I am curious to know how "ring 0" anti-cheats are able to implement detecting potential Dll injections and memory access through monitoring calls such as VirtualA