Introduction - If you have any usage issues, please Google them yourself
detection process code, we find the current Rootkit process. Recommended! (Using thread scheduling chain link)
Packet : 1985489rootkit.rar filelist
killster\buildchk.log
killster\buildchk_wnet_x86.log
killster\buildchk_wxp_x86.log
killster\kmodule.c
killster\Makefile
killster\Myklister.ncb
killster\Myklister.sln
killster\Myklister.sys
killster\Myklister.vcproj
killster\obj\_objects.mac
killster\objchk\i386\kmodule.obj
killster\objchk\i386\Myklister.pdb
killster\objchk_wnet_x86\i386\kmodule.obj
killster\objchk_wnet_x86\i386\Myklister.pdb
killster\objchk_wnet_x86\_objects.mac
killster\objchk_wxp_x86\i386\kmodule.obj
killster\objchk_wxp_x86\i386\Myklister.pdb
killster\objchk_wxp_x86\_objects.mac
killster\Sources
killster\objchk\i386
killster\objchk_wnet_x86\i386
killster\objchk_wxp_x86\i386
killster\objfre\i386
killster\obj
killster\objchk
killster\objchk_wnet_x86
killster\objchk_wxp_x86
killster\objfre
killster