Frontpage
Back
Navigation
Figure 6
«
Previous
|
Malware Analysis
|
Next
»
Figure 6: Using the Redline
Strings
output to look for additional evidence of malware.