Skip to main content

Memory

IDDescriptionSignificance / Prevalence
BH12139Attaches debugger to another process on local or remote computer.
BH12140Attaches debugger to local or remote runspaces.
BH12306Does just-in-time compiling or code rewriting.
BH12307Does process injection into the Chrome executable.
BH12308Does process injection into the Chromium executable.
BH12309Does process injection into the Firefox executable.
BH12310Does process injection into the Internet Explorer executable.
BH12311Does process injection into the Netscape executable.
BH12312Does process injection into the Opera executable.
BH12313Does process injection into the Safari executable.
BH12314Does process injection into the Service Host Process executable.
BH12315Does process injection into the Windows Command Processor executable.
BH12316Does process injection into the Windows Explorer executable.
BH12350Executes shellcode within the current process.
BH12354Exports commands from another PowerShell session.
BH12367Imports commands from another PowerShell session.
BH12471Reads from other process' memory.
BH12821Writes to other process' memory.
BH13158Does process injection into the Windows Local Security Authority Subsystem Service executable.
BH13227Accesses information about virtual memory regions of the current process.
BH13228Accesses information about virtual memory regions of a process.
BH13229Reads data from the process's own memory through the /proc/self/mem pseudo-file.
BH13230Writes data to the process's own memory through the /proc/self/mem pseudo-file.
BH13231Reads data from other process' memory through the 'mem' pseudo-file.
BH13232Writes data to other process' memory through the 'mem' pseudo-file.
BH19106Enumerates active runspaces within a Windows PowerShell host process.
BH19284Enumerates stored command history.
BH20228Uses PowerSploit/Empire command to generate a full-memory minidump of a process.
BH20321Uses PowerSploit/Empire DLL injection command to inject a DLL into a process.
BH20322Uses PowerSploit/Empire injection command to reflectively load a PE file in the PowerShell process, or reflectively inject a DLL into a remote process.
BH20323Uses PowerSploit/Empire injection command which executes PowerShell commands from memory in a remote process.
BH20324Uses PowerSploit/Empire shellcode injection command to inject MSIL shellcode into a process.
BH20325Uses PowerSploit/Empire shellcode injection command to inject shellcode into a process.