interesting video! from my understanding of the video, it appears that you've created a obfuscation tool that allows you to strip PID instances from taskman/tasklist allowing programs to run w/o trace. my next question is have you checked raw memory addresses for those running processes to see if those are completely wiped? my concern would be leaving behind info in RAM
interesting, but there has to be a trace of it somewhere, would it be possible to measure the ram usage of all processes and figure out where it is based on that?
interesting video! from my understanding of the video, it appears that you've created a obfuscation tool that allows you to strip PID instances from taskman/tasklist allowing programs to run w/o trace. my next question is have you checked raw memory addresses for those running processes to see if those are completely wiped? my concern would be leaving behind info in RAM
Yes, raw memory addresses for those running processes completely wiped tech is still WIP, you asked a nice problem.
interesting, but there has to be a trace of it somewhere, would it be possible to measure the ram usage of all processes and figure out where it is based on that?
yes, can be found in system threads.
Interesting... Does it also hide from WindowsAPI calls like Process32x?
Maybe some WindowsAPI calls not all.
amazing
i don't get it...
it means virus programs can't be find by using this technologies.