Rustock.A (lzx32.sys) Removal
No additional information found on the site.
But after google it I found another names for this rootkit:
Rustock.A, Mailbot.AZ, Backdoor.Rustock.A.
The rootkit creates the boot driver with name "PE386" and stores the rootkit body in the Windows\System32:lzx32.sys.
UnHackMe detects and removes rootkit using Partizan anti-rootkit technology.
Note! It doesn't detect the rootkit using the signtature scans. If a rootkit changes the service name it will be detected as well.
Partizan Windows boot monitoring allows you to detect the rootkits on the earlist study of the Windows boot process.
Download and see the video story.
System requirements
Windows 9x, 2000/2003/XP/2008/Vista/Seven or higher 32 or 64 bit.512 Mb RAM
CD/DVD drive or USB stick.
Purchase now!
Purchase includes:
• UnHackMe Single License - Electronic Delivery
• Warrior CD Image - Electronic Delivery
People say:
LisaThis solution works great. Thanks!
Jim
Works as advertised. Keep up your good work guys!