The evolution of computers and technology is outpacing the effectiveness of forensic techniques. In traditional computer forensic methodology, when an organization is effected by a cyber-attack, the systems were plugged off at the scene which results in loss of acquiring volatile memory and further seized media are analyzed at forensic laboratories to get report. In the current work, a novel e-Triage tool is developed which extracts artifacts present within a defined live windows system. It yields on-site identification and interpretation of digital evidences in a short period of time. The e-Triage tool follows live forensic methodology and facilitates to extract and collect artifacts related to system information, registry, events and network information, Random Access Memory, browsing history, shell bag, page file, hibernation file, swap file and also records the changes done by tool on registry whose novelty improves the forensic report. The current proposed e-Triage tool carries out prioritizing and collecting artifacts in preliminary investigation until a potential source is being identified and from then it accelerates further investigation.