You can't completely remove Trojan.zeroaccess!inf4 Virus with any antivirus program. Follow these steps to manually remove the infection.
1. Restart the infected computer. Press and release the F8 key continuously when system starts. You will get an advanced boot menu. Select Safe Mode with Networking and press Enter.

2. Open Control Panel from Start menu and go to Folder Options;

3. Under View tab to tick Show hidden files and folders and non-tick Hide protected operating system files (Recommended);

4. Press Windows+R keys to open the Run window and then type in regedit to open Registry Editor;


5. Find out and delete all these associating files of Trojan.zeroaccess!inf4 as below:
Windows XP or older:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Random.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “[random].exe”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\”Shell” = “[random].exe”
HKEY_CLASSES_ROOT\CLSID\{42aedc87-2188-41fdeuya3-0c976fwsec1}\InprocServer32\”@” = “%UserProfile%\Local Settings\Application Data\[UUID]\
HKEY_CLASSES_ROOT\CLSID\{42aedc87-2188-41ws-b9a3-0c96eooiwlnvns1}\InprocServer32\”@” = “%UserProfile%\AppData\Local\[UUID]\n.”
7. Restart the computer to normal mode when the above steps are done.
1. Restart the infected computer. Press and release the F8 key continuously when system starts. You will get an advanced boot menu. Select Safe Mode with Networking and press Enter.
2. Open Control Panel from Start menu and go to Folder Options;
3. Under View tab to tick Show hidden files and folders and non-tick Hide protected operating system files (Recommended);
4. Press Windows+R keys to open the Run window and then type in regedit to open Registry Editor;
5. Find out and delete all these associating files of Trojan.zeroaccess!inf4 as below:
Windows XP or older:
- %UserProfile%\Local Settings\Application Data\[UUID]\n
- %UserProfile%\Local Settings\Application Data\[UUID]\@
- %UserProfile%\Local Settings\Application Data\[UUID]\L
- %UserProfile%\Local Settings\Application Data\[UUID]\U
- %UserProfile%\AppData\Local\[UUID]\n
- %UserProfile%\AppData\Local\[UUID]\@
- %UserProfile%\AppData\Local\[UUID]\L
- %UserProfile%\AppData\Local\[UUID]\U
- %Windir%\Installer\[UUID]\n
- %Windir%\Installer\[UUID]\@
- %Windir%\Installer\[UUID]\L
- %Windir%\Installer\[UUID]\U
- %System%\services.exe (Trojan.Zeroaccess!inf4)
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run “Random.exe”
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Settings “net
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run “[random].exe”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\”Shell” = “[random].exe”
HKEY_CLASSES_ROOT\CLSID\{42aedc87-2188-41fdeuya3-0c976fwsec1}\InprocServer32\”@” = “%UserProfile%\Local Settings\Application Data\[UUID]\
HKEY_CLASSES_ROOT\CLSID\{42aedc87-2188-41ws-b9a3-0c96eooiwlnvns1}\InprocServer32\”@” = “%UserProfile%\AppData\Local\[UUID]\n.”
7. Restart the computer to normal mode when the above steps are done.
No comments:
Post a Comment