Trojan.Zeroaccess Removal Tool icon

Trojan.Zeroaccess Removal Tool

No Screenshot
Downloads :
Total: 121  |  Last 7 days: 1
Product Version :
Producer :
License type :
Size :
1.72 MB
Category :
March 28, 2012, 16:30
User Rating : (UNRATED)
OS Supported :
Windows 7
Windows Vista

Trojan.Zeroaccess Removal Tool Information

Publisher's Description:

Designed to remove the infections of Trojan.Zeroaccess and Trojan.Zeroaccess.B.


If you are removing an infection from a network, first make sure that all the shares are disabled or set to Read Only.
This tool is designed to run on 32-bit and 64-bit computers.

How to download and run the tool

Important: You must have administrative rights to run this tool on Windows XP, Windows Vista, or Windows 7.

Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft knowledge base article: Issues caused by a back up or a scan of the Exchange 2000 M drive (Article 298924). Follow these steps to download and run the tool:

Download the FixZeroAccess.exe file from: Trojan.Zeroaccess Removal Tool.
Save the file to a convenient location, such as your Windows desktop.
Optional: To check the authenticity of the digital signature, refer to the "Digital signature" section later in this writeup.

Note: If you are sure that you are downloading this tool from the Security Response Web site, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the "Digital signature" section before proceeding with step 4.

Close all running programs.
If you are running Windows XP, turn off System Restore. For instructions on how to turn off System Restore, read your Windows documentation, or one of the following articles: How to turn off or turn on Windows XP System Restore
Locate the file that you just downloaded.
Double-click the FixZeroAccess.exe file to start the removal tool.
Click Start to begin the process, and then allow the tool to run.
Restart the computer when prompted by the tool.
After the computer has started, the tool will inform you of the state of infection.
If you are running Windows XP, re-enable System Restore.
Run LiveUpdate to make sure that you are using the most current virus definitions.

When the tool has finished running (Step 10), you will see a message indicating whether the threat has infected the computer.

What the tool does
The Removal Tool does the following:

Terminates the associated processes
Deletes the associated files
Removes hidden partition unconditionally if detection occurs

Digital signature
For security purposes, the removal tool is digitally signed. Symantec recommends that you use only copies of the removal tool that have been directly downloaded from the Symantec Security Response website. If you are not sure, or are a network administrator and need to authenticate files before deployment, you should check the authenticity of the digital signature. Follow these steps:

Go to
Download and save the Chktrust.exe file to the same folder in which you saved the removal tool.

Note: Most of the following steps are done at a command prompt. If you downloaded the removal tool to the Windows desktop, it will be easier if you first move the tool to the root of the C drive. Then save the Chktrust.exe file to the root of C as well. (Step 3 assumes that both the removal tool and Chktrust.exe are in the root of the C drive.)

Click Start > Run.
Type the following: cmd
Click OK.
In the command window, type the following, pressing Enter after typing each line: cd\ cd downloads chktrust -i FixZeroAccess.exe
You should see one of the following messages, depending on your operating system:

Windows XP SP2: The Trust Validation Utility window will appear. Under Publisher, click the Symantec Corporation link. The Digital Signature Details appears.

Verify the contents of the following fields to ensure that the tool is authentic:
Name: Symantec Corporation
Signing Time: 12/07/2011 00:05:46

All other operating systems: You should see the following message: Do you want to install and run "FixZeroAccess.exe" signed on Wednesday, December 7, 2011 00:05:46 and distributed by Symantec Corporation?

Notes: The date and time in the digital signature above are based on Pacific time. They will be adjusted for your computer's time zone and Regional Options settings. If you are using Daylight Saving time, the displayed time will be exactly one hour earlier.

If this dialog box does not appear, there are two possible reasons: The tool is not from Symantec: Unless you are sure that the tool is legitimate and that you downloaded it from the legitimate Symantec website, you should not run it.

The tool is from Symantec and is legitimate: However, your operating system was previously instructed to always trust content from Symantec. For information on this and on how to view the confirmation dialog again, read the document: How to restore the Publisher Authenticity confirmation dialog box.
Click Yes or Run to close the dialog box.
Type exit, and then press Enter. (This will close the MS-DOS session.)

Note: If the removal tool is unable to repair/replace an infected rootkit driver, a message will be displayed explaining that it will need to be restored manually.

Manually restoring infected drivers
To manually restore an infected driver it is necessary to restart the computer and run the Windows Recovery Console. For full details on how to do this please read the Microsoft Knowledge Base article, How to install and use the Recovery Console in Windows XP.

Insert the Windows XP/Vista/7 CD-ROM into the CD-ROM drive.
Restart the computer from the CD-ROM drive.
XP: Press R to start the Recovery Console when the "Welcome to Setup" screen appears.
Vista/7: Follow the instructions on the screen and click Next > Repair Your Computer.
Select the installation that you want to access from the Recovery Console.
XP: Enter the administrator password and press Enter.
Vista/7: If prompted, enter your user name and password.
(Vista/7 users must first select Command Prompt before following this step)
Type the following commands and press Enter after each command:
cd %System% [DLL FILE] or
cd %System%\drivers [SYS FILES]
expand [CD/DVD DRIVE]:\i386\[DETECTED FILE NAME].[dl or sy]_
For example:
cd c:\windows\system32\drivers
expand d:\i386\atapi.sy_
Repeat the above step for each SYS file affected. See the Technical Description section for a list of files that may be affected.
Type exit.
Press Enter. The computer will now restart automatically.

User reviews

User rating

Your rating:  
Users rating: (0 votes)

Add a Review

(It will not be displayed. Is only for contacting you)
(from the image)
Image Code

!!! Fields marked with * are required !

Trojan.Zeroaccess Removal Tool 100% CLEAN Certification

100% Clean Award for Trojan.Zeroaccess Removal Tool team has tested Trojan.Zeroaccess Removal Tool against viruses, spyware, adware, trojan, backdoors and was found to be 100% clean of any form of malware..
Our editors will test this application periodically to assure that it remains clean.
Click the link below to view the entire antivirus report.

Complete antivirus report

Latest Anti-spyware

Malwarebytes Anti-Malware icon

Malwarebytes Anti-Malware

Application for detecting, destroying and removing malware, one
March 5, 2018, 00:19 | Size: 65 MB
ShutUp10 1.4.1388 icon

ShutUp10 1.4.1388

Antispy tool to provide full control over which comfort functions
April 6, 2017, 04:33 | Size: 194.56 K
SpyDetect Free 1.0.1 icon

SpyDetect Free 1.0.1

Detect processes that might be relevant to tracking any spying
October 2, 2016, 12:23 | Size: 931.84 K
1st Evidence Remover 2.773 icon

1st Evidence Remover 2.773

Clean your Windows of any evidence and temporary files.
January 28, 2013, 03:49 | Size: 931.84 K
Rising PC Doctor icon

Rising PC Doctor

Rising PC Doctor, professional and smart security tool to computer
November 28, 2012, 13:38 | Size: 9.14 MB
PestBlock 4.1.7 icon

PestBlock 4.1.7

Provides you complete protection against most dangerous threats
September 19, 2012, 06:35 | Size: 5.58 MB
SPAMfighter Pro 7.5.133 icon

SPAMfighter Pro 7.5.133

Spam and phishing filter for Outlook/Express. Download SPAMfighter
April 25, 2012, 14:49 | Size: 2.44 MB
SPYWAREfighter 4.1.133 icon

SPYWAREfighter 4.1.133

Protect your PC against spyware, malware and other unwanted
March 22, 2012, 05:45 | Size: 2.15 MB
SPAMfighter Mail Gateway icon

SPAMfighter Mail Gateway

Protect your organization against e-mails that are spam, virus
March 22, 2012, 05:39 | Size: 10.01 MB
SPAMfighter Standard 7.5.131 icon

SPAMfighter Standard 7.5.131

Automatically filter spam and phishing attempts in the Outlook
March 22, 2012, 05:32 | Size: 2.43 MB

Most Downloaded

Malwarebytes Anti-Malware icon

Malwarebytes Anti-Malware

Application for detecting, destroying and removing malware, one
Anti Trojan Elite icon

Anti Trojan Elite

Anti Trojan Elite is a trojan horse remover and system security
Proxy Switcher Standard icon

Proxy Switcher Standard

Obtain flexible proxy settings management and anonymous surfing
Rising PC Doctor icon

Rising PC Doctor

Rising PC Doctor, professional and smart security tool to computer
Spyware Doctor icon

Spyware Doctor

Best Spyware Protection tool that detects and cleans thousands
PrivacyKeyboard icon


Protects computers against both spy software and hardware keyloggers.
Max Secure Spyware Detector icon

Max Secure Spyware Detector

Scans, detects, deletes spyware and malware giving you safe
History Sweeper icon

History Sweeper

Clean up the history of your online activities on your computer.
Spy Emergency icon

Spy Emergency

Complete tool that offer Anti-Spyware, Anti-Virus and Anti-Spam
McAfee SiteAdvisor for Internet Explorer icon

McAfee SiteAdvisor for Internet Explorer

Is a free test Web sites for spyware, spam, viruses and phishing.
Contact | Privacy Policy
Copyright © 2008 - 2020 - All rights reserved. logo