Hey Everyone, We have completed all the Basic and Theoretical stuffs that we use in our practical session, today we will be analyzing a piece of malware with various techniques by monitoring registries, file systems and memory for potential risks and threats. For those who don’t have any idea what’s going on here, i would […]