Trojan.Zeroaccess (virus) - updated Jul 2021

Trojan.Zeroaccess Removal Guide

What is Trojan.Zeroaccess?

ZeroAccess – is the silently distributed malware that focuses on accessing particularly valuable data or acts directly like installer

Trojan.ZeroAccessTrojan - a dangerous virus that can install other malware on the user's computer.

ZeroAccess is a malicious Trojan horse[1] which was named like that because of the string found in its kernel driver code that points to the ZeroAccess folder. However, you can also find it named max++ and ZeroAccess rootkit. Note that there are many versions of this trojan horse that can easily hide deep inside your PC system without any sign. However, this is not what it was created for. The main thing what this trojan is used for is to open the backdoors of the compromised PC and download malware or similar malicious software[2] to it. The silent drop of this virus allows running malicious processes and adding any additional threat to the machine. You need to clean the machine asap because there are tons of different infections that can be active already.

Name ZeroAccess
Type Trojan horse
Alternatively known as ZeroAccess rootkit
Folder name ZeroAccess; max++
  • Trojan.Zeroaccess!kmem;
  • Trojan.Zeroaccess.B;
  • Trojan.zeroaccess!inf;
  • Trojan.Zeroaccess.C;
  • Trojan.Zeroaccess!inf4;
  • Trojan.Zeroaccess!gen10;
  • and many others
Main purpose Opens system's backdoors installs malware malicious programs
Distribution sources Spam messages, potentially dangerous websites
Elimination process Get rid of the Trojan horse automatically using anti-malware tools. Use FortectIntego to detect the damage

Trojan.ZeroAccess can also create a hidden system file that helps it to store all of its components. As long as this threat is considered an advanced Trojan horse, it has also been noticed that it is capable of updating itself through the peer-to-peer network[3]. This is a very helpful capability that allows its authors to improve the virus as frequently as possible. They can easily fill it with more functions and set it for new tasks.

If you ever overcome this dangerous computer infection in the system, note that you need to remove ZeroAccess virus as soon as possible. For this purpose use only reliable and expert-tested anti-malware[4] software. Furthermore, consider downloading and installing computer programs such as SpyHunter 5Combo Cleaner, Malwarebytes because these programs can detect all malicious objects in the system.

Another reason to perform the infection removal is the possibility of other annoying and even harmful consequences such as:

  • high CPU and GPU[5] usage;
  • software slowdowns or crash downs;
  • computer sluggishness;
  • etc.

Note that the sooner you get rid of ZeroAccess rootkit, the better it will be for your computer. We guess you do not want other malware to get injected into the system. If another virus appears on your computer, the removal process might be even more difficult to perform and the damage might get bigger. Additionally, some Trojans have the ability to expose sensitive data which is related to the user. Due to this, make sure the cyber threat vanishes fast.

Even if you get rid of the dangerous infection, note that you have to be very careful in the future. Trojan horses are very likely to appear throughout the Internet and rogue messages. Continue reading and find out what are the distribution techniques and precautionary measures for avoiding dangerous computer viruses such as Trojan.ZeroAccess.

Trojan.ZeroAccess virusThe virus might overuse the CPU and GPU.

Trojans access the computer via spam messages or suspicious web pages

There are several ways how you can get infected with a Trojan horse or one of its modified versions. It may come to your computer after clicking on a malicious link or after visiting a website, which is infected with a hazardous virus. Please, stay away from suspicious sites that can either be visited with the help of browser hijackers or voluntarily. In some cases, as soon as the trojan gets inside the target PC, it downloads an application that starts monitoring the victim's web searches and browsing habits.

Furthermore, according to IT specialists from website[6], another popular trojan distribution source is email spam. Trojan horses come as an attachment that is clicked to the phishing message. Gullible users access such content and immediately start the secret infiltration without even noticing it. So, better stay away from opening email messages that you are not sure about. If you are not expecting to receive anything important at the moment, get rid of all emails that come from questionable senders.

Remove the Trojan from the computer to avoid additional damage

There are several ways how you can remove the ZeroAccess virus from the computer system. First, you can try to download anti-malware and anti-virus programs. In this case, we recommend SpyHunter 5Combo Cleaner and Malwarebytes. If you are blocked by the infection, firstly you should use anti-rootkit tools and then anti-malware programs.

Finally, you can try using bootable CDs. However, note that that's the most difficult way to perform the ZeroAccess removal and you should contact the professional to help you with this method if you don't have enough knowledge about the system's architecture. After the process is finished, reboot your computer system to make sure that no virus-related content is still active. FortectIntego can help with damaged or altered pieces.

do it now!
Fortect Happiness
Intego Happiness
Compatible with Microsoft Windows Compatible with macOS
What to do if failed?
If you failed to fix virus damage using Fortect Intego, submit a question to our support team and provide as much details as possible.
Fortect Intego has a free limited scanner. Fortect Intego offers more through scan when you purchase its full version. When free scanner detects issues, you can fix them using free manual repairs or you can decide to purchase the full version in order to fix them automatically.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Fortect, try running SpyHunter 5.
Alternative Software
Different software has a different purpose. If you didn’t succeed in fixing corrupted files with Intego, try running Combo Cleaner.

Getting rid of Trojan.Zeroaccess. Follow these steps

Manual removal using Safe Mode

Use Safe Mode with Networking to disable the Trojan horse. Read these instructions if help is needed:

Important! →
Manual removal guide might be too complicated for regular computer users. It requires advanced IT knowledge to be performed correctly (if vital system files are removed or damaged, it might result in full Windows compromise), and it also might take hours to complete. Therefore, we highly advise using the automatic method provided above instead.

Step 1. Access Safe Mode with Networking

Manual malware removal should be best performed in the Safe Mode environment. 

Windows 7 / Vista / XP
  1. Click Start > Shutdown > Restart > OK.
  2. When your computer becomes active, start pressing F8 button (if that does not work, try F2, F12, Del, etc. – it all depends on your motherboard model) multiple times until you see the Advanced Boot Options window.
  3. Select Safe Mode with Networking from the list. Windows 7/XP
Windows 10 / Windows 8
  1. Right-click on Start button and select Settings.
  2. Scroll down to pick Update & Security.
    Update and security
  3. On the left side of the window, pick Recovery.
  4. Now scroll down to find Advanced Startup section.
  5. Click Restart now.
  6. Select Troubleshoot. Choose an option
  7. Go to Advanced options. Advanced options
  8. Select Startup Settings. Startup settings
  9. Press Restart.
  10. Now press 5 or click 5) Enable Safe Mode with Networking. Enable safe mode

Step 2. Shut down suspicious processes

Windows Task Manager is a useful tool that shows all the processes running in the background. If malware is running a process, you need to shut it down:

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Click on More details.
    Open task manager
  3. Scroll down to Background processes section, and look for anything suspicious.
  4. Right-click and select Open file location.
    Open file location
  5. Go back to the process, right-click and pick End Task.
    End task
  6. Delete the contents of the malicious folder.

Step 3. Check program Startup

  1. Press Ctrl + Shift + Esc on your keyboard to open Windows Task Manager.
  2. Go to Startup tab.
  3. Right-click on the suspicious program and pick Disable.

Step 4. Delete virus files

Malware-related files can be found in various places within your computer. Here are instructions that could help you find them:

  1. Type in Disk Cleanup in Windows search and press Enter.
    Disk cleanup
  2. Select the drive you want to clean (C: is your main drive by default and is likely to be the one that has malicious files in).
  3. Scroll through the Files to delete list and select the following:

    Temporary Internet Files
    Recycle Bin
    Temporary files

  4. Pick Clean up system files.
    Delete temp files
  5. You can also look for other malicious files hidden in the following folders (type these entries in Windows Search and press Enter):


After you are finished, reboot the PC in normal mode.

Remove Trojan.Zeroaccess using System Restore

Activate the System Restore feature by following these guidelines:

  • Step 1: Reboot your computer to Safe Mode with Command Prompt
    Windows 7 / Vista / XP
    1. Click Start Shutdown Restart OK.
    2. When your computer becomes active, start pressing F8 multiple times until you see the Advanced Boot Options window.
    3. Select Command Prompt from the list Select 'Safe Mode with Command Prompt'

    Windows 10 / Windows 8
    1. Press the Power button at the Windows login screen. Now press and hold Shift, which is on your keyboard, and click Restart..
    2. Now select Troubleshoot Advanced options Startup Settings and finally press Restart.
    3. Once your computer becomes active, select Enable Safe Mode with Command Prompt in Startup Settings window. Select 'Enable Safe Mode with Command Prompt'
  • Step 2: Restore your system files and settings
    1. Once the Command Prompt window shows up, enter cd restore and click Enter. Enter 'cd restore' without quotes and press 'Enter'
    2. Now type rstrui.exe and press Enter again.. Enter 'rstrui.exe' without quotes and press 'Enter'
    3. When a new window shows up, click Next and select your restore point that is prior the infiltration of Trojan.Zeroaccess. After doing that, click Next. When 'System Restore' window shows up, select 'Next' Select your restore point and click 'Next'
    4. Now click Yes to start system restore. Click 'Yes' and start system restore
    Once you restore your system to a previous date, download and scan your computer with FortectIntego and make sure that Trojan.Zeroaccess removal is performed successfully.

Finally, you should always think about the protection of crypto-ransomwares. In order to protect your computer from Trojan.Zeroaccess and other ransomwares, use a reputable anti-spyware, such as FortectIntego, SpyHunter 5Combo Cleaner or Malwarebytes

How to prevent from getting trojans

Choose a proper web browser and improve your safety with a VPN tool

Online spying has got momentum in recent years and people are getting more and more interested in how to protect their privacy online. One of the basic means to add a layer of security – choose the most private and secure web browser. Although web browsers can't grant full privacy protection and security, some of them are much better at sandboxing, HTTPS upgrading, active content blocking, tracking blocking, phishing protection, and similar privacy-oriented features. However, if you want true anonymity, we suggest you employ a powerful Private Internet Access VPN – it can encrypt all the traffic that comes and goes out of your computer, preventing tracking completely.


Lost your files? Use data recovery software

While some files located on any computer are replaceable or useless, others can be extremely valuable. Family photos, work documents, school projects – these are types of files that we don't want to lose. Unfortunately, there are many ways how unexpected data loss can occur: power cuts, Blue Screen of Death errors, hardware failures, crypto-malware attack, or even accidental deletion.

To ensure that all the files remain intact, you should prepare regular data backups. You can choose cloud-based or physical copies you could restore from later in case of a disaster. If your backups were lost as well or you never bothered to prepare any, Data Recovery Pro can be your only hope to retrieve your invaluable files.

About the author
Ugnius Kiguolis
Ugnius Kiguolis - The mastermind

If this free guide helped you and you are satisfied with our service, please consider making a donation to keep this service alive. Even a smallest amount will be appreciated.

Contact Ugnius Kiguolis
About the company Esolutions

Removal guides in other languages