Trojan.Zeroaccess.B Description

Although Trojan.Zeroaccess.B is nearly-indiscernible from Trojan.Zeroaccess on 32-bit Windows computers, malware researchers caution that this lack of originality doesn’t indicate that Trojan.Zeroaccess.B is anything less than a high-level threat to your computer’s safety and privacy. Trojan.Zeroaccess.B contains both dropper and backdoor functions that allow Trojan.Zeroaccess.B to download and install other PC threats, and rootkit functions that allow Trojan.Zeroaccess.B to easily-dodge basic detection and removal techniques. Deleting Trojan.Zeroaccess.B should always use appropriate anti-malware programs, although programs that aren’t equipped with recent threat databases may be unable to detect Trojan.Zeroaccess.B, which was widely-identified only late in December of 2011.

Trojan.Zeroaccess.B: Making Headway with Every Version of Windows That It Can Grab

Trojan.Zeroaccess.B is designed to attack both 64-bit and 32-bit versions of Windows and is capable to successfully-infect Windows 95 up to at least Windows Vista. Trojan.Zeroaccess.B’s behavior includes some minor additional features for 64-bit systems, as malware analysts note in the following list of its functions:
  • In 64-bit computers, Trojan.Zeroaccess.B will create additional folders for malicious files in sub-folders of the Windows directory.
  • Trojan.Zeroaccess.B also installs and loads harmful .dll files.
  • A component of Windows Firewall that monitors networking is then halted; you may be able to observe this by noting a lack of the MpsSvc.exe process in Task Manager.
  • Your Windows Registry is then altered to change system settings for reduced security.
  • Afterwards, Trojan.Zeroaccess.B will download and install other PC threats that will attempt to hook themselves into normal system processes – in some cases, this can include processes for popular web browsers like Chrome or Internet Explorer.
  • Last of all, Trojan.Zeroaccess.B opens a backdoor that can allow criminals to control your PC, view files, or conduct other attacks (such as botnet-based DDoS attacks).

    » Learn more about SpyHunter's Spyware Detection Tool
    and steps to uninstall SpyHunter.

    This may also allow other PC threats, including Trojans, spyware or browser hijackers to be installed.

Sifting Through Your Computer’s Memory for Trojan.Zeroaccess.B

Because components of Trojan.Zeroaccess.B and related PC threats can attach themselves to normal files and processes, malware experts discourage any attempts to find or remove Trojan.Zeroaccess.B on your own. In ideal circumstances, a total scan of your PC via anti-malware software should be able to detect and delete all components of Trojan.Zeroaccess.B before harm to your PC results.

However, rootkit functions like those that are used by Trojan.Zeroaccess.B may also require extra measures to be disabled before you can delete Trojan.Zeroaccess.B. malware researchers warn that you may be required to disable System Restore, boot into Safe Mode or boot Windows from an external source before you can shut down Trojan.Zeroaccess.B long enough to remove Trojan.Zeroaccess.B. Although the removal of Trojan.Zeroaccess.B is far from an easy job, tolerating Trojan.Zeroaccess.B – and the potential web browser hijacks, spyware attacks and other consequences – can definitively be said to be the worse option.

Trojan.Zeroaccess.B Automatic Detection Tool (Recommended)

Is your PC infected with Trojan.Zeroaccess.B? To safely & quickly detect Trojan.Zeroaccess.B we highly recommend you run the malware scanner listed below.

Related Posts

Posted: January 2, 2012 | By
Rate this article:
1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading ... Loading ...
Threat Metric
Threat Level: 9/10
Detection Count: 22
Home Malware ProgramsTrojans Trojan.Zeroaccess.B

Leave a Reply

What is 6 + 13 ?
Please leave these two fields as-is:
IMPORTANT! To be able to proceed, you need to solve the following simple math (so we know that you are a human) :-)