Forensic investigations using prefetch files
Every interaction a malware has with a system produces an artifact – Windows also adds to this a wealth of redundancy. But does inconsistency signal a red flag? We explore patterns that lead to false conclusions and connections for validating assumptions, by analyzing Prefetch files. The question we’re ultimately trying to answer is “has this […]