Registry Hives
Overview
Evidence: Registry Hives Description: Dump Registry Hives Category: Registry Platform: Windows Short Name: hiv Is Parsed: No - Raw hive files are collected Sent to Investigation Hub: Yes Collect File(s): No
Background
The Windows Registry is a hierarchical database that stores configuration settings and options for the operating system, hardware, installed applications, and user preferences. The registry is stored in several files called hives, each containing a specific branch of the registry tree.
Registry hives are critical system files that Windows loads at boot time and keeps open while the system is running. Each hive file may have associated transaction log files (.log, .log1, .log2) that help maintain consistency during registry writes.
Data Collected
RegPath
Registry path being collected
\REGISTRY\MACHINE\SYSTEM
FilePath
Relative path in the evidence package
Registry/SYSTEM
FileSize
Size of the hive file in bytes
12582912
FileModified
Last modified timestamp
2023-10-15T14:30:00
FileAccessed
Last accessed timestamp
2023-10-15T15:45:00
FileCreated
Creation timestamp
2023-10-01T10:00:00
Hash
Hash of the hive file
SHA256:a1b2c3...
Collection Method
This collector gathers registry hive files from multiple locations:
Active hives from
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\hivelist
User hives:
Users\*\ntuser.dat
User class hives:
Users\*\AppData\Local\Microsoft\Windows\UsrClass.dat
Default user hive:
Windows\System32\config\default
Transaction logs (.log, .log1, .log2) for each hive
Backup copies from
Windows\System32\config\RegBack
The registry is flushed before collection to ensure all data is written to disk.
Note: For old registry hives from Windows.old, see Old Registry Hives.
Usage
Registry hives are essential for forensic investigations as they contain vast amounts of system and user activity data. This evidence helps investigators reconstruct system configuration, user behavior, installed applications, network connections, USB device history, recent file access, and persistence mechanisms. Analysts can use registry analysis to identify malware persistence, user activity patterns, application usage, system modifications, and attacker tradecraft.
Known Limitations
Registry hives may be locked by the system
Some hives require elevated privileges to access
Transaction logs may not always be present
Backup copies may be outdated or disabled on some systems
Notes
Always collect both the primary hive files and their transaction logs (.log, .log1, .log2) for complete analysis. The transaction logs can contain uncommitted changes and provide additional forensic value.
Last updated
Was this helpful?