You need to know the metadata or origin of the file.

(e.g., extracting a password-protected file, analyzing a script inside, or finding a hidden message).

You’re looking for a report on what the contents do when executed.