AppPaths

Overview

Evidence: AppPaths Description: Enumerate AppPaths Category: Registry Platform: Windows Short Name: apppaths Is Parsed: Yes - Registry data parsed into structured format Sent to Investigation Hub: Yes Collect File(s): No

Background

The App Paths registry key allows applications to register custom search paths so they can be launched by name without specifying the full path. When a user types just the executable name (e.g., "chrome"), Windows searches the App Paths registry to find the full path.

Malware can abuse this mechanism to hijack application launches or establish persistence by registering malicious executables under legitimate application names.

Data Collected

Field
Description
Example

KeyName

Application executable name

chrome.exe

KeyDefaultValue

Default value (full path to exe)

C:\Program Files\Google\Chrome\Application\chrome.exe

Path

Additional search path

C:\Program Files\Google\Chrome\Application

Username

User account (empty for HKLM)

user or empty

KeyPath

Registry key path

SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe

LastWriteTime

Registry key last write time

2023-10-15T14:30:00

RegPath

Path to registry hive

Registry/SOFTWARE or Registry/ntuser.dat

Collection Method

This collector searches both machine and user registry locations:

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\*

  • HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\*

For each application, it reads:

  • Default value (full executable path)

  • Path value (additional search path)

  • Registry key last write time

Usage

App Paths can reveal application installations and detect persistence mechanisms. Investigators use this data to identify registered applications, detect application hijacking, track custom executable paths, identify persistence mechanisms, verify application locations, and detect malware masquerading as legitimate applications.

Known Limitations

  • Only includes applications that register themselves

  • Many portable applications don't use App Paths

  • Can be manipulated by malware

  • Per-user entries require analyzing all user hives

Notes

Malware may register itself in App Paths to enable execution without full paths or to hijack legitimate application names. Compare App Paths entries with installed applications and file system evidence.

Last updated

Was this helpful?