Prefetch Parsing

Parses Windows Prefetch (.pf) files and extracts execution artifacts, timeline data, and behavioral patterns for forensic analysis.

Prefetch Parsing

Parses Windows Prefetch (.pf) files and extracts execution artifacts, timeline data, and behavioral patterns for forensic analysis.

API Endpoint

POST /analysis/prefetch/parse

HTTP Headers

  • Content-Type: application/json
  • X-Cursed-Api-Token: API token for authentication
  • X-Cursed-Api-Enc-Key: Encryption key for authenticated users (required if using encrypted files)

Request Method

POST

Parameters

Request Body (JSON):

ParameterTypeRequiredDescription
file_idsarrayYesArray of file UUIDs to parse (100 files maximum)

Request Body Schema

{
  "file_ids": ["string (UUID)", "string (UUID)", ...]
}

Response Format

Success Response (200 OK):

{
  "id": "a1b2c3d4-e5f6-7890-abcd-ef1234567890",
  "job_name": "Mystic Phoenix Parser",
  "message": "Job queued",
  "category": "prefetch"
}

Error Response (400 Bad Request):

{
  "error": "No file IDs provided"
}

{
  "error": "Too many file IDs provided"
}

{
  "error": "Max prefetch analysis file limit exceeded"
}

{
  "error": "Failed to download file"
}

Error Response (401 Unauthorized):

{
  "error": "Unauthorized"
}

Error Codes

HTTP StatusDescription
200Success - Analysis job queued
400Bad Request - Invalid parameters or file limit exceeded
401Unauthorized - Missing authentication for private files
413Payload Too Large - Too many files submitted
500Internal Server Error - Server processing error

Example cURL Commands

Parse Multiple Prefetch Files

curl -X POST https://api.cursedtools.com/analysis/prefetch/parse \
  -H "Content-Type: application/json" \
  -H "X-Cursed-Api-Token: your_api_token" \
  -H "X-Cursed-Api-Enc-Key: your_encryption_key" \
  -d '{
    "file_ids": [
      "12345678-abcd-1234-ef56-789012345678",
      "87654321-dcba-4321-fe65-210987654321"
    ]
  }'

Parse Single Prefetch File

curl -X POST https://api.cursedtools.com/analysis/prefetch/parse \
  -H "Content-Type: application/json" \
  -H "X-Cursed-Api-Token: your_api_token" \
  -H "X-Cursed-Api-Enc-Key: your_encryption_key" \
  -d '{
    "file_ids": ["12345678-abcd-1234-ef56-789012345678"]
  }'

Example Response

{
  "id": "f8635c61-36f6-4bf2-a1a7-82cb50f2bcb5",
  "job_name": "Ethereal Dragon Parser",
  "message": "Job queued",
  "category": "prefetch"
}

Job Results

Once parsing is complete, the job will contain structured analysis results that can be retrieved using the Job Status API. Results include:

Analysis Types

Result TypeDescription
Execution TimelineChronological timeline of program executions with frequency analysis
Executable StatisticsProgram execution frequency and usage patterns
LOLBIN DetectionIdentification of Living-off-the-Land binaries and their usage
Volume AnalysisAnalysis of accessed volumes, drives, and suspicious locations
Module AnalysisDLL dependencies and loaded module statistics
Anomaly DetectionSuspicious execution patterns, proximity alerts, and location anomalies

Forensic Insights

  • Program Usage Patterns: Frequency and timing of application executions
  • Execution Anomalies: Unusual execution locations or suspicious proximity patterns
  • Timeline Reconstruction: Detailed execution chronology for incident reconstruction
  • LOLBIN Identification: Automatic detection of legitimate tools used maliciously
  • Volume and Path Analysis: File system access patterns and suspicious locations

Processing Notes

File Requirements

  • Files must be valid Windows Prefetch (.pf) format
  • Maximum 100 files per request
  • Files are processed asynchronously
  • Supports prefetch files from Windows XP through Windows 11

Performance Considerations

  • Individual prefetch files process within seconds
  • Batch processing scales linearly with file count
  • Job priority determined by user subscription level
  • Multiple files are processed in parallel when possible

Example Use Cases

cURL Example - Malware Analysis

# Analyze prefetch files from suspected compromised system
curl -X POST https://api.cursedtools.com/analysis/prefetch/parse \
  -H "X-Cursed-Api-Token: your_api_token" \
  -H "X-Cursed-Api-Enc-Key: your_encryption_key" \
  -d '{
    "file_ids": ["malware-prefetch-uuid"]
  }'

cURL Example - Incident Response

# Batch analyze prefetch collection from incident
curl -X POST https://api.cursedtools.com/analysis/prefetch/parse \
  -H "X-Cursed-Api-Token: your_api_token" \
  -H "X-Cursed-Api-Enc-Key: your_encryption_key" \
  -d '{
    "file_ids": [
      "prefetch-1-uuid",
      "prefetch-2-uuid",
      "prefetch-3-uuid"
    ]
  }'

Notes

  • Maximum of 100 prefetch files can be analyzed in a single request
  • Job results can be retrieved using the job status endpoint
  • Authentication is required for private/encrypted files
  • Job names are auto-generated using creative memorable combinations
  • Priority is determined by user subscription level
  • Unauthenticated users can analyze public files only
  • The analysis creates a background job that processes files asynchronously
  • Results include searchable summary data for efficient querying
  • Analysis automatically normalizes volume paths and timestamps
  • LOLBIN detection uses continuously updated signature database