Hibernation File
Overview
Evidence: Hibernation File Description: Dump Hibernation File Category: Memory Platform: Windows Short Name: hbr Is Parsed: No - Raw hibernation file Sent to Investigation Hub: Yes Collect File(s): No
Background
When Windows hibernates, it saves the complete contents of RAM to the hibernation file (hiberfil.sys). This creates a snapshot of all running processes, kernel state, and memory contents at the time of hibernation.
The hibernation file is essentially a compressed memory dump and can be analyzed with memory forensics tools. It persists even after the system resumes from hibernation.
Data Collected
Type
File type
HibernationFile
Name
File name
hiberfil.sys
SourcePath
Original file path
C:\hiberfil.sys
FilePath
Relative path in evidence
Files/hiberfil.sys
FileSize
File size in bytes
17179869184
Collection Method
This collector collects the hibernation file from:
C:\hiberfil.sys
(default location)
The file is collected using driver or NTFS raw access if locked.
Usage
Hibernation files provide a complete memory snapshot from a specific point in time. Investigators use this data for full memory forensic analysis, recovering historical system state, extracting credentials and keys from point of hibernation, analyzing malware present at hibernation time, and reconstructing system state from past hibernation.
Known Limitations
Only present if hibernation has been used
May not exist if hibernation is disabled
Can be very large (compressed RAM size)
Represents state at last hibernation, not current
Requires hibernation-aware memory forensics tools
Notes
Tools like Volatility and Rekall can convert hiberfil.sys to raw memory format for analysis. The hibernation file represents a snapshot from the last hibernation event, which may be hours, days, or weeks old.
Last updated
Was this helpful?