Please help with BKDR_SERVU.AL removal

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by newuser, Sep 9, 2005.

  1. newuser

    newuser Private E-2

    Hello Everybody,

    Various scans of my PC show that I have BKDR_SERVU.AL located in C:\WINDOWS\SYSTEM32\WBEM\Repository\dll\win\microsoft\dll\dll\bill\roxx\microsoft\dll\setup\acls.exe

    Nothing I have tried to remove this works even HJT can't seem to delete it.

    Can someone please help me out with this issue, I've also not been able to download and install my Windows update for about a month now.

    Any help will be appreciated.

    Thanks in advance.
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That sounds more like a file that belongs to a tool from Microsoft to control Access Contol ListS (thus ACLS).

    What scans are reporting this to be a problem? Show the log.
     
  3. newuser

    newuser Private E-2

    Hello,
    AVG Plus Antivirus repots it as being a trojan and is unable to remove it.
    Please see my lates HJT log. Thanks.

    Edit by chaslang: Inline log removed
     
    Last edited by a moderator: Sep 10, 2005
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I was not referring to posting a HijackThis log. I was talking about what application was showing you the virus. That was the log I wanted to see.

    But HJT shows the service being run:
    O23 - Service: Display ACtrlList (ACLIST) - Unknown owner - C:\WINDOWS\SYSTEM32\WBEM\Repository\dll\win\microsoft\dll\dll\bill\roxx\microsoft\dll\setup\acls.exe

    This is an application that would appear to have been installed by someone. It is used to for access control list (allows you set who has permission to access certain files on a system). Are you sure you or some one else did not install this for some reason. Perhaps it has something to do with MySql? Do you use it for some kind of billing application?

    If you are sure you do not need it you can stop and disable the service and then Delete the Service and assocated files. It is up to you to know whether it is something needed on your system.

    By the way you do have other things in your HJT log that should be fixed!
    And did you install:
    O2 - BHO: SafeGuard Protect PCShield - {564FFB73-9EEF-4969-92FA-5FC4A92E2C2A} - C:\WINDOWS\System32\KDP5335.dll

    This is malware.

    If you would like to cleanup everything, you must follow standard cleaning procedures as given below:


    - Run ALL the steps in this Sticky thread READ ME FIRST BEFORE ASKING FOR SUPPORT: Basic Spyware, Trojan And Virus Removal

    Make sure you check version numbers and get all updates.

    - Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.


    After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps below:

    - Download HijackThis 1.99.1

    - Unzip the hijackthis.exe file to a folder you create named C:\Program Files\HJT

    - Do NOT run Hijack This from the Desktop, a temp folder, or a sub-folder of C:\Documents and Settings, or choose to run it directly from the downloaded ZIP file.

    - Before running HijackThis: You must close each of the following:your web browser, e-mail client, instant messenger, and programs like notepad, wordpad, MS Word etc. And any other unnecessary running programs.

    - Run HijackThis and save your log file.

    - Post your log as an ATTACHMENT to your next message. (Do NOT copy/paste the log into your post).
     
    Last edited: Sep 10, 2005
  5. newuser

    newuser Private E-2

    Sorry for my late reply. All the steps in "this Sticky thread READ ME FIRST BEFORE ASKING FOR SUPPORT" was followed but I'm afraid I haven't still been able to get rid of it. I found haxdoor-h and Netsys in the spybot scan and bkdr_servu.al in the trend micro online scan. All the other scans were fine. I was able to download and complete the scans with no problems.

    I'm also not able to remove the haxdoor-h and Netsys present on my PC which is blocking a lot things on my PC.

    Please see my latest HJT log.

    Thanks.
     

    Attached Files:

  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Not really! What about the RAVantivirus online scan? Did you miss anything else?

    I keep telling you that service is an Access Control List program but you did not make any comment on what I said. Are you possitive this is not something you need and you or someone else installed?

    You need to disable Spybot Teatimer because it could get in our way.

    To disable TeaTimer, run Spybot and click Mode and select Advanced Mode. Then click Tools and select Resident. Now in the right window pane, uncheck TeaTimer.
    Also while this is open, in the left column now select IE Tweaks and then in the right pane make sure all the Miscellaneous locks are unchecked.
    Now quit Spybot!

    Also stop using MSconfig to control startups. We need to see everything. Run MSconfig and select Normal Startup.

    Now let's get a start on your fixes. Run HJT and select the below lines and click Fix:

    O2 - BHO: (no name) - {564FFB73-9EEF-4969-92FA-5FC4A92E2C2A} - (no file)
    O2 - BHO: (no name) - {9ECB9560-04F9-4bbc-943D-298DDF1699E1} - (no file)
    O2 - BHO: (no name) - {BDF3E430-B101-42AD-A544-FADC6B084872} - (no file)
    O9 - Extra button: (no name) - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O9 - Extra 'Tools' menuitem: Uninstall BitDefender Online Scanner v8 - {85d1f590-48f4-11d9-9669-0800200c9a66} - %windir%\bdoscandel.exe (file missing)
    O9 - Extra button: (no name) - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - (no file)
    O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} -
    O16 - DPF: {11111111-1111-1111-1111-111111111237} -
    O16 - DPF: {1803B9EF-9905-4F34-AFC4-05D1BAB28801} -
    O16 - DPF: {2BC66F54-93A8-11D3-BEB6-00105AA9B6AE} -
    O16 - DPF: {31B7EB4E-8B4B-11D1-A789-00A0CC6651A8} -
    O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} -
    O16 - DPF: {644E432F-49D3-41A1-8DD5-E099162EEEC5} -
    O16 - DPF: {71057C18-0507-4747-86BC-E11CE7512C5F} -
    O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} -
    O16 - DPF: {90C9629E-CD32-11D3-BBFB-00105A1F0D68} -
    O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} -
    O16 - DPF: {B9F3009B-976B-41C4-A992-229DCCF3367C} -
    O16 - DPF: {BB21F850-63F4-4EC9-BF9D-565BD30C9AE9} -
    O16 - DPF: {C2FCEF52-ACE9-11D3-BEBD-00105AA9B6AE} -
    O16 - DPF: {CE28D5D2-60CF-4C7D-9FE8-0F47A3308078} -
    O16 - DPF: {E77C0D62-882A-456F-AD8F-7C6C9569B8C7} -
    O16 - DPF: {F58E1CEF-A068-4C15-BA5E-587CAF3EE8C6} -

    Then reboot and post a new HJT log.

    Did you add the below Proxy Server setting:
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac

    Do you know what the below are for:

    O23 - Service: Remote Administrator Service (r_server) - Unknown owner - c:\windows\srv\radmin\radmin.exe" /service (file missing) <--- did you install remote administration software
    O23 - Service: Mainboard Monitor (uninst) - Cat Soft - C:\WINDOWS\srv\unwise32.exe <--- is this for your motherboard
     
    Last edited: Sep 16, 2005
  7. newuser

    newuser Private E-2

    Hello chaslang,
    It wasn't installed by me or someonme else and I don't need it, sorry about that.

    RAVantivirus online scan showed up with these and couldn't clean them up

    C:\servu-windows.rar->pcinfo\hidden32.exe - VirTool:Win32/HiddenRun.B -> Infected
    C:\servu-windows.rar->KILL.EXE->(UPXW) - Trojan:Win32/KillApp.D -> Infected
    C:\WINDOWS\srv\KILL.EXE->(UPXW) - Trojan:Win32/KillApp.D -> Infected
    C:\WINDOWS\srv\pcinfo\hidden32.exe - VirTool:Win32/HiddenRun.B -> Infected

    Tea timer has been disabled,I've also changed to Normal startup as suggested.

    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac <----- wasn't added by me, I don't know how it got there.


    O23 - Service: Remote Administrator Service (r_server) - Unknown owner - c:\windows\srv\radmin\radmin.exe" /service (file missing) <--- wasn't installed by me and I've been trying to get rid of it.

    O23 - Service: Mainboard Monitor (uninst) - Cat Soft - C:\WINDOWS\srv\unwise32.exe <--- is not for my motherboard, I don't know how it got there.


    Attached is my latest HJT log.

    Thanks for your help.
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    See how important it is not to skip steps! RAV picked up some of the problems too! Notice it found the same O23 service line info I was questioning.

    If you are sure you do not have this PC setup to allow remote administration (by you or anyone else) capabiity then proceed with the below. Otherwise stop an tell me what you use remote admin for and what programs you are using to do it.

    Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'.
    On the page that opens, scroll down to Display ACtrlList (or if not found look for ACLIST)... then right click the entry, select 'Properties' and press 'Stop Service'. When it shows that it is stopped, next please set the 'Start-up Type' to 'Disabled'. Press 'OK' until you get back to Windows.

    Now repeat the above to stop and disable:
    Remote Administrator Service (or if not founf look for r_server)
    Mainboard Monitor (or if not founf look for uninst)

    Next, run HJT, but instead of scanning, click on the "None of the above, just start the program" button at the bottom of the choices. At the lower right, click on the 'Config" button, and then the Misc tools' button ... select 'Delete an NT Service" ... copy/paste the following into the box that opens, and press "OK":

    Display ACtrlList or if that does not work, use ACLIST


    Now repeat the above to Delete the below NT Services:
    Remote Administrator Service (or if not founf look for r_server)
    Mainboard Monitor (or if not founf look for uninst)

    Now exit HJT but do not reboot if it asks you to do so. We will reboot later after restarting HJT and fixing some lines.

    If you are using WinXP or WinMe, make sure you have system restore disabled (per the tutorial).
    For all OS types, make sure viewing of hidden files is enabled (per the tutorial).

    Please run HijackThis and click on the "Open the Misc Tools Section" button on the open page. Then select "Open process manager" on the left-hand side. Look for the following process (or processes) and one at a time kill them by selecting it and then click "Kill process". Then click yes.
    C:\WINDOWS\SYSTEM32\WBEM\Repository\dll\win\microsoft\dll\dll\bill\roxx\microsoft\dll\setup\acls.exe
    c:\windows\srv\radmin\radmin.exe
    C:\WINDOWS\srv\unwise32.exe

    After killing all the above processes, click "Back".
    Then please click "Scan" and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = http://localhost:9100/proxy.pac
    O23 - Service: Display ACtrlList (ACLIST) - Unknown owner - C:\WINDOWS\SYSTEM32\WBEM\Repository\dll\win\microsoft\dll\dll\bill\roxx\microsoft\dll\setup\acls.exe
    O23 - Service: Remote Administrator Service (r_server) - Unknown owner - c:\windows\srv\radmin\radmin.exe" /service (file missing)
    O23 - Service: Mainboard Monitor (uninst) - Cat Soft - C:\WINDOWS\srv\unwise32.exe

    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete:
    C:\WINDOWS\SYSTEM32\WBEM\Repository\dll <---- the whole folder
    c:\windows\srv <---- the whole folder

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now run Ccleaner (installed while running the READ ME FIRST). Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.

    Now we need to Reset Web Settings:
    1) If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2) Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3) If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.

    Now reboot in normal mode and post a new HJT log. And tell us how things are working.
     
  9. newuser

    newuser Private E-2

    Hello again chaslang,
    I followed your instructions to a T, however I was unable to delete the C:\WINDOWS\SYSTEM32\WBEM\Repository\dll it said it was being used by another program and I had to stop it first before I can delete it but I have absolutely no clue on what could be using it as I had just rebooted to safe mode and no programs were running. The Read only was also unchecked.

    Any further help will be appreciated. Please see my latest HJT log.

    Thanks so much for your help.
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Did you notice that proxy server line is still there??? Are you sure you do not need it?

    Boot into safe mode and Stop these three services using services.msc (do not disable, just stop)
    O23 - Service: MySql - Unknown owner - C:\mysql\bin\mysqld-nt.exe
    O23 - Service: NoIPDUCService - Vitalwerks LLC - C:\Program Files\No-IP\DUC20.exe
    O23 - Service: VNC Server Version 4 (WinVNC4) - Unknown owner - C:\Program Files\RealVNC\VNC4\WinVNC4.exe" -service (file missing)

    Use HJT's process manager to kill the below processes!
    C:\WINDOWS\System32\MsPMSPSv.exe
    C:\Program Files\BT Voyager 105 ADSL Modem\dslstat.exe
    C:\Program Files\BT Voyager 105 ADSL Modem\dslagent.exe
    C:\PROGRA~1\BTVOYA~2\oamSender.exe
    C:\Program Files\Google\Web Accelerator\GoogleWebAccWarden.exe
    C:\Program Files\Google\Web Accelerator\googlewebaccclient.exe

    Now try to delete the folder you could not delete.
     
  11. newuser

    newuser Private E-2

    Hello chaslang,
    Its very strange none of the files were in services.msc when I booted in safe mode. The same goes for the ones I'm to kill with HJT process manager, none of the files you mentioned is in there.

    I also tried to delete the folder again, but no way.

    Please do you have any other suggestions?.

    Thanks
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Try the same steps in normal boot mode!

    Also please do not use msconfig to control startups. Run msconfig and select Normal Startup. Post a new HJT log.
     
  13. newuser

    newuser Private E-2

    Hi,
    I stopped the three services but I couldn't kill the C:\WINDOWS\System32\MsPMSPSv.exe it says its being used by another program. I managed to kill all the other processes though. I also tried to delete the folder but I still couldn't delete it.

    Thanks.
     
  14. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Download the Registry Search Tool :

    Unzip to your Desktop and double click on regsrch.vbs
    (if you have script protection, please allow this to run)

    In the dialog that opens enter the following:

    ACtrlList

    Press 'OK'

    The search will run for a while then alert you when it is finished. Press 'OK' and copy the contents of the WordPad window and post in this thread.

    Now repeat the above for: ACLIST
     
  15. newuser

    newuser Private E-2

    Hello chaslang,
    Please see below the result, Thanks.

    Log attached!
     

    Attached Files:

    Last edited by a moderator: Sep 20, 2005
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    That log is only for ACLIST! What about the search for ACtrlList ?
     
  17. newuser

    newuser Private E-2

    Hello chaslang,
    Sorry about that, it found nothing on ACtrlList.
    Thanks
     
  18. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Note: while doing the below with all the Startups disabled, you will not be able to do very much on your PC. When we finish you will renable them and get back to normal.

    Click Start, Run, and enter msconfig and click OK!

    Now select Selective Startup and Uncheck the 4 check boxes below it (leave the Use Original Boot.ini alone). Then click Apply and then reboot your PC.

    Now see if you can rename the folder (I would not delete it. I have a feeling you may need it.)
    Rename:
    C:\WINDOWS\SYSTEM32\WBEM\Repository\dll\win\microsoft
    to:
    C:\WINDOWS\SYSTEM32\WBEM\Repository\dll\win\OLDmicrosoft

    Now use msconfig to select Normal Startup and reboot again to normal mode and come back and tell me the results.
     
    Last edited: Sep 21, 2005
  19. newuser

    newuser Private E-2

    Hi,
    None of the files you mentioned are in start up when I run msconfig.
     
  20. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I did not mention any files. I just said select Selective Startup and uncheck the top four items.
     
  21. newuser

    newuser Private E-2

    Sorry I misunderstood you.

    C:\WINDOWS\SYSTEM32\WBEM\Repository\dll\win\microsoft is not present only C:\WINDOWS\SYSTEM32\WBEM\Repository\F5 is present. I also notice its no longer showing up in HJT.

    Thanks.
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    It stopped showing up in your HJT log after doing what I posted in message # 8. But you said in the message # 9 you could not delete the folder.

    So am I to assume all problems are resolved now?
     
  23. newuser

    newuser Private E-2

    Hi chaslang,
    These files are in C:\WINDOWS\SYSTEM32\WBEM\Repository\F5
    INDEX.BTR, INDEX.MAP, MAPPING1.MAP, MAPPING2.MAP, MAPPING.VER, OBJECTS.DATA, OBJECTS.MAP. These are the ones that my system says is being used by an apllication when I previously tried to delete the folder, I guess I deleted one and not the other.

    I don't know if this has anything to do with me not able to download and install my updates. I'm still not able to do that, can you help out on that?.

    Thanks.
     
  24. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    I believe you mean FS not F5. Delete the FS folder too.

    Also look for any of the below and delete them if found (let me know if you find any):
    C:\WINDOWS\svcproc.exe
    C:\WINDOWS\nail.exe
    C:\WINDOWS\tdtb.exe
    C:\WINDOWS\qvbdnifharv.exe
    C:\WINDOWS\dbwqis.exe
    C:\WINDOWS\GGEEINPO.ini
    C:\WINDOWS\lu.dat
    C:\WINDOWS\kwv2.dat
    C:\WINDOWS\kwv2Temp.dat
    C:\WINDOWS\wupdt.exe
    C:\WINDOWS\TMP_FILE_0.tmp
    C:\WINDOWS\TMP_FILE_1.tmp
    C:\WINDOWS\system32\Macromed\Flash\testUpdate.txt
     
  25. newuser

    newuser Private E-2

    Sorry my mistake, FS. I checked for files you mentined below but couldn't find any of them. I haven't been able to delete the FS folder, I get a message saying there is something using it but I haven't been able to detect what it could be.
     
  26. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Do ALL the same steps I recommended in message #18 but this time for the FS folder.
     
  27. newuser

    newuser Private E-2

    Hello chaslang,
    I followed your instructions again on #18. I renamed C:\WINDOWS\SYSTEM32\WBEM\Repository\FS to C:\WINDOWS\SYSTEM32\WBEM\Repository\Oldmicrosoft.

    When I rebooted back in normal mode. I notice that another folder named FS had been created alongside the one I just renamed.

    Thanks
     
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Let's see if we can cleanup some more hidden baddies.

    - download Nail/Bolder/Aurora Remover 0.3.1 Beta and save it to its own folder like c:\ABIremover
    - Now extract the abiremover.exe file from the ZIP file into the folder you created but do not run the EXE yet. We will run it later.

    - Now boot in safe mode, run the abiremover.exe but make sure you are physically disconnected from the internet (unplug your cable to be sure). Just click install, wait (explorer window will disapear)

    - When abiremover finishes just reboot into normal and continue with the below steps.

    Also download HOSTER and then follow the below steps.
    • Unzip Hoster to a convenient folder such as C:\Hoster
    • Run Hoster.exe, click Restore Original Hosts and then click OK.
    • Click the X to exit the program
    Now let's look for some more possible hidden malware:

    - First run CCleaner before doing the below.

    - Download this trial version of Ewido Security Suite
    • Install ewido security suite
    • Launch ewido, there should be an icon on your desktop double-click it.
    • The program will have a window come up. One of the buttons on the left is to Update. Click the Update button.and then Start the Update. The update will start and a progress bar will show the updates being installed.
    • After it completes the update, click the Scanner button

    Now exit Ewido. Now print the below instructions or save them locally because I want you do have no browsers opened and also have no connection to the internet (unplug your cable) while doing the below.

    Okay, reboot into safe mode and follow the steps below. (If you have any problems at all trying to get into safe mode to complete these steps, just run them in normal boot mode and make sure you tell me when you come back.)

    Open up Ewido and do the following:


    • Click on Scanner
    • Then click Settings
    • Under What to Scan? Select Scan every file
    • Then click OK
    • Click on Complete System Scan and the scan will start.
    • Let the program scan the machine
    While the scan is in progress you will be prompted to clean files that are infected. Leave the defaults selections (to Remove and backup) and click OK. To save yourself some time, you can select Perform action with all infections and then click OK. With the option to scan every file, a lot of cookies will be removed.

    Once the scan has completed, there will be a button located on the bottom of the screen named Save report


    • Click Save report
    • Save the report to your desktop or anyplace you will be able to find it to upload here.
    Reboot into normal mode and reconnect to the internet.

    Come back here and post the Ewido Scan Report.

    Let me know where things stand now.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds