PeaceMaker Threat Detection: detects advanced malware techniques

PeaceMaker Threat Detection is one program (kernel-mode utility) designed to detect various methods commonly used by advanced forms of malware.

Compared to a simple antivirus, PeaceMaker targets the techniques that usually the malware to "catch" it while it's running.

In addition, PeaceMaker is designed to provide incredible detail when detecting a malicious technique, allowing for more effective containment and response.

Specifications

  • See which code started a process (stack trace).
  • See which code loads an image in a process (stack trace)
  • Detect uncharted (hidden) code through common Stack Walking features such as:
    • Creation process
    • Upload image
    • Creating threads
  • Detect remote thread creation.
  • Detect parental process identity forgery.
  • Detect threats in unmatched (hidden) code.
  • Block basic breach functions in the GUI client.
  • Block file system/y, record, delete, or perform operations that violate a user-defined filter.
  • Detect file / registry, write, delete, or perform functions that violate a user-defined filter.
    • Records the source process and stack of operation.
  • Filter for known false positives.

Remarkable properties

  • Meticulous analysis of the code.
  • All detection routines are in the kernel .
  • Designed to detect user-mode .
  • Tested using Driver Verifier standard configuration
  • Tried putting it on my daily laptop and watching for problems (nothing happened).

Information on installing and using the program, you will find here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).