A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?
Glacier88
8 months, 2 weeks agoKingamj
8 months, 3 weeks ago1edea48
9 months ago850bc48
7 months, 3 weeks ago3dk1
6 months agoa4e15bd
9 months ago