Tracing Registry Keys
Tracing registry keys can be used to indicate that a program has initiated a network connection leveraging the Windows Remote Access Server (RAS) through the rasapi32.dll and rasman.dll libraries.
Analysis Value
Evidence of ExecutionFirst ExecutedEvidence of Network ActivityOperating System Availability
Windows 11
β
Server 2019
β
Windows 10
β
Server 2016
β
Windows 8
β
Server 2012
β
Windows 7
β
Server 2008
β
Windows Vista
β
Server 2003
β
Windows XP
β
Artifact Location(s)
File:
%SystemRoot%\System32\Config\SOFTWAREKey:
SOFTWARE\Microsoft\Tracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing
Artifact Parsers
RegistryExplorer (Eric Zimmerman)
Artifact Interpretation
Within the SOFTWARE\Microsoft\Tracing key, there may be multiple subkeys with the following name formats of interest:
{EXECUTABLE_FILENAME}_RASMANCS{EXECUTABLE_FILENAME}_RASAPI32
These filenames will not include the executable extension .exe.
The Last Write Timestamp of the registry key provides the first time an executable has loaded rasapi32.dll and rasman.dll in order to establish a remote network connection, typically to download a file.
Subsequent activity of this nature will not update the Last Write Timestamp of the registry key.
Last updated