Does it add itself to "Run" keys for persistence? 5. Conclusion/Classification Based on the findings, classify the archive:

Does it attempt to contact a Command & Control (C2) server?

If you can share or provide a SHA-256 hash , I can help you dig into its specific history or functionality.

Creation dates and software versions used to pack the archive.