Skip to content
WindowsExecutionCritical

Shimcache (AppCompatCache)

Application Compatibility Cache stores up to 1024 executed binary records with full path and last-modified timestamp. Persists even when a binary is deleted.

artifact_type: shimcache

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache\AppCompatCache

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Detecting binaries executed and deleted by malware
  • Locating renamed copies of known-bad tools (e.g., mimikatz.exe → svchost.exe)
  • Establishing long-term execution history that outlives Prefetch

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
AppCompatCacheParser (Eric Zimmerman)
RegRipper
Volatility

Related artifacts

References & further reading

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI