Hi all!
After release a draft of personal AntiTdl 3 solution, I'm now researching on TDL4.... I would like to know if some of you is able to Kernel Debug a TDL4 infected 64 bit system.
For who that doesn't know, TDL4 replace "KdDebuggerInitialize1" functions and many others of "kdcom.dll", the library that is responsable to connect Serial Debug, making impossible to Debug with serial port.
Anyone know if USB2 Debug relies on "kdcom.dll"? Which is the solution? Perhaps replacing "ldr64" file in TDL4 encrypted file System (assuming that encrypting process is reversible)?
Thanks in advice
Andrea :D
After release a draft of personal AntiTdl 3 solution, I'm now researching on TDL4.... I would like to know if some of you is able to Kernel Debug a TDL4 infected 64 bit system.
For who that doesn't know, TDL4 replace "KdDebuggerInitialize1" functions and many others of "kdcom.dll", the library that is responsable to connect Serial Debug, making impossible to Debug with serial port.
Anyone know if USB2 Debug relies on "kdcom.dll"? Which is the solution? Perhaps replacing "ldr64" file in TDL4 encrypted file System (assuming that encrypting process is reversible)?
Thanks in advice
Andrea :D