Infected with Trojan.Zeroaccess.C and Trojan.Gen.2 - Unable to remove it using Symantec Antivirus

Hi,

My laptop - Compaq 420 , Windows 7 has been infected with trojan virus. Full scan with Symantec Anti Virus does not catch it .

Every 3 minutes I get a popup saying Trojan.Zeroaccess.C and Trojan.Gen.2 has been quarantined.

History -

  • When it first infected from a website , the virus started popping up a window saying that following files are corruptedand started giving a list of file names.
  • I ran msconfig and was able to remove the three startup programs which would hijack the system
  • After that I ran full scan and nothing was caught but the popups every 3 minutes from Symantec started coming saying that Trojan.Zeroaccess.C and Trojan.Gen.2 has been quarantined. The location it showed was C:\$Recycle.bin\ .....

Present condition

  • Though I am able to start windows and work normally , when I got to any website , I can observe the malware opening another website in a seperate tab with wierd website names.

PLEASE HELP ME. (I dare not try to run the powerful tools which Quad mentions on my own without a guidance )

Thank you

 

What is the file name and location of where it was detected??

 

Quads

Thanks Quads for picking this up.

 

The filenames and locations as per the dump from the Quarantine log are as follows

 

Trojan.Gen.2  ::  

________________

Filename : Desktop.ini  and 00000004.@

Location : C:\Windows\assembly\GAC\

                    and

                   C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\

   

Trojan.Zeroaccess.C  ::  

________________

Filename : 

000000cb.@

Location :

C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\

           

 

RiskFilenameOriginal LocationStatusDate
Trojan.Gen.2Desktop.iniC:\Windows\assembly\GAC\Infected11/5/2012 14:14
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 14:18
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 14:19
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 14:22
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 14:53
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 14:54
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 14:56
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 14:56
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:00
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:01
Trojan.Gen.2Desktop.iniC:\Windows\assembly\GAC\Infected11/5/2012 15:02
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:05
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:06
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:09
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:09
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:13
Trojan.Zeroaccess.C000000cb.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/5/2012 15:14
Trojan.Gen.2Desktop.iniC:\Windows\assembly\GAC\Infected11/6/2012 16:35
Trojan.Gen.2Desktop.iniC:\Windows\assembly\GAC\Infected11/6/2012 16:38
Trojan.Gen.200000004.@C:\$Recycle.Bin\S-1-5-18\$a7fdf5cfdfc266bc39717a2e07cd4c7c\U\Infected11/6/2012 16:40

ANY other user other than the thread starter is not to use any instructions, scripts or proceedures,  The work though in cleaning a system is individual and only for that system due to a number of factors.

 

Please do not run any tools unless instructed to do so. 

  • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability. Do as the instructions ask nothing extra or run things twice
  • If I ask a Question just answer it, don't run anything unless it states.
  • Major steps used:

1. Find

2. Break

3. Destroy

4. Cleanup  (including system as a whole)

 

Please read every post completely before doing anything. 

  • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

 

  • Logs from malware removal programs (OTL is one of them) can take some time to analyze. I need you to be patient while I analyze any logs you post. Please remember, I am a volunteer, and I do have a life outside of these forum, (sometimes :smileylol:)

  • Attention to detail is important! Since I cannot see or directly interact with your computer I am dependent on you to "be my eyes" and provide as much information as you can regarding the current state of your computer.

 


Bin variant  on Windows 7 / Vista

 

Download these 2 programs to you desktop ready just in case after the break you have no Internet, we at least have the programs for later   Don't run them yet

 

http://www.bleepingcomputer.com/download/farbar-service-scanner/

 

http://www.bleepingcomputer.com/download/combofix/

 

Quads

I have downloaded the two programs on desktop. Awaiting next instructions.

Thanks.

Download the 2 attached .txt files, and remove the .txt extension so that you have the files end in .reg (ZAFix1.reg) etc.

 

Then click to run the files and then the system should ask if you want the data added to the registry, answer = yes.  A cofirmation message should them appear saying that the data has been added..

 

The other way is to right click the files and choose "Open With" from the menu, and you should see Registry Editor as an option to choose.

 

For me this repaired the 2 Windows registry keys in question (Quads did infect his system with this).  So then I could after deal with the rest and also repair broken services.

 

After success in adding the registry data, restart your system.

 

Quads

- The two registries added succesfully

- System restarted with success

 

Awaiting next instructions. Thx.

Now the restart has been done.

 

Run FSS.exe, ( Disable Norton if need be) Tick all the boxes before running the scan and post back a log.

 

Quads

Here is the log after running FSS

 

________________________________________________________________________________

 

 

Farbar Service Scanner Version: 07-11-2012
Ran by Ashutosh.Sohani (administrator) on 07-11-2012 at 05:58:22
Running from "C:\Users\Ashutosh.Sohani\Desktop"
Windows 7 Professional  (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo IP is accessible.
Yahoo.com is accessible.


Windows Firewall:
=============
mpsdrv Service is not running. Checking service configuration:
The start type of mpsdrv service is OK.
The ImagePath of mpsdrv service is OK.

MpsSvc Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist.

bfe Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist.


Firewall Disabled Policy:
==================


System Restore:
============

System Restore Disabled Policy:
========================


Action Center:
============
wscsvc Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.


Windows Update:
============
wuauserv Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open wuauserv registry key. The service key does not exist.

BITS Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open BITS registry key. The service key does not exist.


Windows Autoupdate Disabled Policy:
============================
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU]
"NoAutoUpdate"=DWORD:1


Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist.


Other Services:
==============
Checking Start type of SharedAccess: ATTENTION!=====> Unable to retrieve start type of SharedAccess. The value does not exist.
Checking ImagePath of SharedAccess: ATTENTION!=====> Unable to retrieve ImagePath of SharedAccess. The value does not exist.
Checking ServiceDll of SharedAccess: ATTENTION!=====> Unable to open SharedAccess registry key. The service key does not exist.


File Check:
========
C:\Windows\system32\nsisvc.dll => MD5 is legit
C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit
C:\Windows\system32\dhcpcore.dll => MD5 is legit
C:\Windows\system32\Drivers\afd.sys => MD5 is legit
C:\Windows\system32\Drivers\tdx.sys => MD5 is legit
C:\Windows\system32\Drivers\tcpip.sys
[2012-05-17 15:08] - [2012-03-30 15:59] - 1287024 ____A (Microsoft Corporation) 55E9965552741F3850CB22CBBA9671ED

C:\Windows\system32\dnsrslvr.dll
[2011-05-26 13:07] - [2011-03-03 10:59] - 0132608 ____A (Microsoft Corporation) B15BE77A2BACF9C3177D27518AFE26A9

C:\Windows\system32\mpssvc.dll
[2009-07-14 05:23] - [2009-07-14 06:45] - 0565760 ____A (Microsoft Corporation) 5CD996CECF45CBC3E8D109C86B82D69E

C:\Windows\system32\bfe.dll
[2009-07-14 05:24] - [2009-07-14 06:44] - 0493568 ____A (Microsoft Corporation) 85AC71C045CEB054ED48A7841AAE0C11

C:\Windows\system32\Drivers\mpsdrv.sys => MD5 is legit
C:\Windows\system32\SDRSVC.dll
[2009-07-14 04:53] - [2009-07-14 06:46] - 0125952 ____A (Microsoft Corporation) 5FD90ABDBFAEE85986802622CBB03446

C:\Windows\system32\vssvc.exe
[2009-07-14 04:54] - [2009-07-14 06:44] - 1025536 ____A (Microsoft Corporation) 7EA2BCD94D9CFAF4C556F5CC94532A6C

C:\Windows\system32\wscsvc.dll => MD5 is legit
C:\Windows\system32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\system32\wuaueng.dll => MD5 is legit
C:\Windows\system32\qmgr.dll
[2009-07-14 05:00] - [2009-07-14 06:46] - 0589312 ____A (Microsoft Corporation) 53F476476F55A27F580661BDE09C4EC4

C:\Windows\system32\es.dll => MD5 is legit
C:\Windows\system32\cryptsvc.dll => MD5 is legit
C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
C:\Windows\system32\ipnathlp.dll => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit


**** End of log ****

With logs please attach them as logs as with ones to come can get large.

 

Quads

Sure will do that going forward.

Also attached is the same log (FSS) this time as an attachment

 

Some observations in case it is of any use -

 

- My internet daata upload/download size has increased dramatically as if something is running at background even though I am not going to any other website

- Now the popups by Symantec showing the quarantine info has stopped

 

OK

 

Download the attached .txt files, and remove the .txt extension so that you have the files end in .reg (like earlier)

 

Then click to run the files and then the system should ask if you want the data added to the registry, answer = yes.  A cofirmation message should them appear saying that the data has been added..

 

The other way is to right click the files and choose "Open With" from the menu, and you should see Registry Editor as an option to choose.

 

There are more to come in the next post below.

 

Quads

The rest attached

 

After adding to the registry all those, restart the system and Run FSS like the first time, ticking all the boxes, like before

 

You may find that the likes of Windows Update etc are now able to work after meaning that Windows and other programs are able to check the Internet for any updates.

 

Quads

Added the four registries succesfully. Awaiting next instructions.

Note there are 2 posts above with 8 registry key fixes.

 

Quads

Yes My bad , I replied too early.

Anyways after reading you second post , I did ran all the registries (8 in total)

- Restarted the system

-Ran FSS

- Attached is the log

OK the services are now created and set correctly ready

 

OK

 

Please read carefully Read all of this message first

 

Already Downloaded.


  • Ensure that Combofix is saved directly to the Desktop <--- Very important  (Not in the Download(s) or Temp folders)

  • Disable all security programs as they will have a negative effect on Combofix, Disabled for say 1 hour or more.
  • Close any open browsers and any other programs you might have running

 

Right click the combofix.exe on the desktop and select from the menu "Run as Administrator"

 

  • If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
  • When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review


****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze ****

Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser.
Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.

*EXTRA NOTES*

  • If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
  • If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
  • If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)

 

Quads

ComboFix was run successfully.  It produced a log which is attached .

OK,

 

Zeroaccess is now dead, the files have been placed in a folder dormant for now,  Combofix also swapped a file over using a backup copy.  Combofix also found the 2 msconfig entries that it looks like you stated in yur first post and removed those.

 

Entries

 

MJHxYiFYWBAtiV - c:\programdata\MJHxYiFYWBAtiV.exe
ztC8RkJvzqrYVg - c:\programdata\ztC8RkJvzqrYVg.exe

 

They look like entries for either a FakeAV or FakePolice (Ransomware)

 

Now on to Step 4 (a)

 

Please read carefully and Slowly

 

You might have to export the results

 

 Please scan with ESET next 


I'd like us to scan your machine with ESET OnlineScan

  • Hold down Control and click on the following link to open ESET OnlineScan in a new window.
    ESET OnlineScan
  • Click the Posted Image button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
    • Click on Posted Image to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the Posted Image icon on your desktop.
  • Check Posted Image
  • Click the Posted Image button.
  • Accept any security warnings from your browser.
  • Under scan settings, check Posted Image and DON'T (NO) check Remove found threats (reason for this is we don't want something deleted and then Windows won't load).
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • Attach the resulting log in your next reply


If you think a log should have been generated then go to C:\Program Files\ESET\ESET Online Scanner\log.txt to find it. 

 

Quads

The scan just finished now (took a long time) .

- The result mentions 8 infected file. 

- Log is atatched

 

(I am not using the software/folders mentioned in the log which has infected files. So if you think the part of the solution involves their deletion , I am fine with it . Otherwise whatever you recommend)

 

Thanks again for your patience.