> Windows Syscalls
ntoskrnl.exeT1518T1012T1547.001

NtEnumerateKey

Enumerates subkeys of a registry key — used to walk AutoRun, IFEO and Services for persistence discovery.

Prototype

NTSTATUS NtEnumerateKey(
  HANDLE                KeyHandle,
  ULONG                 Index,
  KEY_INFORMATION_CLASS KeyInformationClass,
  PVOID                 KeyInformation,
  ULONG                 Length,
  PULONG                ResultLength
);

Arguments

NameTypeDirDescription
KeyHandleHANDLEinHandle opened with KEY_ENUMERATE_SUB_KEYS (subset of KEY_READ).
IndexULONGinZero-based index of the subkey to retrieve. Increment until STATUS_NO_MORE_ENTRIES.
KeyInformationClassKEY_INFORMATION_CLASSinLayout: KeyBasicInformation=0, KeyNodeInformation=1, KeyFullInformation=2, KeyNameInformation=3.
KeyInformationPVOIDoutOutput buffer that receives the requested KEY_*_INFORMATION struct.
LengthULONGinSize of KeyInformation in bytes.
ResultLengthPULONGoutReceives the required size when the buffer is too small.

Syscall IDs by Windows version

Windows versionSyscall IDBuild
Win10 15070x32win10-1507
Win10 16070x32win10-1607
Win10 17030x32win10-1703
Win10 17090x32win10-1709
Win10 18030x32win10-1803
Win10 18090x32win10-1809
Win10 19030x32win10-1903
Win10 19090x32win10-1909
Win10 20040x32win10-2004
Win10 20H20x32win10-20h2
Win10 21H10x32win10-21h1
Win10 21H20x32win10-21h2
Win10 22H20x32win10-22h2
Win11 21H20x32win11-21h2
Win11 22H20x32win11-22h2
Win11 23H20x32win11-23h2
Win11 24H20x32win11-24h2
Server 20160x32winserver-2016
Server 20190x32winserver-2019
Server 20220x32winserver-2022
Server 20250x32winserver-2025

Kernel module

ntoskrnl.exeNtEnumerateKey

Related APIs

RegEnumKeyExWNtEnumerateValueKeyNtQueryKeyRegQueryInfoKeyWNtOpenKeyNtOpenKeyEx

Syscall stub

4C 8B D1            mov r10, rcx
B8 32 00 00 00      mov eax, 0x32
F6 04 25 08 03 FE 7F 01   test byte ptr [0x7FFE0308], 1
75 03               jne short +3
0F 05               syscall
C3                  ret
CD 2E               int 2Eh
C3                  ret

Undocumented notes

Index-based enumeration: caller drives a loop from `Index=0` upward until it receives `STATUS_NO_MORE_ENTRIES`. Adding or deleting a subkey during enumeration shifts indices, so robust callers either retry the failing index or snapshot names into a list before processing. SSN `0x32` has been stable since Windows 7. `NtEnumerateKey` returns subkeys only — for values you need `NtEnumerateValueKey` (a sister syscall with the same shape).

Common malware usage

**Persistence discovery (T1518 + T1012 + T1547.x)** — both red and blue use the same primitive, just at different ends of the kill chain. The interesting offensive use is *autorun enumeration before planting*: walk every standard auto-execute key first to find an unused name (collision avoidance), or to discover existing entries the implant can hijack (replace the binary path of an installed but rarely-run scheduled-task launcher rather than create a new entry that would be the only one not seen in baselines). Canonical paths: `\Registry\Machine\Software\Microsoft\Windows\CurrentVersion\Run`, `RunOnce`, `Explorer\Shell Folders`, `Image File Execution Options` (whose subkeys are *names of executables* — enumerating them is the way to find IFEO-debugger hijack opportunities), `App Paths`, `\Services` (Type=1 driver services, Type=16 own-process services), `\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify`. Stealers also enumerate `\Software\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles` to discover Wi-Fi profile GUIDs before going after the PSKs through `wlanapi`.

Detection opportunities

Volume of `NtEnumerateKey` is gigantic on a normal host (Group Policy refresh, Defender ASR engine, every Explorer namespace expansion). It's not a useful primary signal. Two derivative signals work: (1) **Enumeration of a sensitive key by a non-baseline process** — alert when a process whose image hash has never previously enumerated `\Microsoft\Windows NT\CurrentVersion\Image File Execution Options` does so; (2) **Enumeration followed by SetValueKey** at the same parent — implants typically enumerate to dodge collisions, then write. Microsoft-Windows-Kernel-Registry ETW carries both events with timestamps tight enough to correlate. EDRs register `CmRegisterCallbackEx` and receive `RegNtPreEnumerateKey` / `RegNtPostEnumerateKey` notifications regardless of user-mode hook state. Hunt query: same PID emits ≥ 20 `NtEnumerateKey` calls under `\Microsoft\Windows\CurrentVersion\Run*` plus one `NtSetValueKey` to a sibling within 2 s.

Direct syscall examples

cWalk Image File Execution Options subkeys

// hIfeo = handle to \Registry\Machine\Software\Microsoft\
//                  Windows NT\CurrentVersion\Image File Execution Options
for (ULONG i = 0;; ++i) {
    BYTE  buf[0x200];
    ULONG got = 0;
    NTSTATUS s = NtEnumerateKey(
        hIfeo, i,
        KeyBasicInformation,
        buf, sizeof(buf), &got);
    if (s == STATUS_NO_MORE_ENTRIES) break;
    if (!NT_SUCCESS(s)) continue;
    PKEY_BASIC_INFORMATION ki = (PKEY_BASIC_INFORMATION)buf;
    // ki->Name is the image name targetable by IFEO Debugger hijack
}

asmDirect stub (SSN 0x32)

NtEnumerateKey PROC
    mov  r10, rcx
    mov  eax, 32h
    syscall
    ret
NtEnumerateKey ENDP

rustSnapshot subkey names to avoid index drift

use ntapi::ntregapi::{NtEnumerateKey, KEY_BASIC_INFORMATION};
use winapi::shared::ntdef::HANDLE;

pub unsafe fn list_subkeys(h: HANDLE) -> Vec<String> {
    let mut names = Vec::new();
    let mut buf = vec![0u8; 0x400];
    for i in 0u32.. {
        let mut got = 0u32;
        let s = NtEnumerateKey(
            h, i, 0 /* KeyBasicInformation */,
            buf.as_mut_ptr() as *mut _, buf.len() as u32, &mut got);
        if s == 0x8000001A /* STATUS_NO_MORE_ENTRIES */ { break; }
        if s != 0 { continue; }
        let ki = &*(buf.as_ptr() as *const KEY_BASIC_INFORMATION);
        let name = core::slice::from_raw_parts(
            ki.Name.as_ptr(), (ki.NameLength / 2) as usize);
        names.push(String::from_utf16_lossy(name));
    }
    names
}

MITRE ATT&CK mappings

Last verified: 2026-05-20