![]() ![]() "ResidentEvil4UltimateItemModifierv1.3.zip.exe" touched file "C:\Windows\Microsoft.NET\Framework\v7\clr.dll" ![]() "ResidentEvil4UltimateItemModifierv1.3.zip.exe" touched file "C:\Windows\Microsoft.NET\Framework\v\clr.dll" "ResidentEvil4UltimateItemModifierv1.3.zip.exe" touched file "C:\Windows\Microsoft.NET\Framework\v\mscorwks.dll" "ResidentEvil4UltimateItemModifierv1.3.zip.exe" touched file "%WINDIR%\Microsoft.NET\Framework\v\clr.dll" Reads information about supported languagesĪdversaries may attempt to get information about running processes on a system.Īdversaries may attempt to gather information about attached peripheral devices and components connected to a computer system. Software packing is a method of compressing or encrypting an executable.Īdversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. Process injection is a method of executing arbitrary code in the address space of a separate live process.Ĭontains ability to write to a remote process Installs hooks/patches the running process Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Opens the Kernel Security Device Driver (KsecDD) of Windows ![]() Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |