Jump to content

VirTool:Win32/DefenderTamperingRestore discovered after Windows Update

Recommended Posts

To make a long story short, I updated my computer the night before and logged on today to discover a message from Windows Security. I opened up Windows Security to see the message that Windows Defender was turned off. I already knew this was the case as I use Malwarebyte Premium, but it gave me the option to turn it back on so I did. As I turned it on, it started scanning. I immediately stopped the scan because I didn't really want to have my computer scanning while I was using it. As soon as I stopped it, it said that it found "VirTool:Win32/DefenderTamperingRestore" and that the affected items were "regkeyvalue: hklm\software\microsoft\windows defender\\DisableAntiSpyware".

After a lot of googling, I've been unable to come up with a definite answer or not and I'm hoping that someone here could clarify this for me. I'm currently running a deep Malwarebytes scan on my main SSD, but I'm 2 hours in with no detections and still have to scan my HDD which should take even longer. Did Windows Defender find VirTool:Win32/DefenderTamperingRestore because Malwarebytes Premium was installed and I re-enabled Windows Defender after my update or is it possible that my system is infected with some kind of virus or malware?

Thanks in advanced for the help. Also, I've been having a hard time with the spam filter. Not to mention I just created this account and got hit with 3 random login attempts almost immediately.


Link to post
Share on other sites

  • Root Admin

Hello @FinalShark

This is normal. It's just a setting that Windows Defender puts back to default is all.

Please go ahead and run the following if you're concerned about any possible infection and we'll review and assist you.


Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.



When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download






  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.


Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.



Link to post
Share on other sites

Thanks for the response! I'm probably going to try that whenever this full scan finishes. I'm currently at almost 7 hours for this scan. So far, Malwarebytes has discovered one thing, a Malware.AI. I'm not sure if this file is an issue as I know where I downloaded it from and I have not actually opened the file since I downloaded it almost a year ago. However, I'm still going to just delete it after the scan to be safe since I never got around to using it anyway.

However, I do have an update on my Windows issue. Since I've been sitting around waiting for this scan to finish, I've been messing around in the settings. I unregistered Malwarebytes in WSC and fully activated Windows Defender. After doing that, the "VirTool:Win32/DefenderTamperingRestore" moved from active threat to the Protection History as "Abandoned". I still haven't removed the Malware.AI that was detected so I think those two things are unrelated, but if there's something to be thankful for it's this issue alerting me to possible Malware on my system.

Link to post
Share on other sites

  • 3 weeks later...
  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection



Link to post
Share on other sites

This topic is now closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.