Skip to content
WindowsNetworkHigh

WiFi Profile Registry

Windows stores every SSID a machine has connected to under HKLM, along with connection timestamps and MAC address of the AP — strong location evidence.

artifact_type: wireless_profile

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles\
  • $HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Laptop stolen in X city — did it connect to hotel WiFi en route?
  • Establishing which networks a compromised workstation trusts
  • Correlating travel with wireless beacons

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
RegRipper (networklist plugin)
NetAnalysis

Related artifacts

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI