vtd_16.exe - Dangerous
%sysdir%\vtd_16.exe
Manual removal instructions:
Antivirus Report of %sysdir%\vtd_16.exe:
%sysdir%\vtd_16.exe
vtd_16.exe is rootkit Trojan.Haxdoor-AE.
vtd_16.exe is used to hide files, processes and registry.
vtd_16.exe is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
draw32.dll created new system drivers:
service name: "draw32.dll"
display name: "MedManager"
memlow.sys created new system drivers:
service name: "memlow"
display name: "LMMngr"
vdnt32.sys created new system drivers:
service name: " vdnt32"
display name: "MemDRV"
Related files:
%SysDir%\vtd_16.exe
%SysDir%\cm.dll
%SysDir%\draw32.dll
%SysDir%\hm.sys
%SysDir%\memlow.sys
%SysDir%\p2.ini
%SysDir%\vdnt32.sys
%SysDir%\wd.sys
%SysDir%\i.a3d
%SysDir%\klogini.dll
Added to registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
%sysdir%\vtd_16.exe | Malware |
%sysdir%\vtd_16.exe | Dangerous |
%sysdir%\vtd_16.exe | High Risk |
vtd_16.exe is used to hide files, processes and registry.
vtd_16.exe is a kernel mode rootkit.
Rootkit contacts remote hacker server using HTTP session.
draw32.dll created new system drivers:
service name: "draw32.dll"
display name: "MedManager"
memlow.sys created new system drivers:
service name: "memlow"
display name: "LMMngr"
vdnt32.sys created new system drivers:
service name: " vdnt32"
display name: "MemDRV"
Related files:
%SysDir%\vtd_16.exe
%SysDir%\cm.dll
%SysDir%\draw32.dll
%SysDir%\hm.sys
%SysDir%\memlow.sys
%SysDir%\p2.ini
%SysDir%\vdnt32.sys
%SysDir%\wd.sys
%SysDir%\i.a3d
%SysDir%\klogini.dll
Added to registry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.