Jump to content

Veremo

Members
  • Posts

    25
  • Joined

  • Last visited

Posts posted by Veremo

  1. 5 hours ago, Hardq said:

    Furthermore, this requires analysis in a virtual machine, both static and dynamic analysis, and deobfuscation of the code. Otherwise, how are they going to identify the threat, given that several days have already passed and it seems that the sample sent to your email was not processed. 

    Wow, and how much are you going to pay for such service ?

  2. "The road to hell is paved with good intentions" :P

     

    Windows executable files have complicated format. If file does not follow this format (ie. was truncated, some parts overwritten) it can't run and is corrupted.

    Adding detection for corrupted files is useless. It causes increase of virus db without any gain. Bigger virus db means bigger RAM consumption, longer update, slower scanning.

×
×
  • Create New...