Summary
Gathering leads is a critical step in the process of preparing to research antivirus software. In this chapter, we have demonstrated several tools from the Sysinternals suite as well as the Regshot utility. Using these, we can gather up leads to get ready for this research.
We recommend continuing to look for more tools to help locate additional leads. There are also other excellent dynamic malware analysis tools you can use.
In the next chapter, we will discuss our two antivirus bypass approaches, the fundamentals of the Windows operating system, the protection rings model, and more.