Hey there,
the payload or malicious PE file should be on the fileytem here. Mostly it will be already fished away by AV, especially if it is malicious or suspicious enough :-)
In my case for testing purpose it is mimikatz being wiped away.
I was just wondering how malware can benefit from those techniques like process ghosting or transacted hollowing.........
Hey there,
the payload or malicious PE file should be on the fileytem here. Mostly it will be already fished away by AV, especially if it is malicious or suspicious enough :-)
In my case for testing purpose it is mimikatz being wiped away.
I was just wondering how malware can benefit from those techniques like process ghosting or transacted hollowing.........