Windows Registry Forensics: Analysis Techniques

The Windows registry is a hierarchical database containing settings and choices for the operating system, hardware components, and installed programs.

Although users rarely interact with the registry, actions like installing or running software, connecting external devices, or changing settings, leave traces. These traces can provide insights into system usage and user behavior in digital forensics and incident response investigations.

The previous article explained the Windows registry structure, its significance, and the specifics of Windows forensic analysis. Following up, here we will review the following practical aspects of Windows registry forensics:

Read on to uncover practical tips for forensic analysis of the Windows registry. We will explore notable Windows registry artifacts for Windows forensics and review how you can analyze them with Belkasoft X.

Analyzing the registry

You can analyze the Windows registry through live system access or inspect a copy of system data offline. The latter is widely regarded as the de facto standard in forensics because it allows you to preserve evidence integrity.

Using Belkasoft X

Digital forensics software like Belkasoft X offers a range of capabilities to extract, parse, and correlate registry data:

  • Artifact view: When you add a computer image or collected registry hives as a data source to Belkasoft X, the software extracts key forensic artifacts from the registry, including USB device history, startup entries, time zone settings, and more. We will explore these notable registry artifacts in detail later in this article.

Belkasoft X's Artifact window with the registry hives highlighted in the System files node

Registry artifacts parsed after drive acquisition in Belkasoft X

Belkasoft X window showing MuiCache subkey values in Registry Viewer

Reviewing the UsrClass.dat file using Registry Viewer in Belkasoft X

If live analysis is necessary—for instance, during active incident response—the recommended approach is to collect registry hive files using safe, system-native methods (such as reg save or Volume Shadow Copies), and then import these files into Belkasoft X on a dedicated forensic workstation.

Using RegEdit

The Windows Registry Editor (RegEdit), a native registry editing tool, allows you to navigate registry records on a live machine and also load hive files under the HKEY_LOCAL_MACHINE or HKEY_USERS root keys to inspect extracted hives offline on another system.

The Load Hive menu and load results in Windows RegEdit

Importing external hive data into RegEdit

RegEdit is a handy built-in tool for viewing and making changes to the Windows registry, but it comes with a few limitations for forensic analysis:

  • Manual process: Loading and analyzing hives in RegEdit requires manual operations, which can be time-consuming and error-prone.
  • Limited reporting: RegEdit offers basic export options but lacks advanced reporting features for generating detailed analysis reports.

Using command-line utilities

Command-line tools like PowerShell provide flexibility and automation for querying and extracting registry data, which makes them useful for large-scale forensic investigations. Unlike GUI-based tools, they allow scripting, batch processing, and remote registry analysis.

Here are some commonly used PowerShell commands for registry examination:

  • Get-Item: Retrieves specific registry keys and their values. This command can be used to quickly extract relevant artifacts. For example, the below command retrieves startup entries:
    Get-Item -Path "HKLM:\​Software\​Microsoft\​Windows\​CurrentVersion\​Run"
  • Get-ChildItem: Lists all subkeys within a specified registry path, allowing for a broader examination of registry structures. For instance, the following command displays installed services:
    Get-ChildItem -Path "HKLM:\​SYSTEM\​CurrentControlSet\​Services"
  • Reg.exe: A command-line tool to export registry subkeys into .reg files or dump registry hives. For instance, the following command exports the SAM hive, containing Windows account information, to the specified folder:
    reg export HKLM\SAM C:\Forensics\SAM.reg /y

Examining the live system with RegEdit or command-line tools can alter evidence and compromise the integrity of the investigation. When possible, prioritize offline analysis methods to ensure the highest level of forensic soundness.

Key forensic artifacts in the registry

Sifting through all of the registry nodes is mind-boggling, especially since the registry structure presented in Registry Editor does not precisely replicate its actual storage structure. 

Let us explore a few forensically interesting artifacts you can find in the Windows registry when analyzing it with Belkasoft X.

User accounts

The SOFTWARE hive, contains domain and local user profile details, including SID-to-profile path mappings and profile status.

Registry path: HKEY_LOCAL_MACHINE\​SOFTWARE\​Microsoft\​Windows NT\​CurrentVersion\​ProfileList.

Following this path, you will see keys named by SIDs. Each key includes values such as ProfileImagePath (the user's profile path) and State. The State value of 0 typically indicates an active user profile. Non-zero values may indicate inactive or corrupted profiles. 

Belkasoft X artifact tree path: System files → SOFTWARE → Windows → User name and Sid list.

SOFTWARE hive opened with Registry Viewer in Belkasoft X

User profile data from the SOFTWARE hive in Belkasoft X

The SAM hive stores security information about local user accounts, including logon counts, password change dates, password hashes, and more. This data can help investigate local account security and detect unauthorized access or suspicious activity.

Registry path: HKEY_LOCAL_MACHINE\​SAM\​Domains\​Account\​Users

Belkasoft X artifact tree path: System files → SAM → Windows → Windows accounts

User data from the SAM hive in Belkasoft X

Alt Text: Window with SAM hive opened with Registry Viewer in Belkasoft X

USB device connections

The SYSTEM hive stores details about connected devices: their serial numbers, types, and connection timestamps.

Registry paths (may be unavailable if no associated records were created):

  • HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Enum\​USB: Contains records of all USB devices recognized by the system, including input devices, hubs, and peripherals.
  • HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Enum\​USBSTOR: Specifically tracks USB storage devices, such as external hard drives and USB flash drives.
  • HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Enum\​HID: Stores information on Human Interface Devices (HID), such as keyboards, mice, and game controllers.
  • HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Enum\​SCSI: Logs details for devices interfacing via the SCSI protocol, which includes internal drives, virtual drives, and certain external storage devices.

Belkasoft X artifact tree path: System files → SYSTEM → Connected USB devices → USB devices

A screenshot showing connected USB and storage device registry entries

USB devices review in Belkasoft X 

Device properties can help you determine:

  • Device identity:
    • HardwareID: Reveals the vendor (VID_03F0 for HP) and product (PID_042A), which will help determine the exact device model.
    • ContainerID: A unique identifier for the device that helps track this device across different ports and sessions.
  • Connection details:
    • LocationInformation: Specifies the physical port and hub number, helping determine which port the device was plugged into.
    • Address: A dynamically assigned USB address helps reconstruct connection order.
  • Device class and function:
    • ClassGUID: Identifies the device class, indicating whether it is a mass storage device, human interface device (HID), or other type. For example, {36fc9e60-c465-11cf-8056-444553540000} corresponds to USB controllers.
    • Service: The driver service associated with the device. For instance, the service name usbccgp (USB Generic Parent Driver) indicates a composite USB device that may contain multiple functions, such as a keyboard and storage.

Note that since the CurrentControlSet key is a symbolic link, Belkasoft X parses and displays data from the key wherethe actual records are stored. The control set in use is determined by the HKEY_LOCAL_MACHINE\​SYSTEM\​Select key.

Mounted devices

Mounted device records stored in the SYSTEM hive include drive letters and corresponding device paths or volume identifiers. These artifacts help reconstruct storage media usage.

Registry path: HKEY_LOCAL_MACHINE\​SYSTEM\​MountedDevices

Belkasoft X artifact tree path: System files → SYSTEM → Mounted devices → Devices

A screenshot showing mounted device information in the registry

Reviewing mounted devices in Belkasoft X

Time zone settings

Time zone configurations in the SYSTEM hive can align event timestamps with user activities, aiding in timeline analysis. Time zone information helps correlate timestamps across logs, events, and user activity timelines, especially when analyzing systems that have changed locations.

Registry path: HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Control\​TimeZoneInformation

Belkasoft X artifact tree path: System files → SYSTEM → Time zone → Time zone

A screenshot showing the registry path for system time zone configurations

Time zone information review in Belkasoft X.

Services

The SYSTEM hive also records installed and configured services, including startup types and parameters. Windows services, stored in this hive, define what background processes run automatically or on demand. These entries can help identify active services, misconfigurations, or malicious persistence mechanisms.

Registry path: HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Services

Belkasoft X artifact tree path: System files → SYSTEM → Services → Services

A screenshot showing registry entries for configured system services

Reviewing services in Belkasoft X

TCP/IP configurations

Network settings, such as IP addresses, DNS servers, and gateways, are stored in the SYSTEM hive. These details might shed some light on network activity and device connections.

Registry path: HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Services\​Tcpip\​Parameters

Belkasoft X artifact tree path: System files → SYSTEM → Network → TCP/IP Configuration

TCP/IP configuration in Belkasoft X

TCP/IP configuration in Belkasoft X

Program startup entries

Startup program configurations, logged in the SOFTWARE and NTUSER.DAT hives, can reveal persistence mechanisms or unauthorized software.

Registry paths:

  • HKEY_LOCAL_MACHINE\​SOFTWARE\​Microsoft\​Windows\​CurrentVersion\​Run
  • HKEY_CURRENT_USER\​SOFTWARE\​Microsoft\​Windows\​CurrentVersion\​Run

Belkasoft X artifact tree: System files → SOFTWARE→ Program startup → Programs

A screenshot showing registry entries for programs configured to run at startup

Startup settings in Belkasoft X

Scheduled tasks

Scheduled task configurations, stored in the SOFTWARE hive, provide insight into legitimate and malicious task triggers and actions. Tasks created or modified around a suspicious event timeframe require closer attention.

Registry path: HKEY_LOCAL_MACHINE\​SOFTWARE\​Microsoft\​Windows NT\​CurrentVersion\​Schedule\​TaskCache\​Tasks

Belkasoft X artifact tree: System files → SOFTWARE→ Scheduled tasks → Tasks

Belkasoft X showing registry entries in the SOFTWARE key for scheduled tasks

Scheduled tasks in Belkasoft X

Recently accessed documents

Stored in the NTUSER.DAT hive, RecentDocs records include file names and MRU (Most Recently Used) lists, letting you reconstruct part of user activity chronologically.

Registry path: HKEY_CURRENT_USER\​SOFTWARE\​Microsoft\​Windows\​CurrentVersion\​Explorer\​RecentDocs

Belkasoft X artifact tree: System files → <username> (NTUSER.DAT) → Windows Explorer → Recently accessed documents

Belkasoft X showing registry entries in the SOFTWARE key for recently accessed documents

Recently accessed documents in Belkasoft X.

Shellbags

Shellbag data in the NTUSER.DAT hive tracks user navigation and folder view preferences, providing context about user interactions with the file system.

Registry paths:

  • HKEY_CURRENT_USER\​SOFTWARE\​Microsoft\​Windows\​Shell\​BagMRU
  • HKEY_CURRENT_USER\​SOFTWARE\​Microsoft\​Windows\​Shell\​Bags

Belkasoft X artifact tree path: System files → <username> (NTUSER.DAT) → Shellbag → Shellbag

A screenshot showing parsed Shellbag records in Belkasoft X

Shellbag records in Belkasoft X

Application usage: Amcache and Shimcache

The Amcache and Shimcache keys store execution artifacts that can reveal historical program usage and persistence mechanisms.

Registry path: HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Control\​Session Manager\​AppCompatCache

Amcache records provide details of executable programs run on the system, including execution timestamps, file paths, hashes, and sometimes digital signatures. This information can be helpful in reconstructing application execution history.

Belkasoft X artifact tree path: System files → Amcache.hve → Amcache → Amcache

A screenshot showing Amcache data in Belkasoft X

Amcache artifacts in Belkasoft X

Registry path: HKEY_LOCAL_MACHINE\​SYSTEM\​CurrentControlSet\​Control\​ession Manager\​Amcache.hve

Shimcache entries track executables run on the system, even if deleted afterward. Entries often include file paths and timestamps of the last modification or execution, making Shimcache highly valuable for forensic timeline reconstruction.

Belkasoft X artifact tree path: System files → SYSTEM → Application shimming → Recent activity

A screenshot showing Shimcache artifacts in Belkasoft X

Reviewing Shimcache records with Belkasoft X

Conclusion

The Windows registry can provide insights into user activities, connected devices, software executions, and system configurations. While native Windows tools (RegEdit, PowerShell) provide live access at the risk of altering evidence integrity, registry analysis with Belkasoft X ensures evidence integrity and helps quickly find relevant data. You can explore extracted records in the “Artifacts” window and further dig into the clues by inspecting the hives in the Registry Viewer.

By selecting the right approach and utilizing registry artifacts strategically, you can effectively reconstruct events, uncover anomalies, and substantiate forensic findings.

See also