GMER 1.0.15.15641 - http://www.gmer.net Rootkit scan 2012-02-07 19:27:36 Windows 6.1.7600 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 WDC_WD25 rev.01.0 Running: h2yoqb54.exe; Driver: C:\Users\user\AppData\Local\Temp\pxldapob.sys ---- Kernel code sections - GMER 1.0.15 ---- .text ntkrnlpa.exe!ZwSaveKeyEx + 13AD 82C605D9 1 Byte [06] .text ntkrnlpa.exe!KiDispatchInterrupt + 5A2 82C85092 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3} ? C:\Windows\system32\DRIVERS\tmlwf.sys suspicious PE modification ---- User IAT/EAT - GMER 1.0.15 ---- IAT C:\Program Files\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[2560] @ C:\Windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress] [750A5E25] C:\Windows\system32\apphelp.dll (Biblioteka klienta zgodności aplikacji/Microsoft Corporation) IAT C:\Program Files\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[2560] @ C:\Windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress] [750A5E25] C:\Windows\system32\apphelp.dll (Biblioteka klienta zgodności aplikacji/Microsoft Corporation) IAT C:\Program Files\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[2560] @ C:\Windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress] [750A5E25] C:\Windows\system32\apphelp.dll (Biblioteka klienta zgodności aplikacji/Microsoft Corporation) IAT C:\Program Files\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[2560] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress] [750A5E25] C:\Windows\system32\apphelp.dll (Biblioteka klienta zgodności aplikacji/Microsoft Corporation) IAT C:\Program Files\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[2560] @ C:\Windows\system32\WININET.dll [KERNEL32.dll!GetProcAddress] [750A5E25] C:\Windows\system32\apphelp.dll (Biblioteka klienta zgodności aplikacji/Microsoft Corporation) IAT C:\Program Files\Roxio\OEM\Roxio Burn\RoxioBurnLauncher.exe[2560] @ C:\Windows\system32\CRYPT32.dll [KERNEL32.dll!GetProcAddress] [750A5E25] C:\Windows\system32\apphelp.dll (Biblioteka klienta zgodności aplikacji/Microsoft Corporation) ---- Devices - GMER 1.0.15 ---- AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (Aparat wykonawczy struktury sterowników trybu jądra/Microsoft Corporation) AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (Aparat wykonawczy struktury sterowników trybu jądra/Microsoft Corporation) Device \Driver\ACPI_HAL \Device\00000045 halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation) AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation) AttachedDevice \Driver\volmgr \Device\HarddiskVolume3 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation) AttachedDevice \Driver\volmgr \Device\HarddiskVolume5 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation) AttachedDevice \Driver\volmgr \Device\HarddiskVolume7 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation) AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Menedżer filtrów systemu plików firmy Microsoft/Microsoft Corporation) ---- Threads - GMER 1.0.15 ---- Thread System [4:284] 8AC07540 Thread System [4:288] 8AC07540 Thread System [4:292] 8AC07540 Thread System [4:296] 8AC07540 ---- Registry - GMER 1.0.15 ---- Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\c0cb38c6c5a8 Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\c0cb38c6c5a8 (not active ControlSet) ---- Files - GMER 1.0.15 ---- File C:\Windows\$NtUninstallKB31023$\102575468 0 bytes File C:\Windows\$NtUninstallKB31023$\689483720 0 bytes File C:\Windows\$NtUninstallKB31023$\689483720\@ 2048 bytes File C:\Windows\$NtUninstallKB31023$\689483720\L 0 bytes File C:\Windows\$NtUninstallKB31023$\689483720\L\xadqgnnk 146448 bytes File C:\Windows\$NtUninstallKB31023$\689483720\U 0 bytes ---- EOF - GMER 1.0.15 ----