# Inziption - 200 One of our interns for ACME Hacking Inc. is suspected of emailing himself some sensitive company information, but we need to verify this before taking action against him. Attached is the suspect file along with some notes we found on his Desktop. We already had some of our junior operators take a crack at this by hand, but it is taking them too long since there are several nested layers of password protected file compression. Can you do us a favor and write something to automate the decompression of this file and see what information, if any, he was exfiltrating?