One of the Holy Grails for malware authors is a perfect way to impersonate a legitimate process. That would allow them…