Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Practice Log 1A
#1
Practice Log 1A
PM a professor for your Student Access Key.

Analyzing HijackThis logs is all about using the resources you have at hand. Google is your best tool. As you know, a HijackThis log consists of two main sections: a running process list and a system analysis, which comprises of several sections. One has to be very keen to notice differences between the legitimate and malicious processes.

Let's see how well you can use your resources.


Attached Files
.zip   PL1A.zip (Size: 812 bytes / Downloads: 57)


Possibly Related Threads…
Thread Author Replies Views Last Post
  (TUT) A Clean Log --([-S7N-])-- 0 1,434 10-17-2010, 02:34 AM
Last Post: --([-S7N-])--
  (TUT) How to research the registry entries in a HJT log. --([-S7N-])-- 0 1,382 10-17-2010, 02:11 AM
Last Post: --([-S7N-])--
  Practice Log 9B --([-S7N-])-- 0 918 10-17-2010, 12:23 AM
Last Post: --([-S7N-])--
  Practice Log 9A --([-S7N-])-- 0 842 10-17-2010, 12:22 AM
Last Post: --([-S7N-])--
  Practice Log 8D --([-S7N-])-- 0 805 10-17-2010, 12:21 AM
Last Post: --([-S7N-])--

Forum Jump:


Users browsing this thread: 1 Guest(s)