top of page

Registry hives

Registry hives are files in the Windows operating system that store the Windows Registry. The Windows Registry is a hierarchical database that contains configuration settings, options, and preferences for the operating system, software applications, and user accounts.


The registry hives are organized into several files, each serving a specific purpose. Here are the main registry hives found in Windows:

  1. HKEY_LOCAL_MACHINE\SAM: The Security Accounts Manager (SAM) hive stores security-related information, including user account data and password hashes.

  2. HKEY_LOCAL_MACHINE\SOFTWARE: The SOFTWARE hive contains information about installed software applications, settings, and configurations.

  3. HKEY_LOCAL_MACHINE\SYSTEM: The SYSTEM hive stores hardware and system-related settings, such as device drivers, system services, and startup configurations.

  4. HKEY_LOCAL_MACHINE\BCD00000000 (BCD hive): The Boot Configuration Data (BCD) hive is responsible for storing boot-related settings and configuration data for the Windows Boot Manager.

  5. HKEY_CURRENT_USER: The HKEY_CURRENT_USER hive contains user-specific settings for the currently logged-in user. It is a subset of the HKEY_USERS hive.

  6. HKEY_USERS: The HKEY_USERS hive stores profiles and settings for all user accounts that have logged in to the system.

  7. HKEY_CURRENT_CONFIG: The HKEY_CURRENT_CONFIG hive holds information about the current hardware profile being used.


These registry hives are stored as files on the Windows file system. By default, they are located in the "C:\Windows\System32\Config" directory and have file extensions such as ".dat" or ".hiv". However, direct modification of these files is not recommended, and it is advised to use appropriate system tools or utilities for modifying the Windows Registry.


The registry hives play a crucial role in system operation, as they store critical configuration information affecting the operating system's behavior, applications, and user accounts.

3 views0 comments

Recent Posts

See All

Carving vs Recovery

Carving and recovery are both techniques used in computer forensics and data retrieval, but they differ in their approach and purpose. Here's a comparison between carving and recovery: File Carving: F

Cloning vs Imaging

Cloning and imaging are two methods used in data backup and migration processes. While both techniques serve similar purposes, they differ in their approach and the level of data they capture. Here's

bottom of page