1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

morze5 and more

Discussion in 'Virus & Other Malware Removal' started by steinwei, Apr 27, 2004.

Thread Status:
Not open for further replies.
Advertisement
  1. steinwei

    steinwei Thread Starter

    Joined:
    Apr 27, 2004
    Messages:
    1
    After cleaning my son's PC (belgiandip and others) of various spyware (following the instructions in a couple of your posts), I'm now left with a bunch of annoying "seaching for missing..." messages on boot-up. Can I safely remove all references to those "missing" files in the registry? Morze5, morze1, wildtangent, ATKOFUWN, etc.

    I clean regularly with spybot and adaware. Here's the hijack this log:

    Logfile of HijackThis v1.97.7
    Scan saved at 8:44:22 AM, on 4/27/04
    Platform: Windows 98 SE (Win9x 4.10.2222A)
    MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

    Running processes:
    C:\WINDOWS\SYSTEM\KERNEL32.DLL
    C:\WINDOWS\SYSTEM\MSGSRV32.EXE
    C:\WINDOWS\SYSTEM\SPOOL32.EXE
    C:\WINDOWS\SYSTEM\MPREXE.EXE
    C:\WINDOWS\SYSTEM\MSTASK.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCEVTMGR.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCSETMGR.EXE
    C:\PROGRAM FILES\NORTON ANTIVIRUS\ADVTOOLS\NPROTECT.EXE
    C:\WINDOWS\SYSTEM\mmtask.tsk
    C:\WINDOWS\SYSTEM\SYSTRAY.EXE
    C:\WINDOWS\TASKMON.EXE
    C:\PROGRAM FILES\MICROSOFT HARDWARE\MOUSE\POINT32.EXE
    C:\WINDOWS\SYSTEM\HPHA1MON.EXE
    C:\PROGRAM FILES\COMMON FILES\SCM\LEDTRAY.EXE
    C:\PROGRAM FILES\COMMON FILES\SCM\ICONFIG.EXE
    C:\PROGRAM FILES\COMMON FILES\REAL\UPDATE_OB\REALSCHED.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCPD-LC\SYMLCSVC.EXE
    C:\PROGRAM FILES\COMMON FILES\SYMANTEC SHARED\CCAPP.EXE
    C:\WINDOWS\SYSTEM\HPHIPM07.EXE
    C:\WINDOWS\SYSTEM\WMIEXE.EXE
    C:\WINDOWS\SYSTEM\HPZSTATX.EXE
    C:\WINDOWS\SYSTEM\DDHELP.EXE
    C:\WINDOWS\EXPLORER.EXE
    C:\PROGRAM FILES\CRYPTAINER LE\CRYPTAINERLE.EXE
    C:\UNZIPPED\HIJACKTHIS\HIJACKTHIS.EXE

    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer provided by Dell
    R3 - Default URLSearchHook is missing
    F1 - win.ini: run=hpfsched
    O2 - BHO: (no name) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\PROGRAM FILES\ADOBE\ACROBAT 5.0\READER\ACTIVEX\ACROIEHELPER.OCX
    O2 - BHO: NAV Helper - {BDF3E430-B101-42AD-A544-FADC6B084872} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - C:\WINDOWS\SYSTEM\MSDXM.OCX
    O3 - Toolbar: Norton AntiVirus - {42CDD1BF-3FFB-4238-8AD1-7859DF00B1D6} - C:\Program Files\Norton AntiVirus\NavShExt.dll
    O4 - HKLM\..\Run: [ScanRegistry] c:\windows\scanregw.exe /autorun
    O4 - HKLM\..\Run: [SystemTray] SysTray.Exe
    O4 - HKLM\..\Run: [TaskMonitor] c:\windows\taskmon.exe
    O4 - HKLM\..\Run: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\Run: [POINTER] point32.exe
    O4 - HKLM\..\Run: [HPHA1MON] C:\WINDOWS\SYSTEM\HPHA1MON.EXE
    O4 - HKLM\..\Run: [LEDTRAY] C:\PROGRA~1\COMMON~1\SCM\LEDTRAY.EXE
    O4 - HKLM\..\Run: [ICONFIG] C:\PROGRA~1\COMMON~1\SCM\ICONFIG.EXE
    O4 - HKLM\..\Run: [WildTangent CDA] RUNDLL32.exe C:\PROGRA~1\WILDTA~1\APPS\CDA\CDAENG~1.DLL,cdaEngineMain
    O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\Common Files\Real\Update_OB\realsched.exe" -osboot
    O4 - HKLM\..\Run: [Symantec Core LC] C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe start
    O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe"
    O4 - HKLM\..\Run: [NAV CfgWiz] C:\Program Files\Common Files\Symantec Shared\CfgWiz.exe /GUID NAV /CMDLINE "REBOOT"
    O4 - HKLM\..\Run: [Advanced Tools Check] C:\PROGRA~1\NORTON~1\ADVTOOLS\ADVCHK.EXE
    O4 - HKLM\..\Run: [NPROTECT] C:\PROGRA~1\NORTON~1\ADVTOOLS\NPROTECT.EXE
    O4 - HKLM\..\Run: [rgnuvmt] C:\WINDOWS\rgnuvmt.exe
    O4 - HKLM\..\Run: C:\WINDOWS\TEMP\U.EXE
    O4 - HKLM\..\Run: [TV Media] C:\TV MEDIA\TVM.EXE
    O4 - HKLM\..\Run: [NUJN4EI5.EXE] C:\WINDOWS\NUJN4EI5.EXE /dk
    O4 - HKLM\..\RunServices: [LoadPowerProfile] Rundll32.exe powrprof.dll,LoadCurrentPwrScheme
    O4 - HKLM\..\RunServices: [SchedulingAgent] mstask.exe
    O4 - HKLM\..\RunServices: [ScriptBlocking] "C:\Program Files\Common Files\Symantec Shared\Script Blocking\SBServ.exe" -reg
    O4 - HKLM\..\RunServices: [ccEvtMgr] "C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe"
    O4 - HKLM\..\RunServices: [ccSetMgr] "C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe"
    O4 - HKLM\..\RunServices: [NPROTECT] C:\PROGRA~1\NORTON~1\ADVTOOLS\NPROTECT.EXE
    O4 - HKCU\..\Run: [TV Media] C:\TV MEDIA\TVM.EXE
    O4 - HKCU\..\Run: [NUJN4EI5.EXE] C:\WINDOWS\NUJN4EI5.EXE /dk
    O4 - HKLM\..\RunOnce: [GEOclean] command.com /c c:\windows\TEMP\GEOclean.bat
    O4 - Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office\OSA9.EXE
    O4 - Startup: MORZE5.lnk = C:\WINDOWS\morze5.exe
    O4 - Startup: Z02X17KP.lnk = C:\WINDOWS\z02x17kp.exe
    O4 - Startup: MORZE1.lnk = C:\WINDOWS\morze1.exe
    O4 - Startup: 08FPP1CZ.lnk = C:\WINDOWS\08fpp1cz.exe
    O4 - Startup: ATKOFUWN.lnk = C:\WINDOWS\atkofuwn.exe
    O4 - Startup: O9VE1WGZ.lnk = C:\WINDOWS\o9ve1wgz.exe
    O4 - Startup: 2DXEBYE1.lnk = C:\WINDOWS\2dxebye1.exe
    O4 - Startup: PowerReg Scheduler V3.exe
    O4 - Startup: IO7PZ0B9.lnk = C:\WINDOWS\io7pz0b9.exe
    O4 - Startup: TY0E4H9H.lnk = C:\WINDOWS\ty0e4h9h.exe
    O4 - Startup: ML9NJR24.lnk = C:\WINDOWS\ml9njr24.exe
    O4 - Startup: TCR8R884.lnk = C:\WINDOWS\tcr8r884.exe
    O4 - Startup: DB3MR2YU.lnk = C:\WINDOWS\db3mr2yu.exe
    O4 - Startup: LTM0YD8C.lnk = C:\WINDOWS\ltm0yd8c.exe
    O4 - Startup: OXJA8D3B.lnk = C:\WINDOWS\oxja8d3b.exe
    O4 - Startup: 5YG5T1Y8.lnk = C:\WINDOWS\5yg5t1y8.exe
    O4 - Startup: PNDNIXYW.lnk = C:\WINDOWS\pndnixyw.exe
    O4 - Startup: V0VNBGG4.lnk = C:\WINDOWS\v0vnbgg4.exe
    O4 - Startup: BQC0QPJJ.lnk = C:\WINDOWS\bqc0qpjj.exe
    O4 - Startup: WC7805VK.lnk = C:\WINDOWS\wc7805vk.exe
    O4 - Startup: Z1Y1XAAY.lnk = C:\WINDOWS\z1y1xaay.exe
    O4 - Startup: UUJLPU0L.lnk = C:\WINDOWS\uujlpu0l.exe
    O4 - Startup: CQTZLD6C.lnk = C:\WINDOWS\cqtzld6c.exe
    O4 - Startup: K0QNH0QA.lnk = C:\WINDOWS\k0qnh0qa.exe
    O4 - Startup: 271DZ5TR.lnk = C:\WINDOWS\271dz5tr.exe
    O4 - Startup: UZLNRD15.lnk = C:\WINDOWS\uzlnrd15.exe
    O4 - Startup: 7OEDO8E9.lnk = C:\WINDOWS\7oedo8e9.exe
    O4 - Startup: 4DLMOFQH.lnk = C:\WINDOWS\4dlmofqh.exe
    O4 - Startup: 54X0MTKO.lnk = C:\WINDOWS\54x0mtko.exe
    O4 - Startup: EFTB2AXP.lnk = C:\WINDOWS\eftb2axp.exe
    O4 - Startup: PLFU610A.lnk = C:\WINDOWS\plfu610a.exe
    O4 - Startup: OP530OOX.lnk = C:\WINDOWS\op530oox.exe
    O4 - Startup: NUJN4EI5.lnk = C:\WINDOWS\nujn4ei5.exe
    O4 - Global Startup: MORZE5.lnk = C:\WINDOWS\morze5.exe
    O4 - Global Startup: Z02X17KP.lnk = C:\WINDOWS\z02x17kp.exe
    O4 - Global Startup: MORZE1.lnk = C:\WINDOWS\morze1.exe
    O4 - Global Startup: 08FPP1CZ.lnk = C:\WINDOWS\08fpp1cz.exe
    O4 - Global Startup: ATKOFUWN.lnk = C:\WINDOWS\atkofuwn.exe
    O4 - Global Startup: WC7805VK.lnk = C:\WINDOWS\wc7805vk.exe
    O4 - Global Startup: 2DXEBYE1.lnk = C:\WINDOWS\2dxebye1.exe
    O4 - Global Startup: IO7PZ0B9.lnk = C:\WINDOWS\io7pz0b9.exe
    O4 - Global Startup: TY0E4H9H.lnk = C:\WINDOWS\ty0e4h9h.exe
    O4 - Global Startup: ML9NJR24.lnk = C:\WINDOWS\ml9njr24.exe
    O4 - Global Startup: TCR8R884.lnk = C:\WINDOWS\tcr8r884.exe
    O4 - Global Startup: DB3MR2YU.lnk = C:\WINDOWS\db3mr2yu.exe
    O4 - Global Startup: LTM0YD8C.lnk = C:\WINDOWS\ltm0yd8c.exe
    O4 - Global Startup: OXJA8D3B.lnk = C:\WINDOWS\oxja8d3b.exe
    O4 - Global Startup: 5YG5T1Y8.lnk = C:\WINDOWS\5yg5t1y8.exe
    O4 - Global Startup: PNDNIXYW.lnk = C:\WINDOWS\pndnixyw.exe
    O4 - Global Startup: V0VNBGG4.lnk = C:\WINDOWS\v0vnbgg4.exe
    O4 - Global Startup: BQC0QPJJ.lnk = C:\WINDOWS\bqc0qpjj.exe
    O4 - Global Startup: O9VE1WGZ.lnk = C:\WINDOWS\o9ve1wgz.exe
    O4 - Global Startup: Z1Y1XAAY.lnk = C:\WINDOWS\z1y1xaay.exe
    O4 - Global Startup: UUJLPU0L.lnk = C:\WINDOWS\uujlpu0l.exe
    O4 - Global Startup: CQTZLD6C.lnk = C:\WINDOWS\cqtzld6c.exe
    O4 - Global Startup: K0QNH0QA.lnk = C:\WINDOWS\k0qnh0qa.exe
    O4 - Global Startup: 271DZ5TR.lnk = C:\WINDOWS\271dz5tr.exe
    O4 - Global Startup: UZLNRD15.lnk = C:\WINDOWS\uzlnrd15.exe
    O4 - Global Startup: 7OEDO8E9.lnk = C:\WINDOWS\7oedo8e9.exe
    O4 - Global Startup: 4DLMOFQH.lnk = C:\WINDOWS\4dlmofqh.exe
    O4 - Global Startup: 54X0MTKO.lnk = C:\WINDOWS\54x0mtko.exe
    O4 - Global Startup: EFTB2AXP.lnk = C:\WINDOWS\eftb2axp.exe
    O4 - Global Startup: PLFU610A.lnk = C:\WINDOWS\plfu610a.exe
    O4 - Global Startup: OP530OOX.lnk = C:\WINDOWS\op530oox.exe
    O4 - Global Startup: NUJN4EI5.lnk = C:\WINDOWS\nujn4ei5.exe
    O8 - Extra context menu item: ActionCenter - C:\Windows\Desktop\actioncenter.html
    O9 - Extra button: Messenger (HKLM)
    O9 - Extra 'Tools' menuitem: MSN Messenger Service (HKLM)
    O9 - Extra button: AIM (HKLM)
    O9 - Extra button: Dell Home (HKCU)
    O12 - Plugin for .wav: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
    O12 - Plugin for .mid: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
    O12 - Plugin for .spop: C:\PROGRA~1\INTERN~1\Plugins\NPDocBox.dll
    O12 - Plugin for .mov: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
    O12 - Plugin for .aiff: C:\PROGRA~1\INTERN~1\PLUGINS\npqtplugin.dll
    O16 - DPF: {166B1BCA-3F9C-11CF-8075-444553540000} (Shockwave ActiveX Control) - http://download.macromedia.com/pub/shockwave/cabs/director/swdir.cab
    O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://download.macromedia.com/pub/shockwave/cabs/Flash/swflash.cab
    O16 - DPF: {11260943-421B-11D0-8EAC-0000C07D88CF} (IPIX ActiveX Control) - http://www.ipix.com/viewers/ipixx.cab
    O16 - DPF: {DED22F57-FEE2-11D0-953B-00C04FD9152D} (CarPoint Auto-Pricer Control) - http://carpoint.msn.com/components/ocx/autopricer/autopricer.cab
    O16 - DPF: {9F1C11AA-197B-4942-BA54-47A8489BB47F} (Update Class) - http://v4.windowsupdate.microsoft.com/CAB/x86/ansi/iuctl.CAB?37968.8461689815
    O16 - DPF: {15B782AF-55D8-11D1-B477-006097098764} (Macromedia Authorware Web Player Control) - http://download.macromedia.com/pub/shockwave/cabs/authorware/awswaxf.cab
    O16 - DPF: {33564D57-0000-0010-8000-00AA00389B71} - http://download.microsoft.com/download/F/6/E/F6E491A6-77E1-4E20-9F5F-94901338C922/wmv9VCM.CAB
    O16 - DPF: {56336BCB-3D8A-11D6-A00B-0050DA18DE71} (RdxIE Class) - http://software-dl.real.com/0201cd994d3f8c127d04/netzip/RdxIE601.cab

    THanks.
     
  2. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
  3. khazars

    khazars

    Joined:
    Feb 15, 2004
    Messages:
    12,302
    then repost another hijack this log, you need to delete all those global entries.
     
  4. Flrman1

    Flrman1

    Joined:
    Jul 26, 2002
    Messages:
    46,329
    All those O4 Startup entries are from the Adtomi parasite. An online scan will not remove it.

    To get rid of Adtomi run this script put together by Mosaic1:

    Click here to download 9xAdtomi Cleanup.zip.

    Unzip the files to a folder of your choice.

    Now see if there is an Adtomi or yahoo stocks icon in your system tray , it might be a red ?? and if so right click and select remove , you must be online for this part

    --A web page from Adtomi would appear "-uninstall was succesful!".

    *Note: Not all infections have this icon, so if you don't have it just proceed with the rest.


    Now go offline before proceeding with the rest of these instructions.


    If you have a Script Blocking Program enabled, disable it first so the scripts may run.

    Next press CTRL+ ALT+DEL to bring up task manager, look in applications for this file NUJN4EI5.EXE and End Task on it. Open Task Manager again and make sure it is gone.
    If it isn't listed in the applications, then look in processes tab.

    Close all open windows, open the Adtomi cleanup folder and Double Click Cleanup.bat then close the Adtomi cleanup folder while the cleanup.bat file runs.

    *NOTE: DO NOT Touch the VBS files. The bat file will run the scripts all by itself.

    It will:

    Remove the Adtomi Spyware files from the Windows Folder
    Clean the Startup Folders
    Create Backups of the Adtomi exe files it deletes and save them in this folder
    Create a list of all oddly named files deleted from the Windows Folder
    Uninstall the Browserhelper.dll browser plugin
    Start HijackThis and give you directions on what to remove.


    When you have finished please restart the computer.

    Go to the folder that you extracted the Adtomi cleanup files to and find the Adtomi.txt file. Copy and paste the contents of that text file here along with a fresh Hijack This log.
     
  5. Flrman1

    Flrman1

    Joined:
    Jul 26, 2002
    Messages:
    46,329
    Hang on a sec. Those directions won't work. I have the wrong file for you to end task on.

    Give me a minute to edit the post before you proceed please.
     
  6. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/224264

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice