SilentMoonwalk: PoC Implementation of a fully dynamic call stack spoofer

dynamic call stack spoofer
Figure 2: Windows 10 - Legit, unwoundable call stack whereby the EXE module was completely removed (calling 4 parameters function MessageBoxA)