Identifying Code injection
Common uses:
Want to use win32Api to load a dynamic link library (DLL):
Reflective injection - not visible in ProcHacker:
Vol.py:
# look for indicators of PAGE_EXECUTE_READWRITE:
vol.py -f device.img wndows.malfind.Malfind --dump -o output-malfiles/
# Look for the loaded DLLs
vol.py -f device.img wndows.ldrmodule.LdrModulelook for:

Process hollowing:


Last updated