NoVirusThanks OSArmor 1.2.0.0

Published by

NoVirusThanks OSArmor monitors and blocks suspicious process behavior and is aimed at preventing infections by malware, ransomware, and other common threats.

NoVirusThanks OSArmor monitors and blocks suspicious process behavior and is aimed at preventing infections by malware, ransomware, and other common threats.It works by analyzing parent processes and prevents scenarios like MS Word running cmd.exe or powershell.exe and can prevent ransomware from deleting file shadow copies via vssadmin.exe. It also blocks processes that have double file extensions like invoice.pdf.exe for example, as well as blocking malware spread by USB. NoVirusThanks OSArmoris simple to use requiring no configuration but you can choose specific areas for monitoring through the Configurator by simply checking/unchecking a selection. It is designed to run silently in the background while protecting your system without eating up a large amount of memory. This tool is capable of blocking even those threats not detected by your selected security solution making it an additional defense layer against malware, ransomware, etc. NoVirusThanks OSArmor Features:Basic Anti-Exploit-Analyze parent processes and child processes blocking exploit payloadsProtect MS Office Apps-Prevent WINWORD.EXE or EXCEL.EXE from executing malicious processesMonitor Applications-Monitor Adobe PDF Reader, MS Office, OpenOffice, Web Browsers, etc.Block USB Malware-Prevent execution of processes started via autorun.inf from USB devicesBlock Command-Lines-Block processes with command-line strings commonly related to malwareProtect Shadow Copies-Block system processes (vssadmin.exe, etc.) from deleting shadow copies of filesBlock File Download-Block specific command-lines related to download of remote filesBlock .COM & .PIF-Block execution of processes with .COM or .PIF obsolete file extensionsFilter System Processes-Block wscript.exe, mshta.exe, etc., if they match our rules of bad behaviorBlock Bcedit.exe-Prevent important and critical system modifications from Bcedit.exeBlock Schtasks.exe-Block the execution of schtasks.exe (commonly used by malware)Block Bitsadmin.exe-Prevent Bitsadmin.exe from downloading (/download) remote filesPowerShell Rules-Block execution of encoded or malformed commands via PowerShellSvchost & Explorer-Block suspicious behaviors related to Svchost.exe and Explorer.exeBlock RegisterXLL()-Prevent calling of Application.Excel RegisterXLL() via command-lineBlock Remote Scripts-Prevent Regsvr32.exe or Mshta.exe from loading remote scripts
  Download