application was not visible in the installed programs,
neither through the Axiom Examine or Autopsy.
Autopsy could not locate any deleted folders or files
related to Exodus. The application was also not
available from the Windows search, the desktop, or
any visible folder on the hard drive. However hidden
folders located in the roaming profile
‘/Users/exodu/AppData/Roaming/Exodus’ and
containing data identical to that found in previous
tests, was present. Remnants included wallet name,
info seed, storage files, two-factor files and network
files. In addition to the previous tests, database ‘.db’
files were discovered under the local storage folders.
Data residing in the LOCK, LOG and CURRENT
database files was encrypted. The contents in the
CURRENT database file holding records of the
transactions done were also encrypted. However, full
metadata and timestamps of transactions were
available. Cached folders and files including ‘Code
Cache', 'Dawn Cache', and ‘Cache’ were also present.
The OS-encrypted Exodus key was also found in the
local state file. Although all the data was encrypted,
these artefacts confirmed that the wallet application
was present along with an active wallet.
For the Electrum wallet, the Autopsy ‘Deleted
Files’ section marked the Electrum application as
deleted along with other ‘.ink’ and ‘.mo’ file types.
More importantly, metadata contained the created
time, access time, change time and modified time
stamps indicating the exact time at which the
application was removed. All hex data inside the
deleted files contained unreadable information. In the
‘/Users/elect/AppData/Roaming/Electrum’ directory,
data related to the Electrum wallet was obtained
through file carving. Several folders and files were
extracted including the wallet name residing in the
‘wallets’ folder, confirming that although the wallet
application was not present on the local machine,
traces of crypto wallets were still present. In the same
directory, a readable file called ‘recent servers’,
contained the public IP’s ‘34.136.93.37’ and
‘94.23.247.135’ with the corresponding port numbers
and DNS names. This file contained information
about the servers that the Exodus application
communicated with.
For the Bitcoin Core wallet application, unlike
Electrum, the application was not present in the
‘deleted’ section of Autopsy. Bitcoin Core did not
feature under the ‘Installed Applications’ section,
meaning that the application was not present on the
Windows 10 local machine and neither under the
program files where the application used to reside.
However, artefacts related to the Bitcoin Core wallet
residing in the roaming profile
‘/Users/bitco/AppData/Roaming/Bitcoin/’, were
found. These consisted of the wallet folder and name,
peers file, mempool file, block, and index folder.
Although folders, files and wallet names were
present, all data residing in the files was encrypted
and not readable. The only data that Autopsy tagged
as ‘Deleted files’ relating to the Bitcoin Core was the
‘Block Data’, which is used to record some, or all the
recent transactions conducted.
Wireshark was unable to capture any packets
related to Bitcoin Core application during
uninstallation. For the Exodus and Electrum
applications, identical public IP’s as well as DNS
records, similar to the once present in previous tests,
were obtained.
In volatile memory, passphrases to login into the
wallet application were found only for the Bitcoin
Wallet application. For all applications, wallet names
were located, however no additional remnants related
to Transaction ID’s and Seeds were available.
4.5 Phase 4 (After Reboot)
For all the desktop wallet applications, all data related
to the browser history and local artefacts remained the
same. Volatile memory revealed the name of the
roaming paths for all three wallets.
5 CONCLUSIONS
The methodology presented in this study has shown
to be effective in retrieving artefacts related to crypto
wallets. Moreover, the work highlights the
importance of the exact time forensic investigators
perform collection of evidence. From the analysis it
is evident that digital artefacts differ in presence and
amount depending on the status of the application,
whether the wallet has been created, transactions have
been performed, or the applications have been used
and removed. A difference in the recoverable data
from volatile memory was also noticed when an
application was uninstalled, before and after a reboot.
One of the most difficult scenarios that
investigators are faced with is when the application
has been completely uninstalled from the system and
a shutdown was performed. At this stage, it was
observed that unless manually cleared, browser
history could serve as evidence of wallet usage,
including relevant timestamps of application usage
and transactions performed. From the tests
performed, both Exodus and Bitcoin Core wallet left
important artefacts in their respective roaming
profiles. This could help in identifying the usage