are generally considered those leftover files/registry entries and remnants that malware
leaves behind in various locations on a computer's system.
Each security vendor uses their own naming conventions to identify various types of malware
so it's difficult to determine exactly what has been detected or the nature of the threat without knowing more information about the detection.
For example, this is what Emsisoft
Spyware Traces in Detail
...the Anti-Malware Scanner looks for files, folders, registry entries and Tracking Cookies that are typically created by Spyware programs. Traces are exactly these trails that Spyware leaves behind...This approach has both advantages and disadvantages for Malware recognition...The negative side is that it provides a relatively inexact, or insufficiently differentiated to be more precise, Malware recognition. Benign software can be falsely recognized...if it uses the same file name or folder as a dangerous Spyware program. Software discovered via Traces should therefore first be double-checked to see if it is actually Malware before it is finally deleted...
You would need to contact and ask HitmanPro support to determine exactly how they define the term.
PnkBstrK.sys is a system driver...system drivers are prone to detection by various security scanning tools for a variety of reasons.
For example, Daemon Tools is a CD Emulator
that uses rootkit-like techniques
to hide from other applications and to circumvent copy protection schemes. Alchohol 120%, Astroburn and AnyDVD have similar capabilities. AnyDVD uses a driver that allows decryption of DVDs on-the-fly and targeted removal of copy preventions/user operation prohibitions. Alcohol uses a technology similar to hide it's drivers on the system so that game copy protection schemes are unable to detect and blacklist Alcohol virtual drives.
It is not uncommon for the drivers used by these and other anti-cheating or circumventing programs with such technology to be detected as suspicious. Since PnkBstrK.sys is Punk Buster's anti-cheating system driver file, it most likely uses similar techniques and therefore it too is detected as suspicious.
Anytime you come across a suspicious file or you want a second opinion, submit it to one of the following online services that analyzes suspicious files:
--In the "File to Scan
" (Upload or Submit) box, browse to the location of the suspicious file(s) and submit (upload) it for scanning/analysis. If you get a message saying "File has already been analyzed
", click Reanalyze
or Scan again