Windows Prefetch files (.pf) record application execution data including executable names, run counts, timestamps, loaded DLLs, and accessed directories. This skill covers parsing Prefetch files using the windowsprefetch Python library to reconstruct execution timelines, detect renamed or masquerading binaries by comparing executable names with loaded resources, and identifying suspicious programs that may indicate malware execution or lateral movement.
windowsprefetch library (pip install windowsprefetch)Gather .pf files from target system's C:\Windows\Prefetch\ directory.
Extract executable name, run count, last execution timestamps, and volume information.
Flag known attack tools (mimikatz, psexec, etc.), renamed binaries, and unusual execution patterns.
Reconstruct chronological execution timeline from all Prefetch files.
JSON report with execution history, suspicious executables, renamed binary indicators, and timeline reconstruction.