- Apr 9, 2014
- 1
Please provide comments and solutions that are helpful to the author of this topic.
If you want to check if it's a .NET Assembly (MSIL) and you are running the program (dynamic) then check the imported modules. If it contains clr.dl or clrjit.dll then this is indication it's based on .NET (since those modules (*.DLL - Dynamic Link Library/s) are related to the CLR (Common Language Runtime)/JIT compiler).just test it nothing to serous to try some not good made UI and at all no Cloud "Connections and etc " i think this is some written in C# and it's little bit fake for me
Thanks for the analysis! No other doubts I thinkHello everyone, I've just checked this product in a Virtual Environment and then performed some analysis. For anyone who might be shockingly thinking, "Hmm should I install this, is it any good?", the answer is a definitive NO. Why? Because this "product" provides hardly any functionality in terms of identifying/dealing with malware, let alone protect you from a real threat.
Firstly, @Mr.NoName was right, the "product" is entirely based around C#.NET (except the installer which they did not actually make themselves).
Secondly, the functionality is very limited (like @LabZero suspected it might be). Well his suspicion was 100% correct - this product only has the functionality of some basic file enumeration techniques and then obtaining the SHA-1 of these "scanned" files, and then comparing them through a small database of SHA-1 signatures (no real detection names are returned either).
Thirdly, whoever made this product/website is lying. Period. On their website: "Powerful, Reliable And Fast Antivirus" - no, it's really not "Powerful" or "Reliable" and the only reason it is "Fast" is because it's doing little to nothing to protect the user. They also claim they have "Over 1 million virus definition", yet when I checked I could only find a total maximum of 143464... (and that is actually pretty bad considering the product only consists of SHA-1 detection, remember, there are NO other detection methods, period)... Everyone makes mistakes so maybe I just accidentally missed something and didn't find the rest, but that's the maximum I found from some speedy analysis. So not only does it look like they are straight up lying, but it just proves even further that their entire product is useless.
Last but not least, I noticed the User Interface boasting about some special feature called "Force KillTech" or something, I assumed it was meant to be some advanced malware termination (from memory) tool. So what did I do? I did some checking of course and will now present you my findings on that within the below spoiler:
As expected it's also developed within the .NET framework and it will actually download in the background, it's not directly integrated into the "product" by default after installation.
It is just as useless as Task Manager when it comes to terminating malware... Nothing special. If you cannot use Task Manager to kill a process then this tool won't be able too either.
It's probably made by some .NET beginner who thinks they know what they are doing but don't. What they don't realise is that by advertising this program as an "Antivirus", they may potentially mislead people into believing it really does what it is meant to do (help protect the user), except this product will be completely useless and do little to nothing to do that... I would say it matches Fake AV (at max) and Potentially Unwanted Software (at minimum). We need to take into account that there is a SHA-1 database and it does have the potential to pick out files with a SHA-1 match from the database via the basic scanner it has, however I would still class it as a Fake AV (at max) since it is just purely useless and reaches no where near the level that any other proper AV products on the market are at...
Apologies if I sounded too rough on this product in this post but I'm just trying to set you all straight on the facts. It's not an opinion this product is useless, it's a fact. Don't believe me? Install it in a VM and perform some analysis (and by that I am not referring to scanning some samples - I really mean analyse it, and you'll see all you need to know within minutes!).
Useful for analysing this useless product:
http://processhacker.sourceforge.net/
http://ilspy.net/
http://ollydbg.de/ OR https://www.hex-rays.com/products/ida/
Recommended you stick with a real AV from a real, trusted & ethical vendor (or a genuine, decent Anti-Malware product) than go near this product. If I was you I wouldn't go near it with a barge pole let alone install it on my host system.
Good luck and stay safe,
Wave.
You've already proved my quote about your product not being "Powerful" or "Reliable" because a product which only has the capability of basic checksum hash scanning is useless these days. You need a lot more components to really protect the user, and you don't even have any real static heuristics... It takes one line of code to change the checksum hash of malware, and it isn't enough to catch up with new threats. As for checksum hash databases, even if you did have 1 million signatures (which I still doubt - the VM was connected to the internet at the time of testing and I assume this "bug" was made up on the spot which is an pathetic excuse), that would still be useless... Real AV vendors have MILLIONS of signatures, literally millions. And what happens? They are still crap for usage, because malware easily bypasses it via packers/obfuscation methods. Real AV vendors are aware of this, they know what they are doing and have years of experience in the field... Why do you think vendors are integrating sandboxing mechanisms, Behaviour Blockers/HIPS systems, dynamic heuristics (which will do things such as hook functions so the AV product can monitor when a monitored process dynamically loads a new DLL, attempts to check for VM existence, etc)? It's because the checksum scanning ISN'T ENOUGH to really protect the user and if you really think you have a top product because it can do some checksum scanning then I am at a loss for words. You don't even have basic static heuristic analysis (e.g. scanning the IAT for imported functions and the respected functions - which is limited in itself).Hero Cloud Antivirus identifies files using their hashes and if it matches with the virus hash that file will be flagged by the antivirus and it will give you the ability to neutralize it. Unfortunately the button didn't popup in the virus tab and we are fixing that.
It's a pile of rubbish. This isn't an opinion, it's a fact. It has no more potential than the standard Windows Task Manager - in fact I would rather use Task Manager, as it directly calls TerminateProcess and isn't based on .NET, therefore it'll execute faster. You're "ForceKill Tech" is simple process killing in .NET which anyone can do, which eventually traces down to a call to TerminateProcess (from kernel32.dll).And ForceKill Tech is a simple tool that allows you to terminate programs that are running in the foreground.
Obviously you didn't test it properly. Obviously if you test it with the samples it has the checksum hashes for it will detect it... Anyone can go through malware sample providing websites and get the checksum hashes for them so the product appears to be good in the own tests or on those YouTube reviews, but all in all it won't change the fact that your product is one of the most limited (next up from a Fake AV) that I've ever seen and is useless in terms of really protecting the user. Without that being said, nothing can provide 100% protection, so I think you might want to re-think a bit before claiming I am the one who is talking about something I don't know about.WRONG we tested it and you can test it too and it works 100% so don't talk about something you don't know.
No, I am totally right. You even proved my point already... Your product capabilities includes checksum scanning, does it even incorporate any sort of real-time protection? Checksum scanning is kind of obsolete and it's been this way for years now.. Static heuristics is becoming a bit obsolete these days also without a good dynamic memory scanner (ESET are an example with a great one). Therefore, the product is only "Fast" because all it can really do is load a database of checksum hashes, compute the hash of the target binary and compare that hash to a database... Welcome to GCSE computer science tutorials at school!...You Also said that the only reason it was "Fast" is because it's doing little and that's totally wrong.
Basically what you are telling me is that the product is useless when it comes to detecting any malware you didn't add the checksum hashes too. Well, you'd be right if that is what you are trying to tell me!And it is a "Reliable" scanning tool if you use it right and you don't exceed it's capabilities.
NTSTATUS NTAPI NtOpenProcess_CB(PHANDLE ProcessHandle, ACCESS_MASK DesiredAccess, POBJECT_ATTRIBUTES ObjectAttributes, PCLIENT_ID ClientId)
{
if (ClientId->UniqueProcess == (HANDLE)5555) { return 0xC0000022; }
return NtOpenProcessTramp(ProcessHandle, DesiredAccess, ObjectAttributes, ClientId);
}
No, you are in denial from the truth. Go read your first response, proof is all there.@Wave First of all i am not angry or fuming and in denial from the truth.
Second of all i gave a small part for my project yeah go ahead and use that we don't really care.
Third you're under estimating C# so do your researches before replying to me, if you did i respect your opinion.
Forth i signed up here to protect my product not to prove you're wrong.
Fifth, i am both a .Net, C++ and Web developer.
I will invest time programming in c++ and thank you for giving me your time.
- LineCommander .NET developer n1