NoVirusThanks OSArmor

Sunshine-boy

Level 28
Verified
Top Poster
Well-known
Apr 1, 2017
1,760
Cameyo Fp:
Process: [4072]C:\Users\Sunshine-boy\AppData\Roaming\VOS\Cameyo\PROG\%Program Files%\Cameyo\Packager.exe
Parent: [1304]C:\Users\Sunshine-boy\Desktop\Cameyo.exe
Rule: BlockUnsignedProcessesAppDataRoaming
Rule Name: Block execution of unsigned processes on Roaming AppData
Command Line: "C:\Users\Sunshine-boy\AppData\Roaming\VOS\Cameyo\PROG\%Program Files%\Cameyo\Packager.exe"
Signer:
Parent Signer:
 
  • Like
Reactions: AtlBo and Andy Ful

Windows_Security

Level 24
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 13, 2016
1,298
@Sunshine-boy, why don't YOU win the lottery, and buy him a free plane ticket?
He he when I was young I made a list of all the things I wanted to see in life. From the middle east I only visited Petra, i still want to visit historical sites of the Faro's, Mesopotamia and Persia, so Iran is on my to do list. I will definitely visit Iran withing the next 5 years or so.
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
He he when I was young I made a list of all the things I wanted to see in life. From the middle east I only visited Petra, i still want to visit historical sites of the Faro's, Mesopotamia and Persia, so Iran is on my to do list. I will definitely visit Iran withing the next 5 years or so.
Persia could definitely be cool. I want to go to Hamadan.
 

tiktoshi

Level 5
Verified
Jan 19, 2015
205
he is working well

On the default settings


Date/Time: 1/4/2018 10:38:40 AM
Process: [7824]C:\Users\tik\AppData\Local\TempServer.exe
Parent: [6744]C:\Users\tik\Desktop\Test\Test.exe
Rule: BlockProcessesOnSuspiciousFolders
Rule Name: Block processes located in suspicious folders
Command Line: "C:\Users\tik\AppData\Local\TempServer.exe"
Signer:
Parent Signer:

Date/Time: 1/4/2018 10:45:21 AM
Process: [7844]C:\Users\tik\AppData\Roaming\Counter Strike.exe
Parent: [4972]C:\Users\tik\Desktop\Counter Strike\Counter Strike.exe
Rule: BlockProcessesOnSuspiciousFolders
Rule Name: Block processes located in suspicious folders
Command Line: "C:\Users\tik\AppData\Roaming\Counter Strike.exe"
Signer:
Parent Signer:
 
  • Like
Reactions: AtlBo and Andy Ful

bribon77

Level 35
Verified
Top Poster
Well-known
Jul 6, 2017
2,392
He he when I was young I made a list of all the things I wanted to see in life. From the middle east I only visited Petra, i still want to visit historical sites of the Faro's, Mesopotamia and Persia, so Iran is on my to do list. I will definitely visit Iran withing the next 5 years or so.
When you go to Iran, pass by Spain. and you teach me too.:)
 
Last edited:
F

ForgottenSeer 58943

you can brick your system when using it in the wrong way. Don;t want to do that remotely. Chances for average user of running into fileless malware is as likely as me winning the lottery. So when I win the lottery, I will fly over and teach you how to write the rules face to face.

Really? My techs have pulled a LOT of fileless malware off systems in the last few months. I actually think it's becoming much more common than ransomware.
 

DavidLMO

Level 4
Verified
Dec 25, 2017
158
Wondering about running OSArmor and Exe Radar Pro at same time. I have been installing a lot of new apps on a new (to me) Win 7 box. I have only received a couple of warnings/popups from OSA but lots from ERP (to be expected). Is this just due to the different nature of the products? Or does ERP do something that allows OSA to ignore?

So far I have not received any false positives with OSA which I run only with the defaults.

Again - thanks for a great product.
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
Wondering about running OSArmor and Exe Radar Pro at same time. I have been installing a lot of new apps on a new (to me) Win 7 box. I have only received a couple of warnings/popups from OSA but lots from ERP (to be expected). Is this just due to the different nature of the products? Or does ERP do something that allows OSA to ignore?

So far I have not received any false positives with OSA which I run only with the defaults.

Again - thanks for a great product.
OSA does not produce very many blocks. If you don't do anything unusual on your computer, it will be as silent as a mouse.
Yes, it is compatible with ERP.
ERP does not make OSA any quieter than it is, each program does its own thing, without interfering.
 

NoVirusThanks

From NoVirusThanks
Verified
Developer
Well-known
Aug 23, 2012
292
Here is a new v1.4 (pre-release) (test12):
http://downloads.novirusthanks.org/files/osarmor_setup_1.4_test12.exe

*** Please do not share the download link, we will delete it when we'll release the official v1.4 ***

So far this is what's new compared to the previous pre-release:

+ Improved the "anti-exploit" module used to block payloads
+ You can now check\uncheck the apps monitored with "anti-exploit" module
+ Created 3 tabs for grouping of rules
+ Added %PROCESSSIGNER% and %PARENTSIGNER% vars for exclusions and custom-block rules
+ Minor fixes and optimizations

This pre-release version can be installed over the top of the previous one.

New video of OSArmor tested against 30 doc\xls\swf\pdf exploits:
Block Exploit Payloads with OSArmor

Here are the two new tabs on the Configurator:

osarmor-configurator.png


@Sunshine-boy

That FP is generated by "Block execution of unsigned processes on Roaming AppData" and we may not fix it internally on OSArmor.

You can add an exclusion rule like this to fix it:

Code:
[%PROCESS%: C:\Users\Sunshine-boy\AppData\Roaming\VOS\Cameyo\PROG\%Program Files%\Cameyo\Packager.exe] [%PARENTPROCESS%: C:\Users\Sunshine-boy\Desktop\Cameyo.exe]

Alternatively you can allow all processes from Cameyo.exe:

Code:
[%PARENTPROCESS%: C:\Users\Sunshine-boy\Desktop\Cameyo.exe]

@Windows_Security

I've added 2 new vars %PROCESSSIGNER% and %PARENTSIGNER% for exclusions and custom-block rules.

Let me know if they work fine if you'll test them.

Note that OSArmor does not recognize Microsoft Windows (catologue) signatures

Strange, can you send me your C:\Windows\explorer.exe file via PM?
 
Last edited:

codswollip

Level 23
Content Creator
Well-known
Jan 29, 2017
1,201
I got this block when closing a portable version of Free Download Manager launched under SyMenu...

Date/Time: 1/4/2018 8:43:48 PM
Process: [2528]C:\WINDOWS\SysWOW64\cscript.exe
Parent: [3288]D:\SyMenu\ProgramFiles\SPSSuite\SyMenuSuite\Free_Download_Manager_sps\App\FreeDownloadManager\fdm.exe
Rule: PreventCscriptChangingScriptEngineE
Rule Name: Prevent cscript.exe from changing script engine via //E:
Command Line: "C:\WINDOWS\System32\cscript.exe" //E:jscript "D:\SyMenu\ProgramFiles\SPSSuite\SyMenuSuite\Free_Download_Manager_sps\App\FreeDownloadManager\\Chrome\chrome.js" check "C:\Users\MyUserName\AppData\Local\Google\Chrome\User Data\\Default\Preferences" "ahmpjcflkgiildlgicmcieglgoilbfdp"
Signer:
Parent Signer: Softdeluxe Ltd.

Maybe it was trying to install a chrome extension? Not sure what is going on here.
 

l0rdraiden

Level 3
Verified
Jul 28, 2017
108
Wondering about running OSArmor and Exe Radar Pro at same time. I have been installing a lot of new apps on a new (to me) Win 7 box. I have only received a couple of warnings/popups from OSA but lots from ERP (to be expected). Is this just due to the different nature of the products? Or does ERP do something that allows OSA to ignore?

So far I have not received any false positives with OSA which I run only with the defaults.

Again - thanks for a great product.
It's the expected behavior
ERP is a HIPS and will create a popup for any new unknown process
OSarmor is more like a behavior blocked, it has a kind of black list of "suspicious actions" and block them.
 

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,177
On Windows 64-bit the Cameo application runs in a more complex way, and the process packager64.exe is blocked. This process is invoked 2 times, first time by cameo.exe and the second time by packager.exe. So when using parent processes, 2 exclusions are required. The second thing is, that OSArmor seems to be confused by %Program Files% (it is not environment variable) used in Cameo paths, so I had to replace it with the wildcard. The wildcards were also used for packager.exe and packager64.exe (in %PROCESS% sections) to minimize the number of exclusions. The exclusions work when cameo.exe is started from the Desktop - they should work for both 32-bit and 64-bit Windows:
Code:
[%PROCESS%: C:\Users\User_Name\AppData\Roaming\VOS\Cameyo\PROG\*\Cameyo\*] [%PARENTPROCESS%: C:\Users\User_Name\Desktop\Cameyo.exe]
[%PROCESS%: C:\Users\User_Name\AppData\Roaming\VOS\Cameyo\PROG\*\Cameyo\*] [%PARENTPROCESS%: C:\Users\User_Name\AppData\Roaming\VOS\Cameyo\PROG\*\Cameyo\Packager.exe]
(y)
 
Last edited:

Windows_Security

Level 24
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 13, 2016
1,298
@NoVirusThanks send you a we transfer link to support for explorer

%PROCESSSIGNER% exclusions are blocked, see below. Tried wildcard also [Microsoft *]

Custom
; Block executables from my user folders on C drive
[%PROCESS%: C:\Users\*]

Exclusion
;allow processes signed Microsoft Windows
[%PROCESS%: C:\Users\*] [%PROCESSSIGNER%: Microsoft Corporation]

LOG
Date/Time: 5-1-2018 12:04:39
Process: [2936]C:\Users\Kees\AppData\Local\Temp\procexp.exe
Parent: [2276]C:\Windows\explorer.exe
Rule: CustomBlockRule
Rule Name: Custom process-block rule via CustomBlock.db
Command Line: "C:\Users\Kees\AppData\Local\Temp\procexp.exe"
Signer: Microsoft Corporation
Parent Signer:
 
  • Like
Reactions: AtlBo

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top