Advice Request A Question About Shadow Defender

Please provide comments and solutions that are helpful to the author of this topic.
Status
Not open for further replies.
I just look at the statements, which disturbed me. If using Shadow Mode on all disks, running malware, is it possible for the malicious file to remain on the system after reboot?
 
  • Like
Reactions: bribon77
I only had it fail once. The gui would not start up after an insider update. The developer sent me a registry change and after that is has stayed working.
 
  • Like
Reactions: Weebarra and raveed
I mean exactly the procedure when:
- I run Shadow Mode on all disks
- I run a malicious file and check the behavior of av
- I restart the system after the test.
You probably know it, but those points should be extended:
- do not store personal data on the computer;
- check if other sources are disconnected (pendrives, NAS, etc.);
- check if other computers in the home network are isolated from your computer;
- use VPN, or disconnect the computer from the network;
- use Gest Network feature or the separate router for malware testing.
There are probably some more ...
 
Yes you need know yet how this program work what can do for you and what cant do... than you can instal rest software to protect rest part of your system/data

Yes, I know that you can use it as a sandbox, but I usually use it only when I'm not sure of the program, or if I want to test the program - behavior.
 
Yea but some programs put deep drives in to system and otther services which require to restart your system than SD will wipe data so sometimes cant test some soft so in this case full virtual system will be better..

any way no problem glad to help youget some info which you need to know..
if need something know yet feel free to ask at last i will don't answer if dont know xDDDDDDDDD
 
Yea but some programs put deep drives in to system and otther services which require to restart your system than SD will wipe data so sometimes cant test some soft so in this case full virtual system will be better..

That's right, that's the case with av installations. Of course, I also use wmvare, unfortunately due to a rather old computer and weak components it is very tedious ....
 
Sorry...but I found that I can say about one more way of "baypassing" SD...actually not only SD but every LV software like TTF, WTF or Returnil. It's not connetced to SD's commmit or exclusiuon feature but to specific feature of some particular apps - I'm saying about saving/synchronisation of settings/config files that are located not on system disk but on other local not virtualised. In such situation info/data are saved wile Shadow Mode on non virtualised disk and than after reboot and entering to normal mode are still accesible for that app with all saved changes...this could be potentialy used in some cases to bypass protection of vulnerable apps that are using described mechanism.
Such case on SSM exeample was describet some time ago on Wilders in that thread
System Safety Monitor and Shadow Defender
 
Sorry...but I found that I can say about one more way of "baypassing" SD...actually not only SD but every LV software like TTF, WTF or Returnil. It's not connetced to SD's commmit or exclusiuon feature but to specific feature of some particular apps - I'm saying about saving/synchronisation of settings/config files that are located not on system disk but on other local not virtualised. In such situation info/data are saved wile Shadow Mode on non virtualised disk and than after reboot and entering to normal mode are still accesible for that app...this could be potentialy used in some cases to bypass protection of vulnerable apps that are using described mechanism.
Such case on SSM exeample was describet some time ago on Wilders in that thread
System Safety Monitor and Shadow Defender
Well if you run all the disks and partitions that are connected to your computer in shadow mode then nothing will remain after a restart.
 
Status
Not open for further replies.