Windows Registry Forensics with RegRipper
1.Startup and Persistence Plugins
run: Parses the Run key to show programs that are configured to start automatically for the user.
runonce: Similar to run, but shows programs that run only once at startup.
services: Extracts information from the Services key, which contains services that might be used for persistence.
winlogon: Examines the Winlogon key for programs that may execute during the logon process.
drivers: Checks for drivers that load automatically, as malicious drivers may be used for persistence2.User Activity
userassist: Retrieves the UserAssist keys, which show applications the user has recently run via the GUI.
muicache: Displays entries of programs recently executed by the user.
shellbags: Shows recently accessed folders and directory history, which can indicate where a user or malware navigated.
typedurls: Displays URLs typed into Internet Explorer’s address bar.
recentdocs: Lists recently accessed files.
recentapps: Shows recently run applications, which can reveal suspicious programs executed on the system.
lastvisitedmru: Displays the list of recently accessed network shares or remote files.
openwithlist: Shows applications recently used to open specific file types3.Networking Plugins
4.Malware Indicators
5.System Information Plugins
6.Registry Usage and Last Access
7.Browser History and Internet Activity
8.File Access and Recent Documents
9.Security and Logon Information
10.USB and Device History
11.Scheduled Tasks and Job Settings
12.Miscellaneous Plugins
Last updated