PowerTriage Windows

Native and portable forensic triage for Windows systems. Designed for real incident response scenarios, Live Response, and post-mortem analysis.

PowerTriage Windows Screenshot
PowerTriage execution interface on Windows

What is PowerTriage Windows?

PowerTriage Windows is a forensic acquisition and triage tool developed in PowerShell for Windows systems (10, 11, and Server). It allows collecting relevant system artifacts quickly and structurally without requiring installation or external dependencies.

It is designed for direct execution on compromised systems, EDR/XDR environments, or offline analysis from mounted volumes.

Designed for Real DFIR

PowerTriage Windows prioritizes portability, speed, and traceability during a forensic investigation, facilitating the acquisition of context in the early stages of an incident.

Common Use Cases

PowerTriage Windows is oriented towards DFIR teams, SOC, and incident response.

  • Live Response on compromised systems
  • Execution from EDR/XDR or remote consoles
  • Post-mortem analysis from mounted volumes or images
  • Initial triage prior to deep forensic analysis
  • Support for internal and corporate investigations

Collected Forensic Artifacts

Execution & Activity

Prefetch, Amcache, ShimCache, BAM/DAM, and process execution evidence.

User Activity

Jump Lists, Recent Files (LNK), ShellBags, Recycle Bin, and Profiles.

Network & Connections

Active Connections (TCP/UDP), DNS Cache, ARP Table, Routes, and Firewall Rules.

Web Browsers

History, Cookies, and Logins from Chrome, Edge, Firefox, Opera, and Brave.

Email & Cloud

Outlook (OST/PST), Logs and Metadata from OneDrive, Teams, Google Drive, and Dropbox.

System & Security

Event Logs (Security, Sysmon, RDP), Services, Scheduled Tasks, Autoruns, and USB History.

Execution Modes

Quick

Rapid collection of key artifacts for immediate context.

Full

Complete collection for deeper forensic analysis.

Custom

Selective execution of modules according to the investigation.

Offline

Analysis from mounted volumes or images.

Output and Formats

Structured results ready for subsequent analysis.

  • Export to JSON
  • Export to CSV
  • Export to HTML
  • Structure prepared for correlation

Fit within PowerForensics

PowerTriage Windows is part of the PowerForensics ecosystem as an acquisition and triage component. The collected data serves as a basis for temporal analysis, correlation between systems, and broader investigations.

Technical Documentation

Consult requirements, execution parameters, and usage examples.