Investigation Scenario π
A user reports their hard drive is full, but they don't know why. While investigating, you find a series of large, password-protected RAR files that the user knows nothing about.
What do you look for to investigate whether an incident occurred?
