x86 XP SP3, I see mass injection in the trusted processes, also it downloaded bitcoin miner and injected into trusted process address space.
How to get this crap modify services.exe? :)
0x35670000 Ldr suspicious modification-->MSWSOCK.dll [ EPROCESS 0x81D94888 ] PID: 1192 [SDBN][VFN][FEP][FRS][FTDS], size: 20480 bytes
0x35670000 Ldr suspicious modification-->mswsock.dll [ EPROCESS 0x81D9EA78 ] PID: 1368 [SDBN][VFN][FEP][FRS][FTDS], size: 20480 bytes
0x35670000 Ldr suspicious modification-->mswsock.dll [ EPROCESS 0x81C2F560 ] PID: 1856 [SDBN][VFN][FEP][FRS][FTDS], size: 20480 bytes
0x00400000 Ldr suspicious modification-->svchost.exe [ EPROCESS 0x81C2F560 ] PID: 1856 [SDBN][SDFN][VFN][FEP][FRS][FTDS], size: 995328 bytes
where SDBN - Duplicate entry for such BaseDllName in PEB found, VFN - Vad entry name different than module name, FEP - File entry point mismatch with PEB data, FRS - File raw size mismatch with PEB data, FTDS - File time date stamp mismatch with PEB data, so basically ZeroAccess replaced system dll code in memory (mswsock.dll) with it own code and made corresponding modification to the PEB Ldr part.
Additionally MSS completely removed all sensitive components of this malware after full scan.
edit:
Just to mention. Tried latest release of Dr.Web CureIt on the following sample (DB from 04 June) - complete failure. Nothing detected - not on disk nor in memory.
CureIt 7 beta - same fail.
KVRT 2011 with full system disk scan + memory -> complete failure. Custom scan - same. Additionally it identified OllyDbg StrongOD plugin as Rootkit.Win32.Agent.biwb, cool story bro.
Hmm, one day old dropper identified correctly as ZAccess, but all actuall components are undetected.