top of page

Forensic Analysis (Investigating downloads, Browsers Bookmark, Extensions) of Microsoft Edge (Chromium-Based)

Back in 2019, Microsoft replaced its EdgeHTML browser engine with Chromium, the open-source project that powers Google Chrome. By switching to Chromium, Edge shares a common foundation with Chrome, meaning the forensic techniques used for Chrome investigations also apply to Edge.


Microsoft isn’t just using Chromium; they’re actively contributing to its development. This means that, as long as Microsoft continues to submit changes to the Chromium project rath er than making Edge-specific modifications, forensic tools built for Chrome will seamlessly work with Edge.

-------------------------------------------------------------------------------------------------------


Even Edge and Chrome are nearly identical. Microsoft has introduced a few unique features. One of the most intriguing is IE Mode, which allows users to open a tab using the legacy Internet Explorer engine. This feature is mainly aimed at enterprises that still rely on older web applications.


Edge maintains the same folder structure as Chrome


%UserProfile%\AppData\Local\Microsoft\Edge\User Data

Makes it easy to apply existing Chrome forensic methodologies to Edge without major changes.


Similarity b/w edge and chrome artifacts:

Browser Artifacts

Chrome

Edge

Internet History

History

History

Cache Files

data_#, f_######

data_#, f_######

Cookies/Web Storage

Cookies/Local Storage/File System/IndexedDB

Cookies/Local Storage/File System/IndexedDB

Bookmarks

Bookmarks, Bookmarks.bak

Bookmarks, Bookmarks.msbak

Download History

History

History

Auto-Complete/Form History

History, Web Data, Login Data, Network Action Predictor

History, Web Data, Login Data, Network Action Predictor

Installed Extensions

Extensions Folder

Extensions Folder

Session Recovery

Session_<timestamp>, Tabs_<timestamp>

Session_<timestamp>, Tabs_<timestamp>

Synchronization

Sync Data Folder

Sync Data Folder


-------------------------------------------------------------------------------------------------------------


Investigating Downloads in Edge

Edge records extensive metadata on file downloads.


Records are stored in the History database, specifically in the downloads and download_url_chains tables. Key fields in these tables include:
  • current_path/target_path – Where the file was saved.

  • start_time/end_time – Timestamps in Webkit format.

  • state – Whether the download was successful.

    state Code

Code

Description

0

In Progress

1

Complete

2

Cancelled

3

Interrupted

4

Blocked


  • danger_type – Whether the file was flagged as dangerous.

    Danger type

Code

Description

0

Not Dangerous

1

Dangerous

2

Dangerous URL

3

Dangerous Content

4

Maybe Dangerous

5

Uncommon Content

6

User Validated

7

Dangerous Host

8

Potentially Unwanted

11

Password Protected

13/14

Sensitive Content


  • interrupt_reason – Why a download failed (e.g., flagged as malware).

    Interrupt reason

Code

Description

0

None

1

File Failed (generic)

2

Access Denied

3

No Space

5

Filename too long

6

File too large

7

Virus Infected

12

Failed Security Check

20

Network Error

40

User Cancelled

41

User Shutdown

50

Browser Crash


  • opened – Whether the file was opened via the browser’s download manager.

  • last_access_time – When the file was last opened via the browser.

  • tab_url & tab_referrer_url – The page that initiated the download.

  • site_url – The domain from which the download originated.

  • mime_type – The type of file downloaded.


-------------------------------------------------------------------------------------------------------------


Download Chains and Redirects

The download_url_chains table helps reconstruct the sequence of URLs that led to a file being downloaded.

This is useful when a website employs multiple redirects to obscure the true origin of a file, a common tactic in phishing and malware distribution.

-------------------------------------------------------------------------------------------------------------


Browser Extensions: The Silent Threat

Chromium-based browsers, including Edge, support a vast range of extensions. While this is great for customization, it also opens the door to security risks. Rogue extensions are a growing threat, often used to steal data or install malware.


Each installed extension is stored in a uniquely named folder (based on an application GUID) within the Edge user data directory.

Inside, the manifest.json file contains key details such as:

  • name – The extension’s official name.

  • description – A brief summary of its purpose.

  • version – The installed version.

  • URL & metadata – Additional information for identifying the extension.



While most forensic tools can extract this data, manually reviewing manifest.json can sometimes reveal hidden or misleading details.

-------------------------------------------------------------------------------------------------------------


Tools like Hindsight can automate this process by parsing manifest.json files and displaying installed extensions in an easy-to-read format.

-------------------------------------------------------------------------------------------------------------

Browser Bookmarks

Bookmarks don’t always take center stage in forensic tools, yet they hold valuable insights into user behavior. These simple shortcuts, created intentionally by users, can reveal frequently visited websites, saved research, and even traces of malicious activity.


Why Bookmarks Matter in Digital Forensics

Bookmarks serve as personalized navigation aids, offering key details such as:

  • Website of interest – The exact URL, including any parameters embedded in it.

  • User profile association – Identifies which user created the bookmark.

  • Timestamps – Information on when the bookmark was created or last accessed.



Google Chrome & Microsoft Edge

Chrome and Edge (Chromium-based) store bookmarks in a JSON file named Bookmarks (without an extension), making it easy to parse. Additionally, backup versions (Bookmarks.bak or Bookmarks.msbak in Edge) , preserving previous states.


Output Bookmark
  • date_added: Uses the Webkit timestamp format.

  • source: Indicates how the bookmark was created (e.g., user-added or imported).

  • url: The saved web address.


Forensic Considerations:
  • Look for backup files (Bookmarks.bak or Bookmarks.msbak) to retrieve deleted bookmarks.

  • Investigate archived versions of bookmarks stored in snapshot folders:

%UserProfile%\AppData\Local\Google\Chrome\User Data\Snapshots
%UserProfile%\AppData\Local\Microsoft\Edge\User Data\Snapshots
  • If a user has cleared bookmarks, backup versions might still hold past evidence.


Bookmark for other browsers:

Browser

Bookmark Location(s)

Chrome

Bookmarks, Bookmarks.bak

Edge

Bookmarks, Bookmarks.msbak

Internet Explorer

%UserProfile%\Favorites\*.url

Firefox

places.sqlite, bookmarks-<date>.jsonlz4

------------------------------------------------------------------------------------------------------------

Detecting Malicious Bookmarks

Bookmarks can sometimes be manipulated by malware, injecting rogue sites without user knowledge. Forensic investigators should look for:


  • Unusually high bookmark creation activity in a short period (indicating automation or script-based bookmark injection).

  • Bookmarks pointing to phishing pages or known malware-hosting domains.

  • Mismatch between user activity and bookmarks (e.g., a user primarily visiting tech forums but having multiple financial scam bookmarks).


How to Validate Suspicious Bookmarks:

  1. Cross-check browser history – Was the site actually visited?

  2. Scan the system for malware – Look for persistence mechanisms.

  3. Review antivirus logs – Any detections related to browser activity?


Final Thoughts

Forensic analysis isn’t just about looking at history logs—it’s about understanding user behavior through every available artifact. And in that regard, bookmarks offer a surprisingly rich source of evidence.


----------------------------------------Dean-------------------------------------------

 
 
 

Comentários


bottom of page