FortiGuard IR researchers have highlighted unexpected forensic value in the AutoLogger-Diagtrack-Listener.etl file on modern Windows systems.

Despite low exploitation severity, the artefact has shown the ability to preserve historical process-execution data, including deleted binaries and command-line traces — helpful in ransomware investigations.

What’s your view on ETW-based artefacts in DFIR workflows?

Source: https://www.fortinet.com/blog/threat-research/uncovering-hidden-forensic-evidence-in-windows-mystery-of-autologger

Share your insights and follow us for more clear, unbiased analysis.

#InfoSec #DFIR #ThreatIntel #WindowsForensics #ETW #Telemetry #CyberSecurity #IncidentResponse #SecurityResearch #ThreatAnalysis

Deleted a folder? Shellbags is the accessory you need...

They’re one of the most valuable forensic artifacts for tracing user activity in Windows, even if the folders are gone.

This blog post by our Joseph Williams walks through how Shellbags work, how to analyse them with tools like ShellBags Explorer, and what they reveal about user navigation through local, external, and network locations.

If you're in DFIR, this is one artifact you don't want to miss.

📌 Read the blog: https://www.pentestpartners.com/security-blog/dfir-tools-and-techniques-for-tracing-user-footprints-through-shellbags/

#DFIR #DigitalForensics #WindowsForensics #IncidentResponse #Shellbags #CyberSecurity #ForensicAnalysis

Windows Registry Forensics 2025

Key insights for your investigation found in one place! An overview into Windows Registry Forensics and how to leverage data for your investigations. Jump

Cyber Triage
NTUSER.DAT Forensics Analysis 2025

Everything you need to know about NTUSER.DAT forensics in one place. This article by DFIR expert Chris Ray explains what NTUser.dat is, its forensic

Cyber Triage
Windows Registry Forensics Cheat Sheet 2025

Save. This. Post. Our expert staff has compiled an up-to-date and comprehensive Windows Registry forensics cheat sheet, and it might be just what you need

Cyber Triage

Windows Event Log Forensics: Techniques, Tools, and Use Cases: https://belkasoft.com/windows-event-log-forensics

#windowseventlogs #WindowsForensics

Windows Event Log Forensics: Techniques, Tools, and Use Cases

Learn how to analyze Windows event logs in digital forensics and how Belkasoft X enhances event log analysis.

Network Analysis via PowerShell - Iram Jack - Medium

PowerShell is an extremely powerful and extensive command shell for Windows with its own scripting language. It can be used to automate tasks, audit and configure the Windows operating system, and it…

Medium
ShimCache vs AmCache: Key Windows Forensic Artifacts - Magnet Forensics

Discover the forensic value of ShimCache & AmCache on Windows systems to track program execution, build timelines, and uncover cyber threats.

Magnet Forensics
Remote Desktop Application vs MSTSC Forensics: The RDP Artifacts You Might Be Missing

Find out the various RDP artifacts that may not be in traditional locations checked by incident responders.

ZeroFox
Introduction to the Windows Registry and its forensic analysis on a Kali Linux workstation using RegRipper, an open source tool specifically designed to extract forensic artifacts from the Registry.
*
Watch the video on YouTube and subscribe to the channel 👇
https://youtu.be/twwrQFugaOM
*
*
*
#windows #windowsregistry #windowsforensics #digitalforensics #computerforensics #regripper #kalilinux
Windows Registry analysis with RegRipper (on Kali Linux)

YouTube