From a Prevx web page, modern malware can defeat virtualization programs by directly writing directly to the atapi.sys kernel module. I was wondering if Shadow Defender has this same limitation. Also, there are malware that spread through USB drives. Returnil, a competing product, just forbids anyone from accessing the flash drive. However, this solution is terrible. What are Shadow Defender's defenses from these malware? Thanks!