RegRipper: A Deep Dive into Windows Registry Forensics

1. What is RegRipper?

RegRipper is an open-source Windows Registry analysis tool used in digital forensics to extract and analyze critical artifacts from registry hives. It's particularly valuable for:

  • Incident response investigations
  • Malware analysis
  • User activity reconstruction
  • Timeline creation

2. Key Features

Plugin-based architecture (200+ plugins for different registry keys)
✔ Supports both CLI and GUI versions (RipXP)
✔ Handles live systems and dead-box forensics
✔ Works with raw registry hives (SYSTEM, SOFTWARE, SAM, NTUSER.DAT, etc.)

3. Installation

Download from GitHub

We can see the following files after extract the ZIP file. rip is CLI where as rr is GUI version. In our case we are going to use GUI version.

To launch the application's graphical user interface (GUI), double-click the 'rr' file. The GUI will appear, as shown in screenshot #2. Next, use the 'Browse' button adjacent to the 'Hive file' field to locate and select your Hive files. Following the numbered sequence, open the HIVE SAM, SYSTEM, SECURITY, and SOFTWARE files one at a time. 

For this lab purpose we are going to use the Windows Forensics Cheatsheets from the BlueCap
 



GUI Version of RegRipper.

Collection of all the Registry evidence from the suspect machine. 
Open all the evidence file in Notepad Plus or your desire application. Now we are going to follow the cheatsheet. 
Computer Name: HMLM\SYSTEM\CurrentControlSet\Control\Computer-name\ . From the Notepad Plus press Control+F then type Computer Name, it will locate the computer name. Like in our screenshot. 
Windows Version: HKLM\Software\Microsoft\Windows NT\CurrentVersion

Time Zone: HKLM\System\CureentControlSet\Control\TimeZoneInformati

Network Information: HKLM\System\CureentControlSet\Services\Tcpip\parameters\Interfaces\{interface-name
User Information: Using UserAssist.
 

Lnk Files

UsrClass: AppData\Local\Microsoft\Windows. File location that user might have been open.
  
BAM: Background Activity Monitor