Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Need help - jacks39


  • Please log in to reply
3 replies to this topic

#1 jacks39

jacks39

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:08:53 AM

Posted 23 February 2009 - 02:39 PM

here's my result ,what the f**ck one put me into trouble


Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{b69e83f8-638d-45a6-948a-b1a3e4d69c32}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{b69e83f8-638d-45a6-948a-b1a3e4d69c32}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.

and now i can't acces antivirus sites and microsoft sites.please help me to resolve this hijacker
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{b69e83f8-638d-45a6-948a-b1a3e4d69c32}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.

Edited by jacks39, 23 February 2009 - 02:42 PM.


BC AdBot (Login to Remove)

 


#2 jacks39

jacks39
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:08:53 AM

Posted 23 February 2009 - 02:44 PM

this is the f**ck one put me into trouble

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\CheckedValue (Hijack.System.Hidden) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{b69e83f8-638d-45a6-948a-b1a3e4d69c32}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{b69e83f8-638d-45a6-948a-b1a3e4d69c32}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{b69e83f8-638d-45a6-948a-b1a3e4d69c32}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.112.116 85.255.112.183 1.2.3.4 -> Quarantined and deleted successfully.

now i can't acces antivirus sites and microsoft too.help me plss to solve this.

#3 garmanma

garmanma

    Computer Masochist


  • Members
  • 27,809 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Cleveland, Ohio
  • Local time:09:53 AM

Posted 23 February 2009 - 02:58 PM

Split from another post

Please give a brief description of your problem and what you have done
Mark
Posted Image
why won't my laptop work?

Having grandkids is God's way of giving you a 2nd chance because you were too busy working your butt off the 1st time around
Do not send me PMs with problems that should be posted in the forums. Keep it in the forums, so everyone benefits
Become a BleepingComputer fan: Facebook and Twitter

#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,771 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:09:53 AM

Posted 23 February 2009 - 03:32 PM

Reset your network settings. Go to Start > Control Panel, and choose Network Connections.
  • Right-click on your default connection, usually Local Area Connection or Dial-up Connection if you are using Dial-up, and and choose Properties.
  • Double-click on the Internet Protocol (TCP/IP) item.
  • Write down the settings in case you should need to change them back.
  • Select the radio button that says "Obtain DNS servers automatically".
  • If unknown preferred or alternate DNS servers are listed, uncheck the box that says "Use the following DNS server address".
  • Click OK twice to get out of the properties screen and restart your computer. If not prompted to reboot go ahead and reboot manually.
If using a router, disconnect from the Internet and reset the router with a strong logon/password so the malware cannot gain control before connecting again. Many users seldom change the default username/password on the router and are prone to this type of infection.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users