Can't remove zeroaccess from Windows 7x64 system

I have a Windows 7 x64 system that i can not remove the Trojan.zeroaccess malware from.  Symantec Endpoint Protection is installed and sees it but only captures the files it creates and deletes them.  NOthing I chave done can remove the threat from the PC.  I have run Norton Power Eraser it claims to find and fix, but alas no.  Safe mode booting and the threat still is a running service.  PLEASE HELP!!  This is my HTPC and is getting annoying with SEP constantly finding this threat but not removing it.

Thanks.

I have a Windows 7 x64 system that i can not remove the Trojan.zeroaccess malware from.  Symantec Endpoint Protection is installed and sees it but only captures the files it creates and deletes them.  NOthing I chave done can remove the threat from the PC.  I have run Norton Power Eraser it claims to find and fix, but alas no.  Safe mode booting and the threat still is a running service.  PLEASE HELP!!  This is my HTPC and is getting annoying with SEP constantly finding this threat but not removing it.

Thanks.

Happy to wait my turn if it means getting help.  I see from other threads that Quads is involved in that he will aslo want the OS.

- I have a USB Key

- Running Windows 7 x64

- Symantec Endpoint Protection installed

- NPE has been used, but no other anti-malware or spyware programs are installed.

ANY other user other than the thread starter is not to use any instructions, scripts or proceedures,  The work though in cleaning a system is individual and only for that system due to a number of factors.

 

Unfortunately, with the amount of threads means the waiting time is longer, Norton continually Blocking files won't hurt your system but is is just annoying, Please wait and be patient.   I am  trying to keep up, spending hours here to script and clean machines on a first come/first served basis. If you or someone adds to your thread It will be pushed back in line due to the new update.  I use the boards in reverse to what is seen


 

Please do not run any tools unless instructed to do so. 

  • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability. Do as the instructions ask nothing extra or run things twice
  • If I ask a Question just answer it, don't run anything unless it states.
  • Major steps used:

1. Find

2. Break

3. Destroy

4. Cleanup  (including system as a whole)

 

Please read every post completely before doing anything. 

  • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

 

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forum, (sometimes :smileylol:)

  • Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.

 

Read Slowly and all of it.

 

Please download http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/  Download the 64 bit version


Transfer it on to the Flash Drive

Enter System Recovery Options

To enter System Recovery Options from the Advanced Boot Options:

  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Choose your language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.


On the System Recovery Options menu you will get the following options:

 

Startup Repair
System Restore
Windows Complete PC Restore
Windows Memory Diagnostic Tool
Command Prompt


  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive drive letter and close the notepad.
  • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    Note: Replace letter e with the drive letter of your portable hard drive
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) on the flash drive.  restart the system and load Windows Pleaseattach the log in  your reply back..

 

Quads

thanks Quads< turns out i was wring about x64.  ran the frst.exe for x86 though.

 

please find attached the ffsrt.txt file

Download the script attached, needs to be the same file name as well (fixlist.txt), Copy across to flash drive

 

NOTE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options again. Like previously

  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst.exe or frst64.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press the Fix button just once and wait.
  • The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply (attach).

 

Quads

okay Quads so i followed your imstructions step by step as above, and immediately after doing so and trying to load Windows i received a BSOD.  i could not get past>

i only could perform startup repair where i had to perform system restore>

 

i then performed the same steps again with the same result.

 

are you sure about the contents of that file you sent?

 i am reluctant to attempt again

BTW - i should add that now zeroaccess and gen2 are wreaking havoc on my system.  SEP is no longer deleting them, some are being logged some quarsntined and some deleted.

There is nothing in the script to cause that, but there are some systems where with the zeroaccess break or even before the services.exe patched with ZA causes a critical error within 1 minutes giving a BSOD.

 

looks like I will have to deal with the Windows file via FRST also.

 

I need a new FRST.txt log

 

Quads

sorry for the delay but here is an updated file.

 

thanks for the help

You are still infected

 

Start FRST like you did in Step 1, once it starts do this,

 

Type the following in the edit box after "Search:" so it looks like this:

Search: services.exe

Click Search button and post the log it makes to your reply.   Called search.txt

 

Quads

please find attached the search.txt

 

i should also mention that at this time everytime i run this fsrt.exe program i get bsod after and have to load windows with last known good.

 

thanks for the continued help.

Delete your copy of fixlist.txt on the flash drive

 

Download the script attached, needs to be the same file name as well (fixlist.txt), Copy across to flash drive

 

NOTE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Now please enter System Recovery Options again. Like previously

  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst.exe or frst64.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • Press the Fix button just once and wait.
  • The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply (attach).

 

Quads

please find attached the fixlog.txt

i cant tell if the problem is resolved yet.  the SEP detection window laumched but reported nothing  and a bubble from the system tray said denial of service logged.

thanks for the continued help.

 

 

 

zeroaccess may have altered the services entries for windows in the registry.

 

At this point do you get, what is called the 1min critical error BSOD anymore??

 

Quads

No nothing anymore.  Anything else I need to do?

Step 3. 

 

 

Please read carefully Read all of this message first

 

Download Combofix http://www.bleepingcomputer.com/download/anti-virus/combofix


  • Ensure that Combofix is saved directly to the Desktop <--- Very important  (Not in the Download(s) or Temp folders)

  • Disable all security programs as they will have a negative effect on Combofix, Disabled for say 1 hour or more.
  • Close any open browsers and any other programs you might have running

 

Right click the combofix.exe on the desktop and select from the menu "Run as Administrator"

 

  • If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
  • When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review


****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze ****

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

*EXTRA NOTES*

  • If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
  • If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
  • If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)

 

Quads

heres the combofix.txt

services.exe now fixed

 

step 4. (a)

 

Please read carefully and Slowly

 

You might have to export the results

 

 Please scan with ESET next 


I'd like us to scan your machine with ESET OnlineScan

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and DON'T (NO) check Remove found threats (reason for this is we don't want something deleted and then Windows won't load).
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • Attach the resulting log in your next reply


If you think a log should have been generated then go to C:\Program Files\ESET\ESET Online Scanner\log.txt to find it. 

 

Quads

no log created and no threats found.