THE MALICIOUS INTELLIGENCE FROM BEHIND THE INSTRUCTION CODES AND THE ARTIFACTS IN MEMORY Classical Windows attack vector ➡ Exploiting Registry keys, hijacking autorun properties of the system even without user clicking on “autostart”. ➡ Exploiting DLL injection ➡ Exploiting services ➡ Exploiting .exe (lsass.exe, explorer.exe) ➡ Exploiting ATOMS TABLES ➡ Creating names using ASLR Windows Graphical User Interface ➡ The Windows system has memory usage control features handled through a process. This methodological approach is called synchronization object . ➡ When a new process is created (threads and handles) the allocation of memory property of a mutant object is negotiated to give access to avail...