Observed system changes (registry keys, file creation) using Procmon .

Checked for Alternative Data Streams (ADS) if analyzed on a Windows environment.

Used strings to look for human-readable indicators, URLs, or potential flags within extracted binaries.

The artifact is a RAR archive suspected of containing sensitive data or malicious code. The goal is to extract its contents and analyze any embedded flags or behaviors. 2. Initial Triage & Metadata