If you are analyzing a digital artifact, here is the standard structure you should follow:
List embedded strings, imported functions, and metadata found without executing the file.
If applicable, describe the behavior observed in a sandbox (e.g., network calls, registry changes, or dropped files).
