Save. This. Post. Our expert staff has compiled an up-to-date and comprehensive Windows Registry forensics cheat sheet, and it might be just what you need for your next investigation.
Jump to a section…
What Is a Windows Registry Forensics Cheat Sheet?
Core Windows Registry Hives and Their Forensic Value
Key Registry Artifacts by Forensic Purpose
Recommended Tools for Registry Analysis
Windows Forensics Investigation Tips
What Is a Windows Registry Forensics Cheat Sheet?
This document is an overview of key components of Windows Registry forensics, including:
- Registry hives
- Registry artifacts
- Registry analysis tools
- Registry forensics tips
If you’d like to us to add something to our Windows forensics cheat sheet, please contact us.
Core Windows Registry Hives and Their Forensic Value
Each Windows registry hive is a file that stores config settings and system/user data, and these are essential sources in forensic investigations.
As DFIR expert Chris Ray explains, “Windows Registry is a key source of forensic data because of its function within the system. It’s used as a repository to store system and application settings, configurations, preferences, usage telemetry, and more.”
Breakdown of each:
NTUSER.DAT |
|
---|---|
Location |
C:\Users\<username>\NTUSER.DAT |
Loaded under |
HKEY_USERS\<SID> |
Forensic value |
Tracks user-specific settings and activity. |
Contains |
|
UsrClass.dat |
|
---|---|
Location |
C:\Users\<username>\AppData\Local\Microsoft\Windows\UsrClass.dat |
Loaded under |
HKEY_USERS\<SID>_Classes |
Forensic value |
Mainly stores user-specific shell settings and mappings. |
Contains |
SAM (Security Account Manager) |
|
---|---|
Location |
C:\Windows\System32\Config\SAM |
Loaded under |
HKEY_LOCAL_MACHINE\SAM |
Forensic value |
Contains details about local user accounts and groups. |
Contains |
|
SYSTEM |
|
---|---|
Location |
C:\Windows\System32\Config\SYSTEM |
Loaded under |
HKEY_LOCAL_MACHINE\SYSTEM |
Forensic value |
Tracks system config and USB/device usage. |
Contains |
|
SOFTWARE |
|
---|---|
Location |
C:\Windows\System32\Config\SOFTWARE |
Loaded under |
HKEY_LOCAL_MACHINE\SOFTWARE |
Forensic value |
Lists installed software, system settings, and global auto-run entries. |
Contains |
|
SECURITY |
|
---|---|
Location |
C:\Windows\System32\Config\SECURITY |
Loaded under |
HKEY_LOCAL_MACHINE\SECURITY |
Forensic value |
Contains security policies and auditing settings. Mainly used to understand what artifacts may not be available due to poor audit policies. |
Contains |
|
Amcache.hve |
|
---|---|
Location |
C:\Windows\AppCompat\Programs\Amcache.hve |
Loaded under |
Not part of the Windows Registry. |
Forensic value |
Tracks executable metadata and run history, even for deleted files. |
Contains |
|
Key Registry Artifacts by Forensic Purpose
The list below is an up-to-date reference for data artifacts in the Windows Registry.
That said, we don’t recommend investigators memorize these details: If you approach investigations data artifact first, you risk losing the forest for the trees. Instead, we suggest using higher-level computing concepts to guide your investigation: The information artifact level vs the data artifact level.
DFIR experts like Brian Carrier recommend this approach because it makes investigations both easier and more comprehensive.
Artifact |
Path |
Value |
---|---|---|
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist |
Tracks last run time, run count, and path for apps with GUI components; values are ROT13-encoded. |
|
ShimCache (AppCompatCache) |
SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache |
Can prove existence of files (even after being deleted) and in some scenarios provide high degree of confidence on execution. |
C:\Windows\AppCompat\Programs\Amcache.hve |
Can prove existence of files (even after being deleted) and in some scenarios provide high degree of confidence on execution. |
|
C:\Windows\AppCompat\Programs\Amcache.hve |
Commands typed into Windows Run dialog. |
|
HKEY_CURRENT_USER\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache |
Full path to executable with a GUI component and limited PE header info. |
|
BAM/DAM |
SYSTEM\CurrentControlSet\Services\{dam|bam}\State\UserSettings\{SID} |
Full path to executable and last execution time. |
Program Execution TrackingUSB and External Device History
Artifact |
Path |
Value |
---|---|---|
USBSTOR |
SYSTEM\CurrentControlSet\Enum\USBSTOR |
Device vendor, model, serial number, and first/last connection times. |
MountedDevices |
SYSTEM\MountedDevices |
Drive letter to device mapping. |
MountPoints2 |
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 |
Records user-level mounted devices; can include network shares mounted. |
Windows Portable Devices |
SOFTWARE\Microsoft\Windows Portable Devices |
Details about connected media devices. |
User Activity
Artifact |
Path |
Value |
---|---|---|
RecentDocs |
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs |
Recently accessed files (names only not path), grouped by extension on per-user basis. |
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\ OpenSavePIDlMRU |
Recently accessed files (full paths) opened/saved via Windows Open/Save dialog. Grouped by extension and recorded on per-user basis. |
|
NTUSER.DAT\Software\Microsoft\Windows\Shell UsrClass.DAT\Local Settings\Software\Microsoft\Windows\Shell |
Folders that exist on the system (even after deletion) and evidence of users opening folders in certain scenarios. |
|
TypedPaths |
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths |
Tracks typed data into Explorer search bar on per-user basis. |
WordWheelQuery |
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery |
Tracks ordered list of search queries in Explorer search dialog on per-user basis. |
Network + Remote Connections
Artifact |
Path |
Value |
---|---|---|
RDP Connections MRU |
NTUSER.DAT\Software\Microsoft\Terminal Server Client\Default |
MRU list of endpoints recently connected to via Windows RDP. |
RDP Connections |
NTUSER.DAT\Software\Microsoft\Terminal Server Client\Servers |
Subkeys contain hostnames of systems that have been RDP’ed to with username used. Can contain more data than the default key. |
SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles |
Names of networks the system has connected to as well as first and last connection times. |
|
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\ |
Info on all the system’s network interfaces: IP, DNS, default gateway, and leasing info. |
Persistence and Autostart
Artifact |
Path |
Value |
---|---|---|
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Run NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\RunOnce SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
Programs autostart when users log on. |
|
SYSTEM\CurrentControlSet\Services |
Kernel drivers and services information. Commonly used for persistence. |
|
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon |
Alternative login shells or persistence mechanisms. |
|
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache |
Find persistence from scheduled tasks in the Registry. |
Recommended Tools for Registry Analysis
“There are many tools out there that can be used to parse Registry data. Some are more feature-rich than others. Regardless of the tool, it’s key to understand the limitations of your tool to know when to fall back on other tools and to backup findings,” Chris Ray.
Tool |
Description |
---|---|
GUI registry hive viewer with advanced search and plugin support. |
|
Command-line tool to get data out of Registry hives. |
|
Command-line tool to replay transaction logs. |
|
Command-line tool for automated parsing of Registry hives. |
|
Full forensic suites with Registry parsing support. |
|
Automates the parsing of Registry hive to pull out key forensic artifacts and applies scoring to bubble up entries of interest. |
There are many other tools that can handle registry parsing aside from some of the notable ones mentioned above. The backbone of many of these tools are Registry parsing libraries that can be used to script and create new and custom parsers.
If you’d like to see a list of the various parsers and which ones are used by several popular tools check out our Guide to Registry Forensic Tools.
If you’d like to see how Cyber Triage’s automated analysis could speed up your Registry forensics, try it for free now.
Windows Forensics Investigation Tips
No Windows Registry forensics cheat sheet is complete without investigation tips.
Here are a few from our expert staff:
- Ensure your analysis tool handles transaction logs when analyzing offline registry hives,
- Consider looking at app (MSIX) specific registry hives for forensic data. Changes made by MSIX-based applications will only be seen by those applications. As a result, analyzing traditional registry hives (live or offline) can lead to missing data.
- Use registry key lastwrite times in a timeline to help find other sources of potential evidence
- Test your tools to understand their limitations. For example, regedit fails to show keys and value names if the name contains a null character. This results in subkeys being hidden from the UI. Other tools may also have similar issues.
- Cross-reference multiple artifacts for consistency and deeper context.