Rustock.A (lzx32.sys) Removal

Kaspersky on-line file scanner detects the "winsyst32.exe" file as: Trojan-Clicker.Win32.Costrat.ac:

No additional information found on the site.


But after google it I found another names for this rootkit:

Rustock.A, Mailbot.AZ, Backdoor.Rustock.A.


The rootkit creates the boot driver with name "PE386" and stores the rootkit body in the Windows\System32:lzx32.sys.


UnHackMe detects and removes rootkit using Partizan anti-rootkit technology.


Note! It doesn't detect the rootkit using the signtature scans. If a rootkit changes the service name it will be detected as well.


Partizan Windows boot monitoring allows you to detect the rootkits on the earlist study of the Windows boot process.


Download and see the video story.

System requirements

Windows 9x, 2000/2003/XP/2008/Vista/Seven or higher 32 or 64 bit.
512 Mb RAM
CD/DVD drive or USB stick.

Purchase now!

Purchase includes:

  UnHackMe Single License - Electronic Delivery

  Warrior CD Image - Electronic Delivery

More information

Support


Please visit our support center: Ask your question

People say:

Lisa

This solution works great. Thanks!

Jim

Works as advertised. Keep up your good work guys!