WindowsHello
Windowsv1
Author: Kevin Pagano
description
Windows Hello
paths
23 paths
Windows HelloCryptokeys
C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\Windows HelloMasterkey
C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Windows HelloNGC
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Ngc\RegistrySECURITY registry transaction files
C:\Windows\System32\config\SECURITY.LOG*RegistrySECURITY registry transaction files
C:\Windows.old\Windows\System32\config\SECURITY.LOG*RegistrySOFTWARE registry transaction files
C:\Windows\System32\config\SOFTWARE.LOG*RegistrySOFTWARE registry transaction files
C:\Windows.old\Windows\System32\config\SOFTWARE.LOG*RegistrySYSTEM registry transaction files
C:\Windows\System32\config\SYSTEM.LOG*RegistrySYSTEM registry transaction files
C:\Windows.old\Windows\System32\config\SYSTEM.LOG*RegistrySECURITY registry hive
C:\Windows\System32\config\SECURITYRegistrySECURITY registry hive
C:\Windows.old\Windows\System32\config\SECURITYRegistrySOFTWARE registry hive
C:\Windows\System32\config\SOFTWARERegistrySOFTWARE registry hive
C:\Windows.old\Windows\System32\config\SOFTWARERegistrySYSTEM registry hive
C:\Windows\System32\config\SYSTEMRegistrySYSTEM registry hive
C:\Windows.old\Windows\System32\config\SYSTEMRegistrySECURITY registry hive (RegBack)
C:\Windows\System32\config\RegBack\SECURITYRegistrySECURITY registry hive (RegBack)
C:\Windows.old\Windows\System32\config\RegBack\SECURITYRegistrySOFTWARE registry hive (RegBack)
C:\Windows\System32\config\RegBack\SOFTWARERegistrySOFTWARE registry hive (RegBack)
C:\Windows.old\Windows\System32\config\RegBack\SOFTWARERegistrySYSTEM registry hive (RegBack)
C:\Windows\System32\config\RegBack\SYSTEMRegistrySYSTEM registry hive (RegBack)
C:\Windows.old\Windows\System32\config\RegBack\SYSTEMRegistrySYSTEM registry hive (RegBack)
C:\Windows\System32\config\RegBack\SYSTEM1RegistrySYSTEM registry hive (RegBack)
C:\Windows.old\Windows\System32\config\RegBack\SYSTEM1› paths use Windows environment syntax
collection commands
# PowerShell Artifact Collection Script
# Target: WindowsHello
# Run as Administrator
#Requires -RunAsAdministrator
$ErrorActionPreference = "SilentlyContinue"
$DestBase = "D:\Evidence"
# Function to handle directory creation and copying
function Collect-Artifact {
param (
[string]$SourcePath,
[string]$FolderName
)
$FullDest = Join-Path -Path $DestBase -ChildPath $FolderName
if (-not (Test-Path -Path $FullDest)) {
New-Item -ItemType Directory -Path $FullDest -Force | Out-Null
}
Copy-Item -Path $SourcePath -Destination $FullDest -Recurse -Force
}
# 1. Cryptokeys
Collect-Artifact -SourcePath "C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\\*" -FolderName "Cryptokeys"
# 2. Masterkey
Collect-Artifact -SourcePath "C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\\*" -FolderName "Masterkey"
# 3. NGC
Collect-Artifact -SourcePath "C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Ngc\\*" -FolderName "NGC"
# 4. SECURITY registry transaction files
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SECURITY.LOG*" -FolderName "SECURITY_registry_transaction_files"
# 5. SECURITY registry transaction files
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SECURITY.LOG*" -FolderName "SECURITY_registry_transaction_files"
# 6. SOFTWARE registry transaction files
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SOFTWARE.LOG*" -FolderName "SOFTWARE_registry_transaction_files"
# 7. SOFTWARE registry transaction files
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SOFTWARE.LOG*" -FolderName "SOFTWARE_registry_transaction_files"
# 8. SYSTEM registry transaction files
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SYSTEM.LOG*" -FolderName "SYSTEM_registry_transaction_files"
# 9. SYSTEM registry transaction files
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SYSTEM.LOG*" -FolderName "SYSTEM_registry_transaction_files"
# 10. SECURITY registry hive
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SECURITY" -FolderName "SECURITY_registry_hive"
# 11. SECURITY registry hive
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SECURITY" -FolderName "SECURITY_registry_hive"
# 12. SOFTWARE registry hive
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SOFTWARE" -FolderName "SOFTWARE_registry_hive"
# 13. SOFTWARE registry hive
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SOFTWARE" -FolderName "SOFTWARE_registry_hive"
# 14. SYSTEM registry hive
Collect-Artifact -SourcePath "C:\Windows\System32\config\\SYSTEM" -FolderName "SYSTEM_registry_hive"
# 15. SYSTEM registry hive
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\\SYSTEM" -FolderName "SYSTEM_registry_hive"
# 16. SECURITY registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows\System32\config\RegBack\\SECURITY" -FolderName "SECURITY_registry_hive__RegBack_"
# 17. SECURITY registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\RegBack\\SECURITY" -FolderName "SECURITY_registry_hive__RegBack_"
# 18. SOFTWARE registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows\System32\config\RegBack\\SOFTWARE" -FolderName "SOFTWARE_registry_hive__RegBack_"
# 19. SOFTWARE registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\RegBack\\SOFTWARE" -FolderName "SOFTWARE_registry_hive__RegBack_"
# 20. SYSTEM registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows\System32\config\RegBack\\SYSTEM" -FolderName "SYSTEM_registry_hive__RegBack_"
# 21. SYSTEM registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\RegBack\\SYSTEM" -FolderName "SYSTEM_registry_hive__RegBack_"
# 22. SYSTEM registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows\System32\config\RegBack\\SYSTEM1" -FolderName "SYSTEM_registry_hive__RegBack_"
# 23. SYSTEM registry hive (RegBack)
Collect-Artifact -SourcePath "C:\Windows.old\Windows\System32\config\RegBack\\SYSTEM1" -FolderName "SYSTEM_registry_hive__RegBack_"
Write-Host "Collection complete!" -ForegroundColor Green› Save as .ps1 and run as Administrator. Use: powershell -ExecutionPolicy Bypass -File script.ps1
› cyberchef recipes
Open in CyberChef to decode values extracted from this artifact.