Defrag Tools: #89 - Symbol Folder Tools

Mark Russinovich joins Andrew Richards and Larry Larsen for a live version of Defrag Tools. We go through all of the updates that have occurred to the Sysinternals tools in 2014.
Mark's TechEd Sessions:
TechEd Keynote
DCIM-B306 - Public Cloud Security: Surviving in a Hostile Multi-Tenant Environment
DCIM-B386 - Mark Russinovich and Mark Minasi on Cloud Computing
DCIM-B359 - TWC: Pass-the-Hash: How Attackers Spread and How to Stop Them
DCIM-B368 - TWC: Malware Hunting with Mark Russinovich and the Sysinternals Tools
WIN-B354 - Case of the Unexplained: Troubleshooting with Mark Russinovich
Channel 9 Live: Microsoft Azure with Mark Russinovich
Channel 9 Live: Defrag Tools Live – Mark Russinovich
Timeline:
Channel 9 Live:
[00:00] - Welcome Mark!
[01:30] - Autoruns v12.0
[03:15] - ProcDump v7.0
[04:34] - AccessChk v5.2
[05:48] - Sigcheck v2.1
Channel 9 Live - Web Exclusive:
[10:17] - Sigcheck v2.1 continued...
[12:48] - PsExec v2.1
[15:59] - PsPing v2.0
[20:28] - Process Explorer v16.0
The VirusTotal feature is great, but VirusTotal doesn't report, if a signature is of known or unknown origin, or when it was first entered into the system and the reputable vendor rating is voted on by community users. Many anti-virus vendors do provide such services (Comodo, Symantec, to name some of prominence) and provide this information via an API on their systems for use with tools that are very similar to yours. Would it be possible to also integrate with those? That'd be awesome.
Mark's VirusTotal integrated Process Explorer plus Malwarebytes saved my brothers laptop from a nasty bit of software that blocked Malwarebytes download, some functions in Process Explorer, and created a proxy server on the local host. Thank you Mark for this lovely tool, and thank you Defrag Tools team for brining quality content week after week.