Dashboard
Account 🔐
Sign Up
Login
Global Leaderboard
Game Vault
Badge Backpack
Blue Team Glossary
Login and start playing
Leaving so soon?
×
You really want to log out? We were having so much fun!
Home
›
Glossary
›
Forensic Artifacts
›
prefetch
Prefetch
Forensic Artifacts
Definition
Prefetch is a Windows performance feature that records how executables are loaded and run, allowing the operating system to optimize subsequent launches. It generates `.pf` files that contain execution metadata for recently run programs. Prefetch is one of the strongest sources of **execution evidence**. Unlike artifacts that only indicate file presence, Prefetch confirms that a program was actually executed on the system. Prefetch files are stored at: `C:\Windows\Prefetch` Each file follows the format: `PROGRAMNAME-HASH.pf` ### **Data Stored in Prefetch** - Executable name - Full or partial file path (derived via hash correlation) - Run count (number of executions) - Last execution timestamp (multiple timestamps on newer Windows versions) - Files and directories accessed during execution - Volume information (device path, serial number) The hash represents a path-based identifier, allowing multiple entries for the same executable in different locations. ### **Why It Matters** Prefetch provides **direct, host-level proof of execution**, which is critical in incident response and forensic investigations. - **Confirms execution of binaries** — not just presence - **Tracks frequency of use** — useful for identifying automation or repeated attacker activity - **Reveals execution context** — accessed files and directories provide behavioral clues - **Survives file deletion** — even if malware removes itself, Prefetch often persists
Related Terms
Windows-Registry
Examples & Use Cases
**Confirmed malware execution** — A suspicious binary is deleted after use. Prefetch still contains an entry showing it was executed, including timestamp and run count. **Living-off-the-Land detection** - Prefetch reveals execution of built-in tools like powershell.exe or cmd.exe in unusual patterns, indicating attacker activity. **Execution frequency analysis** — A tool shows a high run count in Prefetch, suggesting automation, persistence mechanisms, or repeated attacker usage. ### **Further Reading** - [Forensafe: Prefetch Analysis](https://www.forensafe.com/blogs/prefetch.html) - [YouTube: Prefetch Deep Dive](https://www.youtube.com/watch?v=f4RAtR_3zcs) - [The DFIR Spot: Artifacts of Execution](https://www.thedfirspot.com/post/artifacts-of-execution-i-know-what-you-did-last-incident)