Severity scale:  

Remove Trojan.Zeroaccess (Improved Instructions) - updated Jan 2021

removal by Ugnius Kiguolis - - | Type: Trojans

ZeroAccess – a harmful trojan horse which can inject other malware into the target system


ZeroAccess is a malicious Trojan horse[1] which was named like that because of the string found in its kernel driver code that points to the ZeroAccess folder. However, you can also find it named as max++ and ZeroAccess rootkit. Note that there are many versions of this trojan horse which can easily hide deep inside your PC system without any sign. However, this is not what it was created for. The main thing what this trojan is used for is to open the backdoors of the compromised PC and download malware or similar malicious software[2] to it.

Name ZeroAccess
Type Trojan horse
Alternatively known as ZeroAccess rootkit
Folder name ZeroAccess; max++
  • Trojan.Zeroaccess!kmem;
  • Trojan.Zeroaccess.B;
  • Trojan.zeroaccess!inf;
  • Trojan.Zeroaccess!inf2;
  • Trojan.Zeroaccess!inf3;
  • Trojan.Zeroaccess.C;
  • Trojan.Zeroaccess!inf4;
  • Trojan.Zeroaccess!gen10;
  • Trojan.Zeroaccess!gen11
Main purpose Opens system's backdoors, installs malware malicious programs
Distribution sources Spam messages, potentially dangerous websites
Elimination process Get rid of the Trojan horse automatically. Use ReimageIntego to detect the damage

Trojan.ZeroAccess can also create a hidden system file which helps it to store all of its components. As long as this threat is considered an advanced Trojan horse, it has also been noticed that it is capable of updating itself through the peer-to-peer network[3]. This is a very helpful capability that allows its authors to improve Zeroaccess virus as frequently as possible. They can easily fill it with more functions and set it for new tasks.

If you ever overcome this dangerous computer infection in the system, note that you need to remove ZeroAccess virus as soon as possible. For this purpose use only reliable and expert-tested anti-malware[4] software. Furthermore, consider downloading and installing computer tools such as ReimageIntego because these programs can detect all damaged objects in the system.

Another reason to perform the ZeroAccess removal is the possibility of other annoying and even harmful consequences such as:

  • high CPU and GPU[5] usage;
  • software slowdowns or crash downs;
  • computer sluggishness;
  • etc.

Note that the sooner you get rid of ZeroAccess rootkit, the better it will be for your computer. We guess you do not want other malware to get injected into the system. If another virus appears on your computer, the removal process might be even more difficult to perform and the damage might get bigger. Additionally, some Trojans have the ability to expose sensitive data which is related to the user. Due to this, make sure the cyber threat vanishes fast.

Even if you get rid of the dangerous infection, note that you have to be very careful in the future. Trojan horses are very likely to appear throughout the Internet and rogue messages. Continue reading and find out what are the distribution techniques and precautionary measures for avoiding dangerous computer viruses such as Trojan.ZeroAccess.

Trojan.ZeroAccess virusTrojan.ZeroAccess is a virus which might overuse the CPU and GPU.

Trojans access the computer via spam messages or suspicious web pages

There are several ways how you can get infected with a Trojan horse or one of its modified versions. It may come to your computer after clicking on a malicious link or after visiting a website, which is infected with a hazardous virus. Please, stay away from suspicious sites that can either be visited with the help of browser hijackers or voluntarily. In some cases, as soon as the trojan gets inside the target PC, it downloads an application that starts monitoring victim's web searches and browsing habits.

Furthermore, according to IT specialists from website[6], another popular trojan distribution source is email spam. Trojan horses come as an attachment that is clicked to the phishing message. Gullible users access such content and immediately start the secret infiltration without even noticing it. So, better stay away from opening email messages that you are not sure about. If you are not expecting to receive anything important at the moment, get rid of all emails that come from questionable senders.

Remove Trojan.ZeroAccess virus from the computer

There are several ways how you can remove ZeroAccess virus from the computer system. First, you can try to download anti-malware and anti-virus programs. In this case, we recommend ReimageIntego, SpyHunter 5Combo Cleaner and Malwarebytes. However, you can try running Hitman Pro or Kaspersky as well. If you are blocked by ZeroAccess, firstly you should use anti-rootkit tools and then anti-malware programs.

Finally, you can try using the bootable CDs. However, note that that's the most difficult way to perform the ZeroAccess removal and you should contact the professional to help you with this method if you don't have enough knowledge about system's architecture. After the process is finished, reboot your computer system to make sure that no virus-related content is still active.

do it now!
Reimage Happiness
Intego Happiness
Compatible with Microsoft Windows Supported versions Compatible with OS X Supported versions
What to do if failed?
If you failed to remove virus damage using Reimage Intego, submit a question to our support team and provide as much details as possible.
Reimage Intego has a free limited scanner. Reimage Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Reimage, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

To remove Trojan.Zeroaccess, follow these steps:

Remove Trojan.Zeroaccess using Safe Mode with Networking

Use Safe Mode with Networking to disable the Trojan horse. Read these instructions if help is needed:

  • Step 1: Reboot your computer to Safe Mode with Networking

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Safe Mode with Networking from the list Select 'Safe Mode with Networking'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Networking in Startup Settings window. Select 'Enable Safe Mode with Networking'
  • Step 2: Remove Trojan.Zeroaccess

    Log in to your infected account and start the browser. Download ReimageIntego or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Trojan.Zeroaccess removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

Remove Trojan.Zeroaccess using System Restore

Activate the System Restore feature by following these guidelines:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt

    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Trojan.Zeroaccess. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with ReimageIntego and make sure that Trojan.Zeroaccess removal is performed successfully.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Trojan.Zeroaccess and other ransomwares, use a reputable anti-spyware, such as ReimageIntego, SpyHunter 5Combo Cleaner or Malwarebytes

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.


Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free removal guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

Removal guides in other languages

  1. GaryB says:
    November 24th, 2012 at 2:18 pm

    My wifes PC had ZeroAccess. If her PC was on and connected to the network, all other PCs (family of five) on the network ground to a halt re. internet traffic. The first clue it was a virus and not a network component issue, was the fact that the MS Security Essentials (Win XP SP3) service had been halted inexplicably on my wifes PC, and the service would not restart. It was impossible to update Malwarebytes or to get MS Security Essentials running.

    I booted from an Ultimate Boot CD for Windows (UCB4WIN) which I created years ago to remove a virus I had encountered a few years ago. I used Registry Restore to bring back the registry from a few days prior to the infection. (I have lost faith entirely in Windows System Restore, I dont even bother trying to use it anymore.) I then rebooted into Windows, and could update Malwarebytes. A full scan revealed “Trojan.0Access”. Malwarebytes removed most of it, but suspicious folders remained in C:Recycler. RogueKiller was able to delete everything. I took the time to run CCleaner as well, cleaning over 5 GB of junk of the PC. Also updated MS Security Essentials.

  2. Thomas says:
    November 29th, 2012 at 6:18 pm

    Used Spyhunter in the attempt of removing the Trojan.Zeroaccess. Spyhunter indicated the virus was isolated and deleted, however, upon running a second scan with McAfee, the virus remained/ Stored under C:WINDOWSassemblyGAC_32Desktop.ini. I still cant get rid of it. I try to access the file in Safe Mode in attempt to delete it….It prompts me that access is denied. I am lost. I need help.

  3. Jen says:
    December 1st, 2012 at 7:05 am

    If this virus is so dangerous and I want to try this product but asking for my CC how can I process the purchase? I am afraid my information be collected!

Your opinion regarding Trojan.Zeroaccess