RegistryHivesUser
Windowsv1
Author: Eric Zimmerman / Mark Hallman
description
User Related Registry hives
paths
9 paths
› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: RegistryHivesUser
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle artifact collection with robocopy
function Collect-Artifact {
param (
[string]$SourceDir,
[string]$FolderName,
[string]$FileMask = "*"
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
robocopy "$SourceDir" "$FullDest" "$FileMask" /E /COPY:DAT /R:0 /W:0 /NP /NFL /NDL /NJH /NJS | Out-Null
}
# 1. NTUSER.DAT registry hive XP
$UserPath = Join-Path $env:USERPROFILE ""
Collect-Artifact -SourceDir "$UserPath" -FileMask "NTUSER.DAT*" -FolderName "NTUSER_DAT_registry_hive_XP"
# 2. NTUSER.DAT registry hive
$UserPath = Join-Path $env:USERPROFILE ""
Collect-Artifact -SourceDir "$UserPath" -FileMask "NTUSER.DAT*" -FolderName "NTUSER_DAT_registry_hive"
# 3. NTUSER.DAT registry transaction files
$UserPath = Join-Path $env:USERPROFILE ""
Collect-Artifact -SourceDir "$UserPath" -FileMask "NTUSER.DAT.LOG*" -FolderName "NTUSER_DAT_registry_transaction_files"
# 4. NTUSER.DAT DEFAULT registry hive
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "DEFAULT" -FolderName "NTUSER_DAT_DEFAULT_registry_hive"
# 5. NTUSER.DAT DEFAULT registry hive
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "DEFAULT" -FolderName "NTUSER_DAT_DEFAULT_registry_hive"
# 6. NTUSER.DAT DEFAULT transaction files
Collect-Artifact -SourceDir "C:\Windows\System32\config\" -FileMask "DEFAULT.LOG*" -FolderName "NTUSER_DAT_DEFAULT_transaction_files"
# 7. NTUSER.DAT DEFAULT transaction files
Collect-Artifact -SourceDir "C:\Windows.old\Windows\System32\config\" -FileMask "DEFAULT.LOG*" -FolderName "NTUSER_DAT_DEFAULT_transaction_files"
# 8. UsrClass.dat registry hive
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Microsoft\Windows\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "UsrClass.dat*" -FolderName "UsrClass_dat_registry_hive"
# 9. UsrClass.dat registry transaction files
$UserPath = Join-Path $env:USERPROFILE "AppData\Local\Microsoft\Windows\"
Collect-Artifact -SourceDir "$UserPath" -FileMask "UsrClass.dat.LOG*" -FolderName "UsrClass_dat_registry_transaction_files"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
Open in CyberChef to decode values extracted from this artifact.