Windows program-inventory artifact (Amcache.hve) tracking installed and executed applications with SHA-1 hashes, install paths, and first-run timestamps. Complements ShimCache for execution timeline.
See also:shimcache
Documented, unbroken record of who handled, accessed, or transferred evidence from acquisition through analysis to final disposition. Required for legal admissibility of evidence.
Windows Event Log format (Windows Vista+). Binary, structured logs parsed with wevtutil, EvtxECmd, or PowerShell Get-WinEvent. Key forensic sources: Security, System, PowerShell, Sysmon, RDP.
Also known as:Super Timeline
Unified chronological view of filesystem, registry, log, and application events. Built with tools like log2timeline/plaso or Timesketch. The primary analysis artifact for reconstructing attacker activity.
Also known as:Indicator of Compromise
Observable artifact associated with a specific compromise: file hashes, IP addresses, domain names, registry keys, mutex names, or TTP patterns. Used to hunt for the same attacker in other environments.
Also known as:Master File Table, $MFT
The Master File Table in NTFS filesystems. Every file and directory has at least one MFT entry with metadata (timestamps, security descriptor, data attribute locators). Primary source for filesystem timeline reconstruction on Windows.
See also:usn-journal, timestomping
MITRE-maintained knowledge base of adversary tactics and techniques derived from real-world observations. Provides a shared vocabulary for describing attacker behavior and mapping detections.
See also:ttp
Windows performance-optimization artifact in C:\Windows\Prefetch tracking the last 8 execution times of programs (Win10+). Strong evidence of execution even after log rotation.
Also known as:AppCompatCache
Application Compatibility Cache storing executable metadata and last-modification timestamps. Used to infer historical execution and rollback of compatibility shims. Flushed to the SYSTEM hive on clean shutdown.
See also:amcache
Also known as:System Monitor
Microsoft Sysinternals driver and service providing detailed system activity logging: process creation with command line, file-creation events, registry changes, network connections, and image loads. Critical for endpoint forensics when EDR is absent.
Attacker technique of modifying file timestamps (typically $STANDARD_INFORMATION in NTFS) to hide malicious files among legitimate content. Detected by comparing $STANDARD_INFORMATION vs $FILE_NAME timestamps.
See also:mft
Also known as:Tactics, Techniques, Procedures
Adversary behavior patterns at three levels of abstraction: high-level goals (Tactics, e.g., Lateral Movement), specific approaches (Techniques, e.g., SMB admin-share abuse), and exact implementations (Procedures, e.g., psexec with specific flags).
See also:mitre-attack
Also known as:$UsnJrnl, Change Journal
NTFS Update Sequence Number journal recording file-level changes (create, delete, rename, data-overwrite). Survives some attacker cleanup and provides event-level evidence independent of log sources.
Also known as:RAM, Live Memory
System memory (RAM) that is lost on reboot. Contains running process state, network connections, encryption keys, loaded modules, and attacker-injected code. Must be captured before reboot or containment action.