NoVirusThanks OSArmor

Released a new version v1.3:
Prevent Malware and Ransomware with OSArmor | NoVirusThanks

[22-Dec-2017] v1.3.0.0

+ Block processes with known fake extensions (i.e .pdf.exe)
+ Prevent WMIC from using "process call create" via cmdline
+ Block command-lines that match *\Start Menu\Programs\Startup\*
+ Block command-lines that match shellcode-like patterns
+ Block execution of any process related to UltraVNC (unchecked by default)
+ Block execution of any process related to RealVNC (unchecked by default)
+ Block execution of any process related to Nir Sofer (unchecked by default)
+ Block execution of any process related to LogMeIn (unchecked by default)
+ Block known Bitcoin miners command-lines
+ Prevent wbadmin.exe from deleting backup catalog
+ Block unsigned processes located on root folder (i.e C:\) (unchecked by default)
+ Block SOAP WSDL requests via command-line
+ Block execution of syskey.exe
+ Block execution of cipher.exe
+ Number of pre-defined rules increased to 60
+ Do not delete the settings when the program is uninstalled
+ Improved showing of main window from tray icon
+ Fixed many false positives
+ Improved internal rules

All reported FPs should be fixed.

On the next version we will add support for exclusions.

@AtlBo

Yeah, we'll group rules later (first just want to make sure they are fine without FPs).

@Glashouse

We'll add option to disable\enable protection soon, it is on the todo list.

@harlan4096

That FP is fixed on this new version, thanks for testing :)
 
Last edited:
Hi sorry, i install ubuntu and trash my system and have to reinstall only windows jeje. I see litle incompatibility of this program whith heimdal, but i can not conect the logs, now i not using heimdal but you have to check . I will try to reproduce the error. And great work
 
Last edited:
Here are some more blocks, from HP printer software.

Date/Time: 12/23/2017 11:02:01 PM
Process: [14932]C:\Program Files\HP\HP Officejet Pro 6830\Bin\FaxApplications.exe
Parent: [8140]C:\Windows\SysWOW64\mshta.exe
Rule: BlockProcessesFromMshta
Rule Name: Block any process executed from mshta.exe
Command Line: "C:\Program Files\HP\HP Officejet Pro 6830\Bin\FaxApplications.exe" TH4AR6D1JD:NW /app FaxManager
Signer: Hewlett Packard
Parent Signer:

Date/Time: 12/23/2017 11:02:59 PM
Process: [1320]C:\Windows\SysWOW64\cmd.exe
Parent: [8140]C:\Windows\SysWOW64\mshta.exe
Rule: BlockExpPayload
Rule Name: Basic anti-exploit protection (parent->child process)
Command Line: "C:\Windows\System32\cmd.exe" /C "copy /Y "C:\ProgramData\HP\HP Officejet Pro 6830\HPUDC\HP Officejet Pro 6830 (Network)\UDC_device.json" "C:\ProgramData\HP\HP Officejet Pro 6830\HPUDC\HP Officejet Pro 6830 (Network)\UDC_device_2.json" "
Signer:
Parent Signer:

Date/Time: 12/23/2017 11:03:13 PM
Process: [16868]C:\Windows\SysWOW64\cmd.exe
Parent: [8140]C:\Windows\SysWOW64\mshta.exe
Rule: BlockExpPayload
Rule Name: Basic anti-exploit protection (parent->child process)
Command Line: "C:\Windows\System32\cmd.exe" /C "del /Q /F "C:\ProgramData\HP\HP Officejet Pro 6830\HPUDC\HP Officejet Pro 6830 (Network)\UDC_device.json""
Signer:
Parent Signer:
 
anything extra this security software is doing which is not covered by Emsisoft Anti-malware ?
It would be impossible to truly compare OSArmor with Emsisoft Antimalware, without testing them on the same big pool of malware samples. Yet, some differences are evident because EAM can make use of the reputation cloud. Furthermore, OSArmor is not finished and some new options will be probably added.
 
It would be impossible to truly compare OSArmor with Emsisoft Antimalware, without testing them on the same big pool of malware samples. Yet, some differences are evident because EAM can make use of the reputation cloud. Furthermore, OSArmor is not finished and some new options will be probably added.

I don't want t comparison between them. Basically I am already using Emsisoft Anti-malware. But OSArmor looks promising. So was thing whether it will add any value if I run both of them.
 
ADGuard:
Date/Time: 12/24/2017 4:04:13 AM
Process: [4316]C:\Windows\SysWOW64\cmd.exe
Parent: [2992]C:\Windows\SysWOW64\rundll32.exe
Rule: BlockExpPayload
Rule Name: Basic anti-exploit protection (parent->child process)
Command Line: "cmd.exe" /C "net start "Adguard Service""
Signer:
Parent Signer: