Ensure that Combofix is saved directly to the Desktop <--- Very important
Disable all security programs as they will have a negative effect on Combofix,
Close any open browsers and any other programs you might have running
Doiwnload the attached CFscript.txt, , For some browsers Right Click the attachment on the forum and select "Save AS" or similar to Download it. See screenshot below.
Now drag the CFScript.txt into the ComboFix.exe
If you are using windows XP It might display a pop up saying that "Recovery console is not installed, do you want to install?" Please select yes & let it download the files it needs to do this. Once the recovery console is installed Combofix will then offer to scan for malware. Select continue or yes.
When finished, it will produce a report for you. Please post the "C:\ComboFix.txt" for further review
****Note: Do not mouseclick combofix's window while it's running. That may cause it to stall or freeze****
Note: ComboFix may reset a number of Internet Explorer's settings, including making it the default browser. Note: Combofix prevents autorun of ALL CDs, floppies and USB devices to assist with malware removal & increase security.
*EXTRA NOTES*
If Combofix detects any Rootkit/Bootkit activity on your system it will give a warning and prompt for a reboot, you must allow it to do so.
If Combofix reboot's due to a rootkit, the screen may stay black for several minutes on reboot, this is normal
If after running Combofix you receive any type of warning message about registry key's being listed for deletion when trying to open certain items, reboot the system and this will fix the issue (Those items will not be deleted)
Now your Zeroaccess is dead because if you still had zeroaccess running, this variantions you have bloack Combofix from running.
It could be,
a) Windows has the file(s) desktop.ini in many locations and if there is a bad version Windows will create a new copy after deletion of the bad one. SEP is somehow still detecting the new copies
b) and this happens with Norton products also, When the product detects a file it can't remove so is placed in the History - Unresolved Treats list. The product then continues to notify the user on every startup of Windows and other times.
Even if another 3rd party program is used to remove the infection, From OTL, Combofix FRST, Malwarebytes etc. The Symantec product still has the listing stuck in the unresolved threats list.
The Workaround for Norton products was to Delete items in the Qbackup folder,or Completely remove (uninstall) including all data and history. Then do a fresh install, nice and new.
In approx. 2010 products for Norton (I do not know about Corp products) Symantec in the 2010 kindly added the "Clear Entries" button in the Unresolved Threats so with a click of a mouse the listings could be removed if a 3rd party had already removed it, as Symantec could see the problem.
ok, so you think I am safe and I just have to figure out how to stop the messages from coming up? I'll research how to clear unresolved threats in SEP. Thanks for all your help.
I have found a handful of threads around over the last few days, and they are all trying to figure it out. That is zeroaccess ever changing and altering.
For instance this
C:\Windows\Installer\{8f1182c6-af1a-7035-2b12-4fc3271a0f44}\U\00000008.@ Win64/Agent.BA trojan cleaned by deleting - quarantined C:\Windows\Installer\{8f1182c6-af1a-7035-2b12-4fc3271a0f44}\U\80000000.@ Win64/Sirefef.AE trojan cleaned by deleting - quarantined C:\Windows\Installer\{8f1182c6-af1a-7035-2b12-4fc3271a0f44}\U\80000032.@ probably a variant of Win32/Sirefef.EU trojan cleaned by deleting - quarantined C:\Windows\Installer\{8f1182c6-af1a-7035-2b12-4fc3271a0f44}\U\80000064.@ Win64/Sirefef.AE trojan cleaned by deleting - quarantined
Operating memory a variant of Win32/Sirefef.EZ trojan
Notice the similar above
They have tried alsorts so far to find it, They even used a program to try and force the 2 files
I have asked others for any data, or a dropper, that does this so I can infect my system with it, then I can go about pulling apart the infection on my system
I have also given them the noticed MD5 to look for.
My MD5 is 5F1B6A9C35D3D5CA72D6D6FDEF9747D6, it is legit, and signed
Just so you Know having the PC / Windows the way it is, is still better then removing something unsure about and then finding Windows won't boot after. Although annoying.
On my other group. After reading my zeroaccess post there on how it still holds in the memory with desktop.ini and the MD5 one of the other guys read it, and then found the same problem and MD5 on a MajorGeeks malware removal thread
Then also on Bleeping Computers Malware Removal forum and the Malwarebytes Removal forum. (3 non english boards as well) so we are not alone for the moment.
You only have one good copy of services.exe, sooooo
Can you find manually the services.exe located here C:\Windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe