Registry Explorer
How to use Registry Explorer to parse the Windows Registry in order to provide evidence in support of various malicious activities during incident investigations.
Tool Name
Version
MITRE ATT&CK Tactic
MITRE ATT&CK Technique
Instructions
Loading a Hosts Registry via Registry Explorer
Parsing the AmCache.hve for Evidence of Execution

Parsing the BAM/DAM for Evidence of Execution

Parsing the LastVisitedMRU for Evidence of Execution

Parsing the ShimCache (AppCompatCache) for Evidence of Execution

Last updated