Skip navigation.
Home

Heuristics scanning

Hi , i want to know more about the heuristics scanning techniques, i know that one should detect if the iCode section is set to writable flag , Or analyzing some suspicious imported APIs .

what's more than that , is there any other techniques ?

thank you

You should give a try to

You should give a try to Buster Sandbox Analyzer.

http://sandboxie.com/phpbb/viewtopic.php?t=6557

I tried it before , what i

I tried it before , what i want is getting more info about heuristics scanning techniques .

you can visit eset and see

you can visit eset and see "understanding heuristics.pdf"

and its much more complicated than what u have expressed.

hp