GET /api/techniques/10/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 10,
    "key": "detecting-virtual-environment-process",
    "unprotect_id": "U1334,B0009.004",
    "name": "Detecting Virtual Environment Process",
    "description": "Process related to Virtualbox can be detected by malware by query the process list.\r\n\r\nThe VMware Tools use processes like VMwareServices.exe or VMwareTray.exe, to perform actions on the virtual environment. A malware can list the process and searches for the VMware string. Process: VMwareService.exe, VMwareTray.exe, TPAutoConnSvc.exe, VMtoolsd.exe, VMwareuser.exe.",
    "windows": "",
    "linux": "",
    "macos": "",
    "resources": "https://securingtomorrow.mcafee.com/mcafee-labs/stopping-malware-fake-virtual-machine/",
    "creation_date": "2019-03-11T07:57:29Z",
    "tags": "",
    "modification_date": "2023-10-04T10:43:08.365000Z",
    "category": [
        1
    ],
    "rules": [
        17
    ],
    "attachments": [],
    "featured_api": [],
    "contributors": []
}