×

Scanning data in an access restricted file for malware

  • US 7,660,797 B2
  • Filed: 05/27/2005
  • Issued: 02/09/2010
  • Est. Priority Date: 05/27/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for scanning a file stored on a computer that has been infected by malware and that has restrictive access attributes that were set by the malware to prevent the file from being scanned, the method comprising:

  • attempting to scan a file on a computer with a malware scanner that has administrator privileges to access files on the computer;

    receiving an indication that the file cannot be scanned because of one or more restrictive access attributes of the file that were set by malware that has infected the file, the one or more restrictive access attributes preventing the malware scanner from scanning the file because of the malware scanner'"'"'s administrator privileges, wherein the one or more restrictive access attributes comprise at least one of the following;

    the file being encrypted using a key that is associated with a particular user of the computer;

    the file being associated with an access control list that does not allow a program with administrator privileges to access the file;

    orthe file being locked for exclusive access by the malware;

    bypassing the one or more restrictive access attributes to scan the file, wherein bypassing the one or more restrictive attributes comprises the following;

    if the file is encrypted, impersonating the particular user to obtain the key to decrypt the file such that the file may be scanned;

    if the file is associated with an access control list that does not allow a program with administrator privileges to access the file, bypassing the access control list by obtaining a handle to the file from a backup/restore service and using the handle to scan the file;

    orif the file is locked for exclusive access by the malware, determining whether the file is currently open such that if the file is currently open, the malware scanner obtains and uses a duplicate handle to scan the file, and such that if the file is not currently open, the malware scanner obtains the file directly from a hardware device where the file is stored without using file system services provided by an operating system by identifying physical locations on the hardware device where data clusters associated with the file are stored by parsing a database maintained by the operating system that tracks file attributes; and

    scanning the file to identify the malware.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×