Adam, a forensic investigator, is investigating an attack on the Microsoft Exchange Server of a large organization. As the first step of the investigation, he examined the PRIV.EDB file and found the source from where the mail originated and the name of the file that disappeared upon execution. Now, he wants to examine the MIME stream content. Which of the following files is he going to examine?
a. PRIV.EDBb. PUB.EDBc. PRIV.STMd. gwcheck.db