There is malware that bypasses instant recovery software like ShadowDefender, Returnil, ShadowUSer etc.
I have few samples of such malware, some of these try to access disk directly. Can anybody test if these malware can bypass the direct disk access filter of CFP Defence Plus. Just PM me and I will send the files. Pls post ur replies here with screenshots.
u can send that to me, i will tell u what happens and if defense+ is able to block it.
i’ll post screenshots if i can, cause if i launch it and my sytem is ■■■■■■ immediatly, i could not make screenshots.
maybe u can up it to some place so i can get it. if u can up a rar passworded archive, just tell me.
or if u cant up it, i will pm u to tell u where to send me the thing. but no rar without a password please.
thanks i got the thing.
ah, kaspersky detected the all stuff…
hmm i need some alone HD, not sure my second partition will not be affected by those things.
got an idea, i will backup the second partition and place it on some external HD in case all went wrong
Can I get a confirmation here that the Rootkit sample in this collection is Denied low disk access by Comodo ? Thats the only one I really looked at. Is it this one that you said bypasses some IRS Aigle ? Unless there is a problem with Comodo D+ like you had with a botnet malware sample, Where it said system 32 file was blocked from modification but there actually was modification, Then D+ blocked Low lvl Disk access. Don’t have the screenshots but basically cs.exe called cmd.exe, then cacls.exe, which I allowed, but then I denied the LLDA When prompted. I have checked with various tools afterwards, and don’t see a problem but someone more knowledgable may see something I miss of course.
Guess you can’t say Robodogs bark is worse than bite. lol