n) { if (TOP == SIZE) printf( "OVerflow" ); else STACK[ ++ TOP] = n; } int pop () { if (TOP ==- 1 ) return - 1 ; else return STACK[TOP -- ]; } void main () { int num,i = 0 ,arr[SIZE],j,res = 0 ,temp; printf( "Enter the number" ); scanf( "%d" , & num); printf( " \n Entered number=%d \n " ,num); while (num) { arr[i ++ ] = num % 10 ; num /= 10 ; } for (j = i - 1 ;j >= 0 ;j -- ) push(arr[j]); for (j = 0 ;j < i;j ++ ) { res = res + (pop() * power(j)); } printf( " \n Result=%d" ,res); getchar...

Access Your Facebook Account with 3 Passwords

Did you know that you can login to your Facebook account using 3 different passwords? Seems interesting isn’t it? Yep! Unlike any other online account which has only one password to access, Facebook lets you log in using 3 different variants of your password. Only a few Facebook users are aware of this fact, but for many others, this might seem a bit surprising. Facebook accepts the following forms of your password: 1. Your Original Password Let me explain this to you with the following example. Assume that your default Facebook password that you created during the sign-up process is: 2. Password with the Case Toggled In the above password the letters ‘F’ and ‘P’ are in uppercase and the remaining are in the lowercase. If you TOGGLE the case where all the UPPERCASE characters are converted into the lowercase and vice versa, your default password “myFacebookPass” would become: Now if you log in using the above toggled password, your Facebook will accept it and welcomes yo...

How to Protect an Email Account from being Hacked

If this is the case, then what is the reason for many people to lose their accounts? The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password. Are you confused? If so continue reading and you’ll come to know… Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams. 1 . WEBSITE SPOOFING =Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website...

C++ Program to implement File Handling by using ifstream & ofstream -2

Write a paragraph (At least 2 lines of sentences) in a file. Read the same file in three different ways –   i) Reverse the whole paragraph.  ii) Line by Line Reverses the whole para. iii) Break the paragraph into two equal halves. Reverse the second half of the paragraph. #include #include <fstream.h> #include <conio.h> void main(){     char para[500], ln[80];     int len, i, half;     clrscr();     cout<<"\n Enter a Paragraph (Quit by ^Z):-";     cout<<"\n ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~";     cin.getline(para, 500, '^Z');     len = strlen(para);     ofstream fout;     fout.open("para.txt", ios::out);     fout.write((char *) &para, len);     fout.close();     ifstream fin;     cout<<"\n Reverse the Whole Paragraph:-";     cout<<"\n ~~~~~~~~~~~~~~~~~~~~~~~~~~~";     fin.open...

Batch file to C++ souce code generator ...

Batch file to C++ souce code generator ... Well this project was made upon CODEBLOCK using c++ HERE IS THE SOURCE CODE: download it as .cpp form by clicking here.. mirror 1                                                   mirror 2. One drive if YOu want the exe file only then click here (500 KB) Mirror 1. MULTCLOUD  FOR PASSWORD TO THIS SITE VISIT THE FOLLOWING LINK OR SUMBIT THE FORM BELOW  >>> LINK :   https://goo.gl/forms/DiQHvEjfavsaU18U2                              or Loading...