Recovering Images from WebCacheImageInfo: Tools and Techniques
What WebCacheImageInfo is
WebCacheImageInfo is an artifact produced by Windows’ WebCacheV01.dat (IE/Edge/WebView) and related browser caching systems. It logs metadata about cached images (URLs, cache file names, timestamps, file sizes, content-type) and can help locate image data stored in the cache container.
When it’s useful
- Incident response or forensic examinations involving web-sourced images.
- Recovering deleted or overwritten images referenced by browsers.
- Correlating user activity with images viewed or downloaded.
Key artifacts to target
- WebCacheV01.dat (Windows WebCache/IE/Edge legacy cache)
- Internet Explorer/Edge cache folders (e.g., Content.IE5, INetCache)
- User browser cache directories (Edge/Chromium, legacy IE)
- Associated index files (index.dat for very old IE)
- Browser history and download records for context
Tools (commercial / open-source)
- NirSoft utilities
- CachedView / IECacheView — view and extract items from IE/Edge legacy caches.
- Belkasoft Evidence Center (commercial) — parses WebCache artifacts and extracts cached files.
- Magnet AXIOM / EnCase / X1 (commercial) — comprehensive parsing and carving workflows for WebCacheImageInfo and related caches.
- Bulk Extractor / scalpel / foremost — raw carving tools to carve image files from unallocated space or cache containers.
- sqlite3 / forensic parsers — WebCacheV01.dat is an Extensible Storage Engine (ESE) database; eskimob (or libesedb tools) can parse ESE databases:
- libesedb (open-source) — extract tables and records from ESE files.
- esedbexport/esedbinfo — enumerate and export ESE table contents.
- Python with pyesedb or custom scripts — to parse ESE records and extract WebCacheImageInfo rows.
- FTK Imager / dd — image acquisition and low-level access to cache files.
Practical workflow (step-by-step)
- Acquire an image of the target system or copy of user profile (forensically when possible).
- Locate WebCacheV01.dat (typically in %LOCALAPPDATA%\Microsoft\Windows\WebCache) and browser cache directories.
- Parse the ESE database:
- Use libesedb/esedbexport or pyesedb to list tables and export the WebCacheImageInfo table to CSV/JSON.
- Inspect WebCacheImageInfo fields:
- Note URL, LocalFileName/CacheFileName, LastModified/LastAccessed timestamps, content-type, and file size.
- Locate the corresponding cache blob:
- Match CacheFileName to files in the cache folder or extract blob columns from the ESE table (some parsers can export raw blobs).
- If direct file not present, carve images:
- Use carving tools (foremost/scalpel/bulk_extractor) on the cache container, user profile, or disk image targeting JPEG/PNG headers.
- Validate and repair images:
- Open extracted files in an image viewer; use JPEG repair tools (jpeginfo, jpegrepair) if headers are corrupted.
- Correlate with other artifacts:
- Cross-reference browser history, timestamps, and system logs to build timeline and user activity.
- Document findings and preserve extracted evidence with hashes and timestamps.
Tips and pitfalls
- WebCacheV01.dat is locked on live systems; copy it from a hibernation/volume shadow copy or use forensic imaging.
- Cache filenames may be hashed or relocated; rely on metadata from WebCacheImageInfo rather than filename alone.
- Some images are stored in compressed
Leave a Reply
You must be logged in to post a comment.