Generated on: 2025-04-01 14:30:26
Hardware: Hardware Overview: Model Name: MacBook Pro Model Identifier: MacBookPro16,1 Processor Name: 8-Core Intel Core i9 Processor Speed: 2.3 GHz Number of Processors: 1 Total Number of Cores: 8 L2 Cache (per Core): 256 KB L3 Cache: 16 MB Hyper-Threading Technology: Enabled Memory: 32 GB System Firmware Version: 1715.60.5.0.0 (iBridge: 19.16.10072.0.0,0) OS Loader Version: 540.120.3~22 Serial Number (system): C02ZK07HMD6N Hardware UUID: F48698B5-5C0E-5BAE-B3DF-275F58FB9D7B Provisioning UDID: F48698B5-5C0E-5BAE-B3DF-275F58FB9D7B Activation Lock Status: Enabled
ProductName: macOS ProductVersion: 14.3.1 BuildVersion: 23D60
Forensic-Mac-Pro
Acquisition performed by: forensic-admin
Tool version: macOS Forensic Acquisition Tool v1.1
Acquisition timestamp: 2025-04-01 14:30:26
Case Number: CASE-2025-0401
Examiner: John Smith
Subject: Executive Laptop Analysis
Chain of Custody: Direct acquisition from subject system
Collection started: 2025-04-01T14:15:42.325612
Collection completed: 2025-04-01T14:28:37.981453
Duration: 775.66 seconds
Artifacts collected: 89
Artifacts failed: 7
Category | Description | Collected | Failed |
---|---|---|---|
System Information | Basic system information | 6 | 0 |
File System | File system artifacts and metadata | 10 | 2 |
User Data | User-specific data and configurations | 38 | 3 |
System Security | Security-related artifacts | 12 | 1 |
Network | Network configurations and connections | 9 | 0 |
Running System | Currently running processes and services | 14 | 1 |
Collection Issues: Some artifacts could not be collected due to permission issues or files not present on the system. See detailed logs for more information.
Image File | Source | Size | SHA-256 Hash |
---|---|---|---|
disk0_20250401_143026.dd | /dev/disk0 | 500.28 GB | e7b834c239b4af7783d875e4a73c8f685a0f0b19c384248f97b7aeca7b535ce9 |
Verification: Image hash verified and acquisition completed successfully.
Basic system information
File system artifacts and metadata
User-specific data and configurations
Security-related artifacts
Network configurations and connections
Currently running processes and services
Note: Some file paths have been abbreviated for display purposes. Complete artifacts can be found in the evidence directory.
The following notable items were observed during initial analysis:
This is an automatically generated summary. Further analysis is recommended.