GET /api/techniques/10/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 10,
"key": "detecting-virtual-environment-process",
"unprotect_id": "U1334,B0009.004",
"name": "Detecting Virtual Environment Process",
"description": "Process related to Virtualbox can be detected by malware by query the process list.\r\n\r\nThe VMware Tools use processes like VMwareServices.exe or VMwareTray.exe, to perform actions on the virtual environment. A malware can list the process and searches for the VMware string. Process: VMwareService.exe, VMwareTray.exe, TPAutoConnSvc.exe, VMtoolsd.exe, VMwareuser.exe.",
"windows": "",
"linux": "",
"macos": "",
"resources": "https://securingtomorrow.mcafee.com/mcafee-labs/stopping-malware-fake-virtual-machine/",
"creation_date": "2019-03-11T07:57:29Z",
"tags": "",
"modification_date": "2023-10-04T10:43:08.365000Z",
"category": [
1
],
"rules": [
17
],
"attachments": [],
"featured_api": [],
"contributors": []
}