- Dec 24, 2011
- 480
Hi guys, this is not a review of any kind but I just had to share this with you, maybe someone else saw this behavior from one of the files in the malware hub today? (See pic further down)
The virus started to chat with me, it took a couple of seconds between the "chats" and it looked real, hehe!
I was a bit baffled when the Webroot line came up , did anyone else see this? I think the file is named chekv.exe, and by the way it is named this was probably what it did, checked out what antivirus you did use. Like the virus in the good old days, more fun less serious, I do not know.
I am test driving WSA in Virtualbox, and infected it like 10 hours ago and got a bunch of files in a "monitored" state by WSA.
It is interesting to see WSA "work" its way with the files during the day, one by one, hours later they got detected and removed with a rollback of all changes made by the files.
It is strange to see an infected computer that is not compromised at the same time.
The Identity Shield locks down all the monitored files, and does not let them communicate with the outside world until deemed safe. As they were not safe (unknown) all outgoing connections from the files were blocked.
They have a very interesting way of detecting threats by their behavior, their cloud functions must be among the best out there.
Have great weekend!
/W
The virus started to chat with me, it took a couple of seconds between the "chats" and it looked real, hehe!
I was a bit baffled when the Webroot line came up , did anyone else see this? I think the file is named chekv.exe, and by the way it is named this was probably what it did, checked out what antivirus you did use. Like the virus in the good old days, more fun less serious, I do not know.
I am test driving WSA in Virtualbox, and infected it like 10 hours ago and got a bunch of files in a "monitored" state by WSA.
It is interesting to see WSA "work" its way with the files during the day, one by one, hours later they got detected and removed with a rollback of all changes made by the files.
It is strange to see an infected computer that is not compromised at the same time.
The Identity Shield locks down all the monitored files, and does not let them communicate with the outside world until deemed safe. As they were not safe (unknown) all outgoing connections from the files were blocked.
They have a very interesting way of detecting threats by their behavior, their cloud functions must be among the best out there.
Have great weekend!
/W