Officer Report for D.R. 241122068
Page 41 of 196
Supplement Civilian Investigator S. Ballard #1131 Incident# 241122068 Date: 11/27/2024 Extraction
On 11/26/2024 with the assistance of Analyst J. Fooks(#) with the Arizona Department of Public Saftey Digital Forensic Unit, property #83706, a black Android Cricket Cellular phone's password pattern was recovered. The phone data was extracted using Cellebrite UFED version 7.71.0.1881. The data was analyzed using Cellebrite Physical Analyzer version 7.69.0.10. The following is a summary of the extraction
DEVICE INFO Chipset: MT6761V/WBB Advertising ID: 39806e58-fe40-4508-a560-b8e6c9f3b602 Android ID: al25e2324281746 Detected manufacturer: Cricket Detected model: SL112C Phone date/time: 11/26/2024 1:40:48 PM -07:00 Phone revision: 13 TPlA.220624.014 1729745379 IMEI: 354841720897148 Vendor: Coosea OS: 13 Security Patch Level: 2021-11-05
CONTENT DATA Calendar: 69 Instant Messages: 1591 Call Log: 500 Contacts: 17 Installed Application: 6
DATA FILES Archives: 6 Text: 101
Configurations: 1 Uncatergorized: 23 Databases: 1 Videos: 26 Images: 322
FINDINGS:
CALL LOG 1. a. b. c.
Timestamp: 11/21/2024 11:48:23 AM Duration: 00:03:42 Direction: Outgoing To: [ Timestamp: 11/22/2024 10:18:41 AM(UTC-7) Duration: 00:00:01 Direction: Outgoing To: [
2. a. b. c.
Timestamp: 11/22/2024 10:19:14 AM(UTC-7)
3.
04/03/25
Powered by FlippingBook