MFT (Binary)
Overview
Evidence: MFT Description: Dump Raw Contents of $MFT Category: NTFS Platform: Windows Short Name: mft Is Parsed: No - Raw binary MFT file Sent to Investigation Hub: Yes Collect File(s): No
Background
The Master File Table ($MFT) is the core metadata file for NTFS volumes. This evidence type collects the raw binary $MFT file itself (as opposed to the parsed CSV version).
The raw MFT file can be analyzed with specialized tools to extract more detailed information than the CSV export, including deleted file entries, file slack space, and advanced NTFS features.
Data Collected
Type
File type
Mft
Name
File name
$MFT
SourcePath
Original path
C:$MFT
FilePath
Path in evidence
NTFSFiles/$MFT
FileSize
File size in bytes
536870912
Collection Method
This collector uses kernel driver NTFS raw access to read $MFT
from each fixed NTFS drive. The raw MFT file is collected byte-for-byte.
Usage
Raw MFT files enable advanced NTFS forensics beyond CSV parsing. Investigators use this data for deleted file recovery from unallocated MFT entries, advanced timeline analysis, file slack analysis, NTFS attribute analysis, and deep forensic examination with specialized MFT parsers.
Known Limitations
Only available on NTFS volumes
Requires driver for raw disk access
Can be very large (hundreds of MB to several GB)
Requires specialized tools to parse (MFTECmd, analyzeMFT, etc.)
Notes
This is the raw binary $MFT, different from "MFT as CSV" which is the parsed version. Use tools like MFTECmd or Eric Zimmerman's tools for analysis.
Last updated
Was this helpful?