A forensic investigator encounters a suspicious executable on a compromised system, believed to be packed using a known program packer, and is password-protected. The investigator has knowledge of the tool used for packing and has the corresponding unpacking tool. What should be the next best course of action to examine the executable?
aqeel1506
4 months agoala76nl
4 months, 2 weeks agoElb
5 months, 2 weeks agoElb
5 months, 4 weeks agoElb
5 months, 4 weeks ago