ITLPERF - is this malware or left overs?

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by handyaj, Sep 26, 2011.

  1. handyaj

    handyaj Private E-2

    I completed cleaning my PC yesterday working with TimW. Everything seems clean but I have a question on somethings I found. I removed the tools used and started installing some of the recommended tools.

    I was looking in the event logs and noticed an entry that comes up after each reboot in the System Event log. The error indicates "The Network Location Awarenes service Terminated with the following error: The specified module could not be found." I looked into this and could not find much. I noticed the spelling was wrong in that the service was missing an S. I looked in services and there is the normal NLA service and then this service, Network Location Awarenes. The description for this service is, "Creat New Networks". The word create has the E missing. I manually searched the registry for "Awarenes" and found ITLPERF in numerous places. I am concerned about this and cannot find much information on it.

    This service tries to start and then stops because it cannot find the module. The path is, C:\WINDOWS\System32\svchost.exe -k itnetsvcs.

    I ran the normal beginning scans requested and nothing was found, although ComboFix did not run. The HD activity stops after a few minutes and it just sits there. I attached the rest of the logs requested. I also attached a text file from Registrar Lite which I saw was used in other posts to search for certain keys or data. I created a book mark file and then dumped that into a text file. There was no export of what was found but I made it work.

    One more thing. I installed Microsoft Security Essentials Friday night when I was near the end of the fixes. Last night, it found Virus: Win32/Patchload.O in real time. I was not running an on demand scan. The file in question was disinfected. The file is located at file:C:\Program Files\Common Files\Microsoft Shared\VS7DEBUG\MDM.EXE. Other scans with different scanners after that did not find anything.

    I hope this is just left overs from the previous fixes. If that is all it is, can the registry keys with ITLPERF be deleted? Can I just remove that service with Hijack This?

    Thanks in advance for your help.
     

    Attached Files:

  2. handyaj

    handyaj Private E-2

    Here is the MGLOGS.ZIP file from that scan.
     

    Attached Files:

  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Do not try to remove anything on your own, please in case of mistake. Sounds like a Koblu infection to me by what you have described about those service names with typos (missing letters etc) I could be wrong.


    What is this? C:\WINDOWS\Tasks\restart.job Let me know.


    • I need you to rename Combofix.exe to 87fdsx.com
    • Make sure it is on your desktop
    • Try first to run it in normal mode, or try SAFE MODE if normal proves to be problematic.



    Run this and attach the results.

    Using ESET's Online Scanner



    Now download The Avenger by Swandog469, and save it to your Desktop.

    • Extract avenger.exe from the Zip file and save it to your desktop
    • Run avenger.exe by double-clicking on it.
    • Do not change any check box options!!
    • Copy everything in the Quote box below, and paste it into the Input script here: part of the window:
    • Now click the Execute button.
    • Click Yes to the prompt to confirm you want to execute.
    • Click Yes to the Reboot now? question that will appear when Avenger finishes running.
    • Your PC should reboot, if not, reboot it yourself.
    • A log file from Avenger will be produced at C:\avenger.txt and it will popup for you to view when you login after reboot.

    I want you to run TDSSKiller so refer to the below for how to do so.

    TDSSkiller - How to run



    Try and run Win32diag again please.

    Download and run Win32kDiag per the below instructions:
    • Download this Win32kDiag and save to C:\Win32kDiag.exe. You must save it here!!!!
    • Click on Start->Run, and copy-paste the following command (the bolded text) into the "Open" box, and click OK. When it's finished, there will be a log called Win32kDiag.txt on your desktop. Please attach this log
    C:\win32kdiag.exe -f -r



    Download OTL to your desktop.

    • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
    • Vista and Windows 7 users Right-click OTL and choose Run as Administrator)
    • When the window appears, underneath Output at the top change it to Minimal Output.
    • Check the boxes beside LOP Check and Purity Check.
    • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.

    When the scan completes, it will open two notepad windows. OTL.Txt and Extras.Txt. These are saved in the same location as OTL.

    Attach both of these logs into your next reply.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista or Windows7) Then attach the new C:\MGlogs.zip file that will be created by running this.
     
    Last edited: Sep 26, 2011
  4. handyaj

    handyaj Private E-2

    I figured out what was preventing ComboFix from running. I tried safe mode and differnt user, etc. There is an older PATA drive in the computer and when connected, it shows up as Disk 0 in Windows for some reason and the boot drive shows up as drive 1. I removed the old drive, as there is nothing on it right now, and ComboFix and all the other scans worked without an error.

    C:\WINDOWS\Tasks\restart.job is a scheduled task I created to reboot the computer weekly. It is powered on all the time since I remote control it and it is not used that often so I want to be sure it gets memory refreshed at least weekly.

    Attached are 4 of the 7 requested logs. I will post the other 3 logs in another reply.
     

    Attached Files:

  5. handyaj

    handyaj Private E-2

    Here are the last 3 out of the 7 logs requested.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Looking better! How is your internet connection by the way? All is well I trust?


    Now we need to use ComboFix
    • Make sure that combofix.exe that you downloaded while doing the READ & RUN ME is on your Desktop but Do not run it!
      • If it is not on your Desktop, the below will not work.
    • Also make sure you have shut down all protection software (antivirus, antispyware...etc) or they may get in the way of allowing ComboFix to run properly.
    • If ComboFix tells you it needs to update to a new version, make sure you allow it to update.
    • Open Notepad and copy/paste the text in the below quote box. Ensure you scroll down to select ALL the lines:
    Code:
    KILLALL::
    
    Registry::
    [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
    "itnetsvcs"=-
    • Save the above as CFscript.txt and make sure you save it to the same location (should be on your Desktop) as ComboFix.exe
    • At this point, you MUST EXIT ALL BROWSERS NOW before continuing!
    • You should have both the ComboFix.exe and CFScript.txt icons on your Desktop.
    • Now use your mouse to drag CFscript.txt on top of ComboFix.exe

      http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

    • Follow the prompts.
    • When it finishes, a log will be produced named c:\combofix.txt
    • I will ask for this log below

    Note:

    Do not mouseclick combofix's window while it is running. That may cause it to stall.

    If after running Combofix you discover none of your programs will open up, and you recieve the following error: "Illegal operation attempted on a registry key that has been marked for deletion". Then the answer is to REBOOT the machine, and all will be corrected.


    Run rootrepeal again and attach the log.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let us know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  7. handyaj

    handyaj Private E-2

    Things seem to be running well and the Internet connection is working as well. The instructions you have provided are straight forward. It looks like ComboFix found and corrected another system file infection. Hopefully all is good.

    I was looking in the registry, event logs and services and my initial post of ITLPerf is gone. That is great. I did not even notice what step in this process removed that. Just curious.

    I have attached the 3 logs requested.
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK, that looks very good now. Can you just run the following one more time and attach their logs, please?
    • Combofix
    • TDSSKiller
     
  9. handyaj

    handyaj Private E-2

    I ran Combo Fix and TDSS Killer and their logs are attached.
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    OK, I have spoken to the others and we have a couple more things to do before we wrap up. I'm off out for dinner and then work later on, so see you in a few hours time. I'll make a post then.
     
  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Now we need to scan the system with this special tool.
    • Please download Junction.zip and save it to your root folder (C:\Junction.zip)
    • Unzip it and put junction.exe in the root folder (C:\junction.exe)
    • Now click Start => Run... => Copy and paste the following command in the run box and click OK:
      cmd /c junction -s c:\ >C:\log.txt
    • A command prompt window opens and also a license agreement from SysInternals will appear.
    • Accept the license agreement and the scan will begin.
    • Wait until a log file opens. Attach this C:\log.txt when it finishes (the command prompt window will close when it finishes). (How to attach items to your post)
    • NOTE: It scans your whole hard disk so if can take a long time. Be patient and don't do anything else while it is scanning.



    Please run the following:
    • please download GrantPerms.zip and save it to your desktop.
    • Unzip the file and run GrantPerms.exe
    • Copy and paste the following into the edit box of GrantPerms:
    Code:
    C:\WINDOWS\junction.exe
    C:\Win32kDiag.exe
    C:\Documents and Settings\Treasurer\Desktop\RootRepeal.exe
     
    • Now Click Unlock.
    • When it is done click "OK".
    • Now click List Permissions and attach the which is the Perms.txt file that pops up.
    • A copy of Perms.txt will be saved in the same directory from where the tool is run.

    Now try and run in this order:
    • Junction
    • Rootrepeal
    • Win32diag

    Attach logs if successful.

    Run a full/complete scan with Microsoft Security Essentials and attach a log of anything it finds if possible, or let me know

    Run Combofix again and attach the log.
     
  12. handyaj

    handyaj Private E-2

    Thank you for your time working on this on the weekend. I ran all the scans requested. The Junction application did not have a license agreement and was less than 1 minute to scan. Security Essentials did not find anything and I could not find a log file.

    I am currious, do you know what malware has been affecting my computer? I thought it might be wrapped up then you needed a couple new scans. I just want to find out what I had picked up and if it is able to be fully removed. Thank you.
     

    Attached Files:

  13. handyaj

    handyaj Private E-2

    Here are the last 2 files. Security Essentials did not find anything.
     

    Attached Files:

  14. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It's a ZeroAccess infection we have been fighting.

    Can you run OTL please as you did in post number 3? Attach the log please.
     
  15. handyaj

    handyaj Private E-2

    Thank you for letting me know what we have been dealing with. I have attached the OTL log. It did not generate an Extras log this time.
     

    Attached Files:

  16. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Double-click OTL.exe to start the program.

    • Copy and Paste the following code into the Custom Scans/Fixes textbox. Do not include the word Code

    Code:
    :processes
    :otl
    :files
    @Alternate Data Stream - 95 bytes -> C:\Documents and Settings\All Users\Application Data\TEMP:5C321E34
    :commands
    [PURITY]
    [EMPTYTEMP]
    [RESETHOSTS]
    [REBOOT]
    
    
    • Then click the Run Fix button at the top.
    • Click the OK button.
    • OTL may ask to reboot the machine. Please do so if asked.
    • The report should appear in Notepad after the reboot. Just close notepad and attach this log form OTL to your next message.


    Now:
    Download this file to your desktop

    Kaspersky Virus Removal Tool

    Run the program you have just downloaded to your desktop (it will be randomly named )

    First we will run a virus scan.
    • On the first tab select all elements down to Computer and then select start scan.
    • Once it has finished select report, save and attach that.

    Do not close AVPTool or it will self uninstall, if it does uninstall - then just rerun the setup file on your desktop.

    Now an analysis scan

    • Select the Manual Disinfection tab
    • Press the Gather System Information button
    • Once done , still on the Manual Disinfection tab click the little icon of a file which is the "reports" button. Now click on Manual Disinfection report.You should see an option to save a report here with a little button with an icon of a disk. Attach this log please.

    Also download a fresh copy of Combofix, let it overwrite the old version, (ensure it is on your dekstop) then run it and attach the new C:\combofix.txt log.
     
    Last edited by a moderator: Oct 4, 2011
  17. handyaj

    handyaj Private E-2

    I have run the applications requested and attached the 4 log files. I started and stopped the Kapersky scan about 4 times so the resulting log file was 17 MB!. I trimmed it by creating a file with only the last scan. It found a trojan on MGTOOLS.exe. I decided to let it clean it in case it was infected. I did not delete if from the System Restore points but instead deleted the restore points. I could always download a new copy of the MGTOOLS.EXE file if needed.

    Also, I use McAfee at work and received an email that they came out with a tool for removing Zero Access infections. It is not thoroughly tested yet. Do you know much about that? Should I attempt using it? Please let me know your thoughts. Thank you.
     

    Attached Files:

  18. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep SUPERAntiSpyware and Malwarebytes Anti-Malware for scanning/removal of malware. Unless you purchase them, they provide no protection. They do not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Click START then RUN and enter the below into the run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 6 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    5. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others), you can delete these files now.
    6. If running Vista, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    7. Go to add/remove programs and uninstall HijackThis.
    8. Goto the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders
      related to MGtools and some other items from our cleaning procedures.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 7 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  19. handyaj

    handyaj Private E-2

    Thank you, Kestrel13!. You put a lot of time and effort into finding the final solution. I appreciate all the effort. I have learned how some of these tools work and that is good knowledge to have. If it is not an easier fix, I will definitely tell friends and family to use this malware removal forum on Major Geeks. You and TimW put in so much time in the two instances of malware I asked for help with.

    Keep up the great work.
     
  20. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    From TimW and myself. You are welcome. :) Safe surfing.
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds