Windows Registry Forensics with RegRipper

usage : rip -r c:\case\ntuser.dat -p <plugin>

1.Startup and Persistence Plugins

    run: Parses the Run key to show programs that are configured to start automatically for the user.
    runonce: Similar to run, but shows programs that run only once at startup.
    services: Extracts information from the Services key, which contains services that might be used for persistence.
    winlogon: Examines the Winlogon key for programs that may execute during the logon process.
    drivers: Checks for drivers that load automatically, as malicious drivers may be used for persistence

2.User Activity

   userassist: Retrieves the UserAssist keys, which show applications the user has recently run via the GUI.
   muicache: Displays entries of programs recently executed by the user.
   shellbags: Shows recently accessed folders and directory history, which can indicate where a user or malware navigated.
   typedurls: Displays URLs typed into Internet Explorer’s address bar.
   recentdocs: Lists recently accessed files.
   recentapps: Shows recently run applications, which can reveal suspicious programs executed on the system.
   lastvisitedmru: Displays the list of recently accessed network shares or remote files.
   openwithlist: Shows applications recently used to open specific file types

3.Networking Plugins


4.Malware Indicators

5.System Information Plugins


6.Registry Usage and Last Access

7.Browser History and Internet Activity

8.File Access and Recent Documents

9.Security and Logon Information

10.USB and Device History

11.Scheduled Tasks and Job Settings

12.Miscellaneous Plugins

Last updated