The Windows Registry remains one of the most information-dense repositories for reconstructing system activity and user behavior. Far more than a configuration database, it serves as a critical historical record of execution, data access, and persistence mechanisms across Windows 10 and 11. While automated forensic tools are essential for extracting and parsing this data, the correct interpretation of the results remains the responsibility of the investigator. This article focuses on the Registry keys that possess distinct forensic significance. We will move beyond the standard enumeration found in legacy guides to establish the specific links between technical artifacts and their value in an investigation, distinguishing between actionable evidence and system noise.
Note: This analysis assumes a working familiarity with Windows internals, hive structures, and standard forensic acquisition methodologies. It is not intended as an introductory primer, but rather as a technical reference for experienced examiners and security researchers tasked with deep-dive analysis.
A primary challenge in Registry forensics – and a significant hurdle for automated analysis software – lies in the fragmentation of related data. Critical indicators are rarely stored sequentially. Often, a specific artifact (such as a device connection or a system event) is recorded only as an opaque Identifier (ID) or GUID in one hive, while the translation of that ID into a human-readable name or context resides in a completely different, unrelated key. The software must bridge these gaps to present a coherent picture.
The second layer of complexity involves high-level cross-reference analysis. True forensic insight requires elevating the focus from isolated data points to correlated chains of events. For instance, proving data exfiltration requires synchronizing artifacts from disparate sources: a USB device insertion event, simultaneous browser history accessing a specific file-sharing URL, subsequent network traffic spikes, and finally, the device removal. Similarly, establishing malicious intent often requires linking a program’s execution timestamp in one key with specific file read/write operations recorded elsewhere. This article aims to map these connections.
Successful Registry analysis requires navigating the Registry’s architecture as a transactional database rather than a static file system. Understanding how Windows commits data to disk via hives and transaction logs is essential for recovering deleted keys and accurately interpreting timestamps that might otherwise mislead an investigator.
The Windows Registry is composed of “hives,” which are binary files stored on the disk. When a user interacts with the system, changes are not immediately flushed to the primary hive file (e.g., NTUSER.DAT). Instead, Windows utilizes a transaction logging system to ensure data integrity.
In Windows 10 and 11, this system typically involves a primary hive file and associated transaction logs, often named .LOG1 and .LOG2.
Forensic Implication: The existence of transaction logs is critical for recovering “deleted” evidence. If a threat actor deletes a persistence key (e.g., a malicious Run entry) and the system is immediately seized or crashes, the record of that key’s creation and subsequent deletion can, in some cases, be recoverable only from the NTUSER.DAT.LOG* or SOFTWARE.LOG* files. Investigators typically use tools that parse both the hive and its logs to reconstruct the most current state of the registry, often recovering data that appears “gone” from the active view. These logs are a consistency mechanism, not a historical journal, so recoverability is not guaranteed.
Caution: Note that log replay success varies by tool, system state, and timing.
Attribution – linking an action to a specific human user – relies on distinguishing between machine-wide and user-specific hives. Knowing which hive stores a particular artifact allows an examiner to determine if an action was performed by a specific logged-in user or by a system-level process.
Every Registry key functions like a folder with a “LastWrite” timestamp, similar to a file’s “Last Modified” time. However, individual values (the data inside the key) do not have timestamps. This structural limitation creates a “timestamp paradox” where an investigator knows something changed within a key at a specific time, but not necessarily which value was affected.
If, for example, a registry key Run has a timestamp of 2025-10-27 14:00:00, and it contains three values (Malware, GoogleUpdate, OneDrive), the timestamp only tells the investigator that one of those three values was added or modified at that time. It does not explicitly state which one.
To resolve this, one can attempt correlating the Registry timestamp with file system timestamps by checking the creation time of the executable referenced in the value (e.g., does malware.exe creation time match the Registry key update?)
In almost every digital investigation – whether it involves malware infection, insider data theft, or unauthorized usage – the primary question is: “Did the specific user run this specific program?” Windows 10 and 11 utilize a suite of compatibility and tracking features that inadvertently create a robust history of program execution. By parsing these artifacts, forensic examiners can reconstruct a granular history of execution, distinguishing between the mere presence of a malicious file on a disk and its active utilization by a user or script.
UserAssist is a user-specific artifact located in the NTUSER.DAT hive that tracks programs launched via the Graphical User Interface (GUI). It is primarily used to populate the “Frequently Used Programs” list in the Start Menu, making it a high-fidelity source for supporting the conclusion that a user actively clicked on or launched an application.
Note: In modern Windows shell workflows, this artifact doesn’t guarantee accurate execution. If one uses the “jump to file location” from the Windows Startup/search menu, then a UserAssist entry will be created; run count and last run time will be updated even though the actual execution does not occur.
Location:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist{GUID}\Count
Forensic Meaning:
UserAssist is designed to populate the “Frequently Used Programs” list in the Start Menu. Because of this, it tracks programs launched via the Graphical User Interface (GUI), such as double-clicking an icon on the desktop or selecting an item from the Start Menu. It generally does not track command-line execution (e.g., running cmd.exe and typing whoami).
Structure and Decoding:
The subkeys under UserAssist are named using GUIDs. Two common GUIDs in Windows 10/11 are:
{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}: Executable File Execution.{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}: Shortcut (.LNK) Execution.The values inside these keys are ROT-13 encoded. For example, an entry for msedge.exe would appear in the registry as zfrqtr.rkr. Forensic tools automatically apply the ROT-13 cipher to decode these names.
Data Points:
Windows 10/11 Nuance: In modern Windows, UserAssist also tracks Universal Windows Platform (UWP) apps (also known as Metro or Store apps). The entries for these may look different, often referencing the AppUserModelID (e.g., Microsoft.WindowsCalculator_8wekyb3d8bbwe!App) rather than a simple file path.
The Application Compatibility Cache (ShimCache) is a system-wide artifact in the SYSTEM hive used to identify applications requiring compatibility “shims.” For investigators, it provides a valuable historical record of files that were executed or even just browsed via Explorer, often supporting the conclusion that a file existed on a system long after it has been deleted.
Caution: Note that ShimCache does not reliably prove execution, even with newer flags. Research is still evolving, and behavior differs by build. While ShimCache proves presence and interaction, execution flags are supportive, not definitive, and corroboration is required (BAM, Prefetch, AmCache, UserAssist).
Location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache
Forensic Meaning:
The Application Compatibility Cache, commonly known as ShimCache, is used by Windows to identify if an application requires specific “shims” (compatibility fixes) to run correctly.
Forensic Utility: ShimCache is invaluable for identifying “dropped” malware that has since been deleted. Even if the file malware.exe is wiped from the disk, its entry in ShimCache persists, supporting that it was present on the system before the deletion.
While artifacts like UserAssist rely primarily on file names and paths, AmCache introduces a higher level of fidelity by linking execution directly to the file’s content via hashing. This standalone hive is essential for identifying renamed malware – where a threat actor disguises a tool like Mimikatz as a harmless system process – and verifying the exact version of an executable used during an incident.
Location: C:\Windows\AppCompat\Programs\Amcache.hve (Note: This is a standalone hive file, not part of the standard Registry hives).
Forensic Meaning: AmCache.hve is one of the most powerful execution artifacts in modern Windows forensics because it links execution to the file’s content (hash) rather than just its name.
mimikatz.exe to svchost.exe to hide it, UserAssist will show svchost.exe was run (which looks legitimate). However, AmCache will record the SHA-1 hash of that svchost.exe. A quick lookup of that hash will reveal it is actually Mimikatz.Modern Windows power management strategies require the operating system to monitor resource consumption closely. The Background Activity Moderator (BAM) and Desktop Activity Moderator (DAM) serve this purpose, creating a side-channel of forensic evidence that captures the execution of background tasks and command-line tools often missed by GUI-centric artifacts like UserAssist.
Location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bam\State\UserSettings{SID}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dam\State\UserSettings{SID}Forensic Meaning: While their primary function is to optimize battery life by throttling resource-heavy background processes, BAM and DAM inadvertently create a high-fidelity execution log for processes that operate without a user interface. This makes them indispensable for identifying “silent” malware execution, background scripts, and lateral movement tools that never appear in the Start Menu or on the Desktop.
Critical Limitations:
Investigative Value: Despite these limitations, BAM remains a primary source for supporting the execution of background processes that do not have a GUI.
crypto_miner.exe,” distinguishing user-driven compromise from system-level service exploitation.While execution artifacts prove a tool was run, file access artifacts answer the critical question: “Which files or folders did the suspect browse, view or access?” These artifacts, often referred to as “Shell” artifacts, are generated by the Windows Explorer interface. They are essential for reconstructing the user’s navigation through the file system, proving access to specific files, and establishing the timeline of data exfiltration.
ShellBags are widely considered the most comprehensive artifact for mapping user navigation. Unlike other artifacts that track specific files, ShellBags track folders. Their primary forensic value lies in their persistence: they remain in the Registry even after the target folder or the entire external drive has been removed.
Locations:
NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRU (and \Bags)UsrClass.dat\Local Settings\Software\Microsoft\Windows\Shell\BagMRU (and \Bags)Forensic Meaning: ShellBags are registry keys used to persist the view settings (e.g., icon size, window position, sort order) of folders viewed in Windows Explorer. Windows creates these entries so that when a user returns to a folder, it looks the same as when they left it.
Investigative Value:
E:\Stolen_Docs). However, caution is required: the artifact records the logical path (E:), not the physical device serial number. To prove that “E:” was a specific Kingston USB drive and not a local partition, investigators must correlate the ShellBag access timestamp with the drive letter mappings in the MountedDevices key.While ShellBags prove a user entered a folder, RecentDocs and OpenSaveMRU prove they interacted with specific files. These artifacts are high-fidelity indicators of “intent.” The OpenSaveMRU, in particular, is generated only when a user actively interacts with the common Windows dialog box to open or save a file. In data theft investigations, this is the kind of evidence that differentiates passive browsing from active exfiltration, such as saving a corporate document to an external device.
Locations:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsNTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRUForensic Meaning:
MRUListEx value tracks the order of access, allowing investigators to reconstruct the sequence of file openings.F:).TypedPaths distinguishes between casual and intentional browsing. When a user clicks a link, they are following a pre-determined path. When they manually type a path into the address bar, they are demonstrating both intent and specific knowledge of a destination. This artifact is critical in insider threat cases, as it often reveals a suspect’s knowledge of hidden network shares or internal IP addresses that they should not be accessing.
Location: NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths
Forensic Meaning: This registry key stores the history of paths that were manually typed (or pasted) into the Windows Explorer address bar.
\\192.168.1.50\C$\Hidden, it suggests they knew the server IP and the hidden share name. This is often used to differentiate between “accidental” browsing (clicking links) and “intentional” reconnaissance or lateral movement.In cases of data exfiltration or malware introduction via physical media, the Registry provides a detailed log of every USB device ever connected to the system. These artifacts are pivotal when an investigator needs to prove that a specific physical device found in a suspect’s possession was connected to a compromised machine at a specific time.
The USBSTOR key serves as the primary historical inventory for external storage devices. It allows an investigator to enumerate every USB thumb drive, external hard disk, or smartphone that has been connected as a mass storage device. This registry key is the first step in linking a physical object to digital activity on the endpoint.
Location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR
Forensic Meaning: This key acts as a historical inventory of all USB mass storage devices connected to the machine.
001122334455).&) in the second position (e.g., 100&234...), it indicates the device lacks a unique hardware serial number, and Windows generated a temporary ID based on the port and device characteristics. This is a critical distinction, as a generated ID is not unique to the device and cannot be definitively linked to a specific physical USB stick found in a suspect’s possession.Simply knowing a device was connected is often insufficient; investigators need to know when and for how long. Windows 10 and 11 store precise timestamps for device installation, arrival, and removal within specific property keys. These timestamps allow for the reconstruction of a timeline, proving, for example, that a backup drive was connected immediately before a massive file deletion event.
Location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB\VID_...\PID_...\Properties{83da6326-97a6-4088-9453-a1923f573b29}
Forensic Meaning: For each connected device, Windows 10 and 11 store detailed timestamps in subkeys named with specific property GUIDs. Within the GUID key {83da6326-97a6-4088-9453-a1923f573b29}, there are subkeys named with hexadecimal identifiers that correspond to specific timestamp events 15:
Strategic Analysis: By comparing LastArrivalDate (0066) and LastRemovalDate (0067), an investigator can determine the duration of the last session. If the LastArrivalDate is later than the LastRemovalDate, it indicates the device is currently connected (or the system crashed/lost power while the device was attached).
To fully reconstruct user activity, an investigator must bridge the gap between hardware identifiers (like a USB serial number) and the logical drive letters (like F:) referenced in other artifacts such as ShellBags or LNK files. The MountedDevices key helps establish this connection, enabling the correlation of file system activity on a specific drive letter back to the physical device responsible for it.
Note: MountedDevices only maintains information about the last mapping for each drive letter. If, for example, the user connected a SanDisk Cruzer (mapped as F:), and then connected a Kingston Data Traveler, that was also mapped as F:, only the last mapping will be preserved.
Location: HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices
Forensic Meaning: This key can help establish mappings that link a physical device/volume to a logical drive letter (e.g., F:).
\DosDevices\F:. The binary data inside these values can be correlated to specific volumes and device instances, but formats vary; corroboration with additional artifacts is recommended.F: drive.Reconstructing the network environment and system state is crucial for identifying lateral movement and attributing the device to a specific location. By analyzing network profiles and configuration settings, an investigator can map the physical movements of a device – such as a laptop moving between corporate and public Wi-Fi networks – and identify suspicious network configurations that suggest an attacker was manually manipulating connections to bypass security controls.
Network profiles provide a historical record of every network a device has connected to, effectively maintaining a list of its locations. This artifact is invaluable for proving a suspect was at a specific location (e.g., a coffee shop or a competitor’s office) at a specific time. By correlating the network name (SSID) with DateLastConnected timestamps, investigators can reconstruct the device’s physical journey and identify unauthorized connections to rogue or insecure networks.
Location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles
Forensic Meaning: This key stores a profile for every network (Wi-Fi, Ethernet) the system has connected to.
While network profiles show where a device connected, the TCP/IP configuration reveals how it connected. Examining these keys allows an investigator to determine if a machine was using a standard dynamic IP address (DHCP) or if it was manually configured with a static IP. A sudden switch to a static IP on a user workstation can be a strong indicator of an attacker attempting to blend in with server traffic, bypass network access controls, or establish a persistent connection to a command-and-control server.
Location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces
Forensic Meaning: This key contains the configuration for network adapters.
EnableDHCP value reveals if the machine was configured with a static IP address. Static IPs are common in corporate server environments but suspicious on user workstations or in home networks, potentially indicating an attacker manually configuring the network to bypass detection or connect to a rogue device.Time is the backbone of every forensic investigation. The TimeZoneInformation key is an important reference point for every timestamp on the system. Misinterpreting this value can lead to critical errors in timeline reconstruction, causing an investigator to align digital events (like a file download) with the wrong physical events (like a suspect entering a building), potentially invalidating the entire case.
Location: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\TimeZoneInformation
Forensic Meaning:
Windows 11, particularly versions 23H2 and 24H2, has introduced new features and changed the behavior of existing artifacts. These updates, driven by the integration of AI and modern app architectures, create novel opportunities for investigators to recover data that was previously volatile or encrypted. Understanding these specific artifacts is essential for analyzing the latest generation of “Copilot+” PCs and ensuring that evidence from modern endpoints is not overlooked.
The introduction of the optional “Recall” feature in Windows 11 marks a paradigm shift in forensic visibility. By taking frequent snapshots of the user’s desktop to enable semantic search, the operating system effectively creates a visual log of user activity. For investigators, this is akin to having a surveillance camera pointed at the suspect’s screen, capturing transient data – such as ephemeral chat messages, displayed passwords, or online-only documents – that would never otherwise touch the disk.
Context: Introduced in mid-2024 for “Copilot+” PCs equipped with NPUs, Recall takes frequent screenshots of the user’s desktop to enable semantic search.
Important: At the time of this writing, Recall is an opt-in feature that requires users for explicit manual activation. In addition, Recall is currently only supported on PCs that meet a specific set of requirements: “a Copilot+ PC that meets the Secured-core standard; 40 TOPs NPU (neural processing unit)”. It may be unavailable on older PCs. Since Recall has legal/privacy sensitivity, rapid policy changes by Microsoft may affect possible future encryption or retention. In addition, managed/commercial defaults differ (Microsoft notes Recall is disabled by default for managed commercial devices).
Forensic Artifacts:
Software\Policies\Microsoft\Windows\WindowsAI.%AppData%\Local\CoreAIPlatform.00\UKP{GUID}\ukg.db.%AppData%\Local\CoreAIPlatform.00\UKP{GUID}\ImageStore.Investigative Value: If enabled, Recall serves as a comprehensive “DVR” of user activity. It can capture sensitive data displayed on screen (passwords, encrypted chat messages) that is not otherwise saved to disk. The ukg.db database contains OCR (Optical Character Recognition) text derived from these screenshots, allowing investigators to search for keywords (e.g., “bomb”, “stolen”, “password”) across the user’s visual history. Access and retention may be constrained by Windows security controls and configuration.
The modernization of the Notepad application has inadvertently created a useful forensic artifact. Because the new Notepad automatically saves the state of open tabs to prevent data loss, it preserves the content of “unsaved” documents on disk. This allows investigators to recover notes, code snippets, or addresses that a suspect typed into a scratchpad but never formally saved to a file, challenging the traditional assumption that unsaved data exists only in RAM.
Location: %LOCALAPPDATA%\Packages\Microsoft.WindowsNotepad_8wekyb3d8bbwe\LocalState\TabState (Related state metadata may also exist in %LOCALAPPDATA%\Packages\Microsoft.WindowsNotepad_8wekyb3d8bbwe\LocalState\WindowsState.)
Forensic Meaning: The modern Windows 11 Notepad application saves state automatically to allow users to close the app without losing unsaved tabs.
.bin) in the TabState directory contain the actual text content of unsaved tabs. This is a critical discovery for forensics: users often use Notepad as a temporary scratchpad for copying credentials, snippets of code, or illicit data. Previously, if the file wasn’t saved, the data was lost (RAM only). Now, it persists on disk in these binary files.In digital forensics, time is often the scarcest resource. An investigator can easily become overwhelmed by the sheer volume of data within the Registry, chasing down artifacts that look promising but yield no actionable intelligence. To maintain efficiency, it is crucial to know what to ignore. This section highlights “noisy” or redundant artifacts that, while technically valid, offer a low return on investment in modern Windows 10 and 11 investigations.
Legacy forensic guides often prioritized the manual extraction of Most Recently Used (MRU) lists for individual applications, such as Adobe Reader or Microsoft Word. While this method was necessary in older versions of Windows, modern operating systems have centralized these records. Today, spending hours parsing individual application hives is often a duplication of effort, as the OS itself now aggregates this data more reliably elsewhere.
Legacy Advice: Manually check the MRU keys for every installed application (e.g., Software\Adobe\Acrobat\Recent).
Modern Reality: In Windows 10/11, this is inefficient. The centralized RecentDocs and JumpLists (file system) provide a consolidated view of recent file access across all applications. Specific application MRUs should only be examined if the investigation focuses narrowly on that specific application (e.g., “Did the user open this PDF in Acrobat specifically?”).
The vast array of performance data stored in the Registry does not mean that more data equals more evidence. These keys are designed for real-time system monitoring, not historical reconstruction. They generate a high volume of changes that clutter timeline analysis without offering any particular insight into user actions, file access, or malicious intent.
Location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib
Analysis: These keys contain dynamic performance statistics. They update constantly but provide virtually no insight into user behavior, file access, or malicious activity.
The HKEY_CLASSES_ROOT hive is massive, containing millions of GUIDs (Globally Unique Identifiers) that define file associations and COM objects. While it is technically possible for malware to hide here, manually browsing this hive is akin to searching for a needle in a haystack composed entirely of other needles. Unless there is a specific indicator of compromise (IOC) pointing to a hijacked COM object, this area should be deprioritized in favor of higher-fidelity persistence locations.
Context: The HKEY_CLASSES_ROOT hive is largely a derived view of file associations.
Strategic Advice: Unless investigating a specific persistence technique known as “COM Hijacking” (where a CLSID is modified to point to malware), manually browsing the millions of GUIDs in this hive is a waste of investigative resources.
Registry forensics faces a harsh reality when transitioning from theory to live systems. While endpoint protection is designed to lock down a system against unauthorized access, forensic utilities require unrestricted access to secure evidence – including locked system files. This conflict creates immediate operational risks. Modern antivirus engines with aggressive heuristics often flag legitimate forensic binaries as malware, potentially terminating the acquisition process or quarantining the tool itself. Even without blocking, active background scanning introduces significant I/O latency and threatens evidence integrity, a challenge we explored in Live System Analysis: Mitigating Interference from Antivirus Tools.
Elcomsoft Quick Triage is engineered to navigate these specific constraints. It allows investigators to acquire and parse critical Registry hives and volatile state data—such as AmCache and ShimCache—from live endpoints while minimizing the risk of triggering heuristic blocks or altering evidence timestamps. By automating the collection of high-value artifacts, investigators can rapidly validate hypotheses and identify compromised systems before committing to the time-intensive process of full disk imaging.
When live acquisition poses too high a risk, an alternative strategy involves booting into a clean forensic environment. As detailed in Choosing the Right Strategy: Cold Boot Forensics vs Live System Analysis, this approach bypasses active defenses entirely, granting unrestricted access to Registry hives and files that would otherwise be locked by the operating system.
The forensic analysis of the Windows Registry in Windows 10 and 11 requires a disciplined, hierarchical approach. By prioritizing artifacts that provide high-fidelity evidence of execution (UserAssist, AmCache), intent (TypedPaths, ShellBags), and data movement (USBSTOR, MountedDevices), investigators can construct a defensible narrative of events.
The shift to Windows 11 introduces new challenges – specifically the AI-driven “Recall” feature and the persistence of “unsaved” data in Notepad – but also offers new opportunities for evidence recovery. The Registry remains a major source of artefacts in the Windows OS; while the content of the file system changes, the Registry continues to record the actions of the user with remarkable precision. Successful investigations depend not on finding every key, but on understanding the mechanics and meaning of the right ones.
This article builds upon the collective knowledge of the digital forensics community. The detailed analysis of Windows 10 and 11 artifacts presented here would not be possible without the research and documentation provided by the following authors and organizations. We extend our gratitude to them for their contributions to the field.
Elcomsoft Quick Triage is a tool designed to rapidly extract and analyze the most important evidence from a target computer or disk. It is equally effective during on-site operations and in laboratory environments, helping investigators make informed decisions at the earliest stages of an investigation.
In order to preserve digital evidence, the chain of custody begins from the first point of data collection. Elcomsoft System Recovery employs a forensically sound workflow to ensure that digital evidence collected during the investigation remains court admissible. The workflow implements read-only, write-blocking access to the target computer, and saves collected evidence in the form of digitally signed, verifiable disk images, making Elcomsoft System Recovery a viable alternative to hardware-based write blocking disk imaging devices while offering real-time access to crucial evidence.