Windows Registry Forensics
IN this Section I am going to talk about the important aspects of Windows Registry
HKEY_LOCAL_MACHINE (HKLM)
Scope: System-wide settings and configurations.
Purpose: This key contains configuration data for the entire computer and affects all users on the system. It holds information related to hardware, operating system settings, and software configurations that apply universally across all user accounts.
Common Subkeys:
HKLM\SYSTEM: Contains system configuration data, such as boot configuration, drivers, services, and system devices.
HKLM\SOFTWARE: Stores software-related settings that apply to all users on the machine, including installed programs, their settings, and system software configurations.
HKLM\SECURITY: Contains security-related data.
HKLM\HARDWARE: Contains information detected at startup about the system's hardwareHKEY_USERS (HKU)
Scope: User-specific settings for all users on the computer.
Purpose: HKU stores individual user profile information, including personalized settings, desktop configurations, environment variables, and application preferences for each user on the system.
Common Subkeys:
Each user profile on the system has a subkey within HKU named after the Security Identifier (SID) associated with that user. These keys store user-specific configurations.
HKU.DEFAULT: Contains settings applied to the default profile and is used as a template for new users.the following map provides a detailed and visually structured map of Windows Registry paths and keys as well , designed to assist incident responders, SOC analysts, and cybersecurity professionals in monitoring, detecting, and investigating security incidents , go to this link then download the html file
Here is photo of the content above

SAM (Security Account Manager) - SAM.dat
SYSTEM - SYSTEM.dat
NTUSER - NTUSER .dat
USERCLASS - USERCLASS.dat
SOFTWARE - SOFTWARE.dat
SECURITY - SECURITY.dat
Browser Artifacts
Here are categories of Registry paths , If you wanna divides into categories
1. User Communications
Registry Paths:
Email accounts:
HKEY_CURRENT_USER\Software\Microsoft\Office\<version>\Outlook\ProfilesSkype:
HKEY_CURRENT_USER\Software\Microsoft\Skype\Teams:
HKEY_CURRENT_USER\Software\Microsoft\Office\TeamsMessaging apps: Search for app-specific paths under
HKEY_CURRENT_USER\Software
2. File Download
Registry Paths:
Recent downloads:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRUFirefox:
HKEY_CURRENT_USER\Software\Mozilla\Firefox\ProfilesInternet Explorer:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLsChrome/Edge: Check browser-specific paths, like
AppDatalogsTemporary files:
Temporary Internet files:
%USERPROFILE\AppData\Local\Microsoft\Windows\INetCache
Download history via Windows Defender:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Defender\Threats
3. Program Execution
Registry Paths:
Run/RunOnce:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunPrefetch: Analyze
%SystemRoot%\Prefetch\Recently used programs:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist
Scheduled tasks:
Task Scheduler settings:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache
4. File Opening/Creation
Registry Paths:
MRU (Most Recently Used):
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsShellBags:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\BagsFile access/creation details:
NTFS File System (last access/write): Use
$MFTfrom forensic tools.RecentApps (Apps that opened files):
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search\RecentApps
Windows Jump Lists:
File usage via Taskbar/Start Menu:
%APPDATA\Microsoft\Windows\Recent\AutomaticDestinations
5. File Knowledge
Registry Paths:
File extensions:
HKEY_CLASSES_ROOT\.<extension>Open with history:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts
Known folders:
Downloads, Documents:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
6. Physical Interaction
6. Physical InteractionRegistry Paths:
USB devices:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTORMounted devices:
HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices
7. USB Key Usage
Registry Paths:
USB activity:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBRemovable media settings:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
8. Account Usage
Registry Paths:
Last logon:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUIUSB serial numbers:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTORUser accounts:
HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users
9. Browser Usage
Registry Paths:
Internet Explorer history:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MainChrome/Edge/Firefox: AppData paths like
AppData\Local\Google\Chrome\User Data.
Last updated