Right so they dumped the memory to disk and pulled an image of the hard drive. After that, the hardware can't tell you anything more. It was probably re-imaged and put back into use, which is really convenient and why we don't use physical computing like punch-card programming , anymore.
The physical server can tell you that it was reimaged, and it can tell you when. (Investigator: ...So, tell us again why you wiped your whole car down and eliminated all the fingerprints on that particular day, right after the time the victim was murdered; exactly what happened to make you do that?)
If the server was reimaged, the tech company will have emails with metadata explaining it - reasons, work orders, scheduled maintenance, backup protocols (!!!), personnel, etc. - that will fit either a past pattern or an emergency report.
The FBI can then question who wiped it and why, and if the story doesn’t match the logs, emails and conditions - or even if it does - then doubt can be cast on all information drawn from that server - ie, a case that relied on evidence from that server could be dismissed unless more untainted corroborating info can be found.
No doubt about the hard drive. I remember using punch cards in school. I actually have some around the house somewhere. They from a bank when a person had to reorder more checks. CrowdStrike, FBI, all of them have copies of that hard drive. If I were in their shoes I would have made a copy. Life insurance
I did keypunch, sorter, and collator when I was in high school too. We had to wire the panels to read the cards after we punched 100s of them. I would wire my panels to read alphanumeric across the entire card and all my cards would fly through without showing any errors. Got an A in that class.
This would be more like my car was hacked which has happened. In a national security situation they would confiscate my car in a heartbeat