Here is the latest log from ROOTREPEAL
******************************************************
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/01/09 08:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA95CA000 Size: 98304 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B7F000 Size: 8192 File Visible: No Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA86EE000 Size: 49152 File Visible: No Signed: -
Status: -
Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!
SSDT
-------------------
#: 012 Function Name: NtAlertResumeThread
Status: Hooked by "<unknown>" at address 0x86e29c08
#: 013 Function Name: NtAlertThread
Status: Hooked by "<unknown>" at address 0x86e29a80
#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "<unknown>" at address 0x86d93a78
#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x86edfcd8
#: 043 Function Name: NtCreateMutant
Status: Hooked by "<unknown>" at address 0x86e2acb0
#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0x86b781d8
#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xa9a0f350
#: 083 Function Name: NtFreeVirtualMemory
Status: Hooked by "<unknown>" at address 0x86e27a98
#: 089 Function Name: NtImpersonateAnonymousToken
Status: Hooked by "<unknown>" at address 0x86e2ab38
#: 091 Function Name: NtImpersonateThread
Status: Hooked by "<unknown>" at address 0x86e29db0
#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "<unknown>" at address 0x86d62e30
#: 114 Function Name: NtOpenEvent
Status: Hooked by "<unknown>" at address 0x86e2ba98
#: 123 Function Name: NtOpenProcessToken
Status: Hooked by "<unknown>" at address 0x86e26d20
#: 129 Function Name: NtOpenThreadToken
Status: Hooked by "<unknown>" at address 0x86e27df0
#: 177 Function Name: NtQueryValueKey
Status: Hooked by "<unknown>" at address 0x8703a3e8
#: 206 Function Name: NtResumeThread
Status: Hooked by "<unknown>" at address 0x86e0aa80
#: 213 Function Name: NtSetContextThread
Status: Hooked by "<unknown>" at address 0x86e28a88
#: 228 Function Name: NtSetInformationProcess
Status: Hooked by "<unknown>" at address 0x86e27c68
#: 229 Function Name: NtSetInformationThread
Status: Hooked by "<unknown>" at address 0x86e28b60
#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xa9a0f580
#: 253 Function Name: NtSuspendProcess
Status: Hooked by "<unknown>" at address 0x86e2bad0
#: 254 Function Name: NtSuspendThread
Status: Hooked by "<unknown>" at address 0x86e28e70
#: 257 Function Name: NtTerminateProcess
Status: Hooked by "<unknown>" at address 0x86e26b88
#: 258 Function Name: NtTerminateThread
Status: Hooked by "<unknown>" at address 0x86e28cd8
#: 267 Function Name: NtUnmapViewOfSection
Status: Hooked by "<unknown>" at address 0x86e27ad0
#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "<unknown>" at address 0x86f07da0
==EOF==
******************************************************
ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/01/09 08:17
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA95CA000 Size: 98304 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B7F000 Size: 8192 File Visible: No Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA86EE000 Size: 49152 File Visible: No Signed: -
Status: -
Hidden/Locked Files
-------------------
Path: C:\hiberfil.sys
Status: Locked to the Windows API!
SSDT
-------------------
#: 012 Function Name: NtAlertResumeThread
Status: Hooked by "<unknown>" at address 0x86e29c08
#: 013 Function Name: NtAlertThread
Status: Hooked by "<unknown>" at address 0x86e29a80
#: 017 Function Name: NtAllocateVirtualMemory
Status: Hooked by "<unknown>" at address 0x86d93a78
#: 031 Function Name: NtConnectPort
Status: Hooked by "<unknown>" at address 0x86edfcd8
#: 043 Function Name: NtCreateMutant
Status: Hooked by "<unknown>" at address 0x86e2acb0
#: 053 Function Name: NtCreateThread
Status: Hooked by "<unknown>" at address 0x86b781d8
#: 065 Function Name: NtDeleteValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xa9a0f350
#: 083 Function Name: NtFreeVirtualMemory
Status: Hooked by "<unknown>" at address 0x86e27a98
#: 089 Function Name: NtImpersonateAnonymousToken
Status: Hooked by "<unknown>" at address 0x86e2ab38
#: 091 Function Name: NtImpersonateThread
Status: Hooked by "<unknown>" at address 0x86e29db0
#: 108 Function Name: NtMapViewOfSection
Status: Hooked by "<unknown>" at address 0x86d62e30
#: 114 Function Name: NtOpenEvent
Status: Hooked by "<unknown>" at address 0x86e2ba98
#: 123 Function Name: NtOpenProcessToken
Status: Hooked by "<unknown>" at address 0x86e26d20
#: 129 Function Name: NtOpenThreadToken
Status: Hooked by "<unknown>" at address 0x86e27df0
#: 177 Function Name: NtQueryValueKey
Status: Hooked by "<unknown>" at address 0x8703a3e8
#: 206 Function Name: NtResumeThread
Status: Hooked by "<unknown>" at address 0x86e0aa80
#: 213 Function Name: NtSetContextThread
Status: Hooked by "<unknown>" at address 0x86e28a88
#: 228 Function Name: NtSetInformationProcess
Status: Hooked by "<unknown>" at address 0x86e27c68
#: 229 Function Name: NtSetInformationThread
Status: Hooked by "<unknown>" at address 0x86e28b60
#: 247 Function Name: NtSetValueKey
Status: Hooked by "C:\WINDOWS\system32\Drivers\SYMEVENT.SYS" at address 0xa9a0f580
#: 253 Function Name: NtSuspendProcess
Status: Hooked by "<unknown>" at address 0x86e2bad0
#: 254 Function Name: NtSuspendThread
Status: Hooked by "<unknown>" at address 0x86e28e70
#: 257 Function Name: NtTerminateProcess
Status: Hooked by "<unknown>" at address 0x86e26b88
#: 258 Function Name: NtTerminateThread
Status: Hooked by "<unknown>" at address 0x86e28cd8
#: 267 Function Name: NtUnmapViewOfSection
Status: Hooked by "<unknown>" at address 0x86e27ad0
#: 277 Function Name: NtWriteVirtualMemory
Status: Hooked by "<unknown>" at address 0x86f07da0
==EOF==