Uncovering Digital Footprints: Proving Deleted Application Installations through Forensic Analysis
Previously Installed Application Overview A previously installed application often leaves a digital footprint on a device long after a user deletes the application. Forensic experts often use a combination of techniques to analyze application artifacts to uncover and present a digital footprint of a deleted application. Knowing the significance of a prefetch file, registry log, cache path, and hive file aids a forensic investigator in providing feedback on the initial installation and usage of an application on a device.
Prefetch File Analysis
The Prefetch file stores a timestamp each time an application is run on a device. If an application was previously installed and deleted, there may be information about it in the Prefetch file if a user did not manually disable Prefetch. It is not uncommon to disable the Prefetch to improve performance; however, when the Prefetch is still enabled on a device it proves to be a quick and powerful tool for digital forensics investigators in uncovering the digital footprint of an application’s possible installation history on a device.
Registry Log Analysis
In cases where Prefetch is manually disabled, information about a previously run application may be cached in logs in the registry. A registry allows a forensic examiner to view system information that can be helpful in detecting if a program was ever installed or has run on a device. Programs that require a license key to use often store the license key in the registry. If the key can be identified as the key for use with a specific program, the company may be able to tie the license data to a specific user.
AppCompatCache Analysis
The AppCompactCache lists the full path to an application, file size, and last modified date of an executable. Deleting or removing an application can leave behind residual information about an application that has dependencies or that may have interacted with other applications while it was installed and used on a device.
Hive File Analysis
The hive files often contain evidence of a previously run application. A forensic examiner could view a registry in FTK, extract the hive and view it in regedit, or extract the hive and parse it with RegRipper.
Because a proactive approach to system management promotes efficient disk usage and helps maintain the overall health of your system, information about a previously installed application often remains on a device even after an application is deleted. An application’s digital footprint allows forensic investigators to assess activity and create a timeline of events utilizing a variety of tools that aid in a digital forensics investigation.
Comments
Post a Comment