Ip_leandro_set5.rar -

: If a malicious file was found, describe its location and how it maintained persistence (e.g., a Registry Run key).

Document the tools and steps used to process the "Set 5" data: : How the RAR was extracted and verified. IP_Leandro_Set5.rar

: Briefly state the purpose of the analysis (e.g., investigating a simulated data breach). : If a malicious file was found, describe

: List the files inside the archive (e.g., .E01 disk images, .ad1 logical images, or memory dumps). 3. Analysis Methodology .E01 disk images