Dissecting Windows Malware Series – Unpacking Malware, From Theory To Implementation – Part 7

In the previous article https://8ksec.io/dissecting-windows-malware-series-explaining-rootkits-practical-examples-investigation-methods-part-6/ we did a deep dive on Rootkits.

We saw common ways Rootkits are implemented in order for malware to achieve one of their main objectives – Evasio