Blog >> iOS MeWe

iOS MeWe

27/03/2026 Friday

iOS MeWe artifacts are used to present account, communication, and profile data that are maintained by the MeWe application on the device. Information related to account configuration, chat messages, contacts, cookies, draft messages, posts, and user profiles is stored within the application’s sandbox and is exposed through these artifacts in a structured form. Across this artifact set, values such as activity timestamps, user and post identifiers, profile details, message content, cookie metadata, contact relationships, and account-related settings are recorded. In this way, the use of the MeWe application on the device can be examined through a combination of account, messaging, social, and application-state records.

Digital Forensics Value of iOS MeWe


The digital forensics value of iOS MeWe artifacts is derived from the way account activity, social interactions, and application-state data are preserved by the application. Account information can be used to assess login state, subscription status, locale settings, device tokens, and recent activity. Chat messages, draft messages, and posts can be used to reconstruct communication and content-sharing activity, while contact and user records can be used to associate identifiers with profile names, usernames, and relationship data. Cookie records can be used to show session-related information and validity periods. When these artifacts are correlated with one another, timelines of account use, communication, profile interaction, posting behavior, and application access can be supported or challenged with greater confidence.

Location of iOS MeWe Artifacts


For this artifact set, MeWe data is obtained from files stored inside the application’s sandbox container on the device. The exact application container directory is assigned dynamically by iOS and is represented by a UUID-style value. The data exists in these paths:

/private/var/mobile/Containers/Data/Application/<MeWe_UUID>/Library/Preferences/com.mewe.plist
/private/var/mobile/Containers/Data/Application/<MeWe_UUID>/Documents/sgrouplesdb.sqlite
/private/var/mobile/Containers/Data/Application/<MeWe_UUID>/Library/Cookies/Cookies.binarycookies


Analyzing iOS MeWe Artifacts with ArtiFast

This section will discuss how to use ArtiFast to extract iOS MeWe artifacts from iOS devices’ files and what kind of digital forensics insights we can gain from the artifacts.

After you have created your case and added evidence for the investigation, at the Artifact Selection phase, you can select iOS MeWe artifact parsers:






Once ArtiFast parsers plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of iOS MeWe artifacts in ArtiFast.

iOS MeWe – Account Information

iOS MeWe – Chat Messages

iOS MeWe – Contact

iOS MeWe – Cookies

iOS MeWe – Draft Messages

iOS MeWe – Posts

iOS MeWe – Users



For more information or suggestions please contact: ali.tora@forensafe.com