🖥️
Windows DFIR
  • Introduction
  • Windows Artifacts
    • Windows Quick Tips
      • Windows Command Line
      • Workstation File/Folder Locations
      • Server File/Folder Locations
    • Account Usage
      • Authentications SAM Artifacts
        • Last Login
        • Last Failed Login
        • Last Password Change
      • Authentications (Windows Event Log)
        • Logon ID
      • Group Membership
        • Event ID: 4798
        • Event ID: 4799
      • RDP
        • Source System Artifacts - Quick Reference
        • Destination System Artifacts - Quick Reference
      • SSH
      • Rouge Local Accounts
      • CrowdStrike Searches
        • Event Name - UserLogon
        • Event Name - UserLogonFailed
        • Event Name - UserLogonFailed2
        • Event Name - SsoApplicationAccess
    • Browser Usage
      • History & Downloads
        • Viewing History Files - DB Browser
        • Transition Types
      • Auto-Complete Data
      • Bookmarks
      • Browser Preferences
      • Cache
      • Cookies
      • Extensions
      • Super Cookies (HTML5 Web Storage)
      • Media History
      • Private Browsing
      • Session Restore
      • Stored Credentials
      • Suggested/Frequent Sites
      • DB Browser Queries
        • Firefox
        • Chrome
        • Media History
      • PowerShell Scripts
        • Browser Extension Finder
        • Browser History Finder
    • Processes
      • at.exe
      • explorer.exe
      • lsass.exe
      • lsaiso.exe
      • PuTTy.exe
        • X11 Forwarding
      • runtimebroker.exe
      • services.exe
      • smss.exe
      • System
      • svchost.exe
        • Services
      • winlogon.exe
      • wininit.exe
    • Cloud Storage
    • Deleted File or File Knowledge
      • WordWheelQuery (Win 7+)
      • ACMRU (Win XP)
      • Internet Explorer file:///
      • Last Visited MRU
      • Thumbs.db (Win XP)
      • Thumbcache
      • Recycle Bin
      • User Typed Paths
      • Windows Search Database
    • File Download
      • Zone.Identifer
      • Open/Save Most Recently Used (MRU)
      • Email
      • Drive By Downloads
        • Malvertising
      • Web Browsing
        • Cache Files
      • CrowdStrike Searches
        • MoTW
    • Folder/File Opening/Creation
      • Recent Files
      • Office Recent Files
      • Shell Bags
      • .lnk Files
      • Jump Lists
        • AppIDs
      • Prefetch
      • Index.dat file://
      • PowerShell Scripts
        • .lnk Files
    • Persistence
      • Registry
        • NTUSER.DAT & HKU\SID
        • Run and Run Once
        • Shell Folders and UserInit Key
        • Services
        • Logon Scripts
        • Office Add-ins
        • Winlogon Shell
        • Image File Execution Options (IFEO)
        • AppInit_DLLs
        • Scheduled Tasks
      • Scheduled Tasks
        • Scheduled Task Destination System Artifacts
        • Scheduled Task Source System Artifacts
      • Startup
      • Tool: AutoRuns
      • Accounts
      • WMI Event Consumers
        • WMI: Source System Artifacts
        • WMI: Destination System Artifacts
        • WMI: PowerShell Analysis
      • PowerShell Scripts
        • Startup Programs
      • CrowdStrike Searches
        • Files Written to Startup Folder
        • Files Written to Startup Folder from the Internet
        • Local Account Creation/Deletion
        • Azure Account Creation/Deletion
        • Scheduled Tasks
    • Physical Location
      • Time zone
      • Wireless SSID
      • Network History (Vista/Win7–11)
      • Cookies
      • Browser Search Terms
    • Program Execution
      • Prefetch
        • Decoding Prefetch Files with Eric Zimmerman's PECmd Tool
      • BAM/DAM
      • CapabilityAccessManager
      • UserAssist
      • Last Visited MRU
      • RunMRU
      • MUI Cache
      • ShimCache
      • Amcache
      • Jump Lists
    • Shadow Copies
      • VSC Permissions
      • Event ID 8193: Volume Shadow Copy Service Error
    • USB Usage
      • Key Identification
      • Drive Letter and Volume Name
      • Connection Timestamps
      • User
      • Volume Name
      • Plug & Play Event Log
    • Windows Services
      • DoSvc (Delivery Optimization)
    • System Information
    • Event IDs
      • Authentication / Account
        • 4624 - Authentication Success
          • Logon Types
        • 4625 - Authentication Failure
          • SubStatus Codes
        • 4634 - Account Logoff
        • 4648 - Explicit Credentials Success
        • 4672 - Special Privileges
        • 4720 - Account Creation
        • 4722 - Account Enabled
        • 4732 - Addition to Local Group
        • 4738 - Account Changed
        • 4776 - Kerberos Authentication Attempt
          • Substatus Codes
        • 4771 - Kerberos Failure
        • 4768
      • File System
        • 1006
        • 4688 - Process Created
        • 4663
        • 4656
        • 6416
        • 20001
        • 20003
  • Windows DFIR & MITTR
    • Initial Access
      • Content Injection
      • Drive-by Compromise
        • Watering Hole Attack
        • Microsoft Files (Payload Execution)
        • Exploit Delivery
        • Viewing Browser History Files
      • Phishing
    • Execution
    • Persistence
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
      • Logon ID
    • Discovery
    • Lateral Movement
    • Collection
    • Command and Control
    • Exfiltration
    • Impact
  • SOC Related
    • Cached Credentials
    • Domain Controller Password Spraying
Powered by GitBook
On this page
  • Key Insights:
  • Deeper Dive:
  • File Access Logging Mechanism:
  • Implications for Forensic Analysis:
  • Analyzing The Artifact:
  • Tools for Analysis:

Was this helpful?

  1. Windows Artifacts
  2. Deleted File or File Knowledge

Internet Explorer file:///

Internet Explorer History databases are pivotal for forensic investigations as they record both local and remote file accesses through network shares. This capability of Internet Explorer to log file access details offers a rich source of evidence about user interactions with files, irrespective of whether Internet Explorer is present on the system. Notably, these databases can capture file access on systems up to and including Windows 11.

Key Insights:

  • File Access Tracking Through History Databases:

    • Entries for accessed files are recorded in a specific format, using the file:///C:// notation. This format highlights the method of access but does not confirm that the file was opened within the browser itself. Instead, it indicates that Internet Explorer was used to navigate to or attempt access to the file location.

  • Location of Internet Explorer History Files:

    • IE6-7:

      • %USERPROFILE%\Local Settings\History\History.IE5

    • IE8-9:

      • %USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5

    • IE10-11 and Windows 10+:

      • %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat

Deeper Dive:

File Access Logging Mechanism:

  • Internet Explorer's method of recording file access into history databases is a nuanced process. While the file:///C:// format is used to denote file accesses, it's essential to understand that this does not automatically mean the file was viewed or edited using Internet Explorer. The presence of such entries in the history database signifies the navigation to or interaction with file paths, which can be initiated from the Internet Explorer address bar or through file explorations initiated within the browser.

Implications for Forensic Analysis:

  • The persistence of Internet Explorer history data on systems, even those where the application is no longer available, underscores the importance of this artifact for digital forensic investigations. It provides a backtrack to user activities regarding file access, which can be crucial in cases where understanding access to specific files or directories is necessary for the investigation.

Analyzing The Artifact:

  • Accessing Internet Explorer History Files: To analyze these artifacts, forensic analysts can use specialized tools designed to parse the contents of Internet Explorer history databases. This includes understanding the structure of WebCacheV*.dat files for newer versions of Windows, where traditional history files are replaced by a more complex database format.

  • Interpretation of Entries: Analyzing the file:///C:// entries requires a careful approach. Investigators need to differentiate between mere navigations within the browser and actual file interactions. The context of these entries, combined with other artifacts such as timestamps and user profiles, can provide a comprehensive view of the user's actions related to file access.

Tools for Analysis:

  • IEHistoryView: For older versions of Internet Explorer (IE6-9), tools like IEHistoryView can simplify the process of viewing and analyzing browser history entries.

  • ESEDatabaseView: For Internet Explorer 10-11 and Windows 10+ systems, ESEDatabaseView can be used to access and analyze the WebCacheV*.dat files, offering insights into the structured storage of history data.

PreviousACMRU (Win XP)NextLast Visited MRU

Last updated 1 year ago

Was this helpful?