1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Windows/privacy_danger.htm removal

Discussion in 'Virus & Other Malware Removal' started by Aquaman87, Sep 27, 2008.

Thread Status:
Not open for further replies.
  1. Aquaman87

    Aquaman87 Thread Starter

    Joined:
    Sep 27, 2008
    Messages:
    1
    I followed the instructions to download Hijack This and Smithfraud programs, scanned, and saved/copied the reports as follows. I see references to several former virus protection programs used and am switching to Norton 360 this week.

    My PC is horribly slow at times and the mouse will often freeze. I'll unplug/replug the USP connector and that takes care of it. I'm wondering what causes this. Also, randomly my monitor will quiver. Is this evidence of someone trying to hack in, download something bad, or what causes this? The monitor is not close to the tower and it happens sporadically.

    I run Spybot Search & Destroy daily. Any thoughts on it?

    Thanks,
    Aquaman87

    Hijack This report:

    Logfile of Trend Micro HijackThis v2.0.2
    Scan saved at 8:27:49 PM, on 9/27/2008
    Platform: Windows XP SP2 (WinNT 5.01.2600)
    MSIE: Internet Explorer v7.00 (7.00.6000.16705)
    Boot mode: Normal

    Running processes:
    C:\WINDOWS\System32\smss.exe
    C:\WINDOWS\system32\csrss.exe
    C:\WINDOWS\system32\winlogon.exe
    C:\WINDOWS\system32\services.exe
    C:\WINDOWS\system32\lsass.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\system32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\System32\svchost.exe
    C:\WINDOWS\system32\spoolsv.exe
    C:\Program Files\Common Files\Motive\McciCMService.exe
    C:\WINDOWS\System32\alg.exe
    C:\WINDOWS\Explorer.EXE
    C:\WINDOWS\system32\ctfmon.exe
    C:\Program Files\Tall Emu\Online Armor\oaui.exe
    C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe
    C:\WINDOWS\system32\wscntfy.exe
    C:\Program Files\Mozilla Firefox\firefox.exe
    C:\Documents and Settings\Dan\Desktop\HiJackThis.exe
    C:\WINDOWS\System32\wbem\wmiprvse.exe

    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.drudgereport.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.drudgereport.com
    O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
    O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
    O3 - Toolbar: (no name) - {0BF43445-2F28-4351-9252-17FE6E806AA0} - (no file)
    O4 - HKLM\..\RunOnce: [SpybotDeletingA4152] command /c del "C:\Program Files\PCHealthCenter\0.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC941] cmd /c del "C:\Program Files\PCHealthCenter\0.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA5203] command /c del "C:\Program Files\PCHealthCenter\1.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC7874] cmd /c del "C:\Program Files\PCHealthCenter\1.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA5932] command /c del "C:\Program Files\PCHealthCenter\1.ico"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC855] cmd /c del "C:\Program Files\PCHealthCenter\1.ico"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA6362] command /c del "C:\Program Files\PCHealthCenter\2.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC4611] cmd /c del "C:\Program Files\PCHealthCenter\2.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA1562] command /c del "C:\Program Files\PCHealthCenter\2.ico"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC6804] cmd /c del "C:\Program Files\PCHealthCenter\2.ico"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA8750] command /c del "C:\Program Files\PCHealthCenter\3.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC6781] cmd /c del "C:\Program Files\PCHealthCenter\3.gif"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA9651] command /c del "C:\WINDOWS\rs.txt"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC2223] cmd /c del "C:\WINDOWS\rs.txt"
    O4 - HKLM\..\RunOnce: [SpybotDeletingA7395] command /c del "C:\WINDOWS\rs.txt"
    O4 - HKLM\..\RunOnce: [SpybotDeletingC8427] cmd /c del "C:\WINDOWS\rs.txt"
    O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
    O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
    O4 - HKCU\..\RunOnce: [DelayShred] "c:\program files\mcafee\mshr\ShrCL.EXE" /P7 /q C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\5G6AZXMS\INDEX_~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\5G6AZXMS\PODCAS~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\NWQ7MCQ5\C-INT-~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\TW2G4HK1\LOGO_1~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\NWQ7MCQ5\HIDE_1~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\5EQ4CYJ9\CAX0CV~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\5EQ4CYJ9\FORUM_~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\5EQ4CYJ9\METRIC~1.SH! C:\DOCUME~1\Dan\LOCALS~1\Temp\HSPERF~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\TW2G4HK1\US_1_~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\TW2G4HK1\M1_1_~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\TW2G4HK1\M3_1_~1.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\TW2G4HK1\REALTE~4.SH! C:\DOCUME~1\Dan\LOCALS~1\TEMPOR~1\Content.IE5\5EQ4CYJ9\TIP_CO~1.SH! C:\DOCUME~1\Dan\L
    O4 - HKCU\..\RunOnce: [SpybotDeletingB9835] command /c del "C:\Program Files\PCHealthCenter\0.gif"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD1893] cmd /c del "C:\Program Files\PCHealthCenter\0.gif"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB8638] command /c del "C:\Program Files\PCHealthCenter\1.gif"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD2035] cmd /c del "C:\Program Files\PCHealthCenter\1.gif"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB8347] command /c del "C:\Program Files\PCHealthCenter\1.ico"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD4710] cmd /c del "C:\Program Files\PCHealthCenter\1.ico"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB1687] command /c del "C:\Program Files\PCHealthCenter\2.gif"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD1773] cmd /c del "C:\Program Files\PCHealthCenter\2.gif"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB1433] command /c del "C:\Program Files\PCHealthCenter\2.ico"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD8703] cmd /c del "C:\Program Files\PCHealthCenter\2.ico"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB2198] command /c del "C:\Program Files\PCHealthCenter\3.gif"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB1421] command /c del "C:\WINDOWS\rs.txt"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD4587] cmd /c del "C:\WINDOWS\rs.txt"
    O4 - HKCU\..\RunOnce: [SpybotDeletingB822] command /c del "C:\WINDOWS\rs.txt"
    O4 - HKCU\..\RunOnce: [SpybotDeletingD7974] cmd /c del "C:\WINDOWS\rs.txt"
    O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\shdocvw.dll
    O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\WINDOWS\system32\shdocvw.dll
    O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
    O15 - Trusted Zone: http://*.mcafee.com
    O16 - DPF: {4EFA317A-8569-4788-B175-5BAF9731A549} (Microsoft Virtual Server VMRC Advanced Control) - https://www.microsoft.com/resources/virtuallabs/ActiveX/VMRCActiveXClient1.cab
    O16 - DPF: {CAFECAFE-0013-0001-0028-ABCDEFABCDEF} (JInitiator 1.3.1.28) -
    O16 - DPF: {EF791A6B-FC12-4C68-99EF-FB9E207A39E6} (McFreeScan Class) - http://download.mcafee.com/molbin/iss-loc/mcfscan/2,2,0,5195/mcfscan.cab
    O23 - Service: McciCMService - Motive Communications, Inc. - C:\Program Files\Common Files\Motive\McciCMService.exe
    O23 - Service: McAfee Real-time Scanner (McShield) - Unknown owner - C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe (file missing)
    O23 - Service: McAfee SystemGuards (McSysmon) - Unknown owner - C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe (file missing)
    O23 - Service: Online Armor (SvcOnlineArmor) - Tall Emu - C:\Program Files\Tall Emu\Online Armor\oasrv.exe
    O24 - Desktop Component 0: Privacy Protection - file:///C:\WINDOWS\privacy_danger\index.htm

    --
    End of file - 7667 bytes
    --------------------------------------------------------------

    Smithfraud report:

    SmitFraudFix v2.352

    Scan done at 20:34:24.69, Sat 09/27/2008
    Run from C:\Documents and Settings\Dan\Desktop\SmitfraudFix
    OS: Microsoft Windows XP [Version 5.1.2600] - Windows_NT
    The filesystem type is NTFS
    Fix run in normal mode

    »»»»»»»»»»»»»»»»»»»»»»»» DNS Before Fix

    Description: Realtek RTL8029(AS) PCI Ethernet Adapter - Packet Scheduler Miniport
    DNS Server Search Order: 192.168.2.1

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.1.254 192.168.1.254
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 192.168.1.254
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.2.1

    »»»»»»»»»»»»»»»»»»»»»»»» DNS After Fix

    Description: Realtek RTL8029(AS) PCI Ethernet Adapter - Packet Scheduler Miniport
    DNS Server Search Order: 192.168.2.1

    HKLM\SYSTEM\CCS\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS1\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.1.254 192.168.1.254
    HKLM\SYSTEM\CS2\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS3\Services\Tcpip\..\{EB34988C-EF5E-4AD8-B16E-79BE9BE26975}: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CCS\Services\Tcpip\Parameters: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS1\Services\Tcpip\Parameters: DhcpNameServer=192.168.1.254 192.168.1.254
    HKLM\SYSTEM\CS2\Services\Tcpip\Parameters: DhcpNameServer=192.168.2.1
    HKLM\SYSTEM\CS3\Services\Tcpip\Parameters: DhcpNameServer=192.168.2.1
     
As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/753966

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice