I have a Lenovo laptop that will not connect to websites that contain the names Microsoft, Norton, or Symantec (possibly others). Any attempt to contact a URL containing these names IMMEDIATELY fails with a “server not found” message. Windows auto update does not work and I was unable to manually update drivers for hardware devices. Suspecting a virus, I loaded NAV09 from CD. It did not find anything, but was unable to download the latest updates. OS is WinXP Pro SP2. Windows firewall is off, I already reset IP stack with netsh command and checked \drivers\etc\hosts. It contains only localhost 127.0.0.1. Based on similar problems reported in this forum. I downloaded and ran SysProt and also gmer. Logs are attached below. Is this a rootkit or what?
Please have a bit patience. One of the sysprot guru’s will assist you
BigBlue81:
Before any suggestions are offered, are you able to back up all of your important documents and photos, etc?
Do you have an operating system disc or recovery discs?
There is nothing on this machine that I can’t recover or is important enough to worry about. Fire away!
BigBlue81:
Your machine is at serious risk, as it appears that the svchost.exe, which is a major component of the operating system has been over-written by malware. It is not a rootkit per se, although there are some characteristics, which is why it shows as it does in the GMER. If the svchost.exe file is simply removed, you will lose access to the machine and a reformat will loom largely in your future.
What has been happening, is that the infected file has to be gingerly replaced, using an assortment of tools, and then other malware removed. It is a complex and risky business.
If you prefer not to reformat I would recommend http://www.bleepingcomputer.com/ as they have worked through several of these successfully.
You could check the hosts file by copy and pasting this in the run command:
notepad.exe c:/windows/system32/drivers/etc/hosts
Could you copy what is in this file?
1. Whether the svchost.exe is the legit one OR whether it is one like the "atapi.sys" due to the fact the file is in the correct location, so has it been overwritten with a bad Malware version, Or it's just using the legit svchost as an actor
You now have a reply on the other Forum, Please Note they are busy trying to keep up with everyone
Quads