Currently many computer forensic tools are available for digital forensic work, but the investigators do not know the software architecture of the forensic tools, hence the researcher performed the experimentation to examine the attack paths to analyze the objects to know about the attacker on the basis of which tools are build. This article offers a comprehensive background of the Windows Registry, guiding users through the structure of registry hive files and details the crucial information stored within keys and values, highlighting their significant impact on forensic investigations. The paper explores the cyber-attack on computer window Operating Systems registry, memory, process, file systems and devices and cybercrimes access paths of the window operating systems registry and correlation of the objects in memory, process, files and devices attached for victim’s computer machine. By understanding these elements, users can enhance their investigative skills and improve their ability to analyze and interpret registry data and provides foundational knowledge and guidance that helps users develop their own window forensic tools.