Cybercrime investigations are becoming increasingly intricate, demanding a distinct methodology. Investigators must employ a combination of forensic procedures to follow perpetrators and locate stolen assets. This effort often involves analyzing vast amounts of information from several origins, i