1 2 Previous Next 12 Replies Latest reply on Dec 30, 2009 7:18 AM by SeanMc98


      This morning I had a web site download a file msctrl32.exe and named Spy Eraser.  McAfee did flag it as trying to update the registry and I denied it.


      I couldn't find anything about this on the McAfee site, but google did turn up a few hits that indicated it was malware.  I ran a scan, and it didn't flag it as an error.  I deleted the file (it was 3232kb) and the short cut it put on the desktop, hoping that was all I needed to do.  When we switched to another user, we got a message for "error loading mpor.yuo, the specified module could not be found".   Again I got no hits on this on McAfee, but google flagged it as bad.  So - what else do I need to clean up from this mess, how badly am I infected, and why doesn't McAfee find anything when I run a scan?


      Thanks for any help.

        • 1. Re: msctrl32.exe

          Hi Skobel,

          The term Zero-Day Attack refers to new types of threats and malware that are released before any security software vendor is aware of them and has time to add detections and proactive protection. To protect you from a virus or other malware, your security software must recognize some piece of the code used to carry out the attack. Completely new threats circumvent this because they do not use code which can be detected by existing anti-virus definition files.

          Run a scan from the advanced stinger tool .

          1. Download the Stinger tool from the link below:
          Double-click Stinger and select Preferences.
          3. Enable the Report Applications option.
          4. Click OK.
          5. Click Scan Now and allow the scan to complete.

          : During the scan, you may receive a clean error during on certain .cab files. Ignore the error and allow the scan to complete. The files will be removed when the system is restarted.
          6. Restart your computer.
          7. Run Stinger again using the steps above. 

          Kindly report back if you have any issue running the tool


          Dinesh K

          1 of 1 people found this helpful
          • 2. Re: msctrl32.exe

            Hi Dinesh,


            Thank you for the response. I will download the tool and report back my results.



            • 3. Re: msctrl32.exe

              I ran the program, and it didn't find anything.  Here's the report:


              McAfee® Stinger Version built on Jul  6 2009

              Copyright © 2009 McAfee, Inc. All Rights Reserved.

              Virus data file v1000 created on Jul 6 2009.

              Ready to scan for 897 viruses, trojans and variants.


              Scan initiated on Thu Dec 17 19:43:51 2009

                Number of clean files: 321009


              McAfee® Stinger Version built on Jul  6 2009

              Copyright © 2009 McAfee, Inc. All Rights Reserved.

              Virus data file v1000 created on Jul 6 2009.

              Ready to scan for 897 viruses, trojans and variants.


              Scan initiated on Thu Dec 17 21:48:24 2009

                Number of clean files: 321151


              Even though it didn't find anything, I still went ahead and restarted the pc and ran it a second time.  The report says the file is 6 months old.  Is there a more current version I should run?


              The pc is still slow to start up, and we still get the message box from rundll  that mpor.yuo is not found.  Are there some other areas I should look at to clean up?





              • 4. Re: msctrl32.exe

                Hi  skobel,


                You can try the latest Build added on 11/23/2009 from the link below.




                But i would suggest you to run the stinger scan in the Safe Mode with Networking




                You can try the DOS Scan


                Refer the Document below :




                Thank you,




                Mahesh CJ

                1 of 1 people found this helpful
                • 5. Re: msctrl32.exe

                  I tried the new file, and it still didn't find anything.  I tried booting to DOS, but it didn't work.  I'm not sure how to run it in safe mode with networking.  I don't have a true network set up.  I have a router, that I have 2 pc's connected to (one cable, one wireless), but no sharing of anything between them, just sharing the internet connection.


                  I'm also curious why even this file is nearly a month old.  I get updates almost daily - how is this stinger file better than the normal virus scan with current dat files?


                  P.S.  - the link on to TS100288 didn't work.  I had to do a search for it.


                  Thanks for your continued help.



                  • 6. Re: msctrl32.exe

                    Ok, I think I may have found something. I did a search for anything that had mpor.yuo in it. Four files popped up.  Under .... All Users\Application Data\McAfee\MCLOGS\MISP\mcnasvc\ there are 3 log files - MCNASVC000.LOG, MCNASVC001.LOG, & MCNASVC002.LOG.  A fourth file was found in WINDOWS\SYSTEM32.WBEM\LOGS\FrameWork.log

                    Messages in the Framework.log are along the lines of

                    Shell Name Explorer.exe rundll32.exe mpor.yuo pvihax in Registry not found in process list. 12/17/2009 10:32:47.500 thread:5288


                    The ones in the McAfee directory path had entries along the lines of:

                    12/18/2009 12:10:00 PM$ -- (Error)$ [   mcnmcsrv.dll]$ CMcNmcVirusScanItf::getLastScanDate(), getLoggedOnUserToken failed
                    12/18/2009 12:10:05 PM$ -- (Error)$ [     mcndsv.dll]$ Couldn't bind parameter to statement: library routine called out of sequence
                    12/18/2009 12:13:01 PM$ -- (Error)$ [   mcnmcsrv.dll]$ McNAUserSessionMgr::getShellPid, failed to find shell program process, 'explorer.exe rundll32.exe mpor.yuo pvihax'


                    I checked events log in security center. At the time the program downloaded itself, there was a warning about updates to the registry. I selected deny, but I see 2 entries at about the same time - one was denied, but one was allowed.

                    The denied update was at 07:42:37AM.  It was a registry update for HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\ShellC: \Windows\explorer.exe

                    The allowed update was at 07:40:33AM. It was a registry update process for Winword.exe and the process version is:

                    If I do a REGEDIT, that entry is for Explorer.exe rundll32.exe mpor.yuo pvihax.

                    In addition, if I look at the SYSTEM GUARD log, there is an additional entry in Startup Items that was Allowed at 7:42:16AM.  Process points to a file 46A.tmp in the temp folder of my local settings.  The process version is
                    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpyEraserC:WIND OWS\SYSTEM32\msctrl32.exe

                    So, I have deleted the file 46A.tmp, but I haven't touched any of the registry entries.


                    Any idea what the log entries in the All Users\Application Data\McAfee\MCLOGS\MISP\mcnasvc\  directory mean?


                    Thanks again for the help.



                    • 7. Re: msctrl32.exe

                      From your descriptions, you may have 1) a partially-installed version of "Spy Eraser 2" (I believe from Uniblue), or 2) a relatively new malware ("msctrl32.exe" as opposed to the more well-known "msctrl32.scr"). or 3) something completely new.


                      If you have not already done so, download and run Malwarebytes AntiMalware (www.malwarebytes.org) http://www.malwarebytes.org

                      This will tell you if any malware is found, and remove it.


                      If the above does not resolve the issue, for the first two possibilities, I would suggest:


                      1)  Boot into "Safe Mode with Networking" (or just plain "Safe Mode").  To do this, re-boot, and as soon you start the boot, press F8 (I press it continually).  You should get a screen with various startup options.  Using the arrow keys on your keyboard, move the cursor to either "Safe Mode with Networking" or "Safe Mode", and hit "Enter".


                      2)  Once booted in "Safe Mode with Networking" you should see an information screen stating that you are in fact running in "Safe Mode".


                      3) You will be required to logon as either as a user or as "Administrator".  (Caveat: be very careful if you are logging in as "Administrator").


                      4)  From the Start Menu, click "Run", and enter "Regedit" (or, possibly "Regedt32" if "Regedit" bounces).


                      Using the arrow keys or the mouse navigate to the registry key "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" (HKLM is "HKEY_LOCAL_MACHINE").  Once to that point, the machine startup commands are displayed in the right panel,  Your previous posting indicated a subkey ("HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpyEraser.....").  I think that you will see (on the right side) something like:


                      SpyEraser  REG_SZ  "C:WINDOWS\SYSTEM32\msctrl32.exe"      (NB: there may or may not be double quotes!)


                      Take a screen shot and save it.  Go to Internet Explorer, come back to this thread, and post the screen shot.


                      After that, we will try the next step (removal).  Up to this point, you have changed nothing (unless Antimalware found and removed the nasties ).



                      Message was edited by: SeanMc98 (correction to "Regedt32" on 12/19/09 1:55:50 AM EST
                      • 8. Re: msctrl32.exe

                        Hi SeanMc98,


                        Malwarebytes AntiMalware  seems to have done the trick.  Not only did it remove the 2 entries I had found, plus 2 files in my temp folder (one of which I was already suspicious of), but it flagged 5 other registry entries. I have no idea if they were part of this malware that was installed, or something that had been there for awhile, but it's all gone now.  Thank you very much.



                        • 9. Re: msctrl32.exe

                          Hi guys


                          This virus attacked me this morning so this is how I removed it.


                          Sounds stupid but: I killed task [ctrl+alt+del] & deleted msctrl32.exe & its icon from C/Windows/.... On the next reboot - nothing appears...

                          Btw, Stinger didn`t find anything...

                          1 2 Previous Next