Method and system for detecting non-entity file malicious code
A malicious code, intangible technology, applied in the field of information security, can solve the problem of ineffective identification of intangible file malicious code, etc., and achieve the effect of solving the problem of ineffective detection of intangible file malicious code
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The present invention provides an embodiment of a method and a system for detecting malicious code in an insubstantial file, in order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above objects, features and the present invention better. The advantages can be more obvious and easy to understand, and the technical solutions in the present invention are described in further detail below in conjunction with the accompanying drawings:
[0028] The present invention first provides Embodiment 1 of a method for detecting malicious codes without physical files, such as figure 1 shown, including:
[0029] S101: Traverse the running processes and modules in the system;
[0030] The module is a DLL dynamic link library file, the DLL file is placed in the system, and when a certain program is executed, the corresponding DLL file will be called.
[0031] S102: Obtain the paths and file n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


