Quantcast
Channel: Tech Support Guy
Viewing all articles
Browse latest Browse all 29110

Gmer has detected some malwares/rootkits

$
0
0
Are these dangerous?

Quote:

GMER 2.1.19163 - http://www.gmer.net
Rootkit scan 2013-09-13 17:20:36
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\00000039 WDC_WD5000LPVT-22G33T0 rev.01.01A01 465.76GB
Running: z4rlpubl.exe; Driver: C:\Users\iChad\AppData\Local\Temp\pxlorpow.sys


---- User code sections - GMER 2.1 ----

.text C:\Windows\Explorer.EXE[8052] C:\Windows\SYSTEM32\WSOCK32.dll!recvfrom + 742 000007f834bc1b32 4 bytes [BC, 34, F8, 07]
.text C:\Windows\Explorer.EXE[8052] C:\Windows\SYSTEM32\WSOCK32.dll!recvfrom + 750 000007f834bc1b3a 4 bytes [BC, 34, F8, 07]
.text C:\Windows\system32\taskhost.exe[7960] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 690 000007f83b2c1532 4 bytes [2C, 3B, F8, 07]
.text C:\Windows\system32\taskhost.exe[7960] C:\Windows\SYSTEM32\MSIMG32.dll!GradientFill + 698 000007f83b2c153a 4 bytes [2C, 3B, F8, 07]
.text C:\Windows\system32\taskhost.exe[7960] C:\Windows\SYSTEM32\MSIMG32.dll!TransparentBlt + 246 000007f83b2c165a 4 bytes [2C, 3B, F8, 07]
.text C:\Windows\Explorer.EXE[8052] C:\Windows\system32\RPCRT4.dll!NdrStubCall2 000007f83f588840 6 bytes JMP 000007f841990845
.text C:\Windows\system32\lsass.exe[844] C:\Windows\system32\RPCRT4.dll!NdrStubCall2 000007f83f588840 6 bytes JMP 000007f841af06a3
.text C:\Windows\System32\svchost.exe[1096] C:\Windows\system32\RPCRT4.dll!NdrStubCall2 000007f83f588840 6 bytes JMP 000007f841af0845
.text C:\Windows\system32\svchost.exe[2068] C:\Windows\system32\RPCRT4.dll!NdrStubCall2 000007f83f588840 6 bytes JMP 000007f841af0845
.text C:\Windows\system32\svchost.exe[644] C:\Windows\system32\RPCRT4.dll!NdrStubCall2 000007f83f588840 6 bytes JMP 000007f841af0845
.text C:\Windows\Explorer.EXE[8052] C:\Windows\system32\RPCRT4.dll!NdrServerInitialize 000007f83f58c300 6 bytes JMP 000007f841990774
.text C:\Windows\system32\lsass.exe[844] C:\Windows\system32\RPCRT4.dll!NdrServerInitialize 000007f83f58c300 6 bytes JMP 000007f841af05d2
.text C:\Windows\System32\svchost.exe[1096] C:\Windows\system32\RPCRT4.dll!NdrServerInitialize 000007f83f58c300 6 bytes JMP 000007f841af0774
.text C:\Windows\system32\svchost.exe[2068] C:\Windows\system32\RPCRT4.dll!NdrServerInitialize 000007f83f58c300 6 bytes JMP 000007f841af0774
.text C:\Windows\system32\svchost.exe[644] C:\Windows\system32\RPCRT4.dll!NdrServerInitialize 000007f83f58c300 6 bytes JMP 000007f841af0774
.text C:\Windows\Explorer.EXE[8052] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f83fa1bee0 5 bytes JMP 000007f8419906a3
.text C:\Windows\system32\svchost.exe[2068] C:\Windows\system32\USER32.dll!SetWindowsHookExW 000007f83fa1bee0 5 bytes JMP 000007f841af06a3
.text C:\Windows\system32\svchost.exe[644] C:\Windows\SYSTEM32\user32.dll!SetWindowsHookExW 000007f83fa1bee0 5 bytes JMP 000007f841af06a3
.text C:\Windows\Explorer.EXE[8052] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f83fa41850 12 bytes JMP 000007f8419905d2
.text C:\Windows\system32\svchost.exe[2068] C:\Windows\system32\USER32.dll!SetWindowsHookExA 000007f83fa41850 12 bytes JMP 000007f841af05d2
.text C:\Windows\system32\svchost.exe[644] C:\Windows\SYSTEM32\user32.dll!SetWindowsHookExA 000007f83fa41850 12 bytes JMP 000007f841af05d2
.text C:\Windows\Explorer.EXE[8052] C:\Windows\SYSTEM32\ntdll.dll!NtSetSecurityObject 000007f841b04401 8 bytes JMP 000007f941990501
.text C:\Windows\system32\lsass.exe[844] C:\Windows\SYSTEM32\ntdll.dll!NtSetSecurityObject 000007f841b04401 8 bytes JMP 000007f941af0501
.text C:\Windows\System32\svchost.exe[1096] C:\Windows\SYSTEM32\ntdll.dll!NtSetSecurityObject 000007f841b04401 8 bytes JMP 000007f941af0501
.text C:\Windows\system32\svchost.exe[2068] C:\Windows\SYSTEM32\ntdll.dll!NtSetSecurityObject 000007f841b04401 8 bytes JMP 000007f941af0501
.text C:\Windows\system32\svchost.exe[368] C:\Windows\SYSTEM32\ntdll.dll!NtSetSecurityObject 000007f841b04401 8 bytes JMP 000007f941af0501
.text C:\Windows\system32\svchost.exe[644] C:\Windows\SYSTEM32\ntdll.dll!NtSetSecurityObject 000007f841b04401 8 bytes JMP 000007f941af0501
.text C:\Windows\system32\svchost.exe[972] C:\Windows\SYSTEM32\ntdll.dll!NtSetSecurityObject 000007f841b04401 8 bytes JMP 000007f941af0501
.text C:\Windows\Explorer.EXE[8052] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941990430
.text C:\Windows\system32\lsass.exe[844] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941af0430
.text C:\Windows\system32\services.exe[836] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941af0430
.text C:\Windows\System32\svchost.exe[1096] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941af0430
.text C:\Windows\system32\svchost.exe[2068] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941af0430
.text C:\Windows\system32\svchost.exe[368] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941af0430
.text C:\Windows\system32\svchost.exe[644] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941af0430
.text C:\Windows\system32\svchost.exe[972] C:\Windows\SYSTEM32\ntdll.dll!LdrLoadDll 000007f841b1dfe4 5 bytes JMP 000007f941af0430

---- Kernel code sections - GMER 2.1 ----

.text C:\Windows\System32\win32k.sys!W32pServiceTable fffff960002b9e00 7 bytes [C0, CB, 1C, 01, 00, 7B, 9B]
.text C:\Windows\System32\win32k.sys!W32pServiceTable + 8 fffff960002b9e08 7 bytes [01, 10, E4, FF, 00, 5F, E8]

---- Threads - GMER 2.1 ----

Thread C:\Windows\system32\csrss.exe [4332:1480] fffff960008145e8

---- Disk sectors - GMER 2.1 ----

Disk \Device\Harddisk0\DR0 unknown MBR code

---- EOF - GMER 2.1 ----

Viewing all articles
Browse latest Browse all 29110

Trending Articles