In one embodiment an IO request packet (IRP) attempting to access a
computer disk is evaluated to determine if the request identifies an area
of a computer disk to be accessed that is marked as bad in a file system.
When the request identifies an area of the computer disk to be accessed
that is marked as bad in a file system, the request is assumed to be
indicative of a rootkit. In another embodiment an IO request packet is
evaluated to determine if the request identifies an area of the computer
disk to be accessed that was not identified in requests detected in the
file system level of the kernel. When the stalled request identifies an
area of the computer disk to be accessed not detected in requests
detected in the file system level of the kernel, the request is assumed
to be indicative of a rootkit.