{"id":4085,"date":"2018-05-10T11:19:48","date_gmt":"2018-05-10T15:19:48","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=4085"},"modified":"2025-02-24T17:36:54","modified_gmt":"2025-02-24T17:36:54","slug":"analyzing-instant-messengers-with-belkasoft","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/","title":{"rendered":"Analyzing Instant Messengers with Belkasoft"},"content":{"rendered":"<p>Nowadays, the basic exchange of information is carried out through Instant Messengers by using social networks. Some social networks have their own mobile apps which functionality can be compared with that of IM Messengers.<\/p>\n<p><!--more--><\/p>\n<p><em>Where is History of Instant Messengers stored?<\/em><\/p>\n<p>Some Instant Messengers store history locally (on a computer or mobile device) such as Skype, WhatsApp, etc.<\/p>\n<p>Some Instant Messengers store history partly locally, partly in the cloud such as Telegram, etc. The amount of information stored locally can be different. For example, it can be account info, cache, chats, calls or maybe just account info, cache.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Where can I find the history of Instant Messengers?<\/em><\/p>\n<p>1) Physical dumps of mobile devices.<\/p>\n<p>2) File systems of mobile devices.<\/p>\n<p>3) Backups (history of Instant Messengers can be present in backups completely or \u00a0partially, depending on the security settings of the operating system of the mobile device). Backups can be detected on computers (or laptops), clouds: Google Cloud, iCloud, etc. Backups can be &#8220;standard&#8221; (made by using ADB for Android devices, iTunes for Apple devices), and &#8220;non-standard&#8221;, for example Smart Switch backup (backup made by the proprietary Smart Switch utility (Samsung), or a backup made by the program DrFone (Wondershare) Practice shows that owners of mobile devices do not always realize that when a mobile device is connected to a computer, backup can be created automatically. Therefore, the owner of the device may not take measures to destroy such backups.<\/p>\n<p>4) Hard drives.<\/p>\n<p>5) Memory cards.<\/p>\n<p>6) RAM memory dumps.<\/p>\n<p>7) For Instant Messengers such as Telegram, data can be extracted from their Clouds.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em>Belkasoft Features<\/em><\/p>\n<p>Belkasoft can analyze and extract History of\u00a0Instant Messengers from mobile devices, PCs, laptops, clouds.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4065 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001.png\" alt=\"\" width=\"490\" height=\"172\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001.png 490w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001-300x105.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001-32x11.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001-56x20.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/001-64x22.png 64w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/p>\n<p>Supported Operating Systems:<\/p>\n<ul>\n<li>Android<\/li>\n<li>iOS<\/li>\n<li>MacOS<\/li>\n<li>Linux<\/li>\n<li>Windows<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4066 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002.png\" alt=\"\" width=\"585\" height=\"402\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002.png 585w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002-300x206.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002-512x352.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002-56x38.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/002-64x44.png 64w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/p>\n<p style=\"text-align: center\">* This list is not exhaustive<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4067 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003.png\" alt=\"\" width=\"311\" height=\"158\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003.png 311w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003-300x152.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003-32x16.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003-28x14.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003-56x28.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/003-64x33.png 64w\" sizes=\"auto, (max-width: 311px) 100vw, 311px\" \/><\/p>\n<p style=\"text-align: center\">BEC (Belkasoft Evidence Center) automatically locates and extracts chat history from hundreds of Instant Messengers<\/p>\n<p>&nbsp;<\/p>\n<p>Instant Messengers usually store its history in a SQlite file. Therefore, if it is not possible to extract its chats for a Instant Messenger, it can be done manually using SQLite Viewer, integrated into Belkasoft.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4069 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005.png\" alt=\"\" width=\"507\" height=\"238\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005.png 507w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005-300x141.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005-32x15.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005-28x13.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005-56x26.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/005-64x30.png 64w\" sizes=\"auto, (max-width: 507px) 100vw, 507px\" \/><\/p>\n<p style=\"text-align: center\">An example of a restored chat from SQLite-file<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Example of the Instant Messenger analysis: Skype<\/strong><\/em><\/p>\n<p>The main data of the work of this messenger is in the file main.db<\/p>\n<p>&nbsp;<\/p>\n<p><em>Main.db location:<\/em><\/p>\n<p>Windows 7 or higher: ROOT\\Users\\%userprofile%\\AppData\\Roaming\\Skype\\%SkypeName%\\main.db<\/p>\n<p>Windows XP: ROOT\\Documents and Settings\\%userprofile%\\Application Data\\Skype\\%SkypeName%\\<\/p>\n<p>or RUN: AppData\\Skype\\%SkypeName%\\<\/p>\n<p>Linux: ~\\.Skype\\%SkypeName%\\<\/p>\n<p>Android: \\data\\data\\com.skype.raider\\databases\\main.db<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4068 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004.png\" alt=\"\" width=\"638\" height=\"344\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004.png 638w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004-300x162.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004-512x276.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004-16x9.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004-32x17.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004-28x15.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004-56x30.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/004-64x35.png 64w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/p>\n<p style=\"text-align: center\">Displaying data of a main.db-file in SQLite viewer<\/p>\n<p>Also, it is possible to restore some of the Chats from data files, which are temporary synchronization database files (ChatSynk).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4074 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010.png\" alt=\"\" width=\"668\" height=\"140\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010.png 668w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010-300x63.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010-512x107.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010-16x3.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010-32x7.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010-28x6.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010-56x12.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/010-64x13.png 64w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/p>\n<p>The types of data that are contained in Skype and can be extracted:<\/p>\n<ul>\n<li><strong>Calls<\/strong><\/li>\n<li><strong>Chats<\/strong><\/li>\n<li><strong>Group Chats<\/strong><\/li>\n<li><strong>SMS<\/strong><\/li>\n<li><strong>Voicemails<\/strong><\/li>\n<li><strong>File transfers<\/strong><\/li>\n<li><strong>Geolocation data<\/strong><\/li>\n<li><strong>Pictures<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4070 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006.png\" alt=\"\" width=\"144\" height=\"496\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006.png 144w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006-87x300.png 87w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006-5x16.png 5w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006-9x32.png 9w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006-8x28.png 8w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006-16x56.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/006-19x64.png 19w\" sizes=\"auto, (max-width: 144px) 100vw, 144px\" \/><\/p>\n<p style=\"text-align: center\">A complete list of data that can be extracted from Skype<\/p>\n<p>Accounts: the information about the user&#8217;s account can be obtained by analyzing the relevant fields of the main.db file in the SQLite Viewer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4093 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020.png\" alt=\"\" width=\"800\" height=\"195\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020.png 800w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-300x73.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-768x187.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-512x125.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-16x4.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-32x8.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-28x7.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-56x14.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/020-64x16.png 64w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>It is most convenient to navigate the extracted data in the Overview tab.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4071 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007.png\" alt=\"\" width=\"330\" height=\"171\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007.png 330w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007-300x155.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007-32x17.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007-28x15.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007-56x29.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/007-64x33.png 64w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/p>\n<p><em><strong>Chats<\/strong><\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4088 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2.png\" alt=\"\" width=\"800\" height=\"222\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2.png 800w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-300x83.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-768x213.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-512x142.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-16x4.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-32x9.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-28x8.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-56x16.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/008_2-64x18.png 64w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\">BEC automatically locates and extracts chat history from Skype database, as well as hundreds of other messengers<\/p>\n<p>&nbsp;<\/p>\n<p>The window displays chat properties in the lower part of the window, where the following is indicated:<\/p>\n<p>UIN of the sender and the recipient, External IPs and Internal IPs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4073 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009.png\" alt=\"\" width=\"697\" height=\"357\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009.png 697w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009-300x154.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009-512x262.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009-32x16.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009-28x14.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009-56x29.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/009-64x33.png 64w\" sizes=\"auto, (max-width: 697px) 100vw, 697px\" \/><\/p>\n<p><em><strong>Calls: <\/strong><\/em>Voice calls made via Skype.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4075 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011.png\" alt=\"\" width=\"723\" height=\"240\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011.png 723w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011-300x100.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011-512x170.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011-16x5.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011-32x11.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011-28x9.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011-56x19.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/011-64x21.png 64w\" sizes=\"auto, (max-width: 723px) 100vw, 723px\" \/><\/p>\n<p><em><strong>Contacts:<\/strong><\/em>\u00a0Contents of Skype address book.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4076 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012.png\" alt=\"\" width=\"538\" height=\"73\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012.png 538w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012-300x41.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012-512x69.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012-16x2.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012-32x4.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012-28x4.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012-56x8.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/012-64x9.png 64w\" sizes=\"auto, (max-width: 538px) 100vw, 538px\" \/><\/p>\n<p><em><strong>File transfers:<\/strong><\/em>\u00a0Files sent and received via Skype.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4077 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013.png\" alt=\"\" width=\"755\" height=\"190\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013.png 755w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013-300x75.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013-512x129.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013-16x4.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013-32x8.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013-28x7.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013-56x14.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/013-64x16.png 64w\" sizes=\"auto, (max-width: 755px) 100vw, 755px\" \/><\/p>\n<p><em><strong>Geolocation data:<\/strong><\/em>\u00a0mobile Skype client allows a user to send their current location to an interlocutor. BEC extracts the data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4078 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014.png\" alt=\"\" width=\"299\" height=\"147\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014.png 299w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014-296x147.png 296w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014-32x16.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014-28x14.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014-56x28.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/014-64x31.png 64w\" sizes=\"auto, (max-width: 299px) 100vw, 299px\" \/><\/p>\n<p>BEC can display extracted geotags on Google Maps.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4079 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015.png\" alt=\"\" width=\"468\" height=\"182\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015.png 468w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015-300x117.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015-32x12.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015-28x11.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015-56x22.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/015-64x25.png 64w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4091 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2.png\" alt=\"\" width=\"800\" height=\"523\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2.png 800w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-300x196.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-768x502.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-512x335.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-16x10.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-64x42.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/016_2-184x120.png 184w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\">BEC can visualize one or multiple locations on Google Maps or Google Earth<\/p>\n<p><em><strong>Other artifacts:<\/strong><\/em> BEC can recover other artifacts of Skype. Such us: voicemails, group chats, etc.<\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Deleted chats<\/strong><\/em><\/p>\n<p>BEC can recover deleted records of Skype chats. BEC does this automatically. But, an examiner can do it in the manual mode, using SQLite viewer.<\/p>\n<p>An SQLite database may have one or more unused pages. These pages be created and reserved for future use to improve performance, in which case they contain no meaningful data. Unused pages in the database are stored on what is called a &#8220;freelist&#8221;.<\/p>\n<p>Freelist&#8217;s can contain remote chats and can be extracted manually or automatically.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4084 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018.png\" alt=\"\" width=\"724\" height=\"268\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018.png 724w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018-300x111.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018-512x190.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018-32x12.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018-56x21.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/018-64x24.png 64w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>A part of the deleted data can be in the Unallocated space area. For their restoration, an in-depth analysis is required.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4092 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2.png\" alt=\"\" width=\"800\" height=\"336\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2.png 800w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-300x126.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-768x323.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-512x215.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-32x13.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-28x12.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-56x24.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/05\/019_2-64x27.png 64w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p style=\"text-align: center\">Phone number in Unallocated space<\/p>\n<p><em><strong>Write Ahead Logs<\/strong><\/em><\/p>\n<p>Another artifact from which you can extract Skype data is WAL-files. These files contain new and updated records and are used to ensure the integrity of the data when the content is updated of a main SQLite database. Data in WAL-files can be stored for a very long time. A WAL-file is cleared when it reaches the size of 1000-pages or when it receives a special command.<\/p>\n<p>BEC also knows how to extract data from WAL-files automatically.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>In this article, the functionality of Belkasoft Evidence Center for extracting Chats was reviewed. It was considered where the Chats are stored and from what objects the Chats can be extracted (computers, clouds, mobile devices, etc.).<\/p>\n<p>With the example of Skype, it was shown what types of artifacts of Instant Messengers can be extracted and analyzed with the help of Belkasoft Evidence Center.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Happy forensicating!<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>About the authors<br \/>\n<strong><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin\/\">Oleg Skulkin<\/a><\/strong>, GCFA, MCFE, ACE, is a DFIR enthusional (enthusiast + professional),\u00a0<a href=\"https:\/\/www.amazon.com\/Windows-Forensics-Cookbook-Oleg-Skulkin\/dp\/1784390496\"><strong>Windows Forensics Cookbook<\/strong><\/a>\u00a0and\u00a0<a href=\"https:\/\/www.amazon.com\/Practical-Mobile-Forensics-Rohit-Tamma\/dp\/1788839196\/\"><strong>Practical Mobile Forensics<\/strong><\/a>\u00a0co-author.<\/p>\n<p><strong><a href=\"https:\/\/www.linkedin.com\/in\/igormikhaylovcf\/\">Igor Mikhaylov<\/a><\/strong>, MCFE, EnCE, ACE, OSFCE, is a digital forensic examiner with more than 20 years of experience and\u00a0<a href=\"https:\/\/www.amazon.com\/Mobile-Forensics-Cookbook-Igor-Mikhaylov\/dp\/1785282050\/\"><strong>Mobile Forensics Cookbook<\/strong><\/a>\u00a0author.<\/p>\n","protected":false},"excerpt":{"rendered":"Nowadays, the basic exchange of information is carried out through Instant Messengers by using social networks. Some social&hellip;","protected":false},"author":126,"featured_media":3586,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-4085","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Belkasoft Is Being Used To Analyze Instant Messenger Data<\/title>\n<meta name=\"description\" content=\"Learn how to analyze instant messaging data using Belkasoft software for digital forensics investigations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyzing Instant Messengers with Belkasoft\" \/>\n<meta property=\"og:description\" content=\"Learn how to analyze instant messaging data using Belkasoft software for digital forensics investigations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-10T15:19:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T17:36:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/01\/internet-3113279_960_720.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Analyzing Instant Messengers with Belkasoft\",\"datePublished\":\"2018-05-10T15:19:48+00:00\",\"dateModified\":\"2025-02-24T17:36:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/\"},\"wordCount\":952,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/internet-3113279_960_720.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/\",\"name\":\"How Belkasoft Is Being Used To Analyze Instant Messenger Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/internet-3113279_960_720.png\",\"datePublished\":\"2018-05-10T15:19:48+00:00\",\"dateModified\":\"2025-02-24T17:36:54+00:00\",\"description\":\"Learn how to analyze instant messaging data using Belkasoft software for digital forensics investigations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/internet-3113279_960_720.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/internet-3113279_960_720.png\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/analyzing-instant-messengers-with-belkasoft\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyzing Instant Messengers with Belkasoft\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Belkasoft Is Being Used To Analyze Instant Messenger Data","description":"Learn how to analyze instant messaging data using Belkasoft software for digital forensics investigations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/","og_locale":"en_US","og_type":"article","og_title":"Analyzing Instant Messengers with Belkasoft","og_description":"Learn how to analyze instant messaging data using Belkasoft software for digital forensics investigations.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2018-05-10T15:19:48+00:00","article_modified_time":"2025-02-24T17:36:54+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/01\/internet-3113279_960_720.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Analyzing Instant Messengers with Belkasoft","datePublished":"2018-05-10T15:19:48+00:00","dateModified":"2025-02-24T17:36:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/"},"wordCount":952,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/01\/internet-3113279_960_720.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/","name":"How Belkasoft Is Being Used To Analyze Instant Messenger Data","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/01\/internet-3113279_960_720.png","datePublished":"2018-05-10T15:19:48+00:00","dateModified":"2025-02-24T17:36:54+00:00","description":"Learn how to analyze instant messaging data using Belkasoft software for digital forensics investigations.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/01\/internet-3113279_960_720.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/01\/internet-3113279_960_720.png","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/analyzing-instant-messengers-with-belkasoft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Analyzing Instant Messengers with Belkasoft"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=4085"}],"version-history":[{"count":1,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4085\/revisions"}],"predecessor-version":[{"id":8032,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4085\/revisions\/8032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/3586"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=4085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=4085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=4085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}