Internet Explorer file:///

Internet Explorer History databases are pivotal for forensic investigations as they record both local and remote file accesses through network shares. This capability of Internet Explorer to log file access details offers a rich source of evidence about user interactions with files, irrespective of whether Internet Explorer is present on the system. Notably, these databases can capture file access on systems up to and including Windows 11.

Key Insights:

  • File Access Tracking Through History Databases:

    • Entries for accessed files are recorded in a specific format, using the file:///C:// notation. This format highlights the method of access but does not confirm that the file was opened within the browser itself. Instead, it indicates that Internet Explorer was used to navigate to or attempt access to the file location.

  • Location of Internet Explorer History Files:

    • IE6-7:

      • %USERPROFILE%\Local Settings\History\History.IE5

    • IE8-9:

      • %USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5

    • IE10-11 and Windows 10+:

      • %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat

Deeper Dive:

File Access Logging Mechanism:

  • Internet Explorer's method of recording file access into history databases is a nuanced process. While the file:///C:// format is used to denote file accesses, it's essential to understand that this does not automatically mean the file was viewed or edited using Internet Explorer. The presence of such entries in the history database signifies the navigation to or interaction with file paths, which can be initiated from the Internet Explorer address bar or through file explorations initiated within the browser.

Implications for Forensic Analysis:

  • The persistence of Internet Explorer history data on systems, even those where the application is no longer available, underscores the importance of this artifact for digital forensic investigations. It provides a backtrack to user activities regarding file access, which can be crucial in cases where understanding access to specific files or directories is necessary for the investigation.

Analyzing The Artifact:

  • Accessing Internet Explorer History Files: To analyze these artifacts, forensic analysts can use specialized tools designed to parse the contents of Internet Explorer history databases. This includes understanding the structure of WebCacheV*.dat files for newer versions of Windows, where traditional history files are replaced by a more complex database format.

  • Interpretation of Entries: Analyzing the file:///C:// entries requires a careful approach. Investigators need to differentiate between mere navigations within the browser and actual file interactions. The context of these entries, combined with other artifacts such as timestamps and user profiles, can provide a comprehensive view of the user's actions related to file access.

Tools for Analysis:

  • IEHistoryView: For older versions of Internet Explorer (IE6-9), tools like IEHistoryView can simplify the process of viewing and analyzing browser history entries.

  • ESEDatabaseView: For Internet Explorer 10-11 and Windows 10+ systems, ESEDatabaseView can be used to access and analyze the WebCacheV*.dat files, offering insights into the structured storage of history data.

Last updated

Was this helpful?