Hello,
After changing a process to a less suspicious explorer process on the victims computer as described, is this persistant?
Does this change remain eg after a restart of the victim’s computer?
Thanks a lot for clarifying and helping me with this.
Hans
Hi!
No, that will just persists for the current session, there’s a lecture about persistence but you’ll need to migrate to a less suspicious process anyway.
Greetings!
Diego