Tigzy wrote:What about TLD? is it strong enough?Of course not.
Ring0 - the source of inspiration
A forum for reverse engineering, OS internals and malware analysis
Tigzy wrote:What about TLD? is it strong enough?Of course not.
Of course not.Obviously... :(
However I think this is wasting of time and such things can be 100% identified heuristicallyI'm not sure to understand, can you develop?
Just saw TDL3 was hooking SCSI IRPs, so my method isn't deep enough...Yes, it isn't.
3.27 bypassed SPTI-based detectors (1.6 version of TDSSRemover, HitmanPro previous version)Therefore you can use other methods like: APTI, EPTI.