[ π™’π™žπ™£π™œπ™˜π™€π™™π™š π™₯π™–π™§π™©π™£π™šπ™§ ] α΅’αΆ αΆ β±αΆœβ±α΅ƒΛ‘ inc. COMPANY
10.2K subscribers
705 photos
429 videos
294 files
1.75K links
No.1 Security Learning Platform in Telugu states wingcodepartner inc. COMPANY
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Top at all field courses Top 10+ courses
Market price 13,000/- +
My channel just 1499/-
Courses list :
βœ…Prompt engineering
10,000+ prompts
βœ…Doxing(AGS)
Detailed info
βœ…The Ultimate Dark Web, Anonymity, Privacy & Security
βœ…Remote Desktop protocol
Create unlimited RDP's
βœ… Adavanced Ethical Hacking + Cybersecurity course
βœ…Adobe Photoshop CC for Absolute beginner to Advanced
30+ mojor skills in editing with resources
βœ…How to earn money easily with automations and ai agents
βœ…19 Generative AI real time projects end to end
βœ…Road to life (Reality)
Carrier guidance for successful life
βœ…Bootcamp on Frontend developer
βœ…Ai technology in daily software life
Unlimited tricks and tools

Contact @oyee11 @Arjun_vasudeva
❀2❀‍πŸ”₯1
🧭 Upcoming Cyber Forensics Session – Advanced Data Handling

Dear Participants,
Please be prepared for today’s Cyber Forensics session, where we’ll explore deep-level data interpretation methods and specialized encoding frameworks essential for digital investigations.

πŸ•€ Time: 9:30 PM (Sharp)
πŸ“ People: Private Forensics Channel

This is a high-value session packed with practical knowledgeβ€”ensure your timely presence.

πŸ” Consistency builds expertise. See you in class!
πŸ”₯5❀4πŸ‘1
On end off my birthday
I'm giving this last update
If your serious about you future and carrier it will help a lot result will make you a perfect

The course I have mentioned above is still have same price with discount 1499 only
And registration closes 25th June 2025

Interested people can join fast
After date it will closes
only time left 23hrs
For registration contact @arjun_vasudeva @oyee11
❀2
Task :

Your SOC team receives a report from an employee that their system is showing a ransom note demanding 2 BTC. The system is Windows 10 Pro. You are provided with the following forensic artifacts:

1. A memory dump of the affected system.


2. A copy of the AppData folder from the infected user’s profile.


3. The System.evtx and Security.evtx log files.


4. A suspicious binary named helperservice.exe found running at the time of infection.



Your task is to:

1. Identify how the ransomware initially entered the system (initial infection vector).


2. Reverse engineer helperservice.exe and determine:

Whether it is responsible for encryption.

The encryption method used.

Any weakness or hardcoded keys present.



3. Analyze the memory dump and logs to reconstruct a full timeline of the attack.


4. Extract the ransomware note from memory or disk and analyze if there is any clue to decrypt the files.


5. Identify if lateral movement occurred on the network.
❀3πŸ₯°2