windrvnt.sys is usually located in the 'c:\windows\system32\' folder.
Some of the anti-virus scanners at VirusTotal detected windrvnt.sys.
If you have additional information about the file, please share it with the FreeFixer users by posting a comment at the bottom of this page.
windrvnt.sys is not signed.
3 of the 50 anti-virus programs at VirusTotal detected the windrvnt.sys file. That's a 6% detection rate.
The instructions below shows how to remove windrvnt.sys with help from the FreeFixer removal tool. Basically, you install FreeFixer, scan your computer, check the windrvnt.sys file for removal, restart your computer and scan it again to verify that windrvnt.sys has been successfully removed. Here are the removal instructions in more detail:
windrvnt.sys may also be located in other folders than c:\windows\system32\. The most common variants are listed below:
Property | Value |
---|---|
MD5 | ce291805cb4cd561a5a569df4e28e41f |
SHA256 | 68df0124255f1f94e820099e15d10fa39ddcf6cd8bfa70f5d86c49df136325df |
To help other users, please let us know what you will do with windrvnt.sys:
The poll result listed below shows what users chose to do with windrvnt.sys. 0% have voted for removal. Based on votes from 5 users.
Votes | |||
---|---|---|---|
Keep | 100 % | 5 | |
Remove | 0 % | 0 |
Please share with the other users what you think about this file. What does this file do? Is it legitimate or something that your computer is better without? Do you know how it was installed on your system? Did you install it yourself or did it come bundled with some other software? Is it running smoothly or do you get some error message? Any information that will help to document this file is welcome. Thank you for your contributions.
I'm reading all new comments so don't hesitate to post a question about the file. If I don't have the answer perhaps another user can help you.
Apparently windrvnt.sys is used by a legitimate program that I use called "FolderLock".
More info can be found at this link: http://www.file.net/process/windrvnt.sys.html
# 31 Jan 2010, 7:25
Kimsland writes