Sometimes malware uses for example ror-13 to check process and file names. I suggest to eiter include popular process/file names to existing database with decoy library names "processes" "filesystem" or make a new database located at the same folder.
Sometimes malware uses for example ror-13 to check process and file names. I suggest to eiter include popular process/file names to existing database with decoy library names "processes" "filesystem" or make a new database located at the same folder.