Explore how the payload generated by sRDI looks in the process memory (use Process Hacker and x64dbg) Play with sRDI project and see what else can be done with the payload (clearing header from memory, additional obfuscation). How does it change payload's memory footprint?