Prefetch Files
windowsExecution EvidenceDisk Image
Location
C:\Windows\Prefetch\*.pfDescription
Windows Prefetch files recording application execution with the executable name, run count, last eight execution times, and all files/directories referenced during the first ten seconds of execution.
Forensic Value
Prefetch proves program execution even after the binary is deleted. The last eight execution timestamps create a usage pattern timeline. Referenced files and directories reveal what the tool accessed at launch, such as configuration files or credential stores. The existence of prefetch for tools like psexec.exe, mimikatz.exe, or rclone.exe is a strong indicator of compromise.
Tools Required
KAPEPECmd (Eric Zimmerman)WinPrefetchView (NirSoft)