The seized laptop is a Windows 11 client with a single user account. The User Data directory is imaged cold; SHA-256 hashes are written to the chain-of-custody log. Hindsight runs against a working copy.
The History database shows 14 visits to a domain that is one Levenshtein step away from a real Indian bank's domain, all within a 22-minute window. Cookies for that domain are present with a session ID. Login Data has no row for that domain (the suspect did not save the password), but Web Data autofill carries the suspect's name and a partial card number that match the suspect's profile.
The Cache, expanded with ChromeCacheView, contains the HTML and CSS of the page the suspect actually saw. The form action on the page points to an attacker-controlled URL that is also represented in History as an outbound POST (recorded only at the navigational level, not by body, because Chromium does not cache POST bodies).
Network Action Predictor carries two extra rows for related lookalike domains the suspect typed but never opened, suggesting reconnaissance for sibling phishing sites. Sessions folder shows the lookalike domain still in Current Tabs when the lid closed.
The Section 63 BSA certificate is drawn over the imaged profile and signed by the senior analyst. The report quotes the History rows, the Cache HTML, and the predictor rows, with WebKit-to-UTC conversions stated in line. Under Section 39 BSA deposition the analyst walks the trial court through the timeline; under cross-examination they produce the worksheet, the calibration log of the imaging workstation, and the hash list.