About Site Map Submit Contact Us Log in | Create an account
Create an account Log In
Average Rating
User Rating:
Visitors Rating:
My rating:

Write review
  • License: Freeware
  • Last update: 5 years ago
  • Total downloads: 254
  • Price: Free |
  • Operating system: WinXP, Win2003, Win2000, Win Vista, Windows 7
  • Publisher: Resplendence (3 other programs)
See full specifications
SanityCheck 2.02 screenshot

windows default iconSanityCheck Publisher's description

SanityCheck is an advanced rootkit and malware detection tool for Windows which thoroughly scans the system for threats and irregularities which indicate malware or rootkit behavior.

SanityCheck is an advanced rootkit and malware detection tool for Windows which thoroughly scans the system for threats and irregularities which indicate malware or rootkit behavior. By making use of special deep inventory techniques, this program detects hidden and spoofed processes, hidden threads, hidden drivers and a large number of hooks and hacks which are typically the work of rootkits and malware. It offers a comprehensible report which gives a detailed explanation of any irregularities found and offers suggestions on how to solve or further investigate any situation.

Currently SanityCheck offers the following features:

Runs on almost all Windows versions

SanityCheck runs on most recent Windows versions including Windows XP, Windows Vista, Windows 2003 and 2008 Server. Unlike most other anti-rootkit software it also supports x64 editions of Windows. For an exact overview of the Windows versions supported by SanityCheck and the service packs required click here.

Makes use of special deep inventory techniques

SanityCheck makes use of a special Windows feature (a GlobalFlag setting) which allows it to create a deep inventory of drivers, devices, processes, threads and a lot of other information about your system. By making use of this feature in combination with other techniques it is able to create a very thorough scan of irregularities on your system.

Detect hidden processes

SanityCheck goes to incredible lengths to detect processes which hide themselves from the Windows taskmanager and programming interfaces. It uses seven unmentioned safe techniques to reveal hidden processes in both usermode and kernelmode.

Detect obfuscated processes

Sanity Check detects processes which do efforts to obfuscate their names. This is a typical activity associated with malware.

Detect processes attempting to appear as common system processes

Sanity Check detects for processes which appear as a standard Windows process.

Detect processes with obviously deceptive names

Malicious processes which are received as email attachements often try to appear as an innocent document types. An example of such a process name is:
"foo.txt .exe"

Detect processes without product, company or description information

Although not necessarily evil, SanityCheck checks for processes without a product, company or description resource information.

Verify signatures and checksums of processes and kernel modules

Sanitycheck verifies digital signatures on processes and kernel modules and checks them for validity. It also verifies the validity of checksums.

Detect SSDT hooks

SanityCheck detects kernel modules which hook the system service descriptor table. Although not necessarily the work of malware, SanityCheck will do every effort to detect the modules responsbile for these acts and generate a comprehensible report.

Detect Import Address Table hooks

The program detects kernel modules which hook the entry points of exported kernel routines.

Detect kernel object callout hooks

Although rarely used, kernel object callout hooks are incredibly powerful and have the potential to instrument the complete working of the Windows kernel. Currently we do not know of any security product which detects these hooks.

Detect hidden drivers

SanityCheck detects various forms of kernel modules which are attempting to hide.

Detect hijacked driver entry points

Hijacked dispatch entry points in drivers can be used by rootkits and malware for a wide variety of purposes. SanityCheck detects both drivers which have their entry points hooked as well as the modules reponsible for these actions.

Find the culprit

Note that it is not always possible to make a clear distinction between malware and legitimate products. This is because certain products resort to aggressive controversial techniques as anti-piracy measures, to avoid debugging or even for anti-competitive purposes. Anitivirus or other security software that is installed on your system may be making use of rootkit-like techniques such as a hidden process in an effort to hide itself from malware. Such products may be involved in a controversial race along the lines of "defeat evil with its own weapons".

For this reason SanityCheck does everything possible to pinpoint the modules and processes which are responsbile for these actions while remaining careful in drawing any conclusions.

Comprehensible report

We do not believe in aggressively "fixing" malware with a single click of a button. This is because there is no such thing as a clear distinction line between malware and legitimate products which make of controversial techniques. "Fixing" hooks in the kernel is a very unsafe and despicable act which is only very likely to make your system crash or worse. Instead Sanitycheck leaves your system in an unaltered state while offering comprehensible suggestions on how to proceed in any situation.

Optional expert mode

Optionally you can switch SanityCheck into expert mode. It will then display a wealth of information on drivers, devices, processes, threads, kernel objects and system routines which can be very useful for further analysis. A lot of the information available in expert mode cannot be obtained by any other existing utility other than a kernel debugger. Because the amount of information can be overwhelming and may be difficult to understand for novice users, it is turned off by default and only a comprehensible report is displayed.

What's New in This Release:

Minifilter altitude changed

The minifilter component that SanityCheck makes use of was installed at an altitude that was conflicting with other products. We have updated the altitude to the level that has been recently issued to us by Microsoft.

Amount of installed RAM was misreported

SanityCheck would misreport the amount of installed physical memory if more than 4GB of RAM was installed. This has been fixed.

Minor bug fixes

Some minor unspecified bug fixes were made.

System Requirements:

No special requirements.
Program Release Status: Major Update
Program Install Support: Install and Uninstall

SanityCheck Tags:

Click on a tag to find related softwares

Is SanityCheck your software?

Manage your software

Most Popular

windows default icon Hotspot Shield 3.20
Hotspot Shield : ensure you are private, secure, and anonymous online!
McAfee SuperDAT Update 7354 icon McAfee SuperDAT Update 7354
McAfee virus pattern and engine updates.
Avira Antivir Virus Definition File Update 19-02-2014 icon Avira Antivir Virus Definition File Update 19-02-2014
A comprehensive, easy to use antivirus program, designed to offer reliable virus protection to home-users only... Read more
windows default icon Hack password 1.0.1
Hides the windows password character. Finally you can see what you type.
windows default icon Quick Heal AntiVirus 2012
Quick Heal AntiVirus 2010, with its intuitive and easy-to-use interface

Related Category

» Access Control (455)
» Firewalls (60)
» Other (1171)