Home Malware Programs Trojans Win32:ZAccess-PB

Win32:ZAccess-PB

Posted: February 26, 2013

Threat Metric

Threat Level: 9/10
Infected PCs: 7
First Seen: February 26, 2013
Last Seen: May 15, 2020
OS(es) Affected: Windows

Win32:ZAccess-PB is a Trojan that contains a component of rootkit and backdoor. Win32:ZAccess-PB can collect personal information from the targeted computer. Win32:ZAccess-PB may also enable a remote attacker to gain access and control of the infected computer system and manage some settings. The rootkit part of Win32:ZAccess-PB allows it to function inside the computer secretly. Rootkits use the sophisticated technique to hide the Win32:ZAccess-PB process under genuine system files of Windows. Win32:ZAccess-PB attempts to download and install other malware threats on the corrupted PC.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 96.76 KB (96768 bytes)
MD5: 18fda04a63ed47fd289681ba70b11b2f
Detection count: 44
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 27, 2013
file.exe File name: file.exe
Size: 96.76 KB (96768 bytes)
MD5: 8c297e80ef8c0c970334c4e87a974d58
Detection count: 41
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 15, 2020
file.exe File name: file.exe
Size: 83.96 KB (83968 bytes)
MD5: 4072343407ef049b5d354f5065350373
Detection count: 40
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: May 15, 2020
file.exe File name: file.exe
Size: 78.84 KB (78848 bytes)
MD5: 98a94d72448422b1b7a260a359cbf2e3
Detection count: 39
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 27, 2013
Loading...