6.1.3. Upload to www.threatexpert.com to get High Level overview |
6.1.3.1. Does the executable modify critical files? |
6.1.3.1.1. YES | |
6.1.3.1.2. NO |
6.1.3.2. Does the executable modify common load points in the |
6.1.3.3. Does the executable open communications to the internet? and |
6.1.3.4. Does packet capture reveal specific file names or unique |