Browser & Application Artefacts

Browsers and applications generate extensive artifacts on Windows systems. These artifacts store information about user activity, communication, downloads, logins, searches, installed software, and sometimes even deleted activity. Because users spend most of their time interacting with browsers and applications, these artifacts are critical for reconstructing behavior during a forensic investigation.

This chapter covers the major browser artifacts (Chrome, Edge, Firefox) and common application-level artifacts that hold valuable forensic evidence.


Importance of Browser & Application Artifacts

Browser and application data helps investigators determine:

  • Websites visited

  • Search history

  • Login activity

  • Downloaded files

  • Installed extensions or plugins

  • Communication history

  • Cloud sync activity

  • Application execution patterns

  • Cached content and cookies

  • Malware interactions

These artifacts often reveal a user’s intent and actions more clearly than system logs or registry entries alone.


Browser Artifacts

Google Chrome Artifacts

Default Location:
C:\Users\<User>\AppData\Local\Google\Chrome\User Data\Default\

Important Chrome artifacts:

1. History

Stored in an SQLite database:
History

Contains:

  • URLs visited

  • Visit timestamps

  • Referrer URLs

  • Typed URLs

  • Page transition types

  • Download links

2. Cookies

Stored in:
Cookies

Contains:

  • Session tokens

  • Authentication cookies

  • Persistent tracking cookies

Cookies often confirm logins even if browser history is deleted.

3. Cache

Location:
Cache/ and Code Cache/

Contains:

  • Saved images

  • Web content fragments

  • Cached scripts

Cache can reveal visited content even without history.

4. Downloads

Stored in:
History → Downloads table

Includes:

  • Downloaded file names

  • Source URLs

  • Timestamps

  • File path

  • Download success or failure

5. Login Data

Location:
Login Data

Encrypted database containing:

  • Saved usernames

  • Password hints

  • Login timestamps

Password decryption requires system-level access.

6. Extensions

Location:
Extensions/

Contains metadata about:

  • Installed extensions

  • Malicious add-ons

  • Data stolen through extensions


Microsoft Edge / Internet Explorer Artifacts

Default Location:
C:\Users\<User>\AppData\Local\Microsoft\Edge\User Data\Default\

Artifacts are similar to Chrome because both are Chromium-based.

Key artifacts:

  • History

  • Cookies

  • Cache

  • Downloads

  • Top Sites

  • Preferences

  • Favicons

  • Autofill data

Legacy Internet Explorer artifacts include:

  • WebCacheV01.dat

  • Temporary files

  • Legacy cookies

  • Index.dat (older systems)


Mozilla Firefox Artifacts

Default Location:
C:\Users\<User>\AppData\Roaming\Mozilla\Firefox\Profiles\<profile>\

Key Firefox artifacts:

1. Places.sqlite

Contains:

  • History

  • Bookmarks

  • Visit timestamps

2. Cookies.sqlite

Stores all cookies.

3. Cache2 Folder

Contains cached web content.

4. Form History

Stored in:
formhistory.sqlite

Includes autocomplete, form submissions, and login attempts.

5. Downloads.sqlite

Contains download records.

6. Add-ons & Extensions

Firefox extensions can store additional artifacts.


Application Artifacts

Apart from browsers, many applications generate high-value forensic evidence.


Messaging Applications

WhatsApp Desktop

Location:
C:\Users\<User>\AppData\Roaming\WhatsApp\

Artifacts include:

  • Chat logs

  • Media files

  • Session data

  • Phone sync status

Telegram Desktop

Location:
C:\Users\<User>\AppData\Roaming\Telegram Desktop\

Contains:

  • Cache files

  • User profiles

  • Chat histories

Discord

Location:
C:\Users\<User>\AppData\Roaming\discord\

Artifacts:

  • Channel activity

  • Direct messages

  • Cached images

  • Tokens


Email Applications

Outlook

Outlook stores emails in:

  • .OST (cached mailbox)

  • .PST (local mailbox)

Location:
C:\Users\<User>\AppData\Local\Microsoft\Outlook\

Artifacts include:

  • Emails

  • Attachments

  • Calendar entries

  • Contact lists

  • Deleted email remnants


Office Suite Artifacts

Microsoft Office products store:

  • Recent document lists

  • Template usage

  • Auto-save files

  • Temporary backup files

Locations include:

C:\Users\<User>\AppData\Roaming\Microsoft\Office\Recent\

These reveal:

  • Documents opened

  • Editing patterns

  • File movement

  • Unsaved versions


Cloud Sync Applications

OneDrive

Location:
C:\Users\<User>\AppData\Local\Microsoft\OneDrive\

Artifacts include:

  • Synced files

  • Sync logs

  • File version history

  • Deletion logs

Google Drive

Location:
C:\Users\<User>\AppData\Local\Google\DriveFS\

Artifacts:

  • Cached data

  • File sync history

  • Activity logs

Cloud apps often reveal data exfiltration attempts.


Multimedia & File-Sharing Apps

VLC

Stores:

  • Recently played media

  • Network stream URLs

BitTorrent Clients

Artifacts include:

  • Torrent files

  • Magnet links

  • Partial downloads

  • Transfer logs

Useful for piracy or suspicious file distribution investigations.


Malware & Suspicious Application Artifacts

Malware often leaves traces in:

  • AppData\Local

  • AppData\Roaming

  • Temp folders

  • Browser extensions

  • Scheduled tasks

  • Startup registry keys

Analyzing application folders helps identify:

  • Persistence mechanisms

  • Dropped payloads

  • Logs tampered by malware


Analysis Techniques

1. Compare Browser Data With System Logs

Correlate:

  • Visit timestamps

  • Download times

  • Login events

with Windows Event Logs and Prefetch.

2. Recover Deleted Browser Data

SQLite records often leave remnants even after deletion.

3. Timeline Construction

Combine:

  • Browser history

  • Cache timestamps

  • Download logs

  • Application logs

to build a full activity timeline.

4. Look for Suspicious Extensions

Extensions often serve as spyware or data stealers.

5. Analyze Cache for Deleted Content

Even if the user clears history, cache often remains.


Summary

Browser and application artifacts provide deep insights into user actions, browsing history, communication patterns, downloads, cloud sync activity, and malware behavior. Collecting and analyzing artifacts from Chrome, Edge, Firefox, messaging apps, Office tools, and cloud applications is essential for reconstructing events during an investigation. These artifacts often reveal the most direct evidence of user intent, data access, and suspicious or malicious activity.

HOME COMMUNITY CAREERS DASHBOARD