Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Zeroaccess rootkit with Trojan.w32/Comroki on 64-bit Win 8.1

  • This topic is locked This topic is locked
2 replies to this topic

#1 j@y15


  • Members
  • 2 posts
  • Gender:Male
  • Local time:11:47 PM

Posted 29 May 2015 - 12:37 AM


I have two Windows 8.1 computers that both have been infected with a rootkit virus and other Trojan viruses that closely resemble the Win.32/Comroki virus activities.  I found someone who had posted on this forum back in 2013 that had some very similar things that were happening to his machines but he never replied after posting many logs and screen prints so I do not know what eventually resolved it.  At that time the tech that replied to his post discounted some of the things he was saying because what he was reporting were actions of a three year old virus that was recognized and cleaned by Microsoft Defender and many others.  He was told to check the files against VirusTotal and if they come back clean then he must be mistaken.  The link is: 


 bleeping computer dot com /forums/t/496055/trojankillfiles-kanji-2uce-worm/

I consider myself a very compentent IT person and have had to clean some viruses off of my machines in the past and once I could identify what they are I had no trouble running a boot disk and clearing them.  I have done the same for this and have tried many trusted and some not so well reviewed cleaners and tools and can't be found but I can see the changed files in plain sight.  I have nuked both Win8.1 drives and know I am starting from everything clean: a disk wipe with DiskKill - 2 passes. install from a clean Windows 8.1 iso downloaded with Microsoft's MCE tools and burned on a desktop that never has been on my network or exposed to any usb drives or files from the infected machines and within 10 minutes of connecting the machine to the public internet it is infected and the number of files that are rewritten with a virus "wrapper" is amazing.  I know that the virus is rewriting most of the Windows .exe, .sys, and .dll files and it is also opening up ports from the machine to spots on the internet that if downloads many other files to support what it does.  


I know various programming languages including C++ and have supported windows and unix Internet and middleware servers for over 20 years.  I also have a background in telecom and have a very firm understanding of routers/firewalls/intrustion detection devices and no matter what I do I cannot get my machines cleaned of this rootkit virus.  I have a few other computers on my home network that I am sure are infected (Win7 Ultimate desktop, Win7 Home Premium laptop, and also two android tablets that I have confirmed are infected) so this is not restricted to Windows OS.  I have tried many of the linux based rescue disks and they also cannot seem to see it or clean it and within a few minutes the virus starts modifying some key linux files and takes control of the tcpip stack and I see connections open and other linux files are loaded to the USB I running the rescue disk from.  

I know that the csrss.exe and svchost.exe seam to be some of the first files that it takes over and I have tested with with a fresh install on one machine and all other devices guaranteed turned off.  I could connect on my local network but as soon as I connected to the public internet and I watched as the the virus started rewriting (with Microsoft and other C++ compilers) running apps with its wrapper code that includes the original files certs and MD5 signatures so it goes undetected.  There are many files that get rewritten in the first few minutes and I watched how the csrss.exe file is able replace running processes and unregister the good file and reregister the infected file without anything being alerted.  For the other files it needs it opens up connectons to the internet and downloads the files.  The c:\Assembly and c:\Windows\WinSxS\temp and pendingrename directories are so busy that is is hard to even see how many files are changed.  Within about 10 minutes I counted over 170,000 files were processed.  I have uninstalled the Windows SMB 1.0 services, all file and printer sharing is disabled on the network cards, DHCP turned off. hardcoded ips/DNS for tcpv4, tcpv6 completely disabled, the wireless card is disabled, the homegroup disabled and Microsoft Firewall and Defender are active.  I had done that twice thinking it was my router that was hacked and found out that one of the Android tablets that was turned off was still communicating over bluetooth to anything that would listen and was connecting to the unchanged version of Microsoft's original BLTHSvr.dll and transfering the first few files that get executed with a task that is set up which kicks off all the virus activities.  After that I ran the batteries down on the tablets and made sure that nothing was on but something else is causing the first infection because I had the same results as soon as I connect to the public internet there is no stopping the flood of activity that reinfects the machines.  I thought it could be other bluetooth enabled devices (cordless phone, wireless printer, soundbar???) in my house somehow having some memory that could be written to transfer a virus.. but that seemed beyond possible.  It could be connection from a neighbor's wireless router or infected bluetooth device but then how do I ever prevent that from happening?

Through some other tools I found that the virus starts setting up private 10.x.x.x networks and connecting users.  I have a WinPE program that I can run from a bootable DVD called LAN Server that is able to read all local network traffice so I scanned the entire - 240.x.x.x range and found over 400 private networks running through my router and most showed normal port 80 or 443 were connected by someone.  I tried some of the addresses and it initially looked like I could connect but then the browser gets a disconnect message and blank screen.  I did end up finding the svchost.exe processes that reading some .dat files that looked like DNS records for sites from AmericanExpress, CapitalOne and other U.S. based companies along with names for companies from South Korea, Japan, and others.  So that is what the virus is really doing is routing unsuspecting users back to what they think are the real sites only to get their credentials.  I want to put a stop to it but can't use any of the computers on my network without it happening.  I tried Kaspersky, Avast and other rescue disks and they find nothing.  I can't figure out how it is reinfecting my machies so a wipe and reload which is usually a last resort is not good either.  I was able to use BullGuard Firewall to successfully block all the protocols and inbound activity which must have made someone mad because I saw attempts to access with protocols that I thought were never even used anymore coming from the IPs that I had set for my DNS servers and someone was obviously manually trying to find other ways to connect and shut down whatever was blocking the connections.  I still had outbound internet access but the virus wrappers on my Firefox executable and outbound UDP DNS requests eventually opened something that allowed access in and I received the message that my computer was shutting down.  After that it never did start up again and all my restore points were but when I tried to use them they all failed so I had to wipe, format, and reload.

Sorry for the long post, but I am stuck, I can't really identify what this is.. one checker shows a registry entry that it identifies as zeroaccess but I have tried some specific AVG and Symantec cleaners for that and they don't even recognize it and say the computer is clean.  The virus patterns match closely the Trojan.Win32/Comroki and a few others.  Files such as c:\Windows\IME\IMEJP, IMEKR, IMETC and SPTIP.DLL and obvious \System32 Win Vista version files and mixed case or all uppercase filenames ncluding non-MS files of NOISE.CHT, NOISE.CHS, NOISE.DAT, NOISE.JPN, NOISE.THA point at other viruses. Windows Defender is supposed to be able to clean that but it doesn't even recognize it.  If this is now a 5 year old Trojan virus that should be able to be recognized and cleaned by almost every virus cleaner out there it is somehow hiding itself from the checkers even though I can see the changed files and open them with notepad and see some of the code that rebuilds the files and resigns them with the original certs.  I know that Microsoft's Security Center or Defender offline tools must be able to do something because I am blocked from connecting to download them. 


I am going to reset my router back to factory settings and reconfigure it with a different SSID/PW to rule that out but I don't know what else to try.  I have attached the FRST log files and a log from rkill run from the Comodo Virtual sandbox to show all the files it has taken over that are reported as possible replacements.  I hope the experts on this site have some ideas or they come out with ComboFix for Win8.1 soon because I don't know what else to do.


Thank you.

Attached Files

BC AdBot (Login to Remove)


#2 HelpBot


    Bleepin' Binary Bot

  • Bots
  • 12,769 posts
  • Gender:Male
  • Local time:02:47 AM

Posted 03 June 2015 - 12:40 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:


step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/577660 <<< CLICK THIS LINK

If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.


step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new FRST log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.


We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download FRST by Farbar from the following link if you no longer have it available and save it to your destop.

    FRST Download Link

  • When you go to the above page, there will be 32-bit and 64-bit downloads available. Please click on the appropriate one for your version of Windows. If you are unsure as to whether your Windows is 32-bit or 64-bit, please see this tutorial.
  • Double click on the FRST icon and allow it to run.
  • Agree to the usage agreement and FRST will open. Do not make any changes and click on the Scan button.
  • Notepad will open with the results.
  • Post the new logs as explained in the prep guide.
  • Close the program window, and delete the program from your desktop.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 HelpBot


    Bleepin' Binary Bot

  • Bots
  • 12,769 posts
  • Gender:Male
  • Local time:02:47 AM

Posted 08 June 2015 - 12:45 AM

Hello again!

I haven't heard from you in 5 days. Therefore, I am going to assume that you no longer need our help, and close this topic.

If you do still need help, please send a Private Message to any Moderator within the next five days. Be sure to include a link to your topic in your Private Message.

Thank you for using Bleeping Computer, and have a great day!

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users