RegistryHivesSystem
Windowsv1
Author: Eric Zimmerman / Mark Hallman
description
System level/related Registry hives
paths
41 paths
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: RegistryHivesSystem
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle artifact collection with robocopy
function Collect-Artifact {
param (
[string]$SourceDir,
[string]$FolderName,
[string]$FileMask = "*"
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
robocopy "$SourceDir" "$FullDest" "$FileMask" /E /COPY:DAT /R:0 /W:0 /NP /NFL /NDL /NJH /NJS | Out-Null
}
# 1. SAM registry transaction files
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SAM.LOG*" -FolderName "SAM_registry_transaction_files"
# 2. SAM registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SAM.LOG*" -FolderName "SAM_registry_transaction_files"
# 3. SECURITY registry transaction files
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SECURITY.LOG*" -FolderName "SECURITY_registry_transaction_files"
# 4. SECURITY registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SECURITY.LOG*" -FolderName "SECURITY_registry_transaction_files"
# 5. SOFTWARE registry transaction files
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SOFTWARE.LOG*" -FolderName "SOFTWARE_registry_transaction_files"
# 6. SOFTWARE registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SOFTWARE.LOG*" -FolderName "SOFTWARE_registry_transaction_files"
# 7. SYSTEM registry transaction files
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SYSTEM.LOG*" -FolderName "SYSTEM_registry_transaction_files"
# 8. SYSTEM registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SYSTEM.LOG*" -FolderName "SYSTEM_registry_transaction_files"
# 9. SAM registry hive
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SAM" -FolderName "SAM_registry_hive"
# 10. SAM registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SAM" -FolderName "SAM_registry_hive"
# 11. SECURITY registry hive
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SECURITY" -FolderName "SECURITY_registry_hive"
# 12. SECURITY registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SECURITY" -FolderName "SECURITY_registry_hive"
# 13. SOFTWARE registry hive
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SOFTWARE" -FolderName "SOFTWARE_registry_hive"
# 14. SOFTWARE registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SOFTWARE" -FolderName "SOFTWARE_registry_hive"
# 15. SYSTEM registry hive
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "SYSTEM" -FolderName "SYSTEM_registry_hive"
# 16. SYSTEM registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "SYSTEM" -FolderName "SYSTEM_registry_hive"
# 17. RegBack registry transaction files
Collect-Artifact -SourceDir "C:\Windows\System32\config\RegBack\" -FileMask "*.LOG*" -FolderName "RegBack_registry_transaction_files"
# 18. RegBack registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\RegBack\" -FileMask "*.LOG*" -FolderName "RegBack_registry_transaction_files"
# 19. SAM registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows\System32\config\RegBack\" -FileMask "SAM" -FolderName "SAM_registry_hive__RegBack_"
# 20. SAM registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\RegBack\" -FileMask "SAM" -FolderName "SAM_registry_hive__RegBack_"
# 21. SECURITY registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows\System32\config\RegBack\" -FileMask "SECURITY" -FolderName "SECURITY_registry_hive__RegBack_"
# 22. SECURITY registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\RegBack\" -FileMask "SECURITY" -FolderName "SECURITY_registry_hive__RegBack_"
# 23. SOFTWARE registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows\System32\config\RegBack\" -FileMask "SOFTWARE" -FolderName "SOFTWARE_registry_hive__RegBack_"
# 24. SOFTWARE registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\RegBack\" -FileMask "SOFTWARE" -FolderName "SOFTWARE_registry_hive__RegBack_"
# 25. SYSTEM registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows\System32\config\RegBack\" -FileMask "SYSTEM" -FolderName "SYSTEM_registry_hive__RegBack_"
# 26. SYSTEM registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\RegBack\" -FileMask "SYSTEM" -FolderName "SYSTEM_registry_hive__RegBack_"
# 27. SYSTEM registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows\System32\config\RegBack\" -FileMask "SYSTEM1" -FolderName "SYSTEM_registry_hive__RegBack_"
# 28. SYSTEM registry hive (RegBack)
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\RegBack\" -FileMask "SYSTEM1" -FolderName "SYSTEM_registry_hive__RegBack_"
# 29. System Profile registry hive
Collect-Artifact -SourceDir "C:\Windows\System32\config\systemprofile\" -FileMask "NTUSER.DAT" -FolderName "System_Profile_registry_hive"
# 30. System Profile registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\systemprofile\" -FileMask "NTUSER.DAT" -FolderName "System_Profile_registry_hive"
# 31. System Profile registry transaction files
Collect-Artifact -SourceDir "C:\Windows\System32\config\systemprofile\" -FileMask "NTUSER.DAT.LOG*" -FolderName "System_Profile_registry_transaction_files"
# 32. System Profile registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\systemprofile\" -FileMask "NTUSER.DAT.LOG*" -FolderName "System_Profile_registry_transaction_files"
# 33. Local Service registry hive
Collect-Artifact -SourceDir "C:\Windows\ServiceProfiles\LocalService\" -FileMask "NTUSER.DAT" -FolderName "Local_Service_registry_hive"
# 34. Local Service registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\ServiceProfiles\LocalService\" -FileMask "NTUSER.DAT" -FolderName "Local_Service_registry_hive"
# 35. Local Service registry transaction files
Collect-Artifact -SourceDir "C:\Windows\ServiceProfiles\LocalService\" -FileMask "NTUSER.DAT.LOG*" -FolderName "Local_Service_registry_transaction_files"
# 36. Local Service registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\ServiceProfiles\LocalService\" -FileMask "NTUSER.DAT.LOG*" -FolderName "Local_Service_registry_transaction_files"
# 37. Network Service registry hive
Collect-Artifact -SourceDir "C:\Windows\ServiceProfiles\NetworkService\" -FileMask "NTUSER.DAT" -FolderName "Network_Service_registry_hive"
# 38. Network Service registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\ServiceProfiles\NetworkService\" -FileMask "NTUSER.DAT" -FolderName "Network_Service_registry_hive"
# 39. Network Service registry transaction files
Collect-Artifact -SourceDir "C:\Windows\ServiceProfiles\NetworkService\" -FileMask "NTUSER.DAT.LOG*" -FolderName "Network_Service_registry_transaction_files"
# 40. Network Service registry transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\ServiceProfiles\NetworkService\" -FileMask "NTUSER.DAT.LOG*" -FolderName "Network_Service_registry_transaction_files"
# 41. System Restore Points Registry Hives (XP)
Collect-Artifact -SourceDir "C:\System Volume Information\_restore*\RP*\snapshot\" -FileMask "_REGISTRY_*" -FolderName "System_Restore_Points_Registry_Hives__XP_"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
- open in cyberchef(opens in new tab)Registry BinaryDecode binary registry values
- open in cyberchef(opens in new tab)Windows SIDParse Windows Security Identifier
Open in CyberChef to decode values extracted from this artifact.