Otherwise process images
TCP data can be split out into sessions by IP address and searched for identifying information
User IDs and passwords can be derived from proxy authentication information
MAC addresses associated with Word files can be sought and presented
Other plug-in analysis can be provided