Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Need help finishing removal of ZeroAccess rootkit infection

  • This topic is locked This topic is locked
2 replies to this topic

#1 NukeMan54


  • Members
  • 1 posts
  • Local time:02:33 AM

Posted 03 November 2011 - 01:34 AM


It's my first time actually posting here, but your guides and forums have helped me remove a couple nasties in the past, so I'll start off by saying thanks. :thumbup2:

Initial Problem / Background
About a week ago, my wife's laptop (running XP Pro SP2) got infected with some malware while she browsing. I've cleaned malware off systems in the past, but this one was particularly nasty... browser redirect issues, Symantec Antivirus was disabled, Malwarebytes Antimalware was disabled and new installs all failed (scans would stop and the executable would then be set with permissions such that I couldn't use it anymore), and when you rebooted the system it threw an error related to Symantec and a corrupted Winsock. When What it boiled down to: she'd been infected by a ZeroAccess rootkit. So, in summary: it's a Windows XP Professional SP2 (32-bit) system that was infected by ZeroAccess rootkit about 1 week ago.

Efforts to fix it since then
Using this website, MajorGeeks, and some other Google searches I read up what I could and started working to clean it off. I did numerous things, but the major ones I can remember include:
  • looking through HJT reports
  • running TDSSKiller (which found ZeroAccess rookit and removed it...but it just kept coming back after rebooting...this now reports clean)
  • Kapsersky Virus Removal tool (which found some infected files and removed them...now reports a clean scan)
  • ran ComboFix (it found netbt.sys to be infected, removed it and replaced it...it reports clean now)
  • finally got SuperAntiSpyware to run...it reports clean now
  • finally got Malwarebytes Antimalware run...it reports clean now
  • ran WinsockXPFix
  • ran "netsh winsock reset" in a command window
  • Symantec AV reports clean now

Current Status and Problem
It appears that the ZeroAccess rootkit has been cleaned from the system...but it left the system with a seemingly corrupt network stack or driver file(s). I have no internet access nor even any LAN access.

When I try to connect via hardwire to my router, the laptop gets stuck on "Acquiring network address" and just sits there. Through some debugging, I found that the DHCP service wasn't running and couldn't be started because the "TCP/IP NetBIOS Helper" service won't start. When I go under Device Manager and click "Show hidden devices", the only device in the entire tree that's showing any problems is "NetBios over tcpip" which shows a yellow caution flag. Under properties for that device, when I click "Start" it throws an error: "The system encountered the following error while attempting to start the service: The file name, directory name, or volume label syntax is incorrect." I've looked in C:\Windows\system32\drivers\ at netbt.sys and it appears to have the same timestamp as the rest of the drivers and the filesize seems to match the "correct filesize" indicated by Google searches.

Also, this may be unrelated or it may not be: Symantec AV occasionally pops up a yellow box in the bottom right of the screen saying "Symantec Auto-protect is disabled". I know the ZeroAccess rootkit messed with Symantec...but I'm afraid the most recent virus definitions got corrupted as well, because the update was attempted pretty much at the same time that the infection occurred. I'm left Symantec on the system for now but I know it may need to be removed and reinstalled (or a new and different AV installed.

So, my request:
  • Does it seem like the ZeroAccess rookit has indeed been cleaned off?
  • Any feedback on how I can fix the NetBIOS issues and thus restore network access?
  • Any thoughts on the Symantec AV issue?

Many thanks, in advance, for your assistance. I've spent hours trying to fix this but this one has me licked it seems.

DDS and GMER logs are attached. I have logs from ComboFix, TDSSkiller, Malwarebytes Antimalware, SuperAntiSpyware, RootRepeal, MGtools, and others if requested.

Attached Files

BC AdBot (Login to Remove)


#2 HelpBot


    Bleepin' Binary Bot

  • Bots
  • 12,769 posts
  • Gender:Male
  • Local time:03:33 AM

Posted 08 November 2011 - 01:35 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:


Posted Image In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/426113 <<< CLICK THIS LINK

If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.


Posted Image If you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS and GMER log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.


We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from one of the following links if you no longer have it available. Save it to your desktop.
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control HERE

We also need a new log from the GMER anti-rootkit Scanner.

Please note that if you are running a 64-bit version of Windows you will not be able to run GMER and you may skip this step.

Please first disable any CD emulation programs using the steps found in this topic:

Why we request you disable CD Emulation when receiving Malware Removal Advice

Then create another GMER log and post it as an attachment to the reply where you post your new DDS log. Instructions on how to properly create a GMER log can be found here:

How to create a GMER log

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 HelpBot


    Bleepin' Binary Bot

  • Bots
  • 12,769 posts
  • Gender:Male
  • Local time:03:33 AM

Posted 08 November 2011 - 08:40 PM

You have stated that you no longer need help with this issue, therefore I am closing this topic. If that is not the case and you need or wish to continue with this topic, please send any Moderator a Personal Message (PM) that you would like this topic re-opened.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users