SRUM
Windowsv1
Author: Mark Hallman
description
System Resource Usage Monitor (SRUM) Data
paths
6 paths
ExecutionSRUM
C:\Windows\System32\SRU\ExecutionSRUM
C:\Windows.old\Windows\System32\SRU\RegistrySOFTWARE registry hive
C:\Windows\System32\config\SOFTWARERegistrySOFTWARE registry hive
C:\Windows.old\Windows\System32\config\SOFTWARERegistrySOFTWARE registry transaction files
C:\Windows\System32\config\SOFTWARE.LOG*RegistrySOFTWARE registry transaction files
C:\Windows.old\Windows\System32\config\SOFTWARE.LOG*› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: SRUM
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle directory creation and copying
function Collect-Artifact {
param (
[string]$SourcePath,
[string]$FolderName
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
if (-not (Test-Path -Path $FullDest)) {
New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
}
Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}
# 1. SRUM
Collect-Artifact -SourcePath "C:\Windows\System32\SRU\\*" -FolderName "SRUM"
# 2. SRUM
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\SRU\\*" -FolderName "SRUM"
# 3. SOFTWARE registry hive
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SOFTWARE" -FolderName "SOFTWARE_registry_hive"
# 4. SOFTWARE registry hive
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SOFTWARE" -FolderName "SOFTWARE_registry_hive"
# 5. SOFTWARE registry transaction files
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SOFTWARE.LOG*" -FolderName "SOFTWARE_registry_transaction_files"
# 6. SOFTWARE registry transaction files
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SOFTWARE.LOG*" -FolderName "SOFTWARE_registry_transaction_files"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
Open in CyberChef to decode values extracted from this artifact.