I did the XINGCODE Bypass and I will try it out right now. For the GMER, here is the scan
GMER 2.1.19357 -
GMER - Rootkit Detector and Remover
Rootkit scan 2014-07-08 16:38:51
Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\00000030 ST3500413AS rev.HP64 465.76GB
Running: gmer.exe; Driver: C:\Users\BLAHB_~1\AppData\Local\Temp\uwldqpow.sys
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\atiesrxx.exe[892] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffa5029169a 4 bytes [29, 50, FA, 7F]
.text C:\Windows\system32\atiesrxx.exe[892] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffa502916a2 4 bytes [29, 50, FA, 7F]
.text C:\Windows\system32\atiesrxx.exe[892] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffa5029181a 4 bytes [29, 50, FA, 7F]
.text C:\Windows\system32\atiesrxx.exe[892] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffa50291832 4 bytes [29, 50, FA, 7F]
.text C:\Windows\system32\atieclxx.exe[388] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007ffa5029169a 4 bytes [29, 50, FA, 7F]
.text C:\Windows\system32\atieclxx.exe[388] C:\Windows\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007ffa502916a2 4 bytes [29, 50, FA, 7F]
.text C:\Windows\system32\atieclxx.exe[388] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 118 00007ffa5029181a 4 bytes [29, 50, FA, 7F]
.text C:\Windows\system32\atieclxx.exe[388] C:\Windows\system32\PSAPI.DLL!QueryWorkingSet + 142 00007ffa50291832 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1816] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 506 00007ffa5029169a 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1816] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 514 00007ffa502916a2 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1816] C:\Windows\system32\psapi.dll!QueryWorkingSet + 118 00007ffa5029181a 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe[1816] C:\Windows\system32\psapi.dll!QueryWorkingSet + 142 00007ffa50291832 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[2112] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 506 00007ffa5029169a 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[2112] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 514 00007ffa502916a2 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[2112] C:\Windows\system32\psapi.dll!QueryWorkingSet + 118 00007ffa5029181a 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Windows Defender\MsMpEng.exe[2112] C:\Windows\system32\psapi.dll!QueryWorkingSet + 142 00007ffa50291832 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Tablet\Pen\Pen_Tablet.exe[3712] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 506 00007ffa5029169a 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Tablet\Pen\Pen_Tablet.exe[3712] C:\Windows\system32\psapi.dll!GetModuleBaseNameA + 514 00007ffa502916a2 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Tablet\Pen\Pen_Tablet.exe[3712] C:\Windows\system32\psapi.dll!QueryWorkingSet + 118 00007ffa5029181a 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Tablet\Pen\Pen_Tablet.exe[3712] C:\Windows\system32\psapi.dll!QueryWorkingSet + 142 00007ffa50291832 4 bytes [29, 50, FA, 7F]
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[2084] C:\Windows\SYSTEM32\WSOCK32.dll!setsockopt + 194 00007ffa45eb1f6a 4 bytes {JMP 0x47}
.text C:\Program Files\Windows Media Player\wmpnetwk.exe[2084] C:\Windows\SYSTEM32\WSOCK32.dll!setsockopt + 218 00007ffa45eb1f82 4 bytes {JMP 0x47}
---- Devices - GMER 2.1 ----
Device \Driver\KProcessHacker2 \Device\KProcessHacker2 fffff800108ce008
---- Threads - GMER 2.1 ----
Thread C:\Windows\system32\csrss.exe [588:608] fffff96000aabb90
Thread C:\Windows\syswow64\wwahost.exe [6224:6316] 000000007549a797
Thread C:\Windows\syswow64\wwahost.exe [6224:6368] 000000006952a172
Thread C:\Windows\syswow64\wwahost.exe [6224:1016] 00000000754946ea
Thread C:\Windows\syswow64\wwahost.exe [6224:6428] 00000000753c8244
Thread C:\Windows\syswow64\wwahost.exe [6224:6288] 000000005e48e82a
Thread C:\Windows\syswow64\wwahost.exe [6224:6436] 000000005e4ef891
Thread C:\Windows\syswow64\wwahost.exe [6224:2128] 000000005e48e769
Thread C:\Windows\syswow64\wwahost.exe [6224:6396] 000000005e4ef891
Thread C:\Windows\syswow64\wwahost.exe [6224:6348] 000000005e4ef891
Thread C:\Windows\syswow64\wwahost.exe [6224:4140] 0000000075e11174
Thread C:\Windows\syswow64\wwahost.exe [6224:424] 0000000076ef187e
Thread C:\Windows\syswow64\wwahost.exe [6224:1008] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:664] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:4952] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:2784] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:4044] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:5872] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:4644] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:1872] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:5456] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:6000] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:4468] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:6676] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:6748] 000000005e4ef891
Thread C:\Windows\syswow64\wwahost.exe [6224:2828] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:2552] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:2732] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:5552] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:1972] 000000005cb64a7c
Thread C:\Windows\syswow64\wwahost.exe [6224:7152] 000000005cb64a7c
---- Processes - GMER 2.1 ----
Process C:\Users\BLAHB_~1\AppData\Local\Temp\Rar$EXa0.749\gmer.exe (*** suspicious ***) @ C:\Users\BLAHB_~1\AppData\Local\Temp\Rar$EXa0.749\gmer.exe [6772](2014-07-08 20:33:01) 0000000000400000
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ----