Analyzing a suspicious file for potential threats and uncover hidden indicators of compromise. Analyzing techniques used: Static analysis, Dynamic analysis/ Behavioral Analysis, Code analysis, Memory analysis/ Memory forensics etc. Malware Analysis