Some processes are open to getting injected with arbitrary code, which will put new executable instructions into an
already running process to disguise what it is doing. This procedure determines which processes are vulnerable to
this type of attack.