Used Evasion Techniques
This chart counts the known evasion techniques used by the analyzed samples
Used Packers
understanding what is the most used packer might help the speed up the detection process.
Number of Malware implementing more then one VM evasion technicque
Top Used Anti-Debug Techniques
This chart counts the known techniques to evade debuggers
Total Usage of Anti Debug techniques
This table details the used anti debugger techniques
Number of Malware implementing more then one evasion tecnicque
Top Used Suspicious API
This chart counts the most used Suspicious API
Total Usage of Suspicious API
This table details the used Suspicious API

Powered by Marco Ramilli