As you can see in the link above, CIS detects this malware. But on my system with the same database CAV is not detecting it. This type of issue I have mentioned quite a few times & asked Devs why this happens but no one cares.
If anyone would like to test, I can PM the malware.
Valkyrie is also not detecting it, and again as usual advanced heur in Valkyrie is not working.
if the file is signed with a signature from tvl av will not respond (probably it is something like protection against fp - we have it in the list, it should not be evil >:-D)
remove this signature from the TVL and probably this will change
publisher…: EoRezo
copyright…:
product…: EoDesk3d by EoRezo
description…: EoDesk3d by EoRezo Setup
original name: n/a
internal name: n/a
file version.:
comments…: This installation was built with Inno Setup.
signers…: -
signing date.: -
verified…: Unsigned
If it is like Szadout is saying then the process is local whitelist and only then local black list (to evade FP). But what about “stateful” in the real time scanning? Does it not scan every single file (under 40 mb) basically every 30 minutes? That is the reason that i do not use the scheduled or manual scanning.
Really would like to see a clarification about this issue.