Keywords: encase, SANS, ftk, brute force, cyber, incident, response, breach, investigation, analysis, log, endpoint, detection, remediation, ransomware, dfir, malware, network, host, live box, dead box, host based, end point, digital forensics, security, RCA, Root cause analysis, forensics, DFIR, Autopsy, Xplico, SIFT, Investigate, engineering, malicious, app store, google, google play, mobile app, java, kotlin, ative,, reverse, reverse engineering. This process is intended to lead to the detection of a code functionality that represents behavior types that threaten the personal security of users of applications available on an apps store platform.