The program IceSword, which I have attached, is used to show invisible applications running, hidden files on the harddrive, hidden entries in the registry, and it can show a host of other things – message hooks, loaded drivers; it can kill absolutely any process running, unload DLLs, and so forth. It’s also a hidden application itself. Nothing else can kill it, and the only real way to stop it is to prevent it from running in the first place. Now I’ve heard there are some things that can prevent it from running (Sandbox might be one of them), and some things that can prevent it from terminating applications (ProcessGuard might be one of them), but I do not know this, and it’s not of my concern.
The problem is, Comodo Defense+ isn’t able to stop this program from running. It will alert you that IceSword is running, and IceSword is accessing this and that, but it can’t stop it. The only thing it did stop was IceSword from seeing SPI services (things like mswsock.dll). Otherwise, it sees all, kills all. And with that, I tested it and killed cmdagent.exe and cfp.exe. Now, I’ve done this before, but that was when I gave permission. This time I kept clicking block on everything Comodo warned me about, but since IceSword changes its process name every time it starts up, once it’s loaded, it’s impossible to stop.
I’ve attached the application to this post so no one has to go searching for it (it can be hard to find). I believe 1.20 is the same as 1.22 except 1.22 is translated into English (the buttons, anyway, the help file is still in Chinese).
Btw, some AVs may false detect this as a trojan. It is not. I even sent it in to the team at AVG and 30 minutes later they updated their definitions to ignore it.
Anyway, I think this is very important to be fixed (if possible) since, while IceSword -detects- rootkits, theoretically, a rootkit itself could do the same thing it does to bypass Comodo…
IceSword122en.zip can be downloaded from the following site: