Overview Integrations Release Notes Operational Guide Backend OPSWAT Filescan API Reference v1
Getting Started
Support
Knowledge Base
1.8.1
Search this version
Knowledge Base
Knowledge Base
Title
Message
Create new category
What is the title of your new category?
Edit page index title
What is the title of the page index?
Edit category
What is the new title of your category?
Edit link
What is the new title and URL of your link?
How good is the efficacy for in-the-wild malware?
Copy Markdown
Open in ChatGPT
Open in Claude
Currently, our in-the-wild efficacy for malicious office files ("maldocs") is 90%+ (and growing). This means, our sandbox engines achieve the same result as a full-blown virtualization based sandbox (including bypasses for anti-analysis, sleep tricks, environment checks) in a fraction of time. Besides emulators for VBA macros, we offer emulation of javascript, vbscript, powershell and more.
For PE support, OPSWAT Filescan implements generic unpackers and full binary analysis with automated code extraction & analysis using diassemblers and symbol annotation.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Last updated on
Was this page helpful?
Next to read:
What URL analysis capabilities are in Filescan?See the "Technical Datasheet" for a complete list of features: https://docs.opswat.com/filescan/datasheet/technical-datasheet
Discard Changes
Do you want to discard your current changes and overwrite with the template?
Archive Synced Block
Message
Create new Template
What is this template's title?
Delete Template
Message
