Detecting Changes to System Configurations
In this lab, you have been assigned to look at a suspicious file on a machine that has been set aside just for malicious software analysis. You will be tasked with (1) Running Regshot, TCPView, ListDLLs, Process Explorer and Process Monitor to create a system baseline and (2) Executing the suspicious file to determine if it is malicious or not.
Time
45 minutes
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this lab, you have been assigned to look at a suspicious file on a machine that has been set aside just for malicious software analysis. You will be tasked with (1) Running Regshot, TCPView, ListDLLs, Process Explorer and Process Monitor to create a system baseline and (2) Executing the suspicious file to determine if it is malicious or not.
Learning Partner