boot32.sys - Dangerous
%sysdir%\boot32.sys
Manual removal instructions:
Antivirus Report of %sysdir%\boot32.sys:
%sysdir%\boot32.sys
boot32.sys is rootkit Trojan.Haxdoor-AC.
boot32.sys is used to hide files, processes and registry.
boot32.sys is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
boot32.sys tries to terminate antiviral programs installed on a user computer.
boot32.sys monitors user Internet activity and private information.
It sends stolen data to a hacker site.
boot32.sys created new system drivers:
service name: "boot32"
display name: "KeBoot"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\boot32\
to the Windows startup registry keys.
sdmapi.sys created new system drivers:
service name: "sdmapi"
display name: "KeSDM"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\sdmapi\
to the Windows startup registry keys.
Related files:
%SysDir%\boot32.sys
%SysDir%\p2.ini
%SysDir%\c3.dll
%SysDir%\c3.sys
%SysDir%\c4.sys
%SysDir%\debugg.dll
%SysDir%\sdmapi.sys
%SysDir%\klogini.dll
Adds the value:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\
Notify\debugg\
to the Windows startup registry keys.
Added to registry:
HKLM\System\RAdmin\v2.0\Server\Parameters\
DisableTrayIcon = 1
HKLM\System\CurrentControlSet\Control\Session Manager\
Memory Management\EnforceWriteProtection = 0
HKLM\System\CurrentControlSet\Control\Impersonate
HKLM\System\CurrentControlSet\Control\StackSize
%sysdir%\boot32.sys | Malware |
%sysdir%\boot32.sys | Dangerous |
%sysdir%\boot32.sys | High Risk |
boot32.sys is used to hide files, processes and registry.
boot32.sys is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
boot32.sys tries to terminate antiviral programs installed on a user computer.
boot32.sys monitors user Internet activity and private information.
It sends stolen data to a hacker site.
boot32.sys created new system drivers:
service name: "boot32"
display name: "KeBoot"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\boot32\
to the Windows startup registry keys.
sdmapi.sys created new system drivers:
service name: "sdmapi"
display name: "KeSDM"
Adds the value:
HKLM\SYSTEM\CurrentControlSet\Services\sdmapi\
to the Windows startup registry keys.
Related files:
%SysDir%\boot32.sys
%SysDir%\p2.ini
%SysDir%\c3.dll
%SysDir%\c3.sys
%SysDir%\c4.sys
%SysDir%\debugg.dll
%SysDir%\sdmapi.sys
%SysDir%\klogini.dll
Adds the value:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\
Notify\debugg\
to the Windows startup registry keys.
Added to registry:
HKLM\System\RAdmin\v2.0\Server\Parameters\
DisableTrayIcon = 1
HKLM\System\CurrentControlSet\Control\Session Manager\
Memory Management\EnforceWriteProtection = 0
HKLM\System\CurrentControlSet\Control\Impersonate
HKLM\System\CurrentControlSet\Control\StackSize
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.