{"id":81,"date":"2024-10-24T09:35:45","date_gmt":"2024-10-24T09:35:45","guid":{"rendered":"https:\/\/vis-malai.cs.universityofgalway.ie\/?page_id=81"},"modified":"2024-11-20T13:17:11","modified_gmt":"2024-11-20T13:17:11","slug":"malware-analysis","status":"publish","type":"page","link":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/","title":{"rendered":"Malware Analysis"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"81\" class=\"elementor elementor-81\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\">\n\t\t\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-42422c6b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42422c6b\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b15c07b\" data-id=\"5b15c07b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d13473 elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5d13473\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understanding Malware Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3eecf13 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3eecf13\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Malware analysis is the cornerstone of effective cybersecurity. By dissecting malicious software, we uncover behaviors, origins, and vulnerabilities, empowering organizations to stay one step ahead of evolving threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-28a7ce1a elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28a7ce1a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5b63150f\" data-id=\"5b63150f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55031c5e elementor-position-left animated-fast bdt-icon-type-icon elementor-vertical-align-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"55031c5e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tStatic Analysis\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p>Static analysis is a method of examining malicious software without executing it, focusing on the code, structure, and embedded resources. This process involves deconstructing binaries to uncover indicators of compromise, such as suspicious strings, APIs, or patterns, enabling early threat detection.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e020c65 elementor-position-left animated-fast bdt-icon-type-icon elementor-vertical-align-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"3e020c65\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tDynamic Analysis\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p>Dynamic analysis involves executing malware in a controlled environment, such as a sandbox, to observe its real-time behavior and impact. This method captures insights into how the malware interacts with the operating system, network, and other applications, revealing activities like file modifications, registry changes, and network communications.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-594bce3a\" data-id=\"594bce3a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2994d10 animated-fast elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2994d10\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"717\" height=\"1280\" src=\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp\" class=\"attachment-full size-full wp-image-629\" alt=\"malware analysis\" srcset=\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp 717w, https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis-168x300.webp 168w, https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis-574x1024.webp 574w, https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis-364x650.webp 364w\" sizes=\"(max-width: 717px) 100vw, 717px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3360fefd elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3360fefd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5859967f\" data-id=\"5859967f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2806745d animated-fast elementor-invisible elementor-widget elementor-widget-image\" data-id=\"2806745d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1280\" height=\"1024\" src=\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/behavioural-analysis.webp\" class=\"attachment-full size-full wp-image-630\" alt=\"behavioural analysis\" srcset=\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/behavioural-analysis.webp 1280w, https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/behavioural-analysis-300x240.webp 300w, https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/behavioural-analysis-1024x819.webp 1024w, https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/behavioural-analysis-768x614.webp 768w, https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/behavioural-analysis-650x520.webp 650w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-79e2f315\" data-id=\"79e2f315\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-452d3d70 elementor-position-left animated-fast bdt-icon-type-icon elementor-vertical-align-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"452d3d70\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tBehavioral Analysis\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p>Behavioral analysis focuses on examining the actions and patterns exhibited by malware during its execution to understand its intent and potential impact. Unlike static analysis, which looks at the code, or dynamic analysis, which observes runtime behaviors, behavioral analysis emphasizes identifying malicious activities, such as unauthorized file access, unusual network communication, or privilege escalation.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f0649c elementor-position-left animated-fast bdt-icon-type-icon elementor-vertical-align-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"6f0649c\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tHybrid Analysis\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p>Hybrid analysis combines the strengths of static and dynamic analysis to provide a comprehensive evaluation of malware. This approach integrates the in-depth code inspection of static analysis with the real-time behavior monitoring of dynamic analysis, offering a holistic view of malicious software.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3a20f378 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a20f378\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73407535\" data-id=\"73407535\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-205904f1 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"205904f1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">TOOL AND TECHNIQUES<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77cb358d animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"77cb358d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tools for Malware Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-section elementor-inner-section elementor-element elementor-element-1e92ecd4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e92ecd4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2ed9ffee\" data-id=\"2ed9ffee\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38f8cb73 animated-fast elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit bdt-icon-type-icon elementor-position-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"38f8cb73\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ti ti-stats-up\"><\/i>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tStatic Analysis Tools\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p><strong>IDA Pro<\/strong><\/p><p><strong>Ghidra<\/strong><\/p><p><strong>PEiD<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-indicator bdt-svg-style-1\">\n\t\t\t\t<svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 150 50\"><path d=\"M145.2,26.8c0.3,5.3,0.7,10.5,1.1,15.8c-10.5-10.1-19.1-22.4-31-30.9C104.7,4.1,91.9,0.9,79,1.4C48.2,2.5,22.3,22.7,0.4,42.5c-0.8,0.7,0.2,2,1.1,1.3c23.4-18.3,47.6-39.2,79-39.8c13.4-0.2,26,3.8,36.5,12.2c10,8.1,17.7,18.5,26.8,27.5C137,42,130.5,40,124,37.8c-1.1-0.4-1.7,1.2-0.6,1.7c7.8,3.4,15.9,5.9,24.2,7.9c0.1,0,0.1,0,0.2,0c0.1,0.1,0.2,0.2,0.2,0.2c1.3,1.2,2.9-1.1,1.6-2.2c-0.1-0.1-0.2-0.2-0.3-0.2c-0.4-6.3-0.8-12.6-1.4-18.9C147.7,24.6,145.1,25,145.2,26.8z\"\/><\/svg>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-3f2fafa\" data-id=\"3f2fafa\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5da8371d animated-fast elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit bdt-icon-type-icon elementor-position-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"5da8371d\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:200}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ti ti-pulse\"><\/i>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tDynamic Analysis Tools\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p><strong>Cuckoo Sandbox<\/strong><\/p><p><strong>Process Monitor (ProcMon)<\/strong><\/p><p><strong>Wireshark<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-indicator bdt-svg-style-2\">\n\t\t\t\t<svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 150 50\"><path d=\"M137,10.3c2.7,5.7,4.5,12.2,6.5,18.2c0.4,1.3-1,2.6-2.2,2.2c-6.7-2.3-13.5-4.5-20.3-6.8c-1.8-0.6-1.1-3.4,0.7-2.8c3.2,0.9,6.5,1.9,9.7,2.9c0-0.1-0.1-0.1-0.1-0.2c-3.7-6.4-13.1-18.6-20.2-7.5c-2.3,3.7-2.6,8.7-3.8,12.8c-1.5,5-4.3,9.8-10,10.3c-6.2,0.5-10.7-4.9-13.6-9.6c-2.6-4.4-4.6-9.3-6.8-13.9c-0.7-1.6-1.5-3.2-2.3-4.8c-2.8-4.2-6.4-4.2-8.5-4.1c-4.3,0.2-8.4,5.4-10.7,8.6c-6.2,8.6-9.8,41.1-27.6,32.9C12.2,41.2,6.5,16.6,7.9,1.1c0.1-1.2,1.9-1.2,1.9,0c-0.1,11.7,2.5,23.1,8.8,33c3.8,6.1,9.8,14,18.2,11c5.3-1.9,7.1-11.7,8.6-16.3c3.1-9.7,16.7-35.6,30.3-23c6.8,6.4,7.8,17.8,13.8,25c11.8,14.2,14.5-6.5,17.4-13.9c2.1-5.2,5.9-9.1,11.9-8.7c7.9,0.4,12.6,7.3,15.8,13.7c0.6,1.1-0.1,2.1-1,2.5c1.8,0.5,3.6,1.1,5.3,1.6c-1.9-4.8-3.8-9.6-5-14.5C133.4,9.7,136.2,8.4,137,10.3z\"\/><\/svg>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5099105c\" data-id=\"5099105c\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6277a7db animated-fast elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit bdt-icon-type-icon elementor-position-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"6277a7db\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ti ti-panel\"><\/i>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tBehavioral Analysis Tools\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p><strong>Splunk<\/strong><\/p><p><strong>Sysinternals Suite<\/strong><\/p><p><strong>FireEye Helix<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-indicator bdt-svg-style-3\">\n\t\t\t\t<svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 150 50\"><path d=\"M4.3,12.3c2.9,6.7,5.6,14.2,11.3,19.2c9.3,8.1,20.4,2,29-3.8c12.7-8.5,23.8-20,39-24c26.5-7.1,55,9.2,61.4,35.8c0.7-3.1,1.2-6.2,1.7-9.4c0.2-1.2,2-0.9,2.1,0.3c0.2,5.5-1.1,11.2-2.4,16.5c-0.3,1.2-2,1.7-2.8,0.7c-4-4.8-8.4-9.2-12.4-14c-1.4-1.7,0.7-3.7,2.4-2.4c3.6,2.8,6.8,6.5,9.7,10.3c-5.2-16.6-17.2-30.3-34.7-34.5c-19-4.6-34.8,3.5-49.5,14.7C49.1,29.1,35.7,41.7,22.2,39C10.7,36.7,4.3,23.8,1.4,13.5C0.9,11.9,3.5,10.6,4.3,12.3z\"\/><\/svg>\t\t\t<\/div>\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2bb4315f\" data-id=\"2bb4315f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23507c9b animated-fast elementor-widget-tablet__width-initial elementor-widget-mobile__width-inherit bdt-icon-type-icon elementor-position-top bdt-icon-effect-none elementor-invisible elementor-widget elementor-widget-bdt-advanced-icon-box\" data-id=\"23507c9b\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"bdt-advanced-icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-icon\">\n\t\t\t\t<span class=\"bdt-ep-advanced-icon-box-icon-wrap\">\n\n\n\t\t\t\t\t\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"ti ti-reload\"><\/i>\n\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\n\t\t\t<div class=\"bdt-ep-advanced-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<h4 class=\"bdt-ep-advanced-icon-box-title ep-title-\">\n\t\t\t\t<span >\n\t\t\t\t\tHybrid Analysis Tools\t\t\t\t<\/span>\n\t\t\t<\/h4>\n\t\t\n\n\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"bdt-ep-advanced-icon-box-description\">\n\t\t\t\t\t\t<p><strong>Hybrid Analysis<\/strong><\/p><p><strong>Intezer Analyze<\/strong><\/p><p><strong>VxStream Sandbox<\/strong><\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\n\t\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Understanding Malware Analysis Malware analysis is the cornerstone of effective cybersecurity. By dissecting malicious software, we uncover behaviors, origins, and vulnerabilities, empowering [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-81","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Analysis - PLVME-AI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Analysis - PLVME-AI\" \/>\n<meta property=\"og:description\" content=\"Understanding Malware Analysis Malware analysis is the cornerstone of effective cybersecurity. By dissecting malicious software, we uncover behaviors, origins, and vulnerabilities, empowering [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"PLVME-AI\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-20T13:17:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"717\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/\",\"url\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/\",\"name\":\"Malware Analysis - PLVME-AI\",\"isPartOf\":{\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp\",\"datePublished\":\"2024-10-24T09:35:45+00:00\",\"dateModified\":\"2024-11-20T13:17:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#primaryimage\",\"url\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp\",\"contentUrl\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp\",\"width\":717,\"height\":1280,\"caption\":\"malware analysis\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/#website\",\"url\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/\",\"name\":\"PLVME-AI\",\"description\":\"Unveiling the Future of Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/#organization\",\"name\":\"PLVME-AI\",\"url\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2022\/03\/Logo.png\",\"contentUrl\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2022\/03\/Logo.png\",\"width\":381,\"height\":318,\"caption\":\"PLVME-AI\"},\"image\":{\"@id\":\"https:\/\/vis-malai.cs.universityofgalway.ie\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Analysis - PLVME-AI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Malware Analysis - PLVME-AI","og_description":"Understanding Malware Analysis Malware analysis is the cornerstone of effective cybersecurity. By dissecting malicious software, we uncover behaviors, origins, and vulnerabilities, empowering [&hellip;]","og_url":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/","og_site_name":"PLVME-AI","article_modified_time":"2024-11-20T13:17:11+00:00","og_image":[{"width":717,"height":1280,"url":"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/","url":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/","name":"Malware Analysis - PLVME-AI","isPartOf":{"@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#primaryimage"},"image":{"@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp","datePublished":"2024-10-24T09:35:45+00:00","dateModified":"2024-11-20T13:17:11+00:00","breadcrumb":{"@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#primaryimage","url":"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp","contentUrl":"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2024\/11\/malware-analysis.webp","width":717,"height":1280,"caption":"malware analysis"},{"@type":"BreadcrumbList","@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/malware-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vis-malai.cs.universityofgalway.ie\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis"}]},{"@type":"WebSite","@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/#website","url":"https:\/\/vis-malai.cs.universityofgalway.ie\/","name":"PLVME-AI","description":"Unveiling the Future of Cybersecurity","publisher":{"@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vis-malai.cs.universityofgalway.ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/#organization","name":"PLVME-AI","url":"https:\/\/vis-malai.cs.universityofgalway.ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/#\/schema\/logo\/image\/","url":"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2022\/03\/Logo.png","contentUrl":"https:\/\/vis-malai.cs.universityofgalway.ie\/wp-content\/uploads\/2022\/03\/Logo.png","width":381,"height":318,"caption":"PLVME-AI"},"image":{"@id":"https:\/\/vis-malai.cs.universityofgalway.ie\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/pages\/81"}],"collection":[{"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":22,"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/pages\/81\/revisions"}],"predecessor-version":[{"id":667,"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/pages\/81\/revisions\/667"}],"wp:attachment":[{"href":"https:\/\/vis-malai.cs.universityofgalway.ie\/index.php\/wp-json\/wp\/v2\/media?parent=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}