How to remove ZeroAccess rootkit from Windows (Removal Guide)

ZeroAccess is a sophisticated kernel-mode rootkit that is rapidly becoming one of the most widespread threats in the current malware ecosystem. ZeroAccess’ ability to run on both 32-bit and 64-bit versions of Windows, resilient peer-to-peer command and control infrastructure and constant updates to its functionality over time show that ZeroAccess is a modern threat capable of thriving on modern networks and modern Operating Systems.

ZeroAccess remains hidden on an infected machine while downloading more visible components that generate revenue for the botnet owners. Currently the downloaded malware is mostly aimed at sending spam and carrying out click fraud, but previously the botnet has been instructed to download other malware and it is likely that this will be the case again in the future. ZeroAccess should be considered an advanced and dangerous threat that requires a fully featured, multi-layered protection strategy.

ZeroAccess employs mechanisms that are themselves hard to remove such as a kernel-mode rootkit and patched driver files, patched system files such as services.exe and data hidden in NTFS Extended Attributes, removal of NTFS permissions on files used; and because ZeroAccess often employs several autostart points on an infected machine and usually other files that can re-install the malware.

How to remove ZeroAccess rootkit virus (Virus Removal Guide)

This malware removal guide may appear overwhelming due to the amount of the steps and numerous programs that are being used. We have only written it this way to provide clear, detailed, and easy to understand instructions that anyone can use to remove malware for free.
Please perform all the steps in the correct order. If you have any questions or doubt at any point, STOP and ask for our assistance.

STEP 1:  Use ESETSirfefCleaner tool to remove ZeroAccess rootkit

In this first step, we will use the ESETSirefefCleaner tool to remove the ZeroAccess rootkit from your computer.

  1. You can download ESETSirefefCleaner from the below link.
    ESETSIREFEFCLEANER DOWNLOAD LINK(This link will automatically download ESETSirfefCleaner on your computer.)

    Unable to download “ESETSirefefCleaner.exe contained a virus and was deleted”.
    More recent variants of Sirefef might prevent you from downloading this removal tool. If you cannot download the tool, follow the steps below:

    1. Click Start → Computer → Local Disk (C:) → Program Files.
    2. Right-click the Windows Defender folder and select Rename from the context menu.
    3. Add a unique variation to the filename, such as .old (for example, Windows Defender.old).
    4. Click the link above to download the ESETSirefefCleaner tool.When the download is complete, make sure to rename the Windows Defender folder back to its original filename before running the ESET SirefefCleaner tool.
  2. Double-click on ESETSirefefCleaner.exe to start this utility. You may be presented with an User Account Control pop-up asking if you want to allow this to make changes to your device. If this happens, you should click “Yes” to continue.
  3. The message “Win32/Sirefef.EV found in your system” will be displayed if an infection is found. To remove ZeroAccess rootkit from your computer, press the Y key on your keyboard
    ESETSirefefCleaner virus detected
  4. Once the tool has run, you will be prompted to restore system services after you restart your computer. Press Y on your keyboard to restore system services and restart your computer.
    ESETSirefefCleaner Press Y to remove malware
  5. Once your computer has restarted, if you are presented with a security notification click Yes or Allow. and then continue wit the next step.

STEP 2: Use RKill to stop the ZeroAccess rootkit malicious processes

RKill is a program that will attempt to terminate all malicious processes associated with ZeroAccess rootkit, so that we will be able to perform the next step without being interrupted by this malicious software.

Because this utility will only stop ZeroAccess rootkit running process and does not delete any files, after running it you should not reboot your computer as any malware processes that are configured to start automatically will just be started again.
  1. You can download Rkill from the below link.
    RKILL DOWNLOAD LINK (his link will open a new web page from where you can download “RKill”)
  2. Double click on Rkill program to stop the malicious programs from running.
    Start the Rkill program
  3. RKill will now start working in the background, please be patient while this utiltiy looks for malicious process and tries to end them.
    Rkill Running
  4. When the Rkill tool has completed its task, it will generate a log. Do not reboot your computer after running RKill as the malware programs will start again.
    Rkill Program


STEP 3: Scan your computer with Malwarebytes Anti-Malware to remove ZeroAccess rootkit

Malwarebytes Anti-Malware is a powerful on-demand scanner which should remove the ZeroAccess rootkit virus from your machine. It is important to note that Malwarebytes Anti-Malware will run alongside antivirus software without conflicts.

  1. You can download download Malwarebytes Anti-Malware from the below link.
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link open a new page from where you can download “Malwarebytes Anti-Malware”)
  2. When Malwarebytes has finished downloading, double-click on the “mb3-setup-consumer” file to install Malwarebytes Anti-Malware on your computer.
    Malwarebytes installer
    You may be presented with an User Account Control pop-up asking if you want to allow Malwarebytes to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
    Malwarebytes User Account Control Prompt
  3. When the Malwarebytes installation begins, you will see the Malwarebytes Setup Wizard which will guide you through the installation process.
    Setup Malwarebytes installer
    To install Malwarebytes Anti-Malware on your machine, keep following the prompts by clicking the “Next” button.
    Completing the Malwarebytes Setup Wizard
  4. Once installed, Malwarebytes will automatically start and update the antivirus database. To start a system scan you can click on the “Scan Now” button.
    Perform a system scan with Malwarebytes
  5. Malwarebytes Anti-Malware will now start scanning your computer for malicious programs.
    This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning for malware
  6. When the scan has completed, you will be presented with a screen showing the malware infections that Malwarebytes Anti-Malware has detected.
    To remove the malicious programs that Malwarebytes has found, click on the “Quarantine Selected” button.
    Malwarebytes Quarantine Selected
  7. Malwarebytes Anti-Malware will now quarantine all the malicious files and registry keys that it has found.
    To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes removing malware from computer
    When the malware removal process is complete, you can close Malwarebytes Anti-Malware and continue with the rest of the instructions.

STEP 4: Double-check for malicious programs with HitmanPro

HitmanPro can find and remove malware, adware, bots, and other threats that even the best antivirus suite can oftentimes miss. HitmanPro is designed to run alongside your antivirus suite, firewall, and other security tools.

  1. You can download HitmanPro from the below link:
    HITMANPRO DOWNLOAD LINK (This link will open a new web page from where you can download “HitmanPro”)
  2. When HitmanPro has finished downloading, double-click on the “hitmanpro” file to install this program on your computer.
    HitmanPro icon
    You may be presented with an User Account Control pop-up asking if you want to allow HitmanPro to make changes to your device. If this happens, you should click “Yes” to continue with the installation.
    HitmanPro User Account Control Pop-up
  3. When the program starts you will be presented with the start screen as shown below. Now click on the Next button to continue with the scan process.
    HitmanPro setup process
  4. HitmanPro will now begin to scan your computer for malware.
    HitmanPro scanning for ZeroAccess rootkit virus
  5. When it has finished it will display a list of all the malware that the program found as shown in the image below. Click on the “Next” button, to remove malware.
    HitmanPro detected malware
  6. Click on the “Activate free license” button to begin the free 30 days trial, and remove all the malicious files from your computer.
    Activate HitmanPro to remove malware
    When the process is complete, you can close HitmanPro and continue with the rest of the instructions.

(OPTIONAL) STEP 5: Use Zemana AntiMalware Portable to remove ZeroAccess rootkit

Zemana AntiMalware Portable is a free utility that will scan your computer for the ZeroAccess rootkit and other malicious programs.
This step should be performed only if your issues have not been solved by the previous steps.
  1. You can download Zemana AntiMalware Portable from the below link:
    ZEMANA ANTIMALWARE PORTABLE DOWNLOAD LINK (This link will open a new web page from where you can download “Zemana AntiMalware Portable”)
  2. Double-click on the file named “Zemana.AntiMalware.Portable” to perform a system scan with Zemana AntiMalware Free.
    Zemana AntiMalware portable
    You may be presented with a User Account Control dialog asking you if you want to run this program. If this happens, you should click “Yes” to allow Zemana AntiMalware to run.
    Zemana AntiMalware User Account Control
  3. When Zemana AntiMalware will start, click on the “Scan” button to perform a system scan.
    Zemana AntiMalware Free Scan
  4. Zemana AntiMalware will now scan your computer for malicious programs. This process can take up to 10 minutes.
    Zemana AntiMalware scanning for virus
  5. When Zemana has finished finished scanning it will show a screen that displays any malware that has been detected. To remove all the malicious files, click on the “Next” button.
    Zemana AntiMalware Removing ZeroAccess rootkit Virus
    Zemana AntiMalware will now start to remove all the malicious programs from your computer.
Your computer should now be free of the ZeroAccess rootkit. If you are still experiencing problems while trying to remove ZeroAccess rootkit from your machine, you can ask for help in our Malware Removal Assistance forum.
How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

59 thoughts on “How to remove ZeroAccess rootkit from Windows (Removal Guide)”

  1. Hello,
    Yes, you can skip the Combofix scan, and run it later if need it.

    Lets check if you really have a ZeroAccess rootkit:
    Lets run a scan with ESETSirefefCleaner tool:

    1.Click the link below to download the ESETSirefefCleaner tool, and save the file to your Desktop.
    ESET SIREFEFCLEANER TOOL DOWNLOAD LINK : http://download.eset.com/special/ESETSirefefCleaner.exe
    2.From your Desktop, double-click ESETSirefefCleaner utility. If security notifications appear, click Continue or Run.
    3.The message “Win32/Sirefef.EV found in your system” will be displayed If an infection is found. Press Y on your keyboard to remove the infection.
    4.Once the tool has run, you will be prompted to restore system services after you restart your computer. Press Y on your keyboard to restore system services and restart your computer.
    5.Once your computer has restarted, if you are presented with a security notification click Yes or Allow.
    6.Click Yes at the ESET Services Repair tool window.
    7.Once the ESET Services Repair process is complete, you will again be prompted to restart your computer, to do so click Yes.

    Next, please run a scan with the other tools from this article.

    Stay safe!

  2. Great article!!!. AVG found 3 Rootkit viruses on all 3 of our computers. Can anyone tell me……should reinstall all of our operating systems, or are they safe now.

    We also have an android (phone) and kindle that were regularly plugged in to one or more of the infected machines and a Apple/macbook. The Android, Kindle and Macbook were all scanned but the scanners returned that “there were no viruses detected”.

    Am I safe, or should I go forward with (reinstallation hell) reinstalling all of my OS’s.

    I don’t know what to do about the devices as they would have to be reinstalled via manufacture.

    Any help would be greatly appreciated. This feels like a nightmare. Help!!!!!

  3. ESET found and removed three JAVA exploit variant trojans, Agent.F and A.B. However, it did not find ZeroAccess, which McAfee’s ineffective Rootkit Removal Tool claims is still in my PC; and my McAfee Total Protection is still wonky. I’m going to unpack and try the Emsisoft next. All scanners, but McAfee’s RMT, are reporting my system as clean. This thing is a bear! I’ll let you know what happens, if I don’t chuck my CPU out a window first.

  4. Hello Geri,
    What’s the current status after the ESET scan?What issues are you experiencing?

  5. ComboFix had deleted basically all my program files. I had to do a System Restore to earlier today because I had no web browser to get back online. Does that mean the virus had spread everywhere already? Is it possible to skip step 2 and move on?

  6. First off, THANK YOU so much for all your help. It has gotten me part way through solving my PC’s issues. Unfortunately, I’m experiencing problems with running some of these tools. Here’s what I know:

    A threat identified as ZeroAccess by McAfee Labs’ Rootkit Remover tool has completely disabled my Total Protection software, corrupted the DAT files and, possibly, even disabled my Windows XP firewall. McAfee’s standalone tools are about as effective as their virus protection which, in the case of my PC, is not at all.

    TDSS Killer found and removed 14 items, none of which were ZeroAccess, unless it is going by another name. Rogue Killer will not run. It claims that it is missing a driver. ComboFix found and did a lot of things that I don’t understand. Malwarebytes scanned everything and found nothing. Hitman Pro found and removed 84 tracking cookies. Stinger found nothing. And, like McAfee’s Rootkit Remover, Symantec’s Zero Access Fix Tool doesn’t work.

    Right now, I’m in the process of downloading ESET’s signature database (I’m on my Smartphone and doing everything on my PC in Safe Mode with Networking), but I’m not sure it will work. It’s detecting my McAfee Total Protection, even though its been disabled both by me and the infection. I know the UI settings I see, when the program states that it’s on, are false. In the settings window, every option has been hijacked and is grayed out.

    I really think that I need to get Rogue Killer, or something like it, to work. ESET is now scanning. So far, no threats have been found. When ESET is done, I plan to unpack and run the Emsisoft Emergency Kit.

    All the tools I’m using were downloaded one after the other, before beginning the steps to remove ZeroAccess from my PC. I thought that, in the event that I lost and could not recover web access, at least some of the tools might work.

    Please, help. I’m open to any and all advice. I’m even considering uninstalling and re-installing Total Protection, even though I must do it from McAfee’s site. I’ve not yet spoken to their Tech Support. In the past, they’ve proven fairly useless. I think they’re interested mainly in selling services, not providing them.

    Thank you,

    Geri

  7. Followed the instructions in the guide, within two steps the PC was able to do Microsoft updates again. ZeroAccess Rootkit virus/trojans removed. Completed the full the regimen of exercises, PC now back to normal. Great information to have when you run into this type of trouble.

  8. The ESET scanner just finished and didn’t find any threats on my computer but i still have problems with being redirected to another site when i use the search engine and cant uninstall anything.

  9. Thank you SO much! I thought I had gotten rid of this frickin virus, but it sneaked back I guess. I think it’s finally gone this time, and your instructions were so clear and easy to follow.

  10. Hi Stelian Pilici!!
    Wow you guys respond fast, I’m used to having to wait days to get a reply on other websites. I downloaded the adwclener.exe and it did exactly what you said it would. I’m running the ESET Scanner again to see if there is anymore adware on my laptop.
    My laptop is running fine it even runs bit faster esp when its booting up but I’m pretty sure i still have the redirectware because when i use search engines i cant click on a site without it redirecting me to another page.
    Before i ran the Kaspersky, Combo fix, Rouge killer, malwarebytes, hitman pro, my firewall was down and i couldn’t put it back up but afterwords i could control all of my security settings and i no longer have that problem.
    the only other thing is when i go to uninstall things an error message pops up that says The windows installer can not be accessed.
    Also I’m not sure if it matters but I’m doing everything through sandboxie now, i don’t use my web browser without it. I just thought id ask you guys if that’s a good idea or if that could be causing any problems I’m unaware of.
    Thank you guys so much for taking the time out to help!!!

  11. Hello Monica,
    Apart from this ESET detection on your computer, how is everything running??Any issues?
    Let remove the adware from your computer computer:
    Please download AdwCleaner by Xplode onto your desktop.

    1. Close all open programs and internet browsers.
    2. Double click on adwcleaner.exe to run the tool.
    3. Click on Delete.
    4. Confirm each time with Ok.
    5. Your computer will be rebooted automatically. A text file will open after the restart.
    6. NEXT,double click on adwcleaner.exe to run the tool.
    7. Click on Uninstall.
    8. Confirm with yes.

    Waiting your reply to tell me if everything is ok… :)

  12. I have run all of this step by step. when i ran Kaspersky, Combo fix, Rouge killer, malwarebytes, hitman pro, they all found the viruses and said they either deleted or quarantined them and i started to run the eset scanner. When i ran the eset scanner it was still showing a lot of the viruses on my laptop and i waited 10 and a half hours for it to finish scanning but it was stuck at 28%. i stoped it and started my computer over and started everything over starting with kaspersky and as i went through each program none of them detected any threats so i thought i was in the clear until i started running the eset scanner again. as it ran it was still finding all the viruses. I was going to go ahead and do the emisoft but have no clue how to unpack it and im not sure if its what i need for the viruses eset keeps finding.

    Here is what eset shows that i have: C:\ProgramData\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}\_Setupx.dll a variant of Win32/Adware.Yontoo.B application
    C:\ProgramData\Tarma Installer\{DA00D550-BB91-4A26-AAE5-9172D626CAAE}\_Setupx.dll a variant of Win32/Adware.Yontoo.B application
    etc

    is my laptop just too far gone to fix?? please help!!!

  13. Hello,

    God bless you! I bought an expensive laptop and i care it really hard. I tried to download a movie and zeroacess sneak into my system. I was getting mad and you saved my life! Thank you again and again!

  14. Just want to say a big “Thank You” for providing this step-by-step guide to removing the ZeroAccess rootkit. My anti-virus program and it’s so-called Support team [which shall remain nameless, to save them embaressment – but I’ve passed on your link, so they can learn what real ‘Support’ looks like ; -) ] were incapable of detecting, let alone removing this vicous and very damaging little cancer bug. So thank you very much for all your help! : -)

  15. Well, I don’t even finished the process yet but my problem is already solved! I was unable to acess windows firewall and that prevented me from saving the changes made in the net discovery options on windows.

    I’ in the malware bytes step now but I just noticed that my firewall is working again!

    The only nitpick is tha my network icon in the tray is showing that I’m not connected, but I can live with that!

    Thanks a lot!!!

  16. Well, took like two days to run everything but it seems like I’m finally clean. It was a little scary, considering that every process seemed to find something. Thanks, the guide was unbelievably thorough and helpful. Now I can finally get back to the problem of figuring out why Youtube and Netflix aren’t working on my computer (which seems to have to do with not being able to install a more recent version of Silverlight, as it keeps claiming that my computer isn’t compatible with the program).

  17. I had to write to THANK YOU for saving me a lot of time and money with your articulate explanation of how to get rid of the win64.zaccess.a virus. It took most of an entire day, but I followed every single direction you gave to a “t”, and the virus is gone. I figured I’d have to pay to have the OS completely removed and reinstalled. I am very grateful for the help, and for no charge – greatly appreciated.

  18. Hello Nigel,
    You have a serious infection which needs several steps to be completly removed, so because this is just a basic comment section, I’ll ask you to start a thread in our Malware Removal Assistance forum, where we can properly guide you through all the steps!
    Stay safe and see you on the forums!

  19. I wish it was that easy. I ran combo fix a couple of days ago. I do not know where the report is now. I have just tried downloading again, and started to run it. It got to the end of backing up registry files. I then got six warnings “iexplore.exe. A problem has caused the program to stop working correctly. etc etc.” Then two more “internet explorer has stopped working.” finally I got “You cannot rename Combifix as Combifix (1). After that nothing.

    Two days ago, I ran Rogue killer:

    Log one: RogueKiller V8.4.0 [Dec 12 2012] by Tigzy
    mail : tigzyRKgmailcom
    Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
    Website : http://tigzy.geekstogo.com/roguekiller.php
    Blog : http://tigzyrk.blogspot.com/

    HELP PLEASE!!!!!!

    Thank you!!

  20. My trojan was removed at the first step itself. Though instead of calling the file as given in the guide, it called it zeroaccess

  21. Hello Nigel,
    Can you please go ahead and run Combofix and copy/paste the log in your next reply!

  22. I downloaded TDSSkiller onto another computer. It runs happily on that. I renamed it and burnt it to a discc. Inserting that into my infected computer, I click on the icon. “User Access Control” asks if I want it to run. I get a short hour glass, and nothing else happens. When I try again, the whole computer crashes instantly to zero. Its impressively quick.

    A complete reboot restores the system to “normal”.

    HELP. What should I do now?

    Many Thanks.

  23. I never comment… but on this occasion I absolutely must. Thank you for taking the time to create such a useful and well written guide. All of the links and downloads worked beautifully, the software worked incredibly well without any issues and without asking me to pay to get them to clean up what they found. Without this quality of information I would probably have not got my PC back to the exceptional health it is now enjoying. Brilliant job and thanks to everyone involved in creating these products.

  24. This tutorial was amazing! I though I had gotten rid of the virus ages ago, but then I realized that it was still there. Thanks for the help!

  25. Hello Kristina,
    Can you please go ahead and perform the other steps,then please re-try to scan with TDSSKiller.

  26. Thanks for these great instructions! I have used your site previously with great results. I am struggling this time. I cannot get TDSKiller to run. I download it, rename it iexplore.exe. When I run it, the “User Access Control” window comes up and asks if I want to allow it to run, I say yes. Then I get the “hourglass” swirl and nothing happens. I’m running Windows 7 64 bit, SP1. Any help is greatly appreciated.

  27. I’d like to say that is tremendous advice .It would be Paranoidally Wise also to run Superantispyware, F-Secure’s Easy Clean,
    Comodo’s Cleaning Essentials,Kaspersky’s Security Scan,Norman’s Malware Cleaner ,and Microsoft’s Safety Scanner.

  28. I was infected with some unidentified malware that hijacked my yahoo-webmail and disabled the W7x64-Firewall services (error code 0x80070424).
    To my dismay, Malwarebytes, MS-Security-Essentials, AdvancedSystemCare, CCleaner we NOT able to prevent, identify or remove this infection.

    After reviewing & considering a clutch of other proposed-solutions (complicated, risky, suspect, etc.), I stumbled upon your website.

    So, I thank you so much for your efforts on this most-useful website to counter-attack such malwares.

    Your Step 2 (combofix .exe) was most effective for me and did repair that “error code”.

    If anyone suspects their PC is infected, I recommend they follow all the steps listed here. Worked for me.

  29. Thank you so much Stelian!

    There were so many conflicting guides on the internet saying to do different things but I followed yours from start to finish and my PC seems to be fine now :D

  30. Hello Sigma,
    If you actually disabled the antivirus,firewall and other real-time protection software,than you can go ahead with the scan!

  31. Great site. 1 problem. I have disable Mcaffee but the Combofix continues to show that I have them enabled. Am I safe to run the scan or do you have another option. At this point I cannot afford unpredictable results”.
    Thanks

  32. Thanks for speedy feedback, Stelian. I’ll run those scans as advised.

    I’m still curious why ComboFix (appeared) to stall. It’s likely the answer is highly technical. What actually happened when I got to Step 2 in your ZeroAccess Removal Guide is ComboFix ran for 30 minutes, then appeared to freeze the machine. I uninstalled ComboFix, updated to latest version, renamed it Combo-Fix and installed the “Console” it requested.

    Some AV Sites suggest stopping ComboFix EX3 processes while its executing will speed it up. Not sure about that… I noted the EX3 process takes up a large amount of RAM while executing. My machine is only fitted with 700MB RAM, I’m wondering (as with many newer programs) if ComboFix simply needed more RAM to execute quickly?

    Kind Regards, NB

  33. Hello Stelian
    Thank you so much for your help and advice. I have been following the links you gave me to download and cure the problem with no windows update and no firewall after the SMART virus.
    Got to Combofix it found two files for deletion and rebooted, however on starting up I forgot that I have an automatic pop up of ‘Control panel’ that appears. This caused the Combofix to stall, after waiting about 10 mins I turned the computer off and restared with the Malwarebytes Anti-Malware. I have no problem now dowloading new windows updates, so that part seems to have worked. However, the next step would not allow me to complete a full Malware scan, but did let me follow a short scan. Both the Malware and the Hitmanpro did not throw up any more virus programmes.
    I am having trouble with the last part finding the link WINDOWS REPAIR ALL IN ONE DOWNLOAD LINK you recommended – I have found a Tweaking.com – Windows Repair (All in One) v1.9.1 Released 10.22.2012 would this be an updated version and should I download this one?
    Thank you.
    Jan

  34. Hello nbwriter,
    It should be gone from your machine,however if you want to do a double check, you can run a scan with the following tools:
    STEP 1: Run a scan with Eset Online Scanner.

    1. Download ESET Online Scanner utility.
      ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
    2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
    3. Check Yes, I accept the Terms of Use
    4. Click the Start button.
    5. Check Scan archives
    6. Push the Start button.
    7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    8. When the scan completes, push Finish

    STEP 2: Run a scan with Emsisoft Emergency Kit.

    1. Please download the latest official version of Emsisoft Emergency Kit.
      EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
    2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip (Right click on it and select Extract all) and then double click on EmergencyKitScanner.bat
    3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
    4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.
  35. Thanks to Stelian for another great removal guide.

    I’m not 100 % sure I had ZeroAccess Rootkit on my system. An antivirus program called Stinger identified “FakeAlert!fakealert–REP trojan” but another forum mentioned this is related to ZeroAccess, so I ran Stelian’s Removal Steps just in case.

    The symptoms were rundll32.exe showing in processes, Adobe Flash suddenly installing (even though latest is installed) and some unexpected redirects taking me to (what looked like) legitimate websites.

    Application Data\wcsuie.dll”,DestroyWindow – wcsuie.dll (was identified as malware by Hitman Pro) and there were some hidden entries just called “n” in a hidden RECYCLER directory I’ve never seen before (on XP). I removed all with Hitman Pro.

    ComboFix seemed to hang, even when I renamed it Combo-Fix before downloading it to desktop. Stelian’s guide mentions “report back here” if a problem occurs with ComboFix – So I’ve reported it in this post. I think I’m virus free now, but as ZeroAccess is a particularly persistent rootkit, any expert advice welcomed.

    Kind Regards, NB

  36. You are awesome! To have someone so smart, be so helpful, and for no charge is a blessing. Thank You!

  37. Fantastic! Thanks so much for a thorough and terrifically brutal counterattack on this bug! It saved my friend’s laptop from being flung out of his window!

  38. I’m 30 now and been working on computers for 15 years at least and I’ve discovered some new tools that I haven’t ran before. RogueKiller and TDSSKiller have been added to my arsenal. It’s nice to see that not everyone in the trade hides their techniques. I’m wary when trying new tools but with such a detail write up with responses, I had to give them a shot.

  39. Hello George,
    Can you please post the Combofix log (You should be able to find it at C:\Combofix.txt).
    Next,empty your Recycle Bin and then for our peace of mind please perform this two scans:
    STEP 1: Run a scan with Emsisoft Emergency Kit.

    1. Please download the latest official version of Emsisoft Emergency Kit.
      EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
    2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip and then double click on EmergencyKitScanner.bat
    3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
    4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.

    STEP 2: Run a scan with Eset Online Scanner.

    1. Download ESET Online Scanner utility.
      ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
    2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
    3. Check Yes, I accept the Terms of Use
    4. Click the Start button.
    5. Check Scan archives
    6. Push the Start button.
    7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    8. When the scan completes, push Finish
  40. 10/15/2012

    Killer ran fine, but found nothing. Said system was not infected.

    However, I know I have the ZA rootkit. It is running out of the C:\recycler directory.

    Is it correct this is a brand new variation?

    Please help if you can.

  41. Un-freaking believable how amazing this is! I have never had my butt kicked by a virus so bad before until now. Followed your steps to the T and no more Zero rootkit. What a life saver you are sir! I had over a terabyte of steam games, pictures,documents etc and was about to throw in the towel until finding your blog! Thanks again for doing what you do.

  42. Thank you again Stelian!

    That was an excellent reply. I found an additional 12 threats – 4 with Kaspersky and 8 with ESET. I ran Rogue Killer once more: no flahing warning this time, but 1 more threat to kill.

    How do I get reasonable protection. Until very recently I have not had problems with malware, but in the last 3 months I’ve been infected 3 times – this was the worst. I’ve got McAfee Security Scan Plus and McAfee AntiVirus Plus and always have a firewall up, but they seem to be powerless and are deactivated once an infection gets going. I’m never entirelky sure of how an infection get’s in. Windows & always asks if I want to allow software to make changes to my harddrive, but at least once I was tricked – I think it was a bogus Adobe Flash Update. I’m sure on other occasions the infection started via Facebook or just opening a window!

    Thanks again.

  43. Hello Bruce,
    It looks like you still have some left over files….Can you please do a scan with the following tools:
    1.Run a scan with Kaspersky Virus Removal Tool
    Click here to download the Kaspersky Virus Removal Tool.

    1. Save it to your desktop.
    2. Double click the setup file to run it.
    3. Follow the onscreen prompts until it is installed
    4. Click the Options button (the ‘Gear’ icon), then make sure only the following are ticked:
      • System Memory
      • Hidden startup objects
      • Disk boot sectors
      • Local Disk (C:)
      • Also any other drives (Removable that you may have)
    5. Then click on Actions on the left hand side
    6. Click Select Action, then make sure both Disinfect and Delete if disinfection fails are ticked
    7. Click on Automatic Scan
    8. Now click the Start Scanning button, to run the scan
    9. After the scan is complete, close the program

    2.Run a scan with Eset Online Scanner.

    1. Download ESET Online Scanner utility.
      ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
    2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
    3. Check Yes, I accept the Terms of Use
    4. Click the Start button.
    5. Check Scan archives
    6. Push the Start button.
    7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
    8. When the scan completes, push Finish
  44. Thank you, thank you, thank you. I’ve been battling this virus for weeks and your efforts were the only thing that worked for me.

  45. Thanks Stelian,
    I followed your detailed instructions on “Remove System Progressive Protection” Thanks for this. It removed lots of Malware. At the end Rogue Killer had a flashing ZeroAccess image with exclamation mark in the top left hand corner of the screen. It also openned a Firefox webpage with French instructions. I can’t read French so I followed this link. However, TDSSKiller could find no infection. Am I clean?

    Thanks again.

  46. Hello Stjarn Goss,
    Yes,that was a typo, Remove Temp Files is the the one you need to check. :D

  47. exellent webpage! thanks so much! really outstanding. so kind of you to share like this! this is such an enormous help– it’s just wonderful.

    we are now in STEP 6, with the windows repair all in one tool. everything has been perfect up to this point.
    now the instructions above say in #7. Put a checkmark in the following item:
    Repair Temp Files

    REPAIR? repair temp files?

    Now, I am looking at the boxes to check in the tool and the ONLY one that says anything about TEMPORARY FILES is “REMOVE temporary files.” there is not one that says REPAIR temp files, as in the instructions.

    do you mean we should check the box for REMOVE temporary files? or was it meant to REPAIR something else, not the temporary files? i did already check the boxes by the other three choices (Repair Hosts File, Remove Policies Set By Infections, Set Windows Services To Default Startup).

    thank you so much once again. your assistance is just the best.
    kind regards…

  48. I ran TDSSKiller. It shows win64.Zaccess.a infecting ..\system32\services.exe. It could not remove/repair the infected file. I then tried in safe mode… smae thing.

    Can I go to step 2, then retry step 1? If not, how should I proceed?

    Thanks…

Leave a Comment