Advertisement
Guest User

Untitled

a guest
Jul 30th, 2016
73
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.61 KB | None | 0 0
  1. Anti virus scanners determine the behavior of a process during runtime, what most of you morons fail to understand is the architecture of the virtual machine.
  2.  
  3. There's a huge discrepancy between x86 and x64 in terms of kernel security and detection measures.
  4.  
  5. Ever wonder why you scan a file and it's detected by a certain anti virus, but during execution on your PC it's undetected? Well that's because on x64 there is a security mechanism referred to as KPP / Patch Guard which doesn't allow kernel memory to be patched, unless you were to disable PG, load before PG, or any other means of manipulating the PG timer. Anti viruses therefore detect less viruses on x64, and because of this they result to usermode hooks and documented methods, such as filtering process handles, and intercepting process creation. Anti virus scanners don't just scan for signatures, this isn't 1990
  6.  
  7. Please stop saying "Scantime" vs "runtime" You're all a bunch of clueless fucking retards.
  8.  
  9. Go scan a 64 bit application, it'll be FUD.
  10.  
  11. nodistribute.com/result/vp7CrMAYlWFQHaq8NmP6TO (The VM's don't support 64 bit)
  12. virustotal.com/en/file/e609fddf513561c74906463733041d969ac6ed9f852c755c3da8d1204e9a11e5/analysis/1469917859/
  13.  
  14. The process scanned above writes to the registry, and hooks all processes.
  15. Determining if the process is detected on my system from these scan results is absurd, these scan results provide no evidence, the scan results are inconclusive.
  16.  
  17. tldr; Anti viruses operate differently on different architectures and operating systems, deeming a "crypter" scantime only is retarded.
  18.  
  19. You will rarely see truly FUD malware today.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement