Evidence that the user "Szymcio" used unauthorized tools like mimikatz or netscan .
If "Szymcio" refers to a specific user profile in a disk image, the password is often a variation of their username or a string found in their Browser History or Sticky Notes . Phase 3: Payload Analysis
Evidence of which applications were executed on the victim's machine shortly before the archive was created. Common Findings
To update/upgrade your existing version of WizTree, simply download and run the installer at the top of this page - you don't need to uninstall the older version first. If you're using the portable version, download the portable zip file above and unzip over your old WizTree files.
Evidence that the user "Szymcio" used unauthorized tools like mimikatz or netscan .
If "Szymcio" refers to a specific user profile in a disk image, the password is often a variation of their username or a string found in their Browser History or Sticky Notes . Phase 3: Payload Analysis
Evidence of which applications were executed on the victim's machine shortly before the archive was created. Common Findings