| #179: X-Ways Forensics,
X-Ways Investigator, WinHex 21.6 released
Oct xx, 2025 |
This mailing is to announce the availability
of version 21.6 with official release date Oct 19, 2025.
License owners please go to
https://www.x-ways.net/winhex/license.html
as always for the latest download instructions including the latest log-in
credentials (!), details about their licenses, and upgrade or renewal
offers. Please do not ask us for the download password. Your organization
has access to it already if eligible, as described.
Service releases are announced in the
Announcement section of the
forum,
and you can subscribe to instant e-mail notifications of postings in that
section if you have a forum profile. You can create such a profile
here
(if you have our log-in credentials). If you wish or need to stick with an
older version for a while, please switch to the latest service release of
that version.
Upcoming Training Events
| Dates |
Location |
Target Region |
Course |
Delivered by |
Oct 27-31 |
Online |
America, Europe |
X-Ways Forensics 1 |
X-Ways |
Nov 10-13 |
Fairfax, VA |
USA |
X-Ways Forensics 1 |
H-11 |
Nov 17-21 |
Online |
Europe, Asia |
X-Ways Forensics 1 |
X-Ways |
Nov 17-20 |
Orillia, ON |
Canada |
X-Ways Forensics 1 |
F111th |
Dec 8-12 |
Online |
Europe, Asia |
X-Ways Forensics 2 |
X-Ways |
Dec 9-12 |
Salt Lake City, UT |
USA |
X-Ways Forensics 1 |
H-11 |
Dec 15-19 |
Online |
America, Europe |
X-Ways Forensics 1 |
X-Ways |
Jan 12-16 |
Online |
America, Europe |
X-Ways Forensics 2 |
X-Ways |
Jan 12-16 |
Online |
Europe, Asia |
X-Ways Forensics 1 |
X-Ways |
Feb 2-6 |
Online |
Europe, Asia |
X-Ways Forensics 2 |
X-Ways |
Please sign up for our training notifications
here
if you would like to be kept posted on future training dates.
What's new in Exponent™:
-
The
2nd generation of Exponent, a powerful collection of
X-Tensions for X-Ways Forensics, is now available. In particular, it
has undergone a major facelift with its Exponent Faces™
X-Tension. Face matching accuracy and reliability now provides
dramatically improved results with minimal or no false positives.
-
New module included:
SQLite Explorer provides a powerful interface for examining and
reporting on evidence stored in SQLite databases. Users can build
dynamic queries by selecting table columns or writing custom SQL, while
timestamp fields can be instantly converted into readable formats for
easier timeline analysis. A visual designer helps build complex queries
and JOINS without requiring advanced SQL expertise. For deeper
validation, the Forensics tab exposes raw database structures at the
byte level with predefined offsets for known values. Results and entire
tables can be exported to CSV for reporting or further analysis. This
tool turns complex SQLite files into transparent, actionable evidence.
-
New module included:
CSV to SQLite allows investigators to import CSV files—whether tab,
comma, semicolon, or pipe-delimited—into new or existing SQLite
databases. This makes it easy to consolidate evidence from multiple
sources, even when filenames overlap, such as Chrome download history
from different directories. Table names can be edited before import, and
once in SQLite, the data can be refined or cross-analyzed using the
SQLite Explorer X-Tension. This combination provides a robust workflow
for merging and interrogating diverse datasets under a single framework.
By transforming raw CSV exports into a structured database environment,
investigators gain speed, flexibility, and clarity in timeline
reconstruction.
-
For a complete product overview please refer to
this overview.
X-Ways sells Exponent
here.
What's new in X‑Ways Forensics 21.6?
(where applicable, changes
also affect X‑Ways Investigator, WinHex, and X‑Ways Imager)
Encryption/Decryption
-
X-Ways Forensics can now decrypt BitLocker volumes
that are protected with a startup key if the right startup key is
available. Startup keys are stored in .BEK files, which in turn are
usually stored on removable USB storage devices. Whenever X-Ways
Forensics encounters a .BEK file in any evidence object while taking the
volume snapshot, it copies the .BEK file to the case directory and keeps
it there. (The case directory, not the directory for cases.) In that
directory .BEK files are automatically found whenever a BitLocker volume
is opened to see if any of them fits. You can also manually copy .BEK
files that you have found into the same directory to get X-Ways
Forensics to try them.
-
Supports file systems other than NTFS in BitLocker
partitions in regular (not "to go") style for internal decryption.
-
Tentative fix for only partially encrypted BitLocker
volumes.
-
There is now an option to always prompt the user
before decrypting a BitLocker partition when opening it. If declined,
all data in all sectors will be shown exactly as they are stored on the
storage device, i.e. usually (but not necessarily) encrypted.
-
Informs users that and why switching to any mode
other than read-only mode is not possible with a decrypted BitLocker
partition.
-
Ability to try the passwort collection of the active
case (Passwords.txt) when prompted for the password of a BitLocker
volume.
-
Before trying the password collection on a BitLocker
volume, X-Ways Forensics now first attempts decryption with the
passwords of other BitLocker volumes in the same case, if there are any,
for which a password is known. For that reason it can be beneficial to
unlock BitLocker volumes with a known password instead of with a known
recovery key when prompted if you happen to have both.
-
The verified password or recovery key of a BitLocker
volume is now saved in the Description box of the evidence object
properties for your future reference.
-
Internal passwords/encryption keys, such as for
encrypted .e01 evidence files and cases, now optionally support Unicode,
depending on the state of the new check box "Encode internal passwords
as UTF-8" in the Options | Security dialog window. Make sure the box is
UNchecked if you have previously used passwords that contain non-ASCII
characters to preserve compatibility.
-
Unicode support for password prompts of the viewer
component.
-
Non-Latin 1 passwords are now supported when entering
passwords manually to decrypt archives.
File Archive Support
-
When creating a container for selected files that you
wish to acquire, store together in a separate place or share, you can
now opt for a Zip archive instead of a regular file container (with a
file system). Already created zip archive containers can be opened for
further filling (only unencrypted ones). Many of the advanced properties
of a regular evidence file container are not available that way, but
using Zip archives has the following advantages:
+ The file contents can be encrypted immediately, which can be useful
not only to prevent them from being read by unauthorized people, but
also to prevent virus scanners from detecting malware that you
intentionally wish to pack up/quarantine in a dedicated archive, for
example with a password like "infected". This function is also called
"secure export".
+ Ordinary tools that do not understand file systems at a computer
forensic level as required for regular evidence file containers may be
able to read zip archives and allow to view the included files. That
includes the Windows File Explorer (which, however, does not support Zip
archives with AES encryption).
Regular evidence file containers still have these unique advantages:
+ ability to distinguish between existing and deleted files
+ store an incredible amount of other metadata
+ protection against duplication (user adding the same file multiple
times)
+ Ability to include file slack or only the slack or only the selected
block or to only include metadata.
+ files as child objects of other files
+ original file system data structures for directories,
+ pass on labels, comments, hash values
+ embed attachments in .eml e-mail messages
-
When adding spanned/segmented file archives in WinZip
style (.z01, .z02, ..., .zip) to a case, you do not need to make sure
any more to select the first segment (.z01) as stated in the
documentation. If you add the last segment (.zip) instead, which is
intuitive because of its well-known extension, that will now also work,
i.e. all segments will be found and internally concatenated as needed.
This also works if the extension of the last segment is .ufdr instead,
i.e. in the case of a spanned Cellebrite UFDR report.
-
Slightly improved handling of .fctar files as
evidence objects.
File System Support
-
Redundant timestamps from 0x30 attributes in NTFS
FILE records are now included in newly taken volume snapshots and no
longer rejected as irrelevant already at the time when the file system
is parsed. Now you can decide in the Notation settings whether redundant
timestamps should be displayed/output or not. By default, they are
hidden, just like in previous versions, in order to not unnecessarily
clutter up the screen, with the goal in mind to require the user's time
and attention only for timestamps that actually contain additional
information. However, if you feel you temporarily need to see all
timestamps to double-check or if the recipients of exported lists that
you are sharing wish to see all timestamps, you can now selectively
enable redundant timestamps for where they are needed. A middle setting
allows to see redundant timestamps dimmed in a light gray color in the
directory browser just like previously known from never updated last
access timestamps. (The middle setting is not available in the Notation
settings for case reports, the Export List command or the Recover/Copy
command.) Filters and sorting used to treat redundant timestamps as
non-existent in previous versions because they were simply not included
in the volume snapshot. Now they are treated like any other timestamps,
no matter whether they are currently visible or not. If a timestamp
filter specifically targets a column with redundant timestamps, those
timestamps will be displayed and highlighted even if they were otherwise
invisible.
-
If you wish to see timestamps in the volume snapshot
of an NTFS file system with more than 4 digits after the decimal point
(fractions of seconds), you do not have to point the Data Interpreter
any more to the timestamp in the 0x10 attribute of a FILE record, but
can now simply open the file of interest or switch to File mode for the
selected file and refer to the Info Pane for the maximum of 7 such
digits. This full precision is also available in the Info Pane for files
in an evidence object that is a directory in an NTFS file system as well
as for files opened directly with the File | Open command.
-
The threshold above which backdating is brought to
your attention in the display of a timestamp column in the directory
with the clock+arrow icon and a brief representation of the time
discrepancy and which is used for the backdating filter can now be set
in the directory browser options.
-
The detection of backdating activities in NTFS
timestamps can now be limited to instances where the subsecond part of
the timestamp (the digits after the decimal point) is zeroed out, with
the expectation that backdating was performed manually by some
timestomping tool that did not bother to create randomized subsecond
digits and rather set those parts of the timestamps to zero. (Malware
that tries to cover its tracks and backdates files automatically and
algorithmically may be better than that.)
-
Suitable timestamp precision in the directory browser
and in the Info Pane display for files listed by the operating system if
the underlying file system is FAT, not NTFS.
-
APFS: More extended attributes (EA) will generally be
picked up and output in the Metadata cell of a particular file if the
volume snapshot option "Output simple EAs as metadata" is enabled. That
means fewer child objects and more EAs showing as legible text in the
Metadata cell of the file that the EA actually belongs to. Some
additional data are parsed that way and presented in legible form, for
com.apple.assetsd.UUID, com.apple.assetsd.timeZoneOffset and the
timestamp in the com.apple.quarantine EA. If "Output simple EAs as
metadata" is disabled, an EA child object will have the same information
in its Metadata cell. For the output of com.apple.quarantine EA, the
check box "HFS+/APFS: Complete output of EA" needs to be at least be
half checked. Any timestamps found in quarantine EAs will be output as
events of the type "Operating system: Quarantine" in newly taken volume
snapshots, and associated with the file that the EA belongs to. If the
quarantine entry contains an application name, and perhaps even a GUID,
those end up in the event description.
Storage Device Support
-
That the username of the logged-in user who creates
an image is included in the descriptive text file is now optional. Fully
unchecked even the examiner name known in X-Ways Forensics is not
included.
-
Support for more LVM volume groups open at the same
time.
-
More tolerant of certain corrupt GPT partition
tables.
-
Improved detection of GPT-partitioned disk data
occurring paradoxically within a partition when opening such a
partition. Can happen for example with level 1 MD-RAIDs. An
automatically generated comment advises the user how to get such data
interpreted correctly: You can right-click the virtual file that spans
the entire partition and open it, and because it is like a raw image of
a partitioned storage device, you can afterwards interpret it as a disk
and add it to the case as an additional evidence object by
right-clicking its tab.
Picture File Support
-
The list of recognized picture generating devices was
updated.
-
A propensity score is now only output for pictures
that were not known to have been generated by a sensor-based device.
-
The status "disseminated" is now also defined for
WEBP and PNG files. The status "edited" can be detected in some WEBP
files (they can now edited in Photoshop or GIMP).
-
Extraction of creator/author names from certain JPEG
files like in older versions of X-Ways Forensics.
-
No more extraction of blank "light values". Whether a
"light value" is presented in the metadata column now depends on whether
the output of indoor/outdoor is selected for the picture content
analysis.
-
Metadata extraction from AVIF picture files.
-
Generator signatures are now defined for AVIF files.
Device types are assigned. A new generating software class is defined
specifically for AVID: Airbnb.
-
Improved identification of original (unaltered) and
editied JPEG files produced by Xiaomi, OPPO and OnePlus devices.
-
Labeling of JPEG, PNG and WEBP pictures as pictograms
where applicable. Such pictures also get a lower generic relevance
assigned.
-
Extended detection of certain AI-generated pictures.
Certain pictograms, AI-generated pictures and graphical elements are now
shown with the device type "no device" to show that they were not
generated by any image capturing devices.
-
Improved information about color profiles (ICC).
-
Slightly improved output of PNG metadata.
Volume Snapshot Refinement
-
Updated detection of eCryptfs-encrypted files on
Linux file systems as part of the "File format specific and statistical
encryption test".
-
Indexing engine slightly revised.
-
X-Ways Forensics no longer needs to resort to a
single thread when restarting itself after a crash in order to single
out a problematic file, omit it and label it as the reason for the
crash. This will improve performance.
-
Whether detections of the picture content analysis
shall be used for categorizations based on rules that the user defines
can now be decided separately for notable and irrelevant content.
-
When the metadata extraction finds out that
multi-media files in the MP4 container format contain only audio, no
video, it now confirms the file type as M4A (an audio-only file type) so
that users that are interested in the video category do not need to
invest time checking out those files.
User Interface
-
Regular filters (which internally can be combined
with AND or OR) can now be combined with the FlexFilters (which
internally can be combined with AND or OR) with a logical OR in addition
to a logical AND.
-
The Description filter dialog window now has an
option to focus on non-trivially hard-linked files.
-
Another Notation option has been introduced for the
"Existent" column. Users can now describe the "existent" or
"non-existent" status in their own words. Particularly useful for
example for the Export List command to match the expectations of a 3rd
party and for the Recover/Copy command when grouping files by their
existence/deletion status so that you get directories named accordingly.
-
There is now a dedicated symbol (a lower-case i in a
circle) in the caption line of the directory browser where you can
left-click to get a textual summary of all active filters with their
settings.
-
The icon with the keys next to a BitLocker partition
in the case tree as well as in the directory browser is now grayed out
if the right password or key for decryption is already stored in the
case, to confirm that the encryption is no obstacle any more. For
similar reasons, BitLocker partitions with clear-key encryption are
presented with the same icon.
-
The Override command line parameter for unsupervised
automated processing can now skip the BitLocker password prompt, with
either value 1 or 2, or it can make X-Ways Forensics try the internal
password collection (in Passwords.txt) if a value of 4 is combined with
the usual 1, which gives Override:5. [Note that Override:5 is not
compatible with earlier versions of X-Ways Forensics.]
-
More intuitive options to select the gradient colors
for tag marks and for the "already viewed" status.
Miscellaneous
-
Exporting and importing selected label names as
UTF-16 text files now not only includes the optional descriptions, but
also the type of label (e.g. "user-defined") and the label settings (the
check marks on the right-hand side of the dialog window to manage
labels).
-
Templates now support a new modifier called "hidden",
which identifies variables whose values you wish to set during parsing
and may need for subsequent calculations, but do not want to show to the
user. Also useful for constants that you define and use in calculations
that the user should not be distracted with.
-
Fixed an error where OCR was involuntarily executed
retroactively after picture content analysis was applied to selected
files.
-
A revision of v8.5.7 of the viewer component is now
downloadable. Oracle fixes until Jul 2025 have been applied.
-
The program help and the user manual were updated.
-
Many minor improvements.
Changes of service releases of 21.5:
-
SR-0+: The "Do not display again" check box was
unusable in message boxes with only one button in the original v21.5
release. That was fixed.
-
SR-1: More forms of compressed data storage in APFS
are now supported.
-
SR-1: OCR can now also be triggered by the detection
of paper texture in a picture.
-
SR-1: More consistent in which button in a message
box (e.g. OK or Cancel) is compatible with the "Do not display this
message again" option.
-
SR-1: Fixed an instability that could occur when
decrypting partially encrypted Windows 11 BitLocker volumes.
-
SR-2: v21.5 SR-1 became unstable when the user
interface was set to British English spelling. That was fixed.
-
SR-2: Improved keyboard navigation. Even with no data
window, you can now press the Tab key to give the case tree the focus.
You can now navigate up and down in that tree with the cursor keys
without inadvertently opening the Case Root window. You can press the
context menu key to open the context menu of an evidence object is one
is selected in the case tree, or the context menu of a directory within
an evidence object, e.g. to explore recursively.
-
SR-3: Italian translation of the user interface
updated.
-
SR-3: Prevented an error message about the inability
to find the Cache file of a volume snapshot that could occur in certain
situations in v21.5.
-
SR-3: Prevented an infinite recursion when
deconstructing certain Windows executable files (DLLs) in v21.4 and
later.
-
SR-3: Prevented a floating point exception error when
processing certain SQLite database files.
-
SR-4: Prevented a possible infinite recursion when
parsing UFS file systems.
-
SR-4: An error in LVM2 handling prevented the volumes
within an LVM2 Container partition, if it was not the first in a group
of LVM2 Containers, to be listed correctly, unless the first LVM2
Container in the sequence was opened first. This was fixed.
-
SR-4: Fixed inability to explore certain large nested
archives with caching enabled when not using additional threads.
-
SR-4: Prevents the identification of certain
audio-only MPEG-4 file as MP4 video.
-
SR-4: Prevents an exception error that could occur in
v21.4 in certain situations when using older WinHex.cfg files.
-
SR-4: v21.4 and later did not fully explore RAR
archive files that in turn contained ZIP archives. That was fixed now in
v21.5 SR-4 with an updated zip.dll file that can be recognized by its
modification date (later than all the other files).
-
SR-5: X-Tension API: The XWF_GetEvObjProp() function
can now replace an evidence object with a new image using an nPropType
of 100.
-
SR-5: Fixed a hanging error that occurred rarely with
certain cells in the directory browser when presented with a very wide
column width.
-
SR-5: Fixed an error that occurred when decrypting
data in sectors at the end of very large BitLocker partitions (> 1 TB).
-
SR-5: Presenting certain HEIC files in Details mode
updated the "Content created" cell with a timestamp in a wrong time
zone. That was fixed.
-
SR-6: When opening files in NTFS file systems from
within the directory browser in a separate data window, the Info Pane
optionally showed up to 7 digits after the decimal point for the
creation timestamp as a sub-second value although the available
precision in the volume snapshot only justified the display of 4 such
digits. That was fixed.
-
SR-6: Presenting certain JPEG files in Details mode
updated the "Content created" cell with a timestamp in a wrong time
zone. That was fixed.
-
SR-6: v21.5 SR-3, SR-4 and SR-5 did not properly
rotate certain JPEG photos for viewing and OCR. That was fixed.
-
SR-6: Fixed processing of the command line parameter
"GetLicID:".
-
SR-7: The internal graphics display library now
supports TIFF pictures with CCITT compression.
-
SR-7: Slightly revised support for PNG pictures in
the internal graphics display library.
-
SR-7: Prevented an exception error that could occur
when extracting e-mails from certain rare PST e-mail archives.
-
SR-7: Fixed usage "structure type" as a criterion to
identify duplicates and fixed "+ Modified" as an additional criterion.
-
SR-7: Fixed certain "Do not display this message
again" behavior.
-
SR-7: Prevented a rare division by zero error with
certain RIFF files.
-
SR-8: If the Windows operation system lost control
over a storage device that was in the process of being imaged, signaling
a certain error condition, v21.2 and later reported the error
description from Windows correctly and reported the total number of
unreadable sectors correctly, but only listed the first affected
internal range of sectors individually although it (pointlessly)
continued the operation. In v21.5 SR-8 and also all future releases of
v21.2 and later the same error condition will stop the imaging
procedure.
-
SR-8: One more error condition is now recognized as
permanent loss of connection to a storage device.
-
SR-8: Fixed an exception error that could occur in
v21.5 if text or paper texture detection was selected as a reason to run
OCR on a picture.
-
SR-8: The selected hash types in the Refine Volume
Snapshot dialog window were not stored in .dlg selection files. That was
fixed.
-
SR-8: The number of extra threads set in the Refine
Volume Snapshot dialog window can now be optionally stored in .dlg
selection files (although it is machine-specific) if you hold the Shift
key while creating the .dlg file.
-
SR-8: Prevented an error that could occur with
overlong paths within the case directory when a volume snapshot backup
was created with labels.
-
SR-8: Prevented occasional misidentifications of the
device type "Screen?".
-
SR-8: The registry viewer now always presents the
decoded form of the TrayNotify IconStreams texts instead alternatingly
the original and the decoded form.
-
SR-9: Automatically resuming crashed sessions did not
work if temporary files were stored in a case-specific temp path. That
was fixed.
-
SR-9: Prevented an exception error that could occur
when opening certain rare BitLocker volumes.
Become a certified user of X‑Ways Forensics
Become an
X-PERT (X‑Ways Professional in Evidence Recovery Techniques)
Prove your proficiency
in computer forensics in general and X‑Ways Forensics in particular with our
certification program. After passing the challenging exam, you will be part
of an exclusive circle and enjoy various benefits such as special
recognition, training discounts, updated training material. For further
details, please check
here.
Thank you for your attention! We hope to see you soon
somewhere at https://www.x-ways.net or
on our
Facebook page. You may also follow us on
Twitter/X. Please forward this newsletter to anyone who you think
will be interested. If you wish to subscribe with another e-mail address,
please do so
here.
Kind regards
Stefan Fleischmann
X‑Ways Software Technology AG
Carl-Diem-Str. 32 32257 Bünde Germany |