Forensically Relevant Registry Keys/Locations
While deep Registry analysis requires specialized knowledge, several keys are commonly checked during screenshares (many collected automatically by tools like RL Collector's RECmd module):
Prefetch Parameters:
HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters(CheckEnablePrefetchervalue).Program Compatibility Assistant (PCA):
HKCU\Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Store(Logs program paths PCA interacted with).Background Activity Moderator (BAM):
HKLM\SYSTEM\CurrentControlSet\Services\bam\State\UserSettings\{User_SID}(Logs executed application paths and last execution timestamps. Look for deleted entries!).UserAssist:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Count(Tracks GUI program launches, run counts, last execution times. Data is ROT-13 encoded).Open/Save Dialog MRU:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\(MRU lists for files opened/saved via common dialogs, grouped by extension). Can reveal recently accessed cheat files, DLLs, or configs.RecentDocs:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs(Tracks recently accessed documents/files, often mirrorsshell:recent. Check for clearing).Run / RunOnce Keys:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run,HKCU\Software\Microsoft\Windows\CurrentVersion\Run(and RunOnce variants). Common persistence locations for malware/PUPs.USB Storage History:
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR(Logs details of connected USB storage devices).Network History: Various keys under
HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parametersand user-specific network profiles can reveal connection history.Command Processor Autorun:
HKLM\SOFTWARE\Microsoft\Command Processor\Autorun(Check if commands are automatically run whencmd.exestarts – potential bypass).
Last updated