Call logs, SMSes, emails, social networks communications and, of course, chats
in instant messengers can give you a lot of important information in a course of
a forensic investigation. Let's see how one single chat product can be examined
from different aspects, each of which gives one more – unique! – part of puzzle.
In our case, the suspect had Skype installed on his laptop and mobile device
which were seized and investigated with Belkasoft Evidence Center.
First part of the analysis is easy: chats are extracted from existing main.db,
a SQLite database where Skype stores its history logs.
BEC automatically locates and extracts chat history from Skype database, as
well as hundreds of other messengers
Is this it? No, there are many things yet to be discovered!
First of all, BEC finds not just text chats. Looking in the Overview section
of the product, you can note the following types of data extracted from the same
- Calls: Voice calls made via Skype
- Contacts: Contents of Skype address book, as well as interlocutors not added to it
- File transfers: Files sent and received via Skype "Send file" feature:
- Geolocation data: mobile Skype client allows a user to send their current location to an interlocutor. Belkasoft extracts this data:
Besides, you can visualize one or multiple locations on Google Maps (if you have Internet connection) or Google Earth (if you don't).
- Pictures: Skype allows a user to share photos inside a chat, and BEC shows such pictures:
By the way, BEC can automatically analyze pictures for faces, skin tone and scanned
text, if this is what your investigation about:
- This particular database did not contain other types of Skype artifacts, but there are more supported by BEC: SMSes, voicemails and so on
Now is this all? The answer is still no! What else is there?
Let us check if there is anything deleted in the Skype history. How to do that?
With Belkasoft you can easily review deleted items in the convenient SQLite Viewer
window. In order to populate this window with Skype data, one should select corresponding
Skype profile in the Case Explorer window of Evidence Center:
To the left of SQLite Viewer window you can see tables of selected Skype database.
One of the tables is called Messages, and it stores chats sent or received. In the
picture above you can see a number of records highlighted with red background. These
items are originated from a special area of SQLite database called "freelist". This
area stores recently deleted items, which Belkasoft can recover for you.
You are probably thinking: this has to be it, right? But once again, no! Let
us pay more attention to File System pane of Evidence Center. What
is the file named main.db-journal next to main.db database?
Evidence Center can visualize file system structure of computers and mobile devices (including Android backups). If we navigate
to the suspect's profile folder, we will see main.db file along with main.db-journal. The journal file is of significant size: more than 40% of the main database file!
What is inside this file? Is this information important? Yes, it is!
Journal file is a SQLite auxiliary file which may contain records absent in the main database.
If we go back to SQLite Viewer, we will see records highlighted with cyan:
For chats, 5 extra messages were found in the journal file. For MediaDocuments
table the number is even bigger: 370 items out of 1361. Thus, journal file information
is not to be overlooked!
Now, this is it.
Joke! There is more.
Each SQLite database, if used frequently, contains unallocated space. Don't confuse
it with unallocated space in a hard drive. This is a separate concept, and what
is important to know is that SQLite unallocated may contain remnants of recently
deleted items. This is not similar to freelist and, unlike info in freelist, unallocated
space can contain random or damaged data. However, using data carving of unallocated
SQLite space (built-in feature of BEC), you can recover meaningful data:
In this database only one field was recovered from Skype database
unallocated, but very important one: one of interlocutors' mobile phone number.
For those who prefer to verify results manually, BEC has low-level means for
that. HexViewer window allows to visualize a SQLite record (allocated or unallocated),
any file selected in File List, disk partition or volume selected in File System
pane, or mobile phone backup contents.
HexViewer shows binary contents of selected SQLite unallocated
Fortunately, in our case the suspect's laptop was found switched on, so it was
possible to capture Live RAM. BEC contains Live RAM Capturer utility
as a part of its installation package. Live RAM Capturer is a portable tool, which
can run from a thumb drive and dump all the memory of a running Windows machine.
Then, the output can be analyzed in Evidence Center. In particular, Skype details
can be found inside the memory dump if it was running at the moment of memory acquisition.
When we inspect File System pane of BEC, we can see that Skype.exe was indeed
Now we switch to Case Explorer pane and trust the tool's ability to carve RAM
You can see that Skype.exe process memory contains links in Safari and Opera
format. Some of these links lead to pictures which are still alive on Apple server:
Is this it now? Yes, that's it for this article, but just for the sake of brevity.
We haven't covered Skype data carving of pagefile and hibernation file, as well
as investigation of slack space, analysis of Volume Shadow Copy, processing Skype
hidden inside virtual machines and Skype app for other popular operating systems
such as Mac OS or Linux, and many more other potentially crucial aspects of Skype
investigation. Be sure, however, that all of them are supported by the product reviewed
in this article, Belkasoft Evidence Center (BEC).
P.S. We reviewed Skype app only, but did you know that Belkasoft
several hundreds of other chat applications?
More details on BEC