Debugging outputs from enterprise software.
Move the file to a secure, air-gapped sandbox for analysis. Do not extract it on a production machine.
If this report is for a security audit or a suspected breach, follow these steps:
No account yet?
Create an Account