< Back

Get-ForensicRunKey

Sat Jan 18, 2020 8:51 pm

NAME Get-ForensicRunKey



SYNOPSIS

Gets applications that will autostart due to their inclusion in a "Run" key.





SYNTAX

Get-ForensicRunKey [-VolumeName <String>] [<CommonParameters>]



Get-ForensicRunKey -HivePath <String> [<CommonParameters>]





DESCRIPTION

The Get-ForensicRunKey cmdlet parses the SOFTWARE and NTUSER.DAT hives to produce a list of applications that have

been added to a "Run" key.



Except as noted, the cmdlets in the PowerForensics module require the permissions of a member of the

Administrators group on the computer. To run them, start Windows PowerShell with the 'Run as administrator' option.





PARAMETERS

-VolumeName [<String>]

Specifies the name of the volume or logical partition.



Enter the volume name in one of the following formats: \\\\.\\C:, C:, or C.



Required? false

Position? named

Default value

Accept pipeline input? false

Accept wildcard characters? false



-HivePath <String>

Registry hive to parse.



Required? true

Position? named

Default value

Accept pipeline input? false

Accept wildcard characters? false



<CommonParameters>

This cmdlet supports the common parameters: Verbose, Debug,

ErrorAction, ErrorVariable, WarningAction, WarningVariable,

OutBuffer, PipelineVariable, and OutVariable. For more information, see

about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).



INPUTS

None







OUTPUTS

PowerForensics.Artifacts.Persistence.RunKey







-------------------------- EXAMPLE 1 --------------------------



[ADMIN]: PS C:\\>Get-ForensicRunKey





-------------------------- EXAMPLE 2 --------------------------



[ADMIN]: PS C:\\>Get-ForensicRunKey -HivePath C:\\Windows\\System32\\config\\SOFTWARE







RELATED LINKS