This forensic report presents an investigation into suspected illegal drug activity within the M57.biz workstation. The investigation employed various digital forensic tools, including FTK Imager, OSForensics, and ProDiscover, to analyze seized files and identify potential evidence related to methamphetamine. The report details the use of these tools, outlining their functionalities and capabilities, such as creating forensic images, mounting images, searching for files, and creating timelines of events. The methodology involved comparing images from different time periods to identify changes and locate original evidence. The report provides an overview of file formats supported by FTK Imager, including AD, DD, and E01 files, along with descriptions of methamphetamine and the tools used. It also includes screenshots of the investigation process, answers to specific questions related to the case, and a comparison of the pros and cons of the forensic tools used. The conclusion summarizes the findings of the investigation, highlighting the absence of conclusive evidence of illegal drug activity based on the analysis of the provided data. The report emphasizes the importance of digital forensic tools in investigating cybercrimes.