Troubleshooting and Evasion Detection
Users may attempt to disable, clear, or manipulate Prefetch data to hide their tracks. Awareness of these techniques is key:
Prefetch Disabled (Registry): The primary control is the
EnablePrefetcherDWORD value in the registry at:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParametersCommon values are0(Disabled),1(Application launch prefetching enabled),2(Boot prefetching enabled),3(Both enabled - default). A value of0found during a check is suspicious and indicates deliberate disabling.SysMain Service Stopped: The
sysmainservice (formerly Superfetch) is responsible for managing the Prefetcher. Check its status usingsc query sysmainin an administrative CMD. If the serviceSTATEis notRUNNING(e.g.,STOPPED), Prefetching is inactive. Restarting the service might be necessary for logging to resume, but doing so also clears some volatile system caches, which can impact other analysis steps. Finding it stopped without good reason is a red flag.Permission Tampering (CACLS/ICACLS Bypass): Attackers might alter the security permissions (ACLs) of the
C:\Windows\Prefetchfolder itself to prevent the System or SysMain service from writing new.pffiles or updating existing ones. This can be done using commands likecaclsoricacls. Check the folder's Security tab in its Properties. Evidence of recent permission changes (granting/denying write access) can often be found in the USN Journal ($UsnJrnl) by looking forSECURITY_CHANGEreason codes associated with thePrefetchdirectory path.Hidden Prefetch Files: Individual
.pffiles can be marked with the 'Hidden' attribute. Usedir /ah C:\Windows\Prefetchin an administrative CMD to reveal any hidden files within the directory.Prefetch Clearing: Users may simply delete the contents of the
C:\Windows\Prefetchfolder. Finding the folder empty or missing expected entries (like.pffiles forexplorer.exe,AnyDesk.exe, or the game itself) when the SysMain service is running and Prefetch is enabled in the registry is highly indicative of manual clearing. The USN Journal ($UsnJrnl) is the primary tool to detect this, as it will log numerousFILE_DELETEevents corresponding to.pffilenames occurring around the time of the clearing.
Last updated