GMER 1.0.15.15077 - http://www.gmer.net
Rootkit scan 2009-08-26 20:58:26
Windows 5.1.2600 Service Pack 3
—- System - GMER 1.0.15 —-
SSDT 82C021C0 ZwAlertResumeThread
SSDT 824BB778 ZwAlertThread
SSDT 824CF0C0 ZwAllocateVirtualMemory
SSDT 82CD7370 ZwAssignProcessToJobObject
SSDT 82BB5C90 ZwConnectPort
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwCreateKey
SSDT 82C2E0C0 ZwCreateMutant
SSDT 82C22D28 ZwCreateSymbolicLinkObject
SSDT 82D0F268 ZwCreateThread
SSDT 82D26930 ZwDebugActiveProcess
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteKey
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwDeleteValueKey
SSDT 82C4F0C0 ZwDuplicateObject
SSDT 82CA40C0 ZwFreeVirtualMemory
SSDT 823B00C0 ZwImpersonateAnonymousToken
SSDT 82A82578 ZwImpersonateThread
SSDT 828A5008 ZwLoadDriver
SSDT 82D20A88 ZwMapViewOfSection
SSDT 82BCBEB0 ZwOpenEvent
SSDT 824170C0 ZwOpenProcess
SSDT 82BFF178 ZwOpenProcessToken
SSDT 82C45AB8 ZwOpenSection
SSDT 824370C0 ZwOpenThread
SSDT 82E2C330 ZwProtectVirtualMemory
SSDT 82C081C8 ZwResumeThread
SSDT 82BED208 ZwSetContextThread
SSDT 82CE0658 ZwSetInformationProcess
SSDT 82C68238 ZwSetSystemInformation
SSDT \??\C:\WINDOWS\system32\Drivers\SYMEVENT.SYS (Symantec Event Library/Symantec Corporation) ZwSetValueKey
SSDT 82C23368 ZwSuspendProcess
SSDT 82BEC0B0 ZwSuspendThread
SSDT 82BFFAD8 ZwTerminateProcess
SSDT 82BEC390 ZwTerminateThread
SSDT 82BED658 ZwUnmapViewOfSection
SSDT 82E19628 ZwWriteVirtualMemory
—- Devices - GMER 1.0.15 —-
AttachedDevice \Driver\Tcpip \Device\Ip SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp SYMTDI.SYS (Network Dispatch Driver/Symantec Corporation)
—- Services - GMER 1.0.15 —-
Service C:\WINDOWS\system32 (*** hidden *** ) darkshell <– ROOTKIT !!!
—- Registry - GMER 1.0.15 —-
Reg HKLM\SOFTWARE\Classes\CLSID\{250B3616-206B-5A82-A5D6F15DB93FBA58}\{FE52926E-CF25-F3E9-FB54CAECC4E0C5A1}\{0B8E44BF-BE3D-1006-BCD0774B529E1F63}
Reg HKLM\SOFTWARE\Classes\CLSID\{250B3616-206B-5A82-A5D6F15DB93FBA58}\{FE52926E-CF25-F3E9-FB54CAECC4E0C5A1}\{0B8E44BF-BE3D-1006-BCD0774B529E1F63}@WVJSMZU2N2J3TUTL6NSXFNN2ZH1 0x01 0x00 0x01 0x00 …
—- EOF - GMER 1.0.15 —-