{"id":4243,"date":"2018-06-07T11:44:45","date_gmt":"2018-06-07T15:44:45","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=4243"},"modified":"2024-12-11T18:24:55","modified_gmt":"2024-12-11T18:24:55","slug":"forensic-analysis-instant-messengers-desktop-applications","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/","title":{"rendered":"Instant Messenger Desktop App Forensics : Telegram, WhatsApp, Viber"},"content":{"rendered":"<p>The most popular instant messengers are Telegram, WhatsApp, and Viber. These platforms have both mobile and desktop applications. Today we will look at the types of data an examiner can detect during <strong><a href=\"https:\/\/www.digitalforensics.com\/digital-forensics\/computer-forensics\">computer forensics<\/a><\/strong> analysis of the desktop versions of Telegram, WhatsApp, and Viber.<\/p>\n<p><!--more--><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Telegram\"><\/span><em>Telegram<\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Telegram is a cloud-based applications. All chats are in the cloud. In part, chats can be found on mobile devices.<\/p>\n<p>Telegram files (desktop Application) can be found by the way (Windows 8\/10): \/ Users \/% User profile% \/ AppData \/ Roaming \/ Telegram \/ Telegram Desktop<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4135 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/001.png\" alt=\"\" width=\"189\" height=\"117\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/001.png 189w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/001-16x10.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/001-32x20.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/001-28x17.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/001-56x35.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/001-64x40.png 64w\" sizes=\"auto, (max-width: 189px) 100vw, 189px\" \/><\/p>\n<p style=\"text-align: center;\">Telegram subfolders<\/p>\n<p>&nbsp;<\/p>\n<p>In this folder are:<\/p>\n<p>Executable file &#8211; Telegram.exe<\/p>\n<p>Log file \u2013 log.txt<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4136 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002.png\" alt=\"\" width=\"360\" height=\"462\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002.png 360w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002-234x300.png 234w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002-12x16.png 12w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002-25x32.png 25w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002-22x28.png 22w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002-44x56.png 44w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/002-50x64.png 50w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/p>\n<p style=\"text-align: center;\">Fragment of the log.txt file<\/p>\n<p>The subfolder D877F783D5D3EF8C contains files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4137 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003.png\" alt=\"\" width=\"482\" height=\"257\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003.png 482w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003-300x160.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003-16x9.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003-32x17.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003-28x15.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003-56x30.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/003-64x34.png 64w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/p>\n<p style=\"text-align: center;\">Files in the subfolder D877F783D5D3EF8C<\/p>\n<p>Probably, these files are temporary files of the Telegram desktop Application. Identify their contents failed. These files are probably encrypted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4138 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004.png\" alt=\"\" width=\"626\" height=\"52\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004.png 626w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004-300x25.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004-512x43.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004-16x1.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004-32x3.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004-28x2.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004-56x5.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/004-64x5.png 64w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p>All these files have the header 54 44 46 24 21 4A 0F.<\/p>\n<p><em>\u00a0<\/em><\/p>\n<h2><span class=\"ez-toc-section\" id=\"WhatsApp\"><\/span><em>WhatsApp<\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>WhatsApp stores chats on members. New chat messages are stored in the WhatsApp cloud and can be retrieved from there.<\/p>\n<p>The WhatsApp (desktop Application) files can be found on the path (Windows 8\/10): \/ Users \/% User profile% \/ AppData \/ Roaming \/ WhatsApp<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4139 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/005.png\" alt=\"\" width=\"164\" height=\"193\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/005.png 164w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/005-14x16.png 14w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/005-27x32.png 27w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/005-24x28.png 24w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/005-48x56.png 48w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/005-54x64.png 54w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/><\/p>\n<p style=\"text-align: center;\">WhatsApp subfolders<\/p>\n<p>NOTE: The log file of WhatsApp installation is located on the path \/ Users \/% User profile% \/ AppData \/ Local \/ WhatsApp and has the name SquirrelSetup.log<\/p>\n<p>The subfolder databases contains on a SQLite file &#8211; Databases.db. But this file does not contain contacts or chats.<\/p>\n<p>Other subfolders contain temporary files of the WhatsApp desktop Application.<\/p>\n<p>The most interesting is the subfolder Cache.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4140 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006.png\" alt=\"\" width=\"482\" height=\"322\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006.png 482w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006-300x200.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/006-64x43.png 64w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/p>\n<p style=\"text-align: center;\">Files in the subfolder Cache<\/p>\n<p>The file data_2 contains avatars of the members.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4141 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/007.png\" alt=\"\" width=\"293\" height=\"298\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/007.png 293w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/007-16x16.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/007-32x32.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/007-28x28.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/007-56x56.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/007-64x64.png 64w\" sizes=\"auto, (max-width: 293px) 100vw, 293px\" \/><\/p>\n<p style=\"text-align: center;\">Avatars<\/p>\n<p>and links to the members&#8217; accounts (including phone numbers of the members)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4142 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008.png\" alt=\"\" width=\"776\" height=\"145\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008.png 776w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-300x56.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-768x144.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-512x96.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-16x3.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-32x6.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-28x5.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-56x10.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/008-64x12.png 64w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><\/p>\n<p>The remaining files in the Cache subfolder can be images, videos, documents, which members exchange in chats. Probably, these files are encrypted. As a rule, in these files, in addition to the encrypted content, you can find the same links:<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Viber\"><\/span><em>Viber<\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Viber stores chats on devices members. New chat messages are stored in the Viber cloud and can be retrieved from there.<\/p>\n<p>You can find the Viber files (desktop Application) by the path (Windows 8\/10): \/ Users \/% User profile% \/ AppData \/ Roaming \/ ViberPC \/<\/p>\n<p>Where the name of one of the subfolder is the phone number of the owner of this Viber account.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4143 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/009.png\" alt=\"\" width=\"165\" height=\"204\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/009.png 165w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/009-13x16.png 13w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/009-26x32.png 26w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/009-23x28.png 23w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/009-45x56.png 45w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/009-52x64.png 52w\" sizes=\"auto, (max-width: 165px) 100vw, 165px\" \/><\/p>\n<p>In folder ViberPC there is a file config.db which contains tables<\/p>\n<p>Accounts:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4144 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010.png\" alt=\"\" width=\"546\" height=\"38\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010.png 546w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010-300x21.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010-512x36.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010-16x1.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010-32x2.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010-28x2.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010-56x4.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/010-64x4.png 64w\" sizes=\"auto, (max-width: 546px) 100vw, 546px\" \/><\/p>\n<p>CommonSettings:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4145 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011.png\" alt=\"\" width=\"475\" height=\"255\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011.png 475w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011-300x161.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011-16x9.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011-32x17.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011-28x15.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011-56x30.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/011-64x34.png 64w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/p>\n<p>In the subfolder with a name that is the same as the phone number of the owner of the Viber account, there are:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4146 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012.png\" alt=\"\" width=\"656\" height=\"318\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012.png 656w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012-300x145.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012-512x248.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012-16x8.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012-32x16.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012-28x14.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012-56x27.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/012-64x31.png 64w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/p>\n<p>The file <strong>data.db<\/strong>.<br \/>\nProbably the file contains the auxiliary data necessary for the correct operation of this Instant Messenger.<\/p>\n<p>The <strong>viber.db<\/strong> file, which contains Viber Calls, Viber Chat Messages, Viber Contacts (this information can be extracted with AXIOM (Magnet Forensics) or Belkasoft Evidence Center (Belkasoft) .When examining the viber.db file with SQLite Viewer, from the following additional information can be extracted:<\/p>\n<p>&#8211; additional information about the settings of the ViberPC program;<br \/>\n&#8211; information about downloaded and uploaded files;<br \/>\n-chat info;<br \/>\n-recovered chats;<br \/>\n-version of the Instant Messenger;<br \/>\n-etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4147 size-full\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/013.png\" alt=\"\" width=\"242\" height=\"90\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/013.png 242w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/013-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/013-32x12.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/013-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/013-56x21.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/06\/013-64x24.png 64w\" sizes=\"auto, (max-width: 242px) 100vw, 242px\" \/><\/p>\n<p style=\"text-align: center;\">The data types extracted from the viber.db file with AXIOM<\/p>\n<p>In the subfolder Avatars are avatars of Viber&#8217;s members.<\/p>\n<p>In the subfolder Backgrounds are background images.<\/p>\n<p>The Thumbnails subfolder contains thumbnails of images that were downloaded and uploaded by Viber&#8217;s members.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Instant Messengers Developers declare that chats are partially or completely stored on devices members. However, this statement is not true for Telegram Desktop Application and WhatsApp Desktop Application. An examiner is unable to remove chats, or decrypt the encrypted temporary files of the applications.<\/p>\n<p>When analyzing the WhatsApp Desktop Application, an examiner can extract avatars and phone numbers from the WhatsApp&#8217;s members.<\/p>\n<p>When analyzing Viber Desktop Application an examiner can extract Viber Calls, Viber Chat Messages, Viber Contacts, avatars and media cache. With deep analysis of viber.db with a SQLite Viewer tool, additional information can be extracted.<\/p>\n<p><strong>Happy forensicating!<\/strong><\/p>\n<h2><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin\/\">Oleg Skulkin<\/a><\/strong>, GCFA, MCFE, ACE, is a DFIR enthusional (enthusiast + professional),\u00a0<a href=\"https:\/\/www.amazon.com\/Windows-Forensics-Cookbook-Oleg-Skulkin\/dp\/1784390496\"><strong>Windows Forensics Cookbook<\/strong><\/a>\u00a0and\u00a0<a href=\"https:\/\/www.amazon.com\/Practical-Mobile-Forensics-Rohit-Tamma\/dp\/1788839196\/\"><strong>Practical Mobile Forensics<\/strong><\/a>\u00a0co-author.<\/p>\n<p><strong><a href=\"https:\/\/www.linkedin.com\/in\/igormikhaylovcf\/\">Igor Mikhaylov<\/a><\/strong>, MCFE, EnCE, ACE, OSFCE, is a digital forensic examiner with more than 20 years of experience and\u00a0<a href=\"https:\/\/www.amazon.com\/Mobile-Forensics-Cookbook-Igor-Mikhaylov\/dp\/1785282050\/\"><strong>Mobile Forensics Cookbook<\/strong><\/a>\u00a0author.<\/p>\n","protected":false},"excerpt":{"rendered":"The most popular instant messengers are Telegram, WhatsApp, and Viber. These platforms have both mobile and desktop applications.&hellip;","protected":false},"author":126,"featured_media":3764,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-4243","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Forensic analysis of instant messenger desktop applications<\/title>\n<meta name=\"description\" content=\"Learn what forensic examiners can extract from Telegram, WhatsApp, and Viber desktop applications, including chats, contacts, avatars, call logs, and cached data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Instant Messenger Desktop App Forensics : Telegram, WhatsApp, Viber\" \/>\n<meta property=\"og:description\" content=\"Learn what forensic examiners can extract from Telegram, WhatsApp, and Viber desktop applications, including chats, contacts, avatars, call logs, and cached data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-07T15:44:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:24:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/03\/color-3198094_960_720.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Instant Messenger Desktop App Forensics : Telegram, WhatsApp, Viber\",\"datePublished\":\"2018-06-07T15:44:45+00:00\",\"dateModified\":\"2024-12-11T18:24:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/color-3198094_960_720.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/\",\"name\":\"Forensic analysis of instant messenger desktop applications\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/color-3198094_960_720.png\",\"datePublished\":\"2018-06-07T15:44:45+00:00\",\"dateModified\":\"2024-12-11T18:24:55+00:00\",\"description\":\"Learn what forensic examiners can extract from Telegram, WhatsApp, and Viber desktop applications, including chats, contacts, avatars, call logs, and cached data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/color-3198094_960_720.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/color-3198094_960_720.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/forensic-analysis-instant-messengers-desktop-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Instant Messenger Desktop App Forensics : Telegram, WhatsApp, Viber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Forensic analysis of instant messenger desktop applications","description":"Learn what forensic examiners can extract from Telegram, WhatsApp, and Viber desktop applications, including chats, contacts, avatars, call logs, and cached data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/","og_locale":"en_US","og_type":"article","og_title":"Instant Messenger Desktop App Forensics : Telegram, WhatsApp, Viber","og_description":"Learn what forensic examiners can extract from Telegram, WhatsApp, and Viber desktop applications, including chats, contacts, avatars, call logs, and cached data.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2018-06-07T15:44:45+00:00","article_modified_time":"2024-12-11T18:24:55+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/03\/color-3198094_960_720.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Instant Messenger Desktop App Forensics : Telegram, WhatsApp, Viber","datePublished":"2018-06-07T15:44:45+00:00","dateModified":"2024-12-11T18:24:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/"},"wordCount":706,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/03\/color-3198094_960_720.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/","name":"Forensic analysis of instant messenger desktop applications","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/03\/color-3198094_960_720.png","datePublished":"2018-06-07T15:44:45+00:00","dateModified":"2024-12-11T18:24:55+00:00","description":"Learn what forensic examiners can extract from Telegram, WhatsApp, and Viber desktop applications, including chats, contacts, avatars, call logs, and cached data.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/03\/color-3198094_960_720.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2018\/03\/color-3198094_960_720.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/forensic-analysis-instant-messengers-desktop-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Instant Messenger Desktop App Forensics : Telegram, WhatsApp, Viber"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=4243"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4243\/revisions"}],"predecessor-version":[{"id":16008,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/4243\/revisions\/16008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/3764"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=4243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=4243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=4243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}