[Insert Source, e.g., "Company Intranet," "CTF Platform Name," "Email Attachment"] 2. Extraction & Integrity

[Note if the file was password-protected or used encrypted headers ( -hp switch)]. 3. Contents & Findings

Details on how the file was handled and its internal structure.

(List the files found inside the archive here)