diff --git a/atomics/T1574.002/T1574.002.yaml b/atomics/T1574.002/T1574.002.yaml index 8a11e07f..aae2b6b6 100644 --- a/atomics/T1574.002/T1574.002.yaml +++ b/atomics/T1574.002/T1574.002.yaml @@ -34,6 +34,7 @@ atomic_tests: name: command_prompt - name: DLL Side-Loading using the dotnet startup hook environment variable + auto_generated_guid: d322cdd7-7d60-46e3-9111-648848da7c02 description: | Utilizing the dotnet_startup_hooks environment variable, this method allows for registering a global method in an assembly that will be executed whenever a .net core application is started. This unlocks a whole range of scenarios, from injecting a profiler to tweaking a static context in a given environment. [blog post](https://medium.com/criteo-engineering/c-have-some-fun-with-net-core-startup-hooks-498b9ad001e1) supported_platforms: diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index ad492a03..e6aec1b1 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -1122,3 +1122,4 @@ cc99e772-4e18-4f1f-b422-c5cdd1bfd7b7 c5bec457-43c9-4a18-9a24-fe151d8971b7 979356b9-b588-4e49-bba4-c35517c484f5 3c7094f8-71ec-4917-aeb8-a633d7ec4ef5 +d322cdd7-7d60-46e3-9111-648848da7c02