30
/
AIzaSyAYiBZKx7MnpbEhh9jyipgxe19OcubqV5w
April 1, 2024
Public Timelines
FAQ
Menu
Public Timelines
FAQ
Public Timelines
FAQ
For education
For educational institutions
For teachers
For students
Open cabinet
For educational institutions
For teachers
For students
Open cabinet
Create
Close
Create a timeline
Public timelines
Library
FAQ
Download
Export
Duplicate
Premium
Embed
forensics timeline
Updated 17 Dec 2022
0
0
177
Share
Contributors
Created by
M. F.
List of Edits
Attachments
Comments
Events
First impersonated email
Second impersonated email
Ransom email
Victoria downloads cert.exe
cert.exe deleted from server
cert.exe uploaded to server
CnC sends logout request
Attacker logout request & login as j.doe
Victoria launches cert.exe
whoami
reverse shell
J.Doe arrives at workstation
FTK imager installed
RAM dumped
Last log with previous cert.exe
Periods
CnC server requests to Nextcloud
ping requests
Disk imaging
Victoria's file encrypted
About & Feedback
Terms
Privacy
Library
2024
©
Time.Graphics
Support 24/7
Cabinet
Get premium
Donate
The service accepts bank transfer (ACH, Wire) or cards (Visa, MasterCard, etc). Processed by Stripe.
Secured with SSL
Excellent (Trustpilot Reviews)
Based on 115+ reviews
Write your own review on
Trustpilot.com
Comments