All
I've had great success using recipes out of the Malware Analyst Cookbook. I
particularly like the recipe involving mutantscandb and compare the mutexes in a binary
under investigation with those in my sqlite3 database.
Can anyone tell me how to trace the observed suspicious mutexes in a mutantscandb scan
with the process/binary that owns that mutex?
Jim
~~~~~~~~~~~~~~~~~~~~~~
ACK and you shall receive