Suggest security improvements based on the forensic evidence.
: (You must calculate these using tools like CertUtil -hashfile or sha256sum ) MD5 : [Insert MD5] SHA-256 : [Insert SHA-256] IP_Leandro_Set5.rar
: Highlight the most critical evidence found (e.g., specific malware, exfiltrated files, or unauthorized logins). 2. Evidence Information File Name : IP_Leandro_Set5.rar Suggest security improvements based on the forensic evidence