Skip to main content
Background Image
  1. Posts/

Registry Forensics Cheatsheet

3 mins· loading · loading · ·

The Registry
#

The Windows Registry located at Windows\System32\config is a large database that stores configuration settings for Microsoft Windows and its applications. It contains system settings, user preferences, and more.

On a live system, the registry can be accessed using regedit (Registry Editor). Tools like RegRipper can be used to browse registry hives from image files.


Structure
#

The Registry is organized as a tree structure with keys and subkeys. The root is called HKEY, and it contains several subkeys representing different areas of the system.

  1. Hives – logical groups of keys and values.

    • HKLM (HKEY_LOCAL_MACHINE) β†’ Local machine configuration
    • HKCU (HKEY_CURRENT_USER) β†’ Current user configuration
    • HKCR (HKEY_CLASSES_ROOT) β†’ File associations & class definitions
    • HKU (HKEY_USERS) β†’ All user accounts
  2. Keys – containers that hold configuration data. Example: HKLM\Software (installed software info).

  3. Subkeys – child keys beneath a parent key.

  4. Values – name–value pairs holding specific configuration details.


Registry Forensics
#

The Windows Registry holds artifacts valuable in digital forensics. These reveal user activity, system info, device usage, and attacker traces.

Below are common forensic registry keys:


πŸ§‘β€πŸ’» User Activity
#

ArtifactRegistry KeyDescription
MRUs (Most Recently Used)HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRUTracks programs run recently.
Typed PathsHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\TypedPathsStores paths typed into File Explorer.
Recent File HistoryHKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRUTracks recently opened/saved files via common dialogs.
Program Usage (UserAssist)NTUSER.DAT\...\Explorer\UserAssist\{GUID}\CountCounts program executions by the user.
Last Key ViewedNTUSER.DAT\...\Applets\Regedit\LastKeyLast accessed key in Registry Editor.
LNK FilesHKCU\...\Explorer\RecentDocsShortcuts referencing files (even deleted ones). Useful for MAC times, original paths, volumes, etc.
Jump Lists(AutomaticDestination / CustomDestination files)Lists recently accessed files/programs by app. Tools: jump_list_parser, jump_list_extractor.

βš™οΈ System Information
#

ArtifactRegistry KeyDescription
Advanced SettingsHKCU\...\Explorer\AdvancedFile Explorer customization settings.
Computer NameSYSTEM\ControlSet001\Control\ComputerName\ComputerNameSystem hostname.
Windows Version InfoHKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersionWindows version and build details.
Installed ApplicationsHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\List of installed apps and executables.
ServicesSYSTEM\ControlSet001\Services\Installed services and drivers.
UAC StatusHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\SystemEnableLUA=1 β†’ UAC enabled, =0 β†’ disabled.
Last Logged-in UserHKLM\...\Authentication\LogonUI\LastLoggedOnUserTracks the last user to log in.

πŸ’Ύ Devices & Storage
#

ArtifactRegistry KeyDescription
Auto-Run ProgramsHKLM/HKCU\...\Run, RunOncePrograms launched at logon.
ShellBagsHKCU\SOFTWARE\Microsoft\Windows\Shell\BagMRU
HKCU\SOFTWARE\Microsoft\Windows\Shell\Bags
Folder view preferences. Reveals deleted folders. Tool: ShellBags Explorer.
Mounted DevicesHKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR
HKLM\SYSTEM\MountedDevices
USB/device connection history.
SRUM DatabaseC:\Windows\System32\sru\SRUDB.datTracks every executed application (even deleted ones). Tools: srum_dump, srum_extractor.

🌐 Network & Security
#

ArtifactRegistry KeyDescription
Firewall StatusHKLM\SYSTEM\...\FirewallPolicyEnableFirewall=1 β†’ enabled, =0 β†’ disabled.
Remote DesktopHKLM\SYSTEM\...\Control\Terminal ServerContains RDP settings and status.
Shared FoldersHKLM\SYSTEM\...\LanmanServer\SharesInformation about shared resources.
Network InterfacesHKLM\SYSTEM\...\Tcpip\Parameters\InterfacesNetwork adapter configurations.
Network ListHKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkListList of networks previously connected to.
User AccountsHKLM\SAM\Domains\Account\Users\Names\All local user accounts (including WDAGUtilityAccount).
TimezoneSYSTEM\ControlSet001\Control\TimeZoneInformationSystem timezone settings.
Prefetch & SuperfetchHKLM\SYSTEM\...\PrefetchParameters
HKLM\SYSTEM\...\Superfetch
Performance data. Also useful for execution history.

Summary
#

Registry forensics provides investigators with insights into user actions, system configurations, network history, device usage, and persistence mechanisms. Proper analysis can reveal attacker activity and digital evidence.