OSArmor is a Windows OS application that monitors and blocks suspicious processes behaviors
to prevent infections by malware, ransomware, and other threats. This tool analyzes parent processes and prevents, for example, MS Word from running cmd.exe or powershell.exe. It prevents ransomware from deleting shadow copies of files via vssadmin.exe, blocks processes with double file extensions (i.e invoice.pdf.exe), blocks USB-spreading malware, and much more. It is lightweight, requires zero user input and
protects your system while running in the background. In combination with OSArmor you can
also use SysHardener to harden even more Windows OS settings.
For Windows 7 SP1, 8, 10, 11 (32 & 64-bit)
This application focuses on preventing malware infections by applying smart and intelligent rules that block malicious processes behavior. OSArmor can block threats not detected by your installed security solution. Add an additional layer of defense to your system and prevent infections by malware and ransomware! You don't have to configure anything, just install it and forget about it. We have already added more than 250 policies to improve your system security with this security application.
Analyze parent processes and child processes blocking exploit payloads.
Prevent WINWORD.EXE or EXCEL.EXE from executing malicious processes.
Monitor Adobe PDF Reader, MS Office, OpenOffice, Web Browsers, etc.
Prevent execution of processes started via autorun.inf from USB devices.
Block processes with command-line strings commonly related to malware.
Block system processes (vssadmin.exe, etc) from deleting shadow copies of files.
Block specific command-lines related to download of remote files.
Block execution of processes with .COM or .PIF obsolete file extensions.
Block wscript.exe, mshta.exe, etc if they match our rules of bad behaviors.
Prevent important and critical system modifications from Bcdedit.exe
Block execution of encoded or malformed commands via PowerShell.
You can exclude specifc processes or events from being blocked.
You can write your own custom block rules to block specific processes.
Our internal smart rules can block known and not-yet-known suspicious process activities.
The software application uses only a few MBs of memory, you will not even notice it.
In this video we test OSArmor with various recent malware families like
Magniber, IceID, Bumblebee, Qbot, AgentTesla and file types like ISO, LNK, IMG, MSI, EXE (signed), HTA etc.
We test also malicious MS Office documents (the most used malware delivery method).
|February 25, 2024
|Windows 7 SP1, 8, 8.1, 10, 11 (32 & 64-bit)
|Windows Server 2016, 2019, 2022 (32 & 64-bit)
|Malware Prevention Tool
|Setup File Size
Have questions? Don't hesitate to contact us directly via email.
If you don't receive a reply in one or two business days, please re-send the message.
Here is our email (it is an image to prevent spam):