is an older advanced stand-alone tool that compares the output from system function calls directly into the operating system to output from calls generated by their own functions. Any differences between it's own implementation and that of the operating system is reported as a hidden file, service, registry key, or device. GMER also looks for hidden code modifications and API Kernel hooks as well as many other checks which are not discussed in public to safeguard the program from malware writers who would use that information for nefarious purposes. GMER will not actually tell you if you are infected or not
unless you know what you're looking for. Most of the log listings are dumps of raw memory data structures from the Windows Kernel which handles access to files, registry keys, hardware and from the system processor tables. Even with advanced training, trying to interpret GMER results can be confusing at best as there could be many legitimate entries in its log.
If you want a comprehensive look at your system for possible malware by our experts, there are other more reliable advanced tools which can be used to investigate but they are not permitted in this forum. Please follow the instructions in the Malware Removal and Log Section Preparation Guide
. When you have done that, start a new topic and post your logs
in the Virus, Trojan, Spyware, and Malware Removal Logs forum
, NOT here
, for assistance by the Malware Response Team. If HelpBot
replies to your topic, please follow Step One and CLICK the link so it will report your topic to the team members.
If you choose to post a log, please reply back in this thread with a link to the new topic.