╔═══════════════════════════════════════
Instructions - Antimalware On-Access Scanner Test - Self-Contained

┌───────────────────────────────────────
Plainspeak

• This document allows you to immediately test your antimalware software's on-access scanner:
    · Without configuring antimalware exclusions.
    · Without accessing the EICAR web site.
    · Without accessing the Internet.
    · Using the 'Run' dialog, the command line, or a Windows shortcut.

• This document, itself, will not be detected as an EICAR threat despite the apparent EICAR string contained within it.
    · The inert EICAR variant string in this document contains two caret characters '^', whereas EICAR contains only one.
    · Do not alter the inert EICAR variant string in this document or in the command lines indicated.

• This inert EICAR variant test may be executed using utilities such as Windows Scheduled Tasks, psexec.exe, login script, etc., to canvass an organization for antimalware on-access scanner health.

┌───────────────────────────────────────
References

EICAR
EICAR Anti-malware Test File

┌───────────────────────────────────────
Test Using the 'Run' Dialog or cmd.exe Prompt

• In the 'Run' dialog box, execute:

    %COMSPEC% /C "ECHO X5O!P%@AP[4\PZX54(P^^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* >%TEMP%\EICAR.EXE"

    · A detection should result if exclusions and scan categories do not deliberately prevent scanning of the target file.
        · The antimalware on-access scanner should eventually detect the target file after any configured write-scan delay interval passes.
    · Some antimalware software will not generate a user alert for quickly-repeated identical detections generated within a short time period.
        · Verify any quickly-repeated detections within the antimalware software's log files.

• The command can be reissued from the cmd.exe buffer.

┌───────────────────────────────────────
Test Using a Windows Shortcut

• In File Explorer, create a new Windows shortcut:  PSPro's.EICAR.Test.Generator
    · In the Target field, enter:

    %COMSPEC% /C "ECHO X5O!P%@AP[4\PZX54(P^^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* >%TEMP%\EICAR.EXE"

    · In the 'Start in' field, enter: %WINDIR%
    · Click: OK

• Optional:
    · Assign a distinctive icon to the Windows shortcut from a Windows icon resource file present and resolvable on all Windows systems.
        · Recommended: imageres.dll, fourth page, top row, red shield with white 'x' marking.
    
• In File Explorer, execute the Windows shortcut.
    · A detection should result if exclusions and scan categories do not deliberately prevent scanning of the target file.
        · The antimalware on-access scanner should eventually detect the target file after any configured write-scan delay interval passes.
    · Some antimalware software will not generate a user alert for quickly-repeated identical detections generated within a short time period.
        · Verify any quickly-repeated detections within the antimalware software's log files.

• This Windows shortcut may be executed from any local or shared file system location.

┌───────────────────────────────────────
Test Steps Explained

%COMSPEC% /C "<content below>"
    · Start the command interpeter (cmd.exe), execute the content within double-quotes, and then exit.

ECHO X5O!P%@AP[4\PZX54(P^^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* >%TEMP%\EICAR.EXE
    · The command interpreter (cmd.exe) creates the target file '%TEMP%\EICAR.EXE' using the EICAR variant string as input.
        · cmd.exe's escape character is the caret.
        · The EICAR variant string contains two carets.
        · One caret will be removed by cmd.exe as an escape character.
        · cmd.exe creates the target file content with one caret.
        · This effectively 'reconstitutes' the true, detectable EICAR string within the target file content.

┌───────────────────────────────────────
Credits

Any external referenced material in this document is hyperlinked. Authors responsible for referenced work should be sought through the reference(s) listed.



I am Christopher Etter, a Professional Services consultant.

Because you are using this, I welcome you as my customer. These documents are free for you to use. I work diligently to serve you with material such as this. I would appreciate it if PSPRO (professionalservices.pro), my name, and this 'Credits' section remain attached to this work so that I accrue name recognition via your success and peer recommendation. Thank you very much, and I hope this document helps you solve your current information technology issue!