Remove ZeroAccess rootkit (Uninstall Guide)

ZeroAccess is a sophisticated kernel-mode rootkit that is rapidly becoming one of the most widespread threats in the current malware ecosystem. ZeroAccess’ ability to run on both 32-bit and 64-bit versions of Windows, resilient peer-to-peer command and control infrastructure and constant updates to its functionality over time show that ZeroAccess is a modern threat capable of thriving on modern networks and modern Operating Systems.
ZeroAccess remains hidden on an infected machine while downloading more visible components that generate revenue for the botnet owners. Currently the downloaded malware is mostly aimed at sending spam and carrying out click fraud, but previously the botnet has been instructed to download other malware and it is likely that this will be the case again in the future. ZeroAccess should be considered an advanced and dangerous threat that requires a fully featured, multi-layered protection strategy.

ZeroAccess employs mechanisms that are themselves hard to remove such as a kernel-mode rootkit and patched driver files, patched system files such as services.exe and data hidden in NTFS Extended Attributes, removal of NTFS permissions on files used; and because ZeroAccess often employs several autostart points on an infected machine and usually other files that can re-install the malware.

ZeroAccess Rootkit Removal Guide

STEP 1:  Remove the ZeroAccess rootkit with Kaspersky TDSSKiller

ZeroAccess has installed a  rootkit to protect itself from being removed.To remove the ZeroAccess  rootkit, we need to run a system scan with Kaspersky TDSSKiller.

  1. Please download the latest official version of Kaspersky TDSSKiller.
    KASPERSKY TDSSKILLER DOWNLOAD LINK(This link will automatically download Kaspersky TDSSKiller on your computer.)
  2. Before you can run Kaspersky TDSSKiller, you first need to rename it so that
    you can get it to run. To do this, right-click on the TDSSKiller.exe icon and select Rename.
    Edit the name of the file from TDSSKiller.exe to iexplore.exe, and then double-click on it to launch.
    Kaspersky Tdsskiller renamed
  3. Kaspersky TDSSKiller will now start and display the welcome screen as shown below.In order to start a system scan , press the ’Start Scan’ button.
    Start a Kaspersky scan
  4. Kaspersky TDSSKiller will now scan your computer for the ZeroAccess rootkit.
    Kaspersky TDSSKiller scanning
  5. When the scan has finished it will display a result screen stating whether or not the infection was found on your computer. If it was found it will display a screen similar to the one below.
    Kaspersky TDSSKiller results
  6. To remove the infection simply click on the Continue button and TDSSKiller will attempt to clean the infection.A reboot will be require to completely remove this rootkit from your system.

STEP 2 : Remove the malicious files and replace the infected services.exe file

The ZeroAccess rootkit will infect services.exe Windows file,so we need to run Combofix to replace this file.

  1. Download Combofix from any of the below links.
    COMBOFIX DOWNLOAD LINK #1 (This link will automatically download Combofix on your computer)
    COMBOFIX DOWNLOAD LINK #2  (This link will automatically download Combofix on your computer)
  2. Before running this utiltiy,please follow the below instructions:
    • Close any open browsers.
    • Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
      Temporarily disable your anti-virusscript blocking and any anti-malware real-time protection beforeperforming a scan. They can interfere with ComboFix or remove some of its embedded files which may cause “unpredictable results”.
    • WARNING: Combofix will disconnect your machine from the Internet as soon as it starts
      Please do not attempt to re-connect your machine back to the Internet until Combofix has completely finished.
      If there is no internet connection after running Combofix, then restart your computer to restore back your connection.
  3. Start the Combofix scan:
    1. Double click on ComboFix.exe and then follow the prompts.
    2. Accept the disclaimer and allow to update if it asks.
    3. When finished, it shall produce a log for you.
    4. Restart your computer

    Additional Notes:

    • DO NOT mouse-click Combofix’s window while it is running. That may cause it to stall.
    • DO NOT “re-run” Combofix. If you have a problem, reply back for further instructions.
    • IF after the reboot you get errors about programms being marked for deletion then reboot, that will cure it.

STEP 3 : Remove the malicious registry keys added by the ZeroAccess rootkit

ZeroAccess has added some malicious registry keys to your Windows installation,to remove them we will need to perform a scan with RogueKiller.

  1. Please download the latest official version of RogueKiller.
    ROGUEKILLER DOWNLOAD LINK (This link will automatically download RogueKiller on your computer)
  2. Double click on RogueKiller.exe to start this utility and then wait for the Prescan to complete.This should take only a few seconds and then you can click the Start button to perform a system scan.
    RogueKiller scanning after ZeroAccess virus virus
  3. After the scan has completed, press the Delete button to remove any malicious registry keys.
    Remove ZeroAccess virus  infection with RogueKiller

STEP 4: Remove ZeroAccess malicious files with Malwarebytes Anti-Malware FREE

  1. Download the latest official version of Malwarebytes Anti-Malware FREE.
    MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK (This link will open a download page in a new window from where you can download Malwarebytes Anti-Malware Free)
  2. You can start the Malwarebytes’ Anti-Malware installation process by double clicking on mbam-setup file.
    [Image: Malwarebytes Installer]
  3. When the installation begins, keep following the prompts in order to continue with the setup process. Do not make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked. Then click on the Finish button. If Malwarebytes’ prompts you to reboot, please do not do so.
    [Image: Finishing Malwarebytes installation]
  4. Malwarebytes Anti-Malware will now start and you’ll be prompted to start a trial period , please select ‘Decline‘ as we just want to use the on-demand scanner.
    [Image: Decline Malwarebytes trial]
  5. On the Scanner tab,select Perform full scan and then click on the Scanbutton to start scanning your computer.
    [Image: Starting a full system sca]
  6. Malwarebytes’ Anti-Malware will now start scanning your computer for ZeroAccess malicious files as shown below.
    [Image: Malwarebytes scanning for malicious files]
  7. When the scan is finished a message box will appear, click OK to continue.[Image: Malwarebytes scan results]
  8. You will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware has detected.Please note that the infections found may be different than what is shown in the image.Make sure that everything is Checked (ticked) and click on the Remove Selected button.
    [Image: Infections found by Malwarebytes]
  9. Malwarebytes’ Anti-Malware will now start removing the malicious files.After completing this task it will display a message stating that it needs to reboot,please allow this request and then let your PC boot in Normal mode.

STEP 5: Run a scan with HitmanPro

  1. Download the latest official version of HitmanPro from the below link.
    HITMANPRO DOWNLOAD LINK(This link will open a download page in a new window from where you can download HitmanPro)
  2. Double click on the previously downloaded fileto start the HitmanPro installation.
    [Image: HitmanPro Icon]
    IF you are experiencing problems while trying to starting HitmanPro, you can use the “Force Breach” mode.To start this program in Force Breach mode, hold down the left CTRL-key when you start HitmanPro and all non-essential processes are terminated, including the malware process. (How to start HitmanPro in Force Breach mode – Video)
  3. Click on Next to install HitmanPro on your system.
    [Image: Starting HitmanPro]
  4. The setup screen is displayed, from which you can decide whether you wish to install HitmanPro on your machine or just perform a one-time scan, select a option then click on Next to start a system scan.
    [Image: HitmanPro installation screen]
  5. HitmanPro will start scanning your system for malicious files as seen in the image below.
    [Image: HitmanPron scanning for ZeroAccess virus]
  6. Once the scan is complete,you’ll see a screen which will display all the malicious files that the program has found.Click on Next to remove this malicious files.
    [Image: HitmanPro scan results]
  7. Click Activate free license to start the free 30 days trial and remove the malicious files.
    [Image: Activate HitmanPro license]
  8. HitmanPro will now start removing the infected objects.If this program will ask you to restart your computer,please allow this request.

STEP 6: Double check for any left over infections on your computer

If want to make another check for any left over malicious files,you can run a scan with the following tools:

STEP A: Run a scan with Eset Online Scanner.

  1. Download ESET Online Scanner utility.
    ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
  2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
  3. Check Yes, I accept the Terms of Use
  4. Click the Start button.
  5. Check Scan archives
  6. Push the Start button.
  7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  8. When the scan completes, push Finish

STEP B: Run a scan with Emsisoft Emergency Kit.

  1. Please download the latest official version of Emsisoft Emergency Kit.
    EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
  2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip and then double click on EmergencyKitScanner.bat
  3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
  4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.

Next,we will remove Combofix from your machine and in addition,you can uninstall any of the tools that we’ve used:

Lets remove ComboFix from your computer:

  1. Hold down the Windows key + R on your keyboard. This will display the Run dialogue box
  2. In the Run box, type in ComboFix /Uninstall (Notice the space between the “x” and “/”) then click OK Combofix uninstall command
  3. Follow the prompts on the screen
  4. A message should appear confirming that ComboFix was uninstalled

Delete the following files: (If they exist)
C:\ComboFix.txt

Delete the following folders: (If they exist)
C:\ComboFix
C:\Qoobox
Kaspersky TDSSKiller and RogueKiller can be removed by deleting the utilities.
We strongly recommend that you keep Malwarebytes Anti-Malware and HitmanPro installed on your machine and run regular scans with this tools.If you however,wish to remove them,you can go into the Add or Remove programs and uninstall this two on-demand scanners.

If you are still experiencing problems while trying to remove ZeroAccess rootkit from your machine, please start a new thread in our Malware Removal Assistance forum.

IT’S YOUR TURN TO HELP!

If we have managed to help you with your computer issues, then it's your duty to let other people know that this article will help them!
You can share this article on Facebook,Twitter or Google Plus by using the below buttons.

THE 411 ON ME

FC Barcelona fan, Starbucks addicted and super geek.
I am the creator and owner of MalwareTips.com
My area of expertise includes malware removal and computer forensics. I'm active in the various online anti-malware communities where I do researches for new malware threats as they are released.
I live in Bucharest (Romania), where I run my own local computer repair shop.
I repair both hardware and other operating systems related issues, however most of my business is malware related problems.

Follow me on Google Plus

You can follow me on Google Plus, and I will try to keep you informed with the latest computer infections and malware threats!

SUPPORT MALWARETIPS! (OPTIONAL)

All our malware removal guides and utilities are completely free of charge.
We do not request any kind of money in exchange for our services, however if you like to support us with our hardware maintenance costs, you can make a small donation. Any amount is appreciated, and will support our fight against malware.
  • laz223

    AWESOME!!!!

  • http://malwaretips.com/ Stelian Pilici

    Hello,
    Yes, you can skip the Combofix scan, and run it later if need it.

    Lets check if you really have a ZeroAccess rootkit:
    Lets run a scan with ESETSirefefCleaner tool:

    1.Click the link below to download the ESETSirefefCleaner tool, and save the file to your Desktop.
    ESET SIREFEFCLEANER TOOL DOWNLOAD LINK : http://download.eset.com/special/ESETSirefefCleaner.exe
    2.From your Desktop, double-click ESETSirefefCleaner utility. If security notifications appear, click Continue or Run.
    3.The message “Win32/Sirefef.EV found in your system” will be displayed If an infection is found. Press Y on your keyboard to remove the infection.
    4.Once the tool has run, you will be prompted to restore system services after you restart your computer. Press Y on your keyboard to restore system services and restart your computer.
    5.Once your computer has restarted, if you are presented with a security notification click Yes or Allow.
    6.Click Yes at the ESET Services Repair tool window.
    7.Once the ESET Services Repair process is complete, you will again be prompted to restart your computer, to do so click Yes.

    Next, please run a scan with the other tools from this article.

    Stay safe!

  • JohnM

    Excellent – even Eset found 4 the others had missed!!

  • James Wright

    Great article!!!. AVG found 3 Rootkit viruses on all 3 of our computers. Can anyone tell me……should reinstall all of our operating systems, or are they safe now.

    We also have an android (phone) and kindle that were regularly plugged in to one or more of the infected machines and a Apple/macbook. The Android, Kindle and Macbook were all scanned but the scanners returned that “there were no viruses detected”.

    Am I safe, or should I go forward with (reinstallation hell) reinstalling all of my OS’s.

    I don’t know what to do about the devices as they would have to be reinstalled via manufacture.

    Any help would be greatly appreciated. This feels like a nightmare. Help!!!!!

  • Danielle

    ComboFix had deleted basically all my program files. I had to do a System Restore to earlier today because I had no web browser to get back online. Does that mean the virus had spread everywhere already? Is it possible to skip step 2 and move on?

    • Stelian Pilici

      Hello danielle,
      That’s very strange….Yes,skip step 2 and go ahead with the other steps!

  • Geri

    First off, THANK YOU so much for all your help. It has gotten me part way through solving my PC’s issues. Unfortunately, I’m experiencing problems with running some of these tools. Here’s what I know:

    A threat identified as ZeroAccess by McAfee Labs’ Rootkit Remover tool has completely disabled my Total Protection software, corrupted the DAT files and, possibly, even disabled my Windows XP firewall. McAfee’s standalone tools are about as effective as their virus protection which, in the case of my PC, is not at all.

    TDSS Killer found and removed 14 items, none of which were ZeroAccess, unless it is going by another name. Rogue Killer will not run. It claims that it is missing a driver. ComboFix found and did a lot of things that I don’t understand. Malwarebytes scanned everything and found nothing. Hitman Pro found and removed 84 tracking cookies. Stinger found nothing. And, like McAfee’s Rootkit Remover, Symantec’s Zero Access Fix Tool doesn’t work.

    Right now, I’m in the process of downloading ESET’s signature database (I’m on my Smartphone and doing everything on my PC in Safe Mode with Networking), but I’m not sure it will work. It’s detecting my McAfee Total Protection, even though its been disabled both by me and the infection. I know the UI settings I see, when the program states that it’s on, are false. In the settings window, every option has been hijacked and is grayed out.

    I really think that I need to get Rogue Killer, or something like it, to work. ESET is now scanning. So far, no threats have been found. When ESET is done, I plan to unpack and run the Emsisoft Emergency Kit.

    All the tools I’m using were downloaded one after the other, before beginning the steps to remove ZeroAccess from my PC. I thought that, in the event that I lost and could not recover web access, at least some of the tools might work.

    Please, help. I’m open to any and all advice. I’m even considering uninstalling and re-installing Total Protection, even though I must do it from McAfee’s site. I’ve not yet spoken to their Tech Support. In the past, they’ve proven fairly useless. I think they’re interested mainly in selling services, not providing them.

    Thank you,

    Geri

    • Stelian Pilici

      Hello Geri,
      What’s the current status after the ESET scan?What issues are you experiencing?

    • Geri

      ESET found and removed three JAVA exploit variant trojans, Agent.F and A.B. However, it did not find ZeroAccess, which McAfee’s ineffective Rootkit Removal Tool claims is still in my PC; and my McAfee Total Protection is still wonky. I’m going to unpack and try the Emsisoft next. All scanners, but McAfee’s RMT, are reporting my system as clean. This thing is a bear! I’ll let you know what happens, if I don’t chuck my CPU out a window first.

  • Pete

    Followed the instructions in the guide, within two steps the PC was able to do Microsoft updates again. ZeroAccess Rootkit virus/trojans removed. Completed the full the regimen of exercises, PC now back to normal. Great information to have when you run into this type of trouble.

  • Amanda

    Thank you SO much! I thought I had gotten rid of this frickin virus, but it sneaked back I guess. I think it’s finally gone this time, and your instructions were so clear and easy to follow.

  • Monica

    I have run all of this step by step. when i ran Kaspersky, Combo fix, Rouge killer, malwarebytes, hitman pro, they all found the viruses and said they either deleted or quarantined them and i started to run the eset scanner. When i ran the eset scanner it was still showing a lot of the viruses on my laptop and i waited 10 and a half hours for it to finish scanning but it was stuck at 28%. i stoped it and started my computer over and started everything over starting with kaspersky and as i went through each program none of them detected any threats so i thought i was in the clear until i started running the eset scanner again. as it ran it was still finding all the viruses. I was going to go ahead and do the emisoft but have no clue how to unpack it and im not sure if its what i need for the viruses eset keeps finding.

    Here is what eset shows that i have: C:\ProgramData\Tarma Installer\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}\_Setupx.dll a variant of Win32/Adware.Yontoo.B application
    C:\ProgramData\Tarma Installer\{DA00D550-BB91-4A26-AAE5-9172D626CAAE}\_Setupx.dll a variant of Win32/Adware.Yontoo.B application
    etc

    is my laptop just too far gone to fix?? please help!!!

    • Stelian Pilici

      Hello Monica,
      Apart from this ESET detection on your computer, how is everything running??Any issues?
      Let remove the adware from your computer computer:
      Please download AdwCleaner by Xplode onto your desktop.

      1. Close all open programs and internet browsers.
      2. Double click on adwcleaner.exe to run the tool.
      3. Click on Delete.
      4. Confirm each time with Ok.
      5. Your computer will be rebooted automatically. A text file will open after the restart.
      6. NEXT,double click on adwcleaner.exe to run the tool.
      7. Click on Uninstall.
      8. Confirm with yes.

      Waiting your reply to tell me if everything is ok… :)

      • Monica

        Hi Stelian Pilici!!
        Wow you guys respond fast, I’m used to having to wait days to get a reply on other websites. I downloaded the adwclener.exe and it did exactly what you said it would. I’m running the ESET Scanner again to see if there is anymore adware on my laptop.
        My laptop is running fine it even runs bit faster esp when its booting up but I’m pretty sure i still have the redirectware because when i use search engines i cant click on a site without it redirecting me to another page.
        Before i ran the Kaspersky, Combo fix, Rouge killer, malwarebytes, hitman pro, my firewall was down and i couldn’t put it back up but afterwords i could control all of my security settings and i no longer have that problem.
        the only other thing is when i go to uninstall things an error message pops up that says The windows installer can not be accessed.
        Also I’m not sure if it matters but I’m doing everything through sandboxie now, i don’t use my web browser without it. I just thought id ask you guys if that’s a good idea or if that could be causing any problems I’m unaware of.
        Thank you guys so much for taking the time out to help!!!

        • Monica

          The ESET scanner just finished and didn’t find any threats on my computer but i still have problems with being redirected to another site when i use the search engine and cant uninstall anything.

  • Yagiz Sayiner

    Hello,

    God bless you! I bought an expensive laptop and i care it really hard. I tried to download a movie and zeroacess sneak into my system. I was getting mad and you saved my life! Thank you again and again!

  • Martin

    Just want to say a big “Thank You” for providing this step-by-step guide to removing the ZeroAccess rootkit. My anti-virus program and it’s so-called Support team [which shall remain nameless, to save them embaressment - but I've passed on your link, so they can learn what real 'Support' looks like ; -) ] were incapable of detecting, let alone removing this vicous and very damaging little cancer bug. So thank you very much for all your help! : -)

  • viudez

    Well, I don’t even finished the process yet but my problem is already solved! I was unable to acess windows firewall and that prevented me from saving the changes made in the net discovery options on windows.

    I’ in the malware bytes step now but I just noticed that my firewall is working again!

    The only nitpick is tha my network icon in the tray is showing that I’m not connected, but I can live with that!

    Thanks a lot!!!

  • Joseph

    Well, took like two days to run everything but it seems like I’m finally clean. It was a little scary, considering that every process seemed to find something. Thanks, the guide was unbelievably thorough and helpful. Now I can finally get back to the problem of figuring out why Youtube and Netflix aren’t working on my computer (which seems to have to do with not being able to install a more recent version of Silverlight, as it keeps claiming that my computer isn’t compatible with the program).

  • Sheri

    I had to write to THANK YOU for saving me a lot of time and money with your articulate explanation of how to get rid of the win64.zaccess.a virus. It took most of an entire day, but I followed every single direction you gave to a “t”, and the virus is gone. I figured I’d have to pay to have the OS completely removed and reinstalled. I am very grateful for the help, and for no charge – greatly appreciated.

  • Nishant

    My trojan was removed at the first step itself. Though instead of calling the file as given in the guide, it called it zeroaccess

  • Nigel

    I downloaded TDSSkiller onto another computer. It runs happily on that. I renamed it and burnt it to a discc. Inserting that into my infected computer, I click on the icon. “User Access Control” asks if I want it to run. I get a short hour glass, and nothing else happens. When I try again, the whole computer crashes instantly to zero. Its impressively quick.

    A complete reboot restores the system to “normal”.

    HELP. What should I do now?

    Many Thanks.

    • Stelian Pilici

      Hello Nigel,
      Can you please go ahead and run Combofix and copy/paste the log in your next reply!

      • Nigel

        I wish it was that easy. I ran combo fix a couple of days ago. I do not know where the report is now. I have just tried downloading again, and started to run it. It got to the end of backing up registry files. I then got six warnings “iexplore.exe. A problem has caused the program to stop working correctly. etc etc.” Then two more “internet explorer has stopped working.” finally I got “You cannot rename Combifix as Combifix (1). After that nothing.

        Two days ago, I ran Rogue killer:

        Log one: RogueKiller V8.4.0 [Dec 12 2012] by Tigzy
        mail : tigzyRKgmailcom
        Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
        Website : http://tigzy.geekstogo.com/roguekiller.php
        Blog : http://tigzyrk.blogspot.com/

        HELP PLEASE!!!!!!

        Thank you!!

        • Stelian Pilici

          Hello Nigel,
          You have a serious infection which needs several steps to be completly removed, so because this is just a basic comment section, I’ll ask you to start a thread in our Malware Removal Assistance forum, where we can properly guide you through all the steps!
          Stay safe and see you on the forums!

  • Tom

    I never comment… but on this occasion I absolutely must. Thank you for taking the time to create such a useful and well written guide. All of the links and downloads worked beautifully, the software worked incredibly well without any issues and without asking me to pay to get them to clean up what they found. Without this quality of information I would probably have not got my PC back to the exceptional health it is now enjoying. Brilliant job and thanks to everyone involved in creating these products.

  • Maxim Roncace

    This tutorial was amazing! I though I had gotten rid of the virus ages ago, but then I realized that it was still there. Thanks for the help!

  • Kristina

    Thanks for these great instructions! I have used your site previously with great results. I am struggling this time. I cannot get TDSKiller to run. I download it, rename it iexplore.exe. When I run it, the “User Access Control” window comes up and asks if I want to allow it to run, I say yes. Then I get the “hourglass” swirl and nothing happens. I’m running Windows 7 64 bit, SP1. Any help is greatly appreciated.

    • Stelian Pilici

      Hello Kristina,
      Can you please go ahead and perform the other steps,then please re-try to scan with TDSSKiller.

  • aytonF1

    I’d like to say that is tremendous advice .It would be Paranoidally Wise also to run Superantispyware, F-Secure’s Easy Clean,
    Comodo’s Cleaning Essentials,Kaspersky’s Security Scan,Norman’s Malware Cleaner ,and Microsoft’s Safety Scanner.

  • oldtechy

    I was infected with some unidentified malware that hijacked my yahoo-webmail and disabled the W7x64-Firewall services (error code 0×80070424).
    To my dismay, Malwarebytes, MS-Security-Essentials, AdvancedSystemCare, CCleaner we NOT able to prevent, identify or remove this infection.

    After reviewing & considering a clutch of other proposed-solutions (complicated, risky, suspect, etc.), I stumbled upon your website.

    So, I thank you so much for your efforts on this most-useful website to counter-attack such malwares.

    Your Step 2 (combofix .exe) was most effective for me and did repair that “error code”.

    If anyone suspects their PC is infected, I recommend they follow all the steps listed here. Worked for me.

  • James

    Thank you so much Stelian!

    There were so many conflicting guides on the internet saying to do different things but I followed yours from start to finish and my PC seems to be fine now :D

  • SIGMA

    Great site. 1 problem. I have disable Mcaffee but the Combofix continues to show that I have them enabled. Am I safe to run the scan or do you have another option. At this point I cannot afford unpredictable results”.
    Thanks

    • Stelian Pilici

      Hello Sigma,
      If you actually disabled the antivirus,firewall and other real-time protection software,than you can go ahead with the scan!

  • Jan

    Hello Stelian
    Thank you so much for your help and advice. I have been following the links you gave me to download and cure the problem with no windows update and no firewall after the SMART virus.
    Got to Combofix it found two files for deletion and rebooted, however on starting up I forgot that I have an automatic pop up of ‘Control panel’ that appears. This caused the Combofix to stall, after waiting about 10 mins I turned the computer off and restared with the Malwarebytes Anti-Malware. I have no problem now dowloading new windows updates, so that part seems to have worked. However, the next step would not allow me to complete a full Malware scan, but did let me follow a short scan. Both the Malware and the Hitmanpro did not throw up any more virus programmes.
    I am having trouble with the last part finding the link WINDOWS REPAIR ALL IN ONE DOWNLOAD LINK you recommended – I have found a Tweaking.com – Windows Repair (All in One) v1.9.1 Released 10.22.2012 would this be an updated version and should I download this one?
    Thank you.
    Jan

    • Stelian Pilici

      Hello Jan,
      You can download WINDOWS REPAIR ALL IN ONE from here.

  • nbwriter

    Thanks to Stelian for another great removal guide.

    I’m not 100 % sure I had ZeroAccess Rootkit on my system. An antivirus program called Stinger identified “FakeAlert!fakealert–REP trojan” but another forum mentioned this is related to ZeroAccess, so I ran Stelian’s Removal Steps just in case.

    The symptoms were rundll32.exe showing in processes, Adobe Flash suddenly installing (even though latest is installed) and some unexpected redirects taking me to (what looked like) legitimate websites.

    Application Data\wcsuie.dll”,DestroyWindow – wcsuie.dll (was identified as malware by Hitman Pro) and there were some hidden entries just called “n” in a hidden RECYCLER directory I’ve never seen before (on XP). I removed all with Hitman Pro.

    ComboFix seemed to hang, even when I renamed it Combo-Fix before downloading it to desktop. Stelian’s guide mentions “report back here” if a problem occurs with ComboFix – So I’ve reported it in this post. I think I’m virus free now, but as ZeroAccess is a particularly persistent rootkit, any expert advice welcomed.

    Kind Regards, NB

    • Stelian Pilici

      Hello nbwriter,
      It should be gone from your machine,however if you want to do a double check, you can run a scan with the following tools:
      STEP 1: Run a scan with Eset Online Scanner.

      1. Download ESET Online Scanner utility.
        ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
      2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
      3. Check Yes, I accept the Terms of Use
      4. Click the Start button.
      5. Check Scan archives
      6. Push the Start button.
      7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
      8. When the scan completes, push Finish

      STEP 2: Run a scan with Emsisoft Emergency Kit.

      1. Please download the latest official version of Emsisoft Emergency Kit.
        EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
      2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip (Right click on it and select Extract all) and then double click on EmergencyKitScanner.bat
      3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
      4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.
      • nbwriter

        Thanks for speedy feedback, Stelian. I’ll run those scans as advised.

        I’m still curious why ComboFix (appeared) to stall. It’s likely the answer is highly technical. What actually happened when I got to Step 2 in your ZeroAccess Removal Guide is ComboFix ran for 30 minutes, then appeared to freeze the machine. I uninstalled ComboFix, updated to latest version, renamed it Combo-Fix and installed the “Console” it requested.

        Some AV Sites suggest stopping ComboFix EX3 processes while its executing will speed it up. Not sure about that… I noted the EX3 process takes up a large amount of RAM while executing. My machine is only fitted with 700MB RAM, I’m wondering (as with many newer programs) if ComboFix simply needed more RAM to execute quickly?

        Kind Regards, NB

  • Terri

    You are awesome! To have someone so smart, be so helpful, and for no charge is a blessing. Thank You!

  • Mig

    Fantastic! Thanks so much for a thorough and terrifically brutal counterattack on this bug! It saved my friend’s laptop from being flung out of his window!

  • Pete

    Fantastic guide. My firewall is finally up and staying up

  • Ruby

    Kaspersky TDSSKiller did not successfully remove the infections what do you think I should do?

    • Stelian Pilici

      Please go ahead and follow all the guide.Good luck!

      • Ruby

        Thanks a lot! it worked!! :D :D

  • Chas Daugherty

    I’m 30 now and been working on computers for 15 years at least and I’ve discovered some new tools that I haven’t ran before. RogueKiller and TDSSKiller have been added to my arsenal. It’s nice to see that not everyone in the trade hides their techniques. I’m wary when trying new tools but with such a detail write up with responses, I had to give them a shot.

  • George A.

    10/15/2012

    Killer ran fine, but found nothing. Said system was not infected.

    However, I know I have the ZA rootkit. It is running out of the C:\recycler directory.

    Is it correct this is a brand new variation?

    Please help if you can.

    • Stelian Pilici

      Hello George,
      Can you please post the Combofix log (You should be able to find it at C:\Combofix.txt).
      Next,empty your Recycle Bin and then for our peace of mind please perform this two scans:
      STEP 1: Run a scan with Emsisoft Emergency Kit.

      1. Please download the latest official version of Emsisoft Emergency Kit.
        EMSISOFT EMERGENCY KIT DOWNLOAD LINK (This link will open a download page in a new window from where you can download Emsisoft Emergency Kit)
      2. After the download process will finish , you’ll need to unpack EmsisoftEmergencyKit.zip and then double click on EmergencyKitScanner.bat
      3. A pop-up will prompt you to update Emsisoft Emergency Kit , please click the “Yes” button.After the Update process has completed , put the mouse cursor over the “Menu” tab on the left and click-on “Scan PC“.
      4. Select “Smart scan” and click-on the below “SCAN” button.When the scan will be completed , you will be presented with a screen showing you the malware infections that Emsisoft Emergency Kit has detected.Make sure that everything is Checked (ticked) and click on the ‘Quarantine selected objects‘ button.

      STEP 2: Run a scan with Eset Online Scanner.

      1. Download ESET Online Scanner utility.
        ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
      2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
      3. Check Yes, I accept the Terms of Use
      4. Click the Start button.
      5. Check Scan archives
      6. Push the Start button.
      7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
      8. When the scan completes, push Finish
  • Zer0-2-Her0

    Un-freaking believable how amazing this is! I have never had my butt kicked by a virus so bad before until now. Followed your steps to the T and no more Zero rootkit. What a life saver you are sir! I had over a terabyte of steam games, pictures,documents etc and was about to throw in the towel until finding your blog! Thanks again for doing what you do.

  • Mike Hood

    Great set of instructions for someone like me who is not that savy.

  • Matt

    Thank you, thank you, thank you. I’ve been battling this virus for weeks and your efforts were the only thing that worked for me.

  • Bruce

    Thanks Stelian,
    I followed your detailed instructions on “Remove System Progressive Protection” Thanks for this. It removed lots of Malware. At the end Rogue Killer had a flashing ZeroAccess image with exclamation mark in the top left hand corner of the screen. It also openned a Firefox webpage with French instructions. I can’t read French so I followed this link. However, TDSSKiller could find no infection. Am I clean?

    Thanks again.

    • Stelian Pilici

      Hello Bruce,
      It looks like you still have some left over files….Can you please do a scan with the following tools:
      1.Run a scan with Kaspersky Virus Removal Tool
      Click here to download the Kaspersky Virus Removal Tool.

      1. Save it to your desktop.
      2. Double click the setup file to run it.
      3. Follow the onscreen prompts until it is installed
      4. Click the Options button (the ‘Gear’ icon), then make sure only the following are ticked:
        • System Memory
        • Hidden startup objects
        • Disk boot sectors
        • Local Disk (C:)
        • Also any other drives (Removable that you may have)
      5. Then click on Actions on the left hand side
      6. Click Select Action, then make sure both Disinfect and Delete if disinfection fails are ticked
      7. Click on Automatic Scan
      8. Now click the Start Scanning button, to run the scan
      9. After the scan is complete, close the program

      2.Run a scan with Eset Online Scanner.

      1. Download ESET Online Scanner utility.
        ESET Online Scanner Download Link (This link will automatically download ESET Online Scanner on your computer.)
      2. Double click on the Eset installer program (esetsmartinstaller_enu.exe).
      3. Check Yes, I accept the Terms of Use
      4. Click the Start button.
      5. Check Scan archives
      6. Push the Start button.
      7. ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
      8. When the scan completes, push Finish
      • Bruce

        Thank you again Stelian!

        That was an excellent reply. I found an additional 12 threats – 4 with Kaspersky and 8 with ESET. I ran Rogue Killer once more: no flahing warning this time, but 1 more threat to kill.

        How do I get reasonable protection. Until very recently I have not had problems with malware, but in the last 3 months I’ve been infected 3 times – this was the worst. I’ve got McAfee Security Scan Plus and McAfee AntiVirus Plus and always have a firewall up, but they seem to be powerless and are deactivated once an infection gets going. I’m never entirelky sure of how an infection get’s in. Windows & always asks if I want to allow software to make changes to my harddrive, but at least once I was tricked – I think it was a bogus Adobe Flash Update. I’m sure on other occasions the infection started via Facebook or just opening a window!

        Thanks again.

  • Stjarn Goss

    exellent webpage! thanks so much! really outstanding. so kind of you to share like this! this is such an enormous help– it’s just wonderful.

    we are now in STEP 6, with the windows repair all in one tool. everything has been perfect up to this point.
    now the instructions above say in #7. Put a checkmark in the following item:
    Repair Temp Files

    REPAIR? repair temp files?

    Now, I am looking at the boxes to check in the tool and the ONLY one that says anything about TEMPORARY FILES is “REMOVE temporary files.” there is not one that says REPAIR temp files, as in the instructions.

    do you mean we should check the box for REMOVE temporary files? or was it meant to REPAIR something else, not the temporary files? i did already check the boxes by the other three choices (Repair Hosts File, Remove Policies Set By Infections, Set Windows Services To Default Startup).

    thank you so much once again. your assistance is just the best.
    kind regards…

    • Stelian Pilici

      Hello Stjarn Goss,
      Yes,that was a typo, Remove Temp Files is the the one you need to check. :D

  • Guy Manning

    I ran TDSSKiller. It shows win64.Zaccess.a infecting ..\system32\services.exe. It could not remove/repair the infected file. I then tried in safe mode… smae thing.

    Can I go to step 2, then retry step 1? If not, how should I proceed?

    Thanks…

    • Stelian Pilici

      Hello
      Please go ahead with STEP 2.Good luck!