Date Added: Apr 2012
The paper will be a detailed introduction of malware handling for security professionals. This paper will also serve as a guideline for the reader to perform malware handling by providing definitions, tools to use, and real world demonstration to the reader with enough information to successfully perform malware incident handling. It will spotlight on step by step process, including suggestions on what tool to employ, what to look for and what to do with the disbelieving file. In the authors' experiment, they present the findings about the state of services, registry keys, security updates, and virus total results.