Tombstones, ANR Traces, and DropBox Crash Reports
Location
/data/tombstones/, /data/anr/, /data/system/dropbox/, and bugreport crash sectionsCommon Names
Description
System crash and error-reporting artifacts including native tombstone files, ANR (Application Not Responding) traces, and DropBoxManager entries written when apps, services, or the system encounter crashes or severe faults.
Forensic Value
These artifacts are essential for detecting failed exploitation, unstable malware, and repeated application failures that can signal surveillance tooling or code injection gone wrong. Tombstones preserve register state, backtraces, and loaded libraries for native crashes; ANR traces show what the main thread and binder threads were doing when an app hung; and DropBox entries can preserve higher-level system crash context that is no longer visible in logcat. Together they often provide the clearest evidence that a suspicious app or exploit path was actively executing on the device.
Tools Required
Collection Commands
adb
adb pull /data/tombstones/ /forensics/tombstones/ 2>/dev/null && adb pull /data/anr/ /forensics/anr/ 2>/dev/null && adb pull /data/system/dropbox/ /forensics/dropbox/ 2>/dev/null
adb
adb bugreport /forensics/bugreport.zip
ADB
adb shell dumpsys activity anr > anr_state.txt
Collection Constraints
- •Availability depends on Android version, OEM build, encryption state, privilege level, and whether the collection was logical, rooted, or full-filesystem. OEM-specific builds may move or rename stores.
- •Mobile application data may be partially cached, excluded from backup, or pruned by the OS. Validate against the extraction type before treating gaps as meaningful.
- •Crash artifacts are volatile and may be rotated quickly on heavily used devices. File names and retention policies vary by OEM, and some locations require elevated access for collection.