I'm no computer wizard as can be seen from my previous post. thought I'd better put a new title up.
'System Tool' infected my computer. In safe mode with networking, I discovered and used the guide supplied by bleeping computer. It was a relief to find something because 'System Tool' stops you using Task Manager or anything else you can use to identify it and destroy it manually.
Everything in the guide worked fine through using RKill, Malwarebytes anti-malware to over-riding the Windows permissions in order to delete the corrupted file C:\Windows\System32\Drivers\etc\Hosts file.
Unfortunately I cannot get permission from Windows to save the replacement file in this directory.
I don't dare shut down the PC in case it won't re-boot without this file in place.
Can anyone help me to save this file where it should be?
Thanks from one tired computer novice !
Hope this isn't classed as bumping. If so, it was not intentional. I'm new to these sites and not familiar with information I need to supply. Apologies if I caused offence.
Operating system is Windows Vista, by the way. Forgot to mention that, too.
Hope that is all the information you need. I understand how busy you are, so don't expect instant replies.
Just wish someone would catch the idiots that design these malware infections.
At least I knew to keep tapping F8 to start windows in safe mode after turning the computer on, otherwise I wouldn't have got this far.
Success! After a bit of fiddling I have the clean Hosts file in the System32 folder where it belongs. The trick which is probably obvious to a lot of people (but wasn't to me!) is to use explorer to find the folder, change ownership to myself, then alter my own permissions to allow me to write to it or modify it.
The PC restarted normally, with no sign of the System Tool infection. Thanks to bleeping computer for the rest of the fix, though. I don't think that I would ever have managed it on my own.
No need for any advice, now (I hope) but thanks again.
Edited by Mark_Cumbria, 20 December 2010 - 11:30 AM.