Knowing if it contains network logs , code , or images will help me provide a more specific analysis. Reporting a Cyber Incident | CISA
List the internal directories and files found upon extraction.
Report the incident to the or through CISA's reporting portal .