You are on page 1of 2

Laporan Hasil

1. Where did the user contract the malware from?


2. Malware file (is possible)?
3. What kind of calls to the internet does it make?
4. Does it try to self propagate throght the internal network?
5. Possible network traffic signatures?

You might also like