PDA

View Full Version : Manual Removal Guide for MZS.Spoolserver32



Friday
2008-11-29, 18:50
The following instructions have been created to help you to get rid of "MZS.Spoolserver32" manually.
Use this guide at your own risk; software should usually be better suited to remove malware, since it is able to look deeper.

If this guide was helpful to you, please consider donating towards this site (http://www.safer-networking.org/index.php?page=donate).

Threat Details:

Categories:
trojan

Description:
csmss.exe and winacpi.dll copie themselves to <$SYSDIR> and start contacting the following hosts
205.209.172.230
exbandos.biz
zorrocoolboy.biz
nobro.net

This trojan attempts to terminate the process of security programs with the following filenames:
kpf4gui.exe
NPROTECT.EXE
MpfService.exe
outpost.exe
ZAPRO.EXE
amon.exe
kpf4ss.exe
firewall.exe
zonealarm.exe

the Trojan also sets the IE startpage to about:blank

Supposed Functionality:
not stated,
according to file and autorun naming, it appears to be windows system files and services
Privacy Statement:
na
Removal Instructions:

Autorun:

Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd), RunAlyzer (http://www.safer-networking.org/index.php?page=runalyzer) or msconfig.exe to remove the following autorun entries.

Entries named "SysMemory manager" and pointing to "<$SYSDIR>\mdms.exe".
Entries named "SysMemory manager" and pointing to "<$SYSDIR>\mdms.exe".
Entries named "spoolsvr32" and pointing to "<$SYSDIR>\csmss??.exe".
Entries named "spoolsvr32" and pointing to "<$SYSDIR>\csmss.exe".

Files:

Please use Windows Explorer or another file manager of your choice to locate and delete these files.

The file at "<$WINDIR>\kl.exe".
The file at "<$SYSDIR>\mdms.exe".
The file at "<$WINDIR>\hammer.exe".
The file at "<$SYSDIR>\mdms.exe".
The file at "<$WINDIR>\hammer.exe".
The file at "<$SYSDIR>\svcpy.dll".
The file at "<$SYSDIR>\winacpi.dll".
The file at "<$WINDIR>\kl.exe".
A file with an unknown location named "mdms.exe".
The file at "<$SYSDIR>\aux32.exe".
The file at "<$SYSDIR>\doit.exe".
The file at "<$SYSDIR>\w".
The file at "<$SYSDIR>\csmss32.exe".
The file at "<$SYSDIR>\file.exe".
The file at "<$SYSDIR>\winacpi.dll".
The file at "<$SYSDIR>\csmss.exe".
The file at "<$SYSDIR>\winacpi.dll".
A file with an unknown location named "csmss.exe".
Make sure you set your file manager to display hidden and system files. If MZS.Spoolserver32 uses rootkit technologies, use our RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).
You will have to use a global search for files without a name specified. Be extra careful, because just the name might not be enough to identify files!

Important: There are more files that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Registry:

You can use regedit.exe (included in Windows) to locate and delete these registry entries.

A key in HKEY_CLASSES_ROOT\ named "acpi.acpi.1", plus associated values.
A key in HKEY_CLASSES_ROOT\ named "acpi.ext", plus associated values.
Delete the registry key "{91259102-F52D-E42A-57ed-EDA392644311}" at "HKEY_CLASSES_ROOT\CLSID\".
Delete the registry key "{91259102-F52D-E42A-57ed-EDA392644311}" at "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\".
Delete the registry value "<$SYSDIR>\mdms.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$SYSDIR>\spanner.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$WINDIR>\tool1.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$SYSDIR>\mdms.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$SYSDIR>\spanner.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$WINDIR>\tool1.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "" at "HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers\sysacpildap\".
Delete the registry value "<$SYSDIR>\aux32.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$SYSDIR>\csmss.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$SYSDIR>\csmss32.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$SYSDIR>\doit.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "<$WINDIR>\tgbcde\module32.exe" at "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\".
Delete the registry value "" at "HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}\".
Delete the registry value "" at "HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}\InprocServer32\".
Delete the registry value "" at "HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}\ProgID\".
Delete the registry value "" at "HKEY_CLASSES_ROOT\CLSID\{5E2121EE-0300-11D4-8D3B-444553540000}\VersionIndependentProgID\".
Delete the registry key "{5E2121ED-0300-11D4-8D3B-444553540000}" at "HKEY_CLASSES_ROOT\Interface\".
Delete the registry key "{5E2121E1-0300-11D4-8D3B-444553540000}" at "HKEY_CLASSES_ROOT\TypeLib\".
Delete the registry key "mzs" at "HKEY_CURRENT_USER\Software\".
If MZS.Spoolserver32 uses rootkit technologies, use our RegAlyzer (http://www.safer-networking.org/index.php?page=regalyzer), RootAlyzer (http://forums.spybot.info/downloads.php?id=8) or our Total Commander anti-rootkit plugins (http://forums.spybot.info/downloads.php?id=3).

There are more registry entries that cannot be safely described in simple words. Please use Spybot-S&D (http://www.safer-networking.org/index.php?page=spybotsd) to remove them.

Final Words:

If neither Spybot-S&D nor self help did resolve the issue or you would prefer one on one help,
Please read these instructions (http://forums.spybot.info/showthread.php?t=288) before requesting assistance,
Then start your own thread in the Malware Removal Forum (http://forums.spybot.info/forumdisplay.php?f=22) where a volunteer analyst will advise you as soon as available.