Win32.ZAccess.m
Posted: September 4, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 9 |
First Seen: | September 4, 2012 |
---|---|
Last Seen: | July 14, 2020 |
OS(es) Affected: | Windows |
Win32.ZAccess.m is an alert for Windows system files that have been infected by ZeroAccess (AKA Sirefef or Max++) rootkits and Trojans. These attacks target specific Windows files and insert code for ZeroAccess to launch automatically as part of your operating system's processes, and SpywareRemove.com malware experts haven't seen any cases of Win32.ZAccess.m or related PC threats infected benign nonsystem files. Win32.ZAccess.m usually is related to launching or protecting other parts of a multi-component ZeroAccess infection, which can, themselves, launch severe attacks such as inserting phishing attacks into bank web pages or monitoring keyboard input (keylogging). Since Win32.ZAccess.m infects vital system files and is just one of several PC threats in any one ZeroAccess infection, you should delete Win32.ZAccess.m with a top-of-the-line anti-malware program and scan the rest of your PC to uncover the rest of ZeroAccess's files.
Win32.ZAccess.m: the Innocuous Windows Component with a Lot Going On Behind the Scenes
Other ZeroAccess components (such as Trojan droppers that specialize in installing ZeroAccess rootkits) install Win32.ZAccess.m by inserting its code into services.exe, the Windows file that controls the startup and cessation of services. From that location, Win32.ZAccess.m is used to launch other ZeroAccess components, while the Trojan dropper usually deletes itself to avoid detection. Win32.ZAccess.m may also shut down services that Win32.ZAccess.m considers a threat to itself such as anti-virus scanners and other PC security tools.
Other PC threats related to ZeroAccess infections usually use similar methods to conceal themselves – for example, by having their code injected into a web browser's process. As a result, SpywareRemove.com malware researchers discourage attempts to delete Win32.ZAccess.m and other ZeroAccess-based infections without anti-malware products or, at least, assistance from PC security experts. Deleting the infected files will damage your OS and may cause Windows to be unable to boot until you repair it with its factory CD/DVD.
What Win32.ZAccess.m Gives a Helping Hand in Creating
Win32.ZAccess.m isn't designed for functions other than the ones described above. However, SpywareRemove.com malware analysts have found a whole host of other attacks in closely-related PC threats from the ZeroAccess family. Other components of ZeroAccess that are launched by Win32.ZAccess.m can result in attacks that include:
- Changing your online search results to display advertisements or unrelated sites.
- Disabling security features such as Internet Explorer's security zones.
- Monitoring keyboard input, screen activity (via screenshots), browser activities and text form fields to steal personal information. Account passwords and user names are especially likely to be compromised by PC threats linked to Win32.ZAccess.m.
SpywareRemove.com malware researchers have found many aliases for Win32.ZAccess.m, which is a well-defined threat that many PC security companies have identified and defined in their threat databases. Win32.ZAccess.m's prominent aliases include ZeroAccess.ds.gen.c, Trojan.Zeroaccess!inf4, PTCH_ZACCESS.A and Virus:Win32/Sirefef.R.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.