Elcomsoft Quick Triage

Elcomsoft Quick Triage helps quickly extract and analyze the most critical data from a wide range of sources on a Windows PC during the early stages of an investigation, whether in the field or in the lab.

  • Rapid acquisition and analysis of critical evidence
  • Detailed system information, user activities and usage patterns
  • Global search across select data categories
  • Passwords from dozens of Web browsers and email clients
  • Browsing history and search queries
  • User communications, emails, documents, and pictures extracted and stored in a single open container

Supports: Windows 7, 8, 8.1, Windows 10, Windows 11; Windows Vista, Windows XP, Windows 2000, Windows NT; all Windows Server versions; SAM/SYSTEM and Active Directory

Common license $ 799
Köp

Elcomsoft Quick Triage for Fast Initial Analysis

Elcomsoft Quick Triage is a tool designed to rapidly extract and analyze the most important evidence from a target computer or disk. It is equally effective during on-site operations and in laboratory environments, helping investigators make informed decisions at the earliest stages of an investigation.

Elcomsoft Quick Triage focuses on extracting the most forensically valuable data from Windows systems, covering hundreds of sources while prioritizing artefacts that are critical for early-stage investigations. The tool targets evidence that helps quickly answer key questions about how a system was used, by whom, when, and for what purpose. It processes data from the operating system itself as well as from a wide range of popular applications that may contain information about user activity, communications, file handling, connected devices, and network usage.

Data and Artefacts

With Elcomsoft Quick Triage, investigators can quickly review saved passwords, browsing history, and user activity of the currently logged-in account, examine data from other user profiles on the same system, and analyze evidence contained in mounted disk images. The product focuses on speed, relevance, and ease of use rather than exhaustive analysis.

The tool supports hundreds of system artefacts that allow investigators to reconstruct timelines and system behavior. EQT extracts and analyzes Windows Event Logs, Prefetch, Shimcache, SRUM, Task Scheduler data, application execution traces, crash reports, and other system logs. These artefacts provide insight into program launches, background activity, and overall system usage. The tool helps establish whether external devices were used by collecting information about connected USB storage devices, printers, displays, and other hardware.

Elcomsoft Quick Triage collects and processes a wide range of user-centric evidence. The tool extracts documents and files from user folders, recent files lists, Recycle Bin contents, and artefacts reflecting everyday user actions. It processes data from web browsers, including browsing history, search queries, and saved credentials, as well as data from email clients and instant messengers.

Finally, Elcomsoft Quick Triage pays special attention to credentials and protected data. The tool extracts Windows Vault entries, DPAPI-related data, cryptographic keys, certificates, and user and system credential stores. All artefacts are preserved with clear source attribution and context, allowing investigators to quickly focus on the most relevant evidence and make informed decisions without waiting for a full forensic examination.

Open Container Format

The VHDX format used to store acquired data is a cross-platform container that preserves both the file system structure and associated metadata. Unlike many comparable solutions that store collected data in proprietary, undocumented, and often encrypted formats, EQT keeps all data in an open, well-documented form.

In a lab environment, VHDX containers can be mounted either in a "raw" form or with reconstructed paths for each data source. The open and fully documented container format allows access to the data not only through EQT itself, but also by using third-party forensic tools.

Key Features

Fast Acquisition of Key Windows Artefacts
EQT collects system, user, and storage-related data from live Windows systems with an active user session, as well as from externally connected disks and mounted volumes.

Aggregation of Evidence from Multiple Sources
Similar artefacts such as browser history, credentials, and communication data are automatically aggregated, even when originating from different disks or computers belonging to the same user.

On-the-Fly Indexing and Global Search
The most valuable data is indexed on the fly, enabling fast searches across documents, email data, text files, and other extracted artefacts.

Timeline Filtering and Activity Analysis
Artefacts containing timestamps can be filtered by date and time to reconstruct event timelines. EQT processes application launches, file access, Web activity, communication events, and other user actions.

Built-In Text and Binary Viewer
The tool includes a built-in viewer for text and binary files with support for keyword and hex searches.

Artefact Attribution and Source Tracking
Each artefact retains information about its original source, including file path and origin. Investigators can instantly jump to the source file within the evidence container.

Single Evidence Container
All extracted data is stored in a single container based on the open VHDX format with additional metadata, simplifying storage, transfer, and follow-up analysis.

Windows Password Attacks
EQT includes built-in Windows password attack capabilities, supporting dictionary, mask, hybrid, and brute-force attacks to quickly identify weak or common passwords. Password hashes can be exported in .pwdump format for subsequent attacks in Elcomsoft Distributed Password Recovery.

Data Export
Export to Adobe PDF format is supported.

Memory Acquisition
Elcomsoft Quick Triage can capture a memory image of a running system, enabling analysis of volatile data during live investigations.

We listed just a few artefacts out of the hundreds supported in the list below.

System Artifacts (File System)

  • Third-party application data
  • Active Directory data
  • Amcache, Shimcache
  • Program Compatibility Assistant
  • SRUM (System Resource Utilization Monitor)
  • Recycle Bin
  • Scheduled Tasks
  • Windows Events, Windows Prefetch, Windows Error Reporting
  • Wi-Fi network configurations and saved passwords
  • Windows Search database
  • DPAPI, system credentials, Vault, cryptographic keys and certificates
  • System Registry
  • Windows notifications
  • Various logs

System Artifacts (Registry)

  • List of executed programs
  • List of Bluetooth devices, displays, ACPI devices, and PCI/SCSI/USB devices ever connected
  • Information about battery, BIOS, CPU, other hardware, storage devices, and RAM
  • Installed Microsoft Office applications and add-ons
  • Complete network configuration
  • List of applications installed from the Windows Store
  • Usage status: location services, microphone, and webcam
  • List of installed drivers, updates, driver packages, running services, and DLL libraries
  • List of system default programs for opening files
  • List of tasks in the Task Scheduler
  • Paths to allowed files in Controlled Folder Access
  • Windows Defender and Windows Firewall data

User Artifacts (File System)

  • Third-party application data and logs
  • Microsoft Office application data
  • ActivitiesCache
  • Notifications
  • Crash dumps
  • Files in Desktop / Documents / Downloads / Videos folders
  • RDP cache
  • Recycle Bin
  • Recent files
  • Windows Mail / Calendar / Phone / Contacts databases
  • User credentials, Vault, cryptographic keys, and certificates
  • User Registry
  • Browser data (Chrome and all Chromium-based browsers, Microsoft Edge, Mozilla, etc.)

User Artifacts (Registry)

  • List of devices ever connected to the computer (smartphones, tablets, etc.)
  • Microsoft Office user registration information
  • List of recently opened files using Microsoft Office applications
  • List of programs configured to run at startup
  • Usage status: location services, microphone, and webcam
  • List of user default programs for opening files
  • Taskbar data: list of pinned applications, right-click actions, application switches
  • List of files opened or saved via file dialogs, recent files, recently executed commands
  • List of searches performed in File Explorer
  • Username of the last logged-in user
  • List of archive names recently created

Systemkrav

Windows

  • Windows 10
  • Windows 11

Elcomsoft Quick Triage supports Windows-based systems. In a lab, the tool is installed on the examiner’s workstation; for field work, a portable version is available.

Trial limitations

Export functionality is unavailable in the trial edition of the software.

Information om produktversion

Elcomsoft Quick Triage v.2.0.158

Avinstallationsprocedur: För att avinstallera produkten följ standardproceduren via Kontrollpanelen - Program och funktioner eller använd motsvarande Avinstallation-länk från produktens mapp i Windows Start-menyn.

Köp Elcomsoft Quick Triage

Common license
$ 799
Köp