Tier 2Deep dive · 30–60 min · 40 methods

Advanced PC Checking

Beyond surface artifacts. Tier 2 introduces NTFS-level reconstruction of file lifecycles, multi-source execution correlation, automated event-log threat hunting, and unified timeline analysis in Timeline Explorer. Each technique strengthens the case by stacking independent evidence sources.

T2

Tier 2 Tool Downloads

3
T2

Deep File System Analysis

8
T2

Deep Execution Correlation

4
T2

Timeline & Event Analysis

3
T2

User Activity Deep Dive

6
T2

Process & Memory

4
T2

Persistence & Evasion

5
T2

External Devices

2
T2

Java & Scripts

2
T2

Hash & Binary Triage

2
T2

Full Timeline Reconstruction

1

The Golden Rule — Tier 2

The timeline doesn't lie. Every action leaves traces in multiple places. Cross-reference EVERYTHING. If it happened, the evidence is there — you just have to find it.