Virus:W32/ZeroAccess patches a legitimate Windows system file in order to facilitate the malware's other malicious activities.
Caution: Manual repair is a risky process; it is recommended only for advanced users.
The following manual removal instructions apply to Windows 7 systems with a service.exe file infected by Trojan.patched.sirefef.[variant], and with F-Secure Internet Security 2012 (FSIS 2012) installed.
Many users will also find files in the Java cache being detected for Blackhole exploits; this is the most commonly dropped on the computer on visits to compromised/malicious sites silently serving the exploits. The detected files may be removed.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
This ZeroAccess variant patches a legitimate Windows system file, C:\Windows\system32\services.exe. Upon execution, it will determine the operating system installed on the machine; it only patches the services.exe file on the following systems:
The patched Windows file will act as a loader to start other ZeroAccess components to perform other malware activities like downloading and installing additional malware components.
ZeroAccess is capable of storing additional malware contents in the Extended Attribute (EA) section of services.exe. The purpose of doing this is to hide the presence of the main malware code from detection by security software.
For more information on malware-patched files, see Trojan:W32/Patched.