As I understand it, not if they'd already been contained(encoded and contained) by the anti-malware programs and not still "live" hits. As for the registry, doesn't that only hold live exe files? I think most anti-malware programs are able to remove these exe files from your registry when they quarantine them, so only if new ones were activated by trojans or keylogger programs that are usually buried deep in obscure files would they be visible on a cursory look.
I would like to see a comparison of any of these malware/




hits that were supposedly on TA's laptop compared to the "external" HD that I believe was from JA(not TA/Deanna's laptop) that the defense received on Oct.25, 2012 and subsequently used a mirror image they got from it on Nov.5, 2012 to retrieve the penis pics, etc.
Also, what's with this whole 1:44pm time stamp that shows as the anti-malware(Spybot iirc) on TA's laptop that somehow is also the timestamp on one of JA's nasty photo shoot pics? For me, that just firms up my suspicions about JA either planting or "accidentally" leaving the sd card(ie. she probably loaded malware/




programs onto TA's laptop from her sd card that somehow then recorded the time back onto the meta data on her card and after deleting the pics she had taken of TA in the shower, not realizing the photo shoot was(or had been) on it, she either tossed it with the camera thinking it would be safe or accidentally dropped it and didn't realize it was missing until it was too late to go looking for it).