Jump to content


Question About Windows Prefetch Files - I Also Asked This On The Clamav Fourm

  • Please log in to reply
1 reply to this topic

#1 Bobn



  • Members
  • Pip
  • 4 posts

Posted 10 April 2016 - 07:49 AM

I asked this on the Windows ClamAV forum but I think this forum and that one are different enough, as regards readership, that it might help to ask the question here. Let me know if this is inappropriate and that readers of either forum would see it posted in just one of  them.


If I were to explain why I'm asking this question, you would have a lot to read - it is rather involved and twisted.


Let me ask the question and see what happens. If more information is needed, I'll explain where I'm coming from on this.


Can a Windows prefetch file be a vehicle for malware?


That is, can malware be inserted into a prefetch file so that that malware could then be "used" to damage, etc a system?


My reading says No. Prefetch files contain data,not code, and are never "executed."


And I've also seen entries on the immunet.com forum - such as: http://support.immun...s/?hl=prefetch which seem to say that prefetch files cannot be dangerous and are actually excluded from their scanning.


So - can a prefetch file, or more generally, a file with file name extention .pf be used by a "bad" guy to make an attack?


And to add a twist to the question - could such an attack, if possible, be used against web sites on a shared Apache server installation on a system running Linux?



#2 ritchie58


    Staff Member

  • Moderators
  • 2,026 posts
  • LocationEarth

Posted 11 April 2016 - 04:12 AM

The only way the prefetch files, in my view, can be used maliciously if the program that the files are associated with is a malicious or compromised (in some manner) third-party software program. I think that's where I would look first (installed software) if I suspected that was the case.

* Immunet Global Forum Moderator *

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users