![]() ![]() URL: *vjo/aTube_Catcher.exe (AV positives: 1/71 scanned on 01:00:25) Reads the registry for installed applicationsįound malicious artifacts related to "13.226.23.163". Reads the Equation Editor Class Identifier (CLSID) Installs hooks/patches the running processĪdversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in ] and ].Īdversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. ![]() Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service Control Manager.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |