My laptop - Compaq 420 , Windows 7 has been infected with trojan virus. Full scan with Symantec Anti Virus does not catch it .
Every 3 minutes I get a popup saying Trojan.Zeroaccess.C and Trojan.Gen.2 has been quarantined.
History -
When it first infected from a website , the virus started popping up a window saying that following files are corruptedand started giving a list of file names.
I ran msconfig and was able to remove the three startup programs which would hijack the system
After that I ran full scan and nothing was caught but the popups every 3 minutes from Symantec started coming saying that Trojan.Zeroaccess.C and Trojan.Gen.2 has been quarantined. The location it showed was C:\$Recycle.bin\ .....
Present condition
Though I am able to start windows and work normally , when I got to any website , I can observe the malware opening another website in a seperate tab with wierd website names.
PLEASE HELP ME. (I dare not try to run the powerful tools which Quad mentions on my own without a guidance )
ANY other user other than the thread starter is not to use any instructions, scripts or proceedures, The work though in cleaning a system is individual and only for that system due to a number of factors.
Please do not run any tools unless instructed to do so.
We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability. Do as the instructions ask nothing extra or run things twice
If I ask a Question just answer it, don't run anything unless it states.
Major steps used:
1. Find
2. Break
3. Destroy
4. Cleanup (including system as a whole)
Please read every post completely before doing anything.
Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forum, (sometimes )
Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.
Bin variant on Windows 7 / Vista
Download these 2 programs to you desktop ready just in case after the break you have no Internet, we at least have the programs for later Don't run them yet
Download the 2 attached .txt files, and remove the .txt extension so that you have the files end in .reg (ZAFix1.reg) etc.
Then click to run the files and then the system should ask if you want the data added to the registry, answer = yes. A cofirmation message should them appear saying that the data has been added..
The other way is to right click the files and choose "Open With" from the menu, and you should see Registry Editor as an option to choose.
For me this repaired the 2 Windows registry keys in question (Quads did infect his system with this). So then I could after deal with the rest and also repair broken services.
After success in adding the registry data, restart your system.
Farbar Service Scanner Version: 07-11-2012 Ran by Ashutosh.Sohani (administrator) on 07-11-2012 at 05:58:22 Running from "C:\Users\Ashutosh.Sohani\Desktop" Windows 7 Professional (X86) Boot Mode: Normal ****************************************************************
Internet Services: ============
Connection Status: ============== Localhost is accessible. LAN connected. Google IP is accessible. Google.com is accessible. Yahoo IP is accessible. Yahoo.com is accessible.
Windows Firewall: ============= mpsdrv Service is not running. Checking service configuration: The start type of mpsdrv service is OK. The ImagePath of mpsdrv service is OK.
MpsSvc Service is not running. Checking service configuration: Checking Start type: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist. Checking ImagePath: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist. Checking ServiceDll: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist.
bfe Service is not running. Checking service configuration: Checking Start type: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist. Checking ImagePath: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist. Checking ServiceDll: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist.
Firewall Disabled Policy: ==================
System Restore: ============
System Restore Disabled Policy: ========================
Action Center: ============ wscsvc Service is not running. Checking service configuration: Checking Start type: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist. Checking ImagePath: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist. Checking ServiceDll: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Windows Update: ============ wuauserv Service is not running. Checking service configuration: Checking Start type: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist. Checking ImagePath: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist. Checking ServiceDll: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist.
BITS Service is not running. Checking service configuration: Checking Start type: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist. Checking ImagePath: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist. Checking ServiceDll: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist.
Windows Autoupdate Disabled Policy: ============================ [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU] "NoAutoUpdate"=DWORD:1
Windows Defender: ============== WinDefend Service is not running. Checking service configuration: Checking Start type: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist. Checking ImagePath: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist. Checking ServiceDll: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist.
Other Services: ============== Checking Start type of SharedAccess: ATTENTION!=====> Unable to retrieve start type of SharedAccess. The value does not exist. Checking ImagePath of SharedAccess: ATTENTION!=====> Unable to retrieve ImagePath of SharedAccess. The value does not exist. Checking ServiceDll of SharedAccess: ATTENTION!=====> Unable to open SharedAccess registry key. The service key does not exist.
File Check: ======== C:\Windows\system32\nsisvc.dll => MD5 is legit C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit C:\Windows\system32\dhcpcore.dll => MD5 is legit C:\Windows\system32\Drivers\afd.sys => MD5 is legit C:\Windows\system32\Drivers\tdx.sys => MD5 is legit C:\Windows\system32\Drivers\tcpip.sys [2012-05-17 15:08] - [2012-03-30 15:59] - 1287024 ____A (Microsoft Corporation) 55E9965552741F3850CB22CBBA9671ED
Also attached is the same log (FSS) this time as an attachment
Some observations in case it is of any use -
- My internet daata upload/download size has increased dramatically as if something is running at background even though I am not going to any other website
- Now the popups by Symantec showing the quarantine info has stopped
Download the attached .txt files, and remove the .txt extension so that you have the files end in .reg (like earlier)
Then click to run the files and then the system should ask if you want the data added to the registry, answer = yes. A cofirmation message should them appear saying that the data has been added..
The other way is to right click the files and choose "Open With" from the menu, and you should see Registry Editor as an option to choose.
After adding to the registry all those, restart the system and Run FSS like the first time, ticking all the boxes, like before
You may find that the likes of Windows Update etc are now able to work after meaning that Windows and other programs are able to check the Internet for any updates.
OK the services are now created and set correctly ready
OK
Please read carefully Read all of this message first
Already Downloaded.
Ensure that Combofix is saved directly to the Desktop <--- Very important (Not in the Download(s) or Temp folders)
Disable all security programs as they will have a negative effect on Combofix, Disabled for say 1 hour or more.
Close any open browsers and any other programs you might have running
Right click the combofix.exe on the desktop and select from the menu "Run as Administrator"
If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review
****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze****
Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser. Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.
*EXTRA NOTES*
If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)
Zeroaccess is now dead, the files have been placed in a folder dormant for now, Combofix also swapped a file over using a backup copy. Combofix also found the 2 msconfig entries that it looks like you stated in yur first post and removed those.
(I am not using the software/folders mentioned in the log which has infected files. So if you think the part of the solution involves their deletion , I am fine with it . Otherwise whatever you recommend)