This is actually Rustock.B or Rustock v1.2.
GMER detects it by registry key, it can't detect driver. RkU can detect it hooks, driver and hidden ADS.
Below is the log from system infected with lzx32.sys Rustock.B
Ignore atapi.sys detections, this VM also infected with latest TDL3 and some other rootkits.
RkU Version: 3.8.388.590, Type LE (SR2)
==============================================
OS Name: Windows XP
Version 5.1.2600 (Service Pack 3)
Number of processors #1
==============================================
>Drivers
==============================================
!!!!!!!!!!!Hidden driver: 0xF8100000 pe386 73728 bytes
0x81B608BE unknown_irp_handler 1858 bytes
!!!!!!!!!!!Hidden driver: 0x81DFDCE2 ?_empty_? 798 bytes
!!!!!!!!!!!Hidden driver: 0x81FDD760 ?_empty_? 0 bytes
==============================================
>Stealth
==============================================
0xF8493000 WARNING: suspicious driver modification [atapi.sys::0x81DFDCE2]
0x66700000 Hidden Image-->mssfc.dll [ EPROCESS 0x81D2EDA0 ] PID: 408, 1576960 bytes
0x10000000 Hidden Image-->sfcfiles.dll [ EPROCESS 0x81D2EDA0 ] PID: 408, 40960 bytes
==============================================
>Files
==============================================
!-->[Hidden] C:\WINDOWS\system32:lzx32.sys:$DATA
==============================================
>Hooks
==============================================
IDT-->Int 2Eh-->_KiSystemService, Type: Inline - RelativeJump 0x806DABA8-->F8104DDF [pe386]
ntoskrnl.exe+0x00004AA2, Type: Inline - RelativeJump 0x804DBAA2-->804DBAA9 [ntoskrnl.exe]
ntoskrnl.exe+0x00027327, Type: Inline - DirectJump 0x804FE327-->F501FD8C [Dbgv.sys]
ntoskrnl.exe+0x000B710C, Type: Inline - RelativeJump 0x8058E10C-->81B609EE [unknown_irp_handler]
ntoskrnl.exe-->IofCallDriver, Type: Address change 0x80553480-->F8103863 [pe386]
SYSENTER/Int 2E, Type: System Call & Inline 0x804DE6F0-->F8104E0B [pe386]
tcpip.sys+0x00003D3A, Type: Inline - RelativeCall 0xF8077D3A-->F8106BCF [pe386]
tcpip.sys+0x00005690, Type: Inline - RelativeCall 0xF8079690-->F8106BCF [pe386]
tcpip.sys+0x0001B480, Type: Inline - RelativeCall 0xF808F480-->F8106BCF [pe386]
tcpip.sys-->ndis.sys-->NdisCloseAdapter, Type: IAT modification 0xF80B33A8-->F8106C33 [pe386]
tcpip.sys-->ndis.sys-->NdisOpenAdapter, Type: IAT modification 0xF80B33D4-->F8106BE5 [pe386]
wanarp.sys+0x000053FD, Type: Inline - RelativeCall 0xF81673FD-->F8106BD9 [pe386]
!!POSSIBLE ROOTKIT ACTIVITY DETECTED!! =)
I've removed nonmeaningful list of drivers and user mode hooks.