Nicholas, CharlesGoenka, Siddhant2021-01-292021-01-292019-01-0112016http://hdl.handle.net/11603/20915We describe the problems addressed by various malware or malicious applications on the Microsoft Windows Operating System. Our work focuses on automatic the dynamic malware analysis by intercepting Windows system calls that help to cover a larger range of malware, including the newly evolved fileless variants. Intercepting system calls allow us to monitor malicious activities in a way that malicious behavior can be easily identified without the manual efforts of disassembling binaries. The results will show how our work can help in automating the process of API Hooking for the open source community to detect Byzantine behaviors, rather than focusing on improving the detection mechanism.application:pdfAPI hookingFileless MalwareMalwareMalware Analysissystem callsWindowsAutomate the tracing of Windows System Calls to identify malicious activitiesText