You might remember ZeroAccess, one of the largest and most advanced P2P botnets that ever existed. It first appeared around 2009 in form of a kernel-mode rootkit focused on click fraud and was later used for bitcoin mining. Later versions appeared without the kernel-mode rootkit. As we found out, the developer of ZeroAccess also created legitimate tools as a freelancer. He also mentioned a self-made Windows kernel-mode debugger in one of his service offerings, but we were unable to find it at that time. I discovered it on Virustotal in 2018, and as of this year, the ZeroAccess developer itself has posted an upgraded version on GitHub. You read correctly: the ZeroAccess developer is still active today, however he most likely does no longer create malware. At least since his last public exposure in 2016, I haven’t come across any new malware samples that use his trademark.

Background

In 2016, we at the kernelmode.info forum tried to find the developer of ZeroAccess. Back then, we discovered a number of benign Windows apps created by the same individual. We found some information about the creator from one of the tools, which was TV streaming software. It turned out that he advertised some of these legitimate tools as references on freelance sites where he sold his skills.

The information showed that the developer was 40 years old, lived in Odessa (Ukraine) and used the name Maksim Samuistov (maksimsamuistov) in Skype. At the time, I shared the information with the CERT-UA team. They were able to confirm that a person with that name does, in fact, live in Odessa. However, I was informed that local LE protected him, thus they were unable to contact him. After we published the information on X and in the kernelmode.info forum, he deleted some of his freelancing offers and disappeared… until a year later.

A Reformed ZeroAccess Developer?

In 2017, new service offerings showed up with his most recent nicknames rbmm and alex short.

Searching for these nicknames, I could find his GitHub, Stackoverflow and OSR accounts which he still uses to this day:

ZeroAccess developer GitHub account

ZeroAccess developer Stackoverflow account

ZeroAccess developer OSR account

In 2019, he also offered his services with the name Alex S. on Upwork which revealed the geo location from where he posted it (L'vivs'ka city council, Ukraine):

ZeroAccess developer service offering

Later, he also created accounts on X, LinkedIn, YouTube and contributes to a blog:

ZeroAccess developer X account

ZeroAccess developer LinkedIn account

ZeroAccess developer YouTube account

ZeroAccess developer blog account

In his X account, he also states to be involved in the development of Protectimus and StartMenuX.

Windows Kernel-Mode Debugger Z-DbgYDbg

ZeroAccess’s creator likely shared pre-2025 versions of his private Windows kernel-mode debugger with other people. This could be read in some of his posts and it’s likely also the reason these versions have been leaked to Virustotal. Before he released his debugger in 2025 under the name YDbg it was known as Z-Dbg, probably in reference to ZeroAccess:

Z-Dbg vs YDbg

The creator also gives a description of the debugger’s functionality:

YDbg description

There’s also a video demonstration on his YouTube channel: https://www.youtube.com/watch?v=eZA5_C8pudo

The 2025 release of the debugger named YDbg can be found on his GitHub account: https://github.com/rbmm/asterisk

The previous versions can be downloaded here: Z-Dbg

The Code Signing Certificates - Who is Vertamedia?

Some of the Z-Dbg files are signed and when we take a look at the signer data, we can see some interesting information.

This (unsigned) 64-bit debugger installer from 2018 contains the following embedded files:

File Name SHA256 PE Type Platform Compilation Timestamp Signature Signer
DbgNew.exe ab7eb831fb018e1f7ef62091fb5e7e94afa1a883613dfd735ee79f54d055b5c5 EXE 64-bit 2018-03-26 13:43:58 UTC - -
GetPdb.exe a62670727e49377cbd70ab62bf1856f4f96499188dad116eae4936a7dbebe005 EXE 64-bit 2018-02-19 12:42:23 UTC - -
lgSessions.exe e3faa45908a04fb5cdf4d4f6b860fd8c9ac487fc5f874ab37d0d79c15a370a78 EXE 32-bit 2018-03-28 20:07:13 UTC - -
ListProtected.exe da5f004f82b4cc15a6c5bae2d74d62cfac2f6d53128129a8c9606c41c2cff49d EXE 32-bit 2017-11-15 10:38:16 UTC - -
MemDump.exe 04ad75c1e869f509851a628dac577678749e2c7058a2f1702ed781e753a9d06d EXE 64-bit 2018-04-15 15:44:35 UTC - -
Modules.exe 9d56f4640afd9786202137e140508cab7ebc7cbbd1caf7403afb9cf1e50000bc EXE 64-bit 2017-10-10 17:50:55 UTC - -
msdis170.dll 8fa7d7a2339b6e72f592f4da719eee499f2ed3f1eb2ddde7558c9e1238e0f809 DLL 64-bit 2009-11-30 22:45:35 UTC Valid Microsoft Corporation
NtRegView.exe ef66fcd070f36652c2f5d2813dde57678a6c542280a52fdf343afff3d6d31575 EXE 64-bit 2018-02-28 17:35:02 UTC - -
PdbUtils.exe 285e0ae748125a3f7ce0fc3915d1dac90c2a3095d1690c61823c19773fadb41b EXE 64-bit 2017-10-07 10:25:14 UTC - -
run as pro.exe 0d1bec99333b8f92962e0768d3a281598117cfc1f99d5bad1be37ebaf1e95127 EXE 64-bit 2017-11-15 12:29:35 UTC - -
SearchEx.exe d02040fec884d7747e7a78d7822fb06e9255164ac8e11ef2251b0665279a4ffd EXE 64-bit 2018-01-17 09:52:41 UTC - -
tkn.dll f8be332e8b6ee09684d55319154c3e951d5daf8e22fcf0908d0ff6d135f4feca DLL 64-bit 2016-09-01 15:29:06 UTC Self-signed 45cae3b9
UnInst.dll 301fd7692eafe3fbf5788c40f4f95e769f6d0c2078a6721d71b4a949f3558416 DLL 64-bit 2018-01-18 10:59:41 UTC - -
winobj.exe 69a6ab6caf8ed3a8cdf05a678994fe651bbc926a42a22efe2b13ccf5fd832b6e EXE 32-bit 2018-03-26 13:55:13 UTC -  

In this installer, the debugger’s kernel-mode library named tkn.dll is self-signed with the signer 45cae3b9 and can therefore be only loaded if test-signed code is enabled during system boot. Aside from discovering a legit game of tic tac toe that he created, not much can be deduced from the signer’s name.

Let’s take a look at the files from a signed 32-bit debugger installer from 2015:

File Name SHA256 PE Type Platform Compilation Timestamp Signature Signer
DbgNew.exe fa81ef35b2ef360a8ea3bcad508363b3ff88c241c4190813403419e64b5ddce3 EXE 32-bit 2015-10-16 18:41:28 UTC Self-signed max black
dllList.exe d377f9cf63a38e0e76bf77db0b578158e89f3685e862d66c5fd3371bb269e9a7 EXE 32-bit 2015-08-15 19:15:56 UTC Self-signed max black
GetPdb.exe bce355e35077e6d3787062df2b5601f18726c6f34b42accf412f0d0e8a2fc212 EXE 32-bit 2015-07-28 08:42:44 UTC Self-signed max black
lgSessions.exe cd9685b3b2700d2140e51a62fe94f518aa7f94170e3ca529ac043b40ea86acc6 EXE 32-bit 2015-07-24 18:57:46 UTC Self-signed max black
ListProtected.exe cf08fb0c6fee8b6ee43676a68697aea4e968a4ed403eb21600f7fbd6f3b4cd54 EXE 32-bit 2015-08-10 12:36:58 UTC Self-signed max black
MemDump.exe 49dda01e845877c07004f74316d40a2659c24daf06e751478bb4cd073db673af EXE 32-bit 2015-08-15 17:04:08 UTC Self-signed max black
msdia80.dll 76ae5b476597eebb2e70e871f2d9a556caf3a383abb91034b2d1f194c2aea08c DLL 32-bit 2005-09-23 09:52:57 UTC - -
msdis170.dll eccc1fe7290ce4e65fb327013d8b7a9a0689503f77a3c9d5f4d590f03e5076a2 DLL 32-bit 2010-03-18 12:10:19 UTC Valid Microsoft Corporation
PdbUtils.exe 3895ef60b3979bc55e71562283d350c101c26226d2428b35cf58d115e782f5d4 EXE 32-bit 2015-08-26 10:54:23 UTC Self-signed max black
reparse.exe c188ec7e2fdabae62f03433fea84503be7413616167eb021b4f5139588b888ac EXE 32-bit 2015-08-29 17:58:05 UTC Self-signed max black
run as pro.exe 0a4f3c6bcf807f3d5c007226f1334703a5e6624b0c487fc901b8b9be14883356 EXE 32-bit 2015-08-10 10:49:03 UTC Self-signed max black
tkn.dll ed6f2c8b9402cb3fe684cccb4d47b2b244e171128f65f2b641394c3971ae908d DLL 32-bit 2015-08-10 10:33:22 UTC Valid Vertamedia, LLC
winobj.exe 6ab1247824d0e75a9a3fd34fd2b67c54900c261a511ba3893d6393e7eeaaac48 EXE 32-bit 2011-05-06 06:23:45 UTC Self-signed max black

As can be seen, most files are self-signed with the signer max black, a handle we already discussed in 2016 (see link in chapter Background). What’s interesting is the valid signed kernel-module DLL with the signer Vertamedia, LLC. VertaMedia (now Adtelligent) is an ad monetarization company that was founded in 2008 in Odessa, Ukraine. The question is how the ZeroAccess creator, which seemed to be also located in Odessa, got a valid code signing certificate from this company to sign his debugger? Was it stolen? Did he work for that company and used it for his debugger? Did he knew somebody at this company who passed him the certificate? The fact that the developer of a click fraud bot uses an ad monetization platform’s certificate to sign his own private tool cannot be a coincidence.

There is another 32-bit debugger installer from 2015 which also contains the same signed kernel driver.

Let us take a look at the newest signed (64-bit) debugger installer (YDbg) from his GitHub account:

File Name SHA256 PE Type Platform Compilation Timestamp Signature Signer
DbgNew.exe 34eab4b64a57db265dda623a0734ebfaad89e09ccbb4331ca7cd40a2501603cc EXE 64-bit 2025-09-10 12:26:57 UTC Valid DENNISBABKIN.COM, LLC
GetPdb.exe f2848dcaa8ce4bcccfa2a2ee83bbbffa6b22106a65f8f720826b61b91544aaee EXE 64-bit 2023-02-07 01:55:30 UTC Valid dennisbabkin.com, LLC
MemDump.exe 8a7868e09d09fb67669a81456a8753e6cf255734efdb6853398dbc276e8b3aae EXE 64-bit 2022-08-12 22:11:57 UTC Valid dennisbabkin.com, LLC
NtRegView.exe 3645c1707b6e7036d229aa7648242fe73d2423e5ee3b24840a8bb2b23759a66e EXE 64-bit 2022-11-03 11:13:07 UTC Valid dennisbabkin.com, LLC
PdbUtils.exe ad610954ab6aa27802e1c14d17d11c9e755a39d1e87d57d56988ed44fea78ef9 EXE 64-bit 2022-12-07 03:09:10 UTC Valid dennisbabkin.com, LLC
Processes.exe 6c7e7a1c8eaad533f4c3b056565c55a3b300e660142df8b13790e05e46ea5f7b EXE 64-bit 2024-06-02 06:34:16 UTC Valid dennisbabkin.com, LLC
run as pro.exe e42ed55a33ffe62bfbae3325523edbcc3b32d7d228f56797a0619562bde3cacf EXE 64-bit 2024-02-24 23:19:24 UTC Valid dennisbabkin.com, LLC
SearchEx.exe 811802cb56c81b355b8c619d9e43278540bcfc584ede1095c55faab33978ba05 EXE 64-bit 2021-06-15 00:39:28 UTC Valid dennisbabkin.com, LLC
SetProCrit.exe ee316057df89da1b073d7daa038eb359233aedecfd8d594171fa12ce1fe7cf78 EXE 64-bit 2022-08-10 16:33:34 UTC Valid dennisbabkin.com, LLC
srvs.exe 697e9dbc98cffd3ceb8c080cc9db85198e704a40dd77c4f0c6aad6d38021418b EXE 64-bit 2025-02-11 17:46:26 UTC Valid dennisbabkin.com, LLC
StartDbg.exe 643886b8d7246a4e48520ea97d4d7ff9ac0505b04bb661490ce527621e67c5d1 EXE 64-bit 2022-06-18 12:34:28 UTC Valid dennisbabkin.com, LLC
tkn.dll 7b9ed3c76ae8c436504f73024ee723ed4ee9f7ece16e2a424cee0d559c70f542 DLL 64-bit 2022-11-05 13:42:16 UTC Valid Microsoft Windows Hardware Compatibility Publisher
tvi.exe 1764400cd10a69bcfd34b92673b463cee0ce83b4d27d38498a6afe2d0a4b920c EXE 64-bit 2023-01-02 10:51:37 UTC Valid dennisbabkin.com, LLC
UnInst.dll 82be99d169e78e4a0bd73231c845266af147db528f5a58106949a56f6c964311 DLL 64-bit 2022-11-27 01:05:45 UTC Valid dennisbabkin.com, LLC
winobj.exe 2e3670c1c7ae810ee28f7213f35ecdcb8686a81716edafc1822ebcef10d9d343 EXE 64-bit 2022-11-03 11:10:18 UTC Valid dennisbabkin.com, LLC

We can see that all files including the installer itself are signed with valid certificates of the signer dennisbabkin.com, LLC or DENNISBABKIN.COM, LLC (see blog link in chapter A Reformed ZeroAccess Developer?). Like the developer of ZeroAccess, this individual appears to be a very skilled (Windows) developer, but I’m not sure and would like to hypothesize as to how they are related. The kernel-mode library tkn.dll is signed by Microsoft Windows Hardware Compatibility Publisher, a program by Microsoft to make drivers more reliable, secure and fully compatible with Windows operating systems.

Conclusion

After being exposed in 2016, it appears that the ZeroAccess developer shifted from writing malware to writing legitimate software. It seems he has successfully reinvented himself, using his technical skill only for legitimate purposes rather than writing malware. Some of his work is quite outstanding, such as his kernel-mode debugger. However, he does not provide any personal information on any of his accounts, and for good reason. I am aware that at least US law enforcement attempted to prosecute him in 2018, albeit obviously without success.

Unfortunately for him, during the ZeroAccess era there were no such things as offensive security, red teaming or APT simulation.