Search Evasion Techniques
Names, Techniques, Definitions, Keywords
Search Result
1 item(s) found so far for this keyword.
Kill Process Anti-Monitoring
Malware can use various techniques to evade detection and disrupt the efforts of security professionals to analyze it. One such technique is to kill processes that are related to anti-virus software or monitoring tools.
For example, malware may target processes such as wireshark.exe, ida.exe, or procmon.exe, which are commonly used by security professionals to monitor and analyze running processes on …