AppGuard 4.x 32/64 Bit - Releases

Discussion in 'other anti-malware software' started by Jryder54, Oct 29, 2013.

Thread Status:
Not open for further replies.
  1. guest

    guest Guest

    @paulderdash
    I wrongly said, that files has been removed, but they were added :oops:
    I corrected my previous post. #6728
     
  2. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,814
    Location:
    .
    Did an update to Internet Download Manager v9.27 build 5 an hour ago. Now I got some blocks in my usual Locked Down Mode:

    Code:
    02/14/17 10:13:07 Prevented process <idmmzcc.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components>.
    02/14/17 10:13:07 Prevented process <idmmzcc.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components12>.
    02/14/17 10:13:06 Prevented process <idmcchandler2_64.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components2>.
    02/14/17 10:13:06 Prevented process <idmcchandler2_64.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components2>.
    02/14/17 10:13:06 Prevented process <idmcchandler2.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components2>.
    02/14/17 10:13:06 Prevented process <idmmzcc64.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components2>.
    02/14/17 10:13:06 Prevented process <idmmzcc.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components2>.
    02/14/17 10:13:05 Prevented process <idmmzcc64.dll | c:\windows\system32\rundll32.exe> from launching from <c:\users\mrx\appdata\roaming\idm\idmmzcc5\components12>.
     
  3. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    The above *.dll block events are expected behavior. I would bet those *.dlls are unsigned. The loading of unsigned *.dlls isn't permitted in both Protected and Locked Down modes.

    You can determine if they are digitally unsigned by lowering protection to Protected mode and try to update. If they are also blocked in Protected mode, then they are unsigned. Then in that case...

    To update in both Protected and Locked Down mode, you could create a User Space (NO) exclusion: c:\users\mrx\appdata\roaming\idm\idmmzcc5\*

    If you create the above exclusion, I wouldn't be surprised if afterwards there are more blocks. You'll have to create exclusions for those too.

    For digitally signed *.dlls, your best option is to add the publisher to the Trusted Publisher List. When you need to update, just lower protection to Protected mode, perform the update, then raise protection to Locked Down mode. That way you don't have any User Space exclusions and don't have to set AppGuard to Allow Installs. It is recommended to use the highest protection level that permits you to do what is needed.

    Remember, Locked Down mode disables the Trusted Publisher List except for Microsoft - so you will always have to create exclusions for non-Microsoft publishers if you want to update softs without having to lower the protection to Protected mode.

    For updates that have digitally unsigned components, you'll have to create exclusions for both Locked Down and Protected modes - or more simply lower protection to Allow Installs.

    For both Protected and Locked Down mode, if an update pathway exclusion would require the compound use of the * wildcard, it isn't currently supported and you will have to use Allow Installs.
     
    Last edited: Feb 14, 2017
  4. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,814
    Location:
    .
    @Lockdown

    Digitally signed, all of them. But Digest algorithm says: md5
     
  5. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Add the publisher, ToneC, by navigating to the installer, selecting it, and Add to Trusted Publisher List. You should be able update in Protected mode then.

    Should you want to update in Locked Down mode, you'll have to create the exclusion in User Space (NO): c:\users\mrx\appdata\roaming\idm\idmmzcc5\*
     
    Last edited: Feb 14, 2017
  6. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    If I really trust the software publisher it is sometime just easier to turn Appguard off update and turn back on.
     
  7. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Hi Lockdown

    If you want a real challenge, download a trial of the Napster(used to be Rhapsody) music service, and see if you can get it to run in Lockdown, without checking Rundll32. I'd love it.

    Pete
     
  8. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Point me to the specific download link that you use, please.
     
  9. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    you would not recommend adding it to the power applications? or is that mainly for other security apps?
     
  10. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    An application should be added to Power Apps ONLY if something is broken. I know a lot of people add all their security and other softs to the Power Apps list, but this is improper technique and needlessly creates vulnerabilities.
     
  11. boredog

    boredog Registered Member

    Joined:
    Feb 1, 2015
    Posts:
    2,499
    I added all my security apps because other people suggested it. I have now removed them and will see if all stays working well.

    Thanks
     
  12. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    I know it is often recommended on the forums, but it is not proper security technique.
     
  13. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Anyone seeing blocked WRITES to C:\Program Data or C:\Users ? [I am not interested in blocked executions - that is expected behavior.]

    If yes, please post them here.
     
  14. guest

    guest Guest

    My list of Power Apps is empty, it has never caused problems or block-events. All is running fine :thumb:
     
  15. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
  16. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Process Explorer is digitally signed by Microsoft. Remember, in Protected mode the Trusted Publisher List is enabled. Microsoft is set with MemGuard enabled. So if you execute Process Explorer - the old versions would execute the procexp\procexp_64 process from AppData (User Space). So the Trusted Publisher List settings for Microsoft would be applied to Process Explorer. The MemGuard protection would block procexp\procexp_64 from reading other process memory - and the columns would mostly be blank. In the case of the older versions, yes, it was best to add to Power Apps or run it in Locked Down mode (which disables the Trusted Publisher List settings). With the most recent version of Process Explorer it runs completely from System Space and there is no MemGuard issue.
     
  17. guest

    guest Guest

    With newer versions of Process Explorer (v16.20) MS is providing both versions (32-bit and 64-bit) in the ProcessExplorer.zip-file, which can be downloaded from their site.
    You can now execute "procexp64.exe" on a 64-bit system and no temporary file is spawned in the temporary directory.
    ---
    The portable version of Process Explorer (portableapps.com) does include both executables (32bit+64bit), but after executing "ProcessExplorerPortable.exe", it launches "procexep.exe" and the 64bit-version "procexp64.exe" is extracted to a temporary directory :ninja:
    instead of launching it with "ProcessExplorerPortable.exe", it's maybe better to copy the file "procexp64.exe" somewhere to System Space and launch it directly.
     
  18. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Thanks for posting about the portable version. I haven't used it in a long time.
     
  19. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Thanks for the info @Lockdown and @mood.
    I did test the PortableApps.com version again now, without including it in Power Apps, and did still experience the issue of blank columns so the temporary directory issue does still exist with this portable version.
    Indeed I could copy procexp64.exe to System Space and do away with any Power Apps, but for now it's just easier to keep ProcessExplorerPortable.exe in Power Apps.
    I just prefer the convenience of PortableApps.com updating, and no extra steps.
     
  20. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    An alternative to adding portable Process Explorer to Power Apps, you can run it with AppGuard set to Locked Down mode. That will disable the Trusted Publisher List settings. If you want to run it in Protected mode, then you can simply set the MemGuard setting to OFF, use Process Explorer, and then when you are done re-enable the MemGuard setting back to ON.

    There are multiple solutions.
     
  21. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    Please don't ask me for free licenses.

    Please don't ask me for license discounts.

    I don't have access to general licenses.

    Licenses are handled by BRN operations; make requests through the AppGuard support page.
     
    Last edited: Feb 17, 2017
  22. guest

    guest Guest

    i think that statement will lighten your PM box :D
     
  23. paulderdash

    paulderdash Registered Member

    Joined:
    Dec 27, 2013
    Posts:
    4,644
    Location:
    Under a bushel ...
    Thanks @Lockdown.
    I do normally run in Protected Mode, on the assumption that I will get less blocks, but I will experiment with Locked Down mode, and see how it goes.
     
  24. Lockdown

    Lockdown Registered Member

    Joined:
    Oct 28, 2016
    Posts:
    772
    Location:
    Wilders Security
    You will get block events from User Space in Locked Down mode; OneDrive updater, manual updates of Windows Defender, dismhost.exe during automatic or manual system cleanup, and perhaps others dependent upon what softs that are installed on your system and run processes from User Space. The Google Chrome software_reporting_tool.exe for example.

    If you want to run in Locked Down mode, then all you need to do is to exclude those safe processes by adding them to the User Space list set to (NO).
     
  25. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,814
    Location:
    .
    :ninja::gack::p:argh:
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.