The Windows Registry functions similarly to a file system. Understanding its structure helps in identifying potential persistence mechanisms.
Lists in the registry appear in three forms:

** Registry terminology example**

**List of values in the Run Key**

Windows Run Keys allow programs to start automatically when a user logs in. Attackers leverage these keys to execute malware upon system startup.
The registry consists of several "hives" major sections storing system and user data. The two most important for persistence are: