Calculate the MD5 or SHA-256 hash of the .7z file before and after extraction to ensure the evidence hasn't been tampered with. :
: Prefetch files or Shellbags that show which programs the "suspect" executed.
Use tools like file (Linux) or to identify the extracted file type (e.g., a .raw memory dump or a .vmdk virtual disk). Artifact Extraction :