I couldn't resist doing some internal checking but the only information I will provide very little information: they do utilise kernel-mode callbacks, it seems they perform their injection from kernel-mode and I think they put more effort into their products than vendors like AVG has (just based on the quick internal research).
Personally I do not trust Qihoo as much as other vendors like ESET, Kaspersky, Emsisoft, Avast,... However there is no denying that they do have a decent product out there for free, regardless of their practises being ethical or not, the point is that the product is actually fairly decent at the least and they do some pretty decent things.
Kernel-mode callbacks which are used at some point or another:
- PsSetCreateProcessNotifyRoutine
- FltRegisterFilter
- PsSetCreateThreadNotifyRoutine
- PsSetLoadImageNotifyRoutine
- (more but I didn’t check everything)
It seems they also auto-ignore system processes based on file path such as: lsass.exe; svchost.exe; services.exe; csrss.exe; smss.exe; winlogon.exe; explorer.exe; wininit.exe; lsm.exe.
I don't want to detail anything else because it's not my place since it's not my project. Although I've barely shared much, the project is very big... And there is no need for a full analysis.
The analysis was too quick due to lack of time, but I will end this post with that they do indeed have a pretty decent product (whether I like their marketing/trust them or not) and as long as you use their product wisely with alerts and watch what you are doing like with any other product, it can probably protect you well.
As an ending resort to this post, I would like to say that if you do not like Qihoo then just don't use it, and if you do like them/trust them then go for it. After some more testing than last time and proper internal checks I actually like Qihoo much more than before and rate it higher than other vendors like AVG and even Avira. And let's all agree to disagree if anything so we don't end up fighting.
Thanks for reading.