Extracts and analyzes execution evidence from Windows Amcache.hve hives to identify malicious activity and program history.
This skill empowers Claude to guide users through the complex process of Windows Amcache forensics, a critical component of digital investigations. By parsing the Amcache.hve registry hive, the skill enables the extraction of application execution history, file paths, SHA-1 hashes, and installation timestamps. It is designed for Incident Response (IR) teams and forensic analysts who need to reconstruct timelines of compromise, identify unsigned or suspicious binaries, and detect persistence mechanisms that traditional logs might miss. It provides structured procedures for interpreting Amcache data to accelerate threat hunting and forensic reporting.
Key Features
01Analyzes publisher metadata to flag unsigned or suspicious drivers
02Extracts program execution history including paths and timestamps
03Assists in building detection rules based on forensic artifacts
04Recovers device connection history and installation sources
050 GitHub stars
06Provides SHA-1 hashes for malware identification and threat intelligence
Use Cases
01Validating security monitoring coverage for application execution attack techniques
02Threat hunting for unauthorized or portable executables in corporate environments
03Reconstructing a timeline of malicious activity during a post-breach investigation