⊹˚. Employed Threat Intel Researcher
♡‧₊˚ SynthV-P-wannabe
🎨: @jamama666.bsky.social / @MomoiroKohi / @justNovaj
🖌️: #artsyaz
🐦: x.com/azakasekai_
https://links.azaka.fun
The code then takes the path of the executable and then concat it with crashhandler.dll and loads it. This became an unintentional DLL sideloading case as clearly it did not intend to load from the current executable path but instead wherever tier0_s is located.
The code then takes the path of the executable and then concat it with crashhandler.dll and loads it. This became an unintentional DLL sideloading case as clearly it did not intend to load from the current executable path but instead wherever tier0_s is located.
Experimenting with different schedule hours this week, and I'll be away this weekend so the REWorkshop session will be moved early to Thursday!
Experimenting with different schedule hours this week, and I'll be away this weekend so the REWorkshop session will be moved early to Thursday!