Jump to content

patdale

Members
  • Posts

    4
  • Joined

  • Last visited

About patdale

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    USA
  1. sha-1 hash is A346D6EDC022C6F667FFED233CB446E42EC2852B
  2. do you mind explaining why in the your piece of software begins deleting files labelled "suspicious" why is it suspicious? is there an actual signature match, behavioral heuristics or are you just yourself because it might be a packed PE?
  3. so how does it actually work? does eset actually apply any heuristics to the page before it is rendered or does it simply use a global blacklist
×
×
  • Create New...