Hey Everyone. I have just scanned my Compaq Presario laptop computer with McAfee, scanning all files and folders, and finding and deleting four antiviruses, however, no matter what i do, that pesky NTOSKRNL - HOOK just won't go away. I have read multiple forums regarding this problem and many of them suggested booting into safe mode. Unfortunately, i get a blue screen of death every time i attempt this, so i am stuck in regular windows unable to proceed any further. Also, occasionally when i run windows in normal mode the blue death screen still appears, automatically restarting my computer repeatedly. I still have full internet access, full access to my antimalware and antivirus protection, and nothing else seems to be restricted as i can see now. I have ran three Malwarebytes AntiMalware scans - two quick and one full - and deleted any spyware, as well as restarted my computer asap. I also have ran an AVG free antivirus scan which found absolutely nothing. I am going to post my most recent logs from Malwarebytes, McAfee and RootRepeal, and any help would be greatly appreciated, as I am going to college in two days and need my computer up and running at full speed without a risk of crashing. Thank you very much.
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2009/08/25 09:58
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xED4C7000 Size: 98304 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B4C000 Size: 8192 File Visible: No Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xEDA3A000 Size: 49152 File Visible: No Signed: -
Status: -
Hidden/Locked Files
-------------------
Path: C:\WINDOWS\system32\kbiwkmabrpuhhb.dll
Status: Invisible to the Windows API!
Path: C:\WINDOWS\system32\kbiwkmgdqrdlft.dat
Status: Invisible to the Windows API!
Path: C:\WINDOWS\system32\kbiwkmiranwuyr.dll
Status: Invisible to the Windows API!
Path: C:\WINDOWS\system32\kbiwkmkymkkdmp.dat
Status: Invisible to the Windows API!
Path: C:\WINDOWS\Temp\kbiwkmoqmcrtqjhx.tmp
Status: Invisible to the Windows API!
Path: C:\WINDOWS\system32\drivers\kbiwkmwboradae.sys
Status: Invisible to the Windows API!
Path: c:\documents and settings\admin\local settings\application data\google\chrome\user data\default\current session
Status: Size mismatch (API: 19594, Raw: 15591)
Stealth Objects
-------------------
Object: Hidden Module [Name: kbiwkmiranwuyr.dll]
Process: svchost.exe (PID: 988) Address: 0x10000000 Size: 49152
Object: Hidden Module [Name: kbiwkmabrpuhhb.dll]
Process: Explorer.EXE (PID: 1632) Address: 0x10000000 Size: 32768
Hidden Services
-------------------
Service Name: kbiwkmppqoqvxo
Image Path: C:\WINDOWS\system32\drivers\kbiwkmwboradae.sys
Service Name: WZSZXserv.sys
Image Path: C:\WINDOWS\system32\drivers\WZSZXuwkiorbqbdqomuwkriqhkltapucwjudw.sys
==EOF==
==========================================================
========================Malwarebytes AntiMalware=================
==========================================================
Malwarebytes' Anti-Malware 1.40
Database version: 2693
Windows 5.1.2600 Service Pack 3
8/25/2009 10:35:56 AM
mbam-log-2009-08-25 (10-35-56).txt
Scan type: Quick Scan
Objects scanned: 88033
Time elapsed: 5 minute(s), 4 second(s)
Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 0
Memory Processes Infected:
(No malicious items detected)
Memory Modules Infected:
(No malicious items detected)
Registry Keys Infected:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\AntipPro2009_100 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Enum\Root\LEGACY_ANTIPPRO2009_100 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Registry Values Infected:
(No malicious items detected)
Registry Data Items Infected:
(No malicious items detected)
Folders Infected:
(No malicious items detected)
Files Infected:
(No malicious items detected)