Infected with zpyemhvct.exe

Discussion in 'Malware Help (A Specialist Will Reply)' started by Vako, Nov 2, 2013.

  1. Vako

    Vako Private E-2

    A bunch of my programs wont even connect to the internet including the ones used here on the READ ME thread. My FTP software went crazy and doesnt even connect. My AV got dismantled to the point that even that i uninstalled it and cant even install it back again.

    Its driving me crazy and I dont know what to do. Please assist me here. Thanks.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Re run Hitman, and under the heading Suspicious files, have it delete anything in relation to:

    • zpyemhvct.exe




    http://img805.imageshack.us/img805/9659/rktigzy.gif Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [RUN][HJNAME] HKCU\[...]\Run : Explorer (C:\Users\TxnerT\AppData\Local\Temp\Explorer\Explorer.exe [-]) -> FOUND
    • [RUN][SUSP PATH] HKCU\[...]\Run : Win Update (C:\Users\TxnerT\AppData\Local\Temp\Win Update\Win Update.exe [-]) -> FOUND
    • [RUN][HJNAME] HKCU\[...]\Run : (C:\Users\TxnerT\AppData\Roaming\Explorer\Explorer.exe [x]) -> FOUND
    • [RUN][HJNAME] HKUS\S-1-5-21-3984871074-3827112338-3617424434-1000\[...]\Run : Explorer (C:\Users\TxnerT\AppData\Local\Temp\Explorer\Explorer.exe [-]) -> FOUND
    • [RUN][SUSP PATH] HKUS\S-1-5-21-3984871074-3827112338-3617424434-1000\[...]\Run : Win Update (C:\Users\TxnerT\AppData\Local\Temp\Win Update\Win Update.exe [-]) -> FOUND
    • [RUN][HJNAME] HKUS\S-1-5-21-3984871074-3827112338-3617424434-1000\[...]\Run : (C:\Users\TxnerT\AppData\Roaming\Explorer\Explorer.exe [x]) -> FOUND
    • [V2][SUSP PATH] Windows Update Check - 0x0BC402F2 : C:\Users\TxnerT\AppData\Roaming\Microsoft\Windows\Start - Menu\Programs\Startup\zpyemhvct.exe [x][x] -> FOUND

    Place a checkmark each of these items, leave the others unchecked.
    Now press the Delete button.

    ...and the same for these items on the files tab please.
    • [ZeroAccess][Folder] U : C:\Windows\Installer\{c88a1a61-dc37-ee2a-c6fa-9ff7f7fc636d}\U [-] --> FOUND
    • [ZeroAccess][Folder] L : C:\Windows\Installer\{c88a1a61-dc37-ee2a-c6fa-9ff7f7fc636d}\L [-] --> FOUND
    • [ZeroAccess][Junction] en-US : C:\Program Files\Windows Defender\en-US >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpAsDesc.dll : C:\Program Files\Windows Defender\MpAsDesc.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpClient.dll : C:\Program Files\Windows Defender\MpClient.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpCmdRun.exe : C:\Program Files\Windows Defender\MpCmdRun.exe >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpCommu.dll : C:\Program Files\Windows Defender\MpCommu.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpEvMsg.dll : C:\Program Files\Windows Defender\MpEvMsg.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpOAV.dll : C:\Program Files\Windows Defender\MpOAV.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpRTP.dll : C:\Program Files\Windows Defender\MpRTP.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MpSvc.dll : C:\Program Files\Windows Defender\MpSvc.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MSASCui.exe : C:\Program Files\Windows Defender\MSASCui.exe >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MsMpCom.dll : C:\Program Files\Windows Defender\MsMpCom.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MsMpLics.dll : C:\Program Files\Windows Defender\MsMpLics.dll >> \systemroot\system32\config [-] --> FOUND
    • [ZeroAccess][Junction] MsMpRes.dll : C:\Program Files\Windows Defender\MsMpRes.dll >> \systemroot\system32\config [-] --> FOUND
    • [Aslr][File] services.exe : C:\Windows\System32\services.exe [-] --> FOUND

    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.






    Download Windows Repair by Tweaking.com and unzip the contents into a newly created folder on your desktop.
    • Now run Repair_Windows.exe by double clicking on it ( if you are running Vista or Win 7, use right click and select Run As Administrator)
    • Now select the Start Repairs tab.
    • The click the Start button.
    • Create a System Restore point if prompted.
    • On the next screen, click the Unselect All button to first deselect all repairs.
    • Now select the following repair options:
      • Reset Registry Permissions
      • Reset File Permissions
      • Register System Files
      • Repair WMI
      • Repair Windows Firewall
      • Remove Policies Set By Infections
      • Repair Winsock & DNS Cache
      • Repair Proxy Settings
      • Repair Windows Updates
      • Set Windows Services To Default Startup
    • Now on the lower right side check the box to Restart/Shutdown System When Finished
    • Then make sure the Restart System radio button is enabled.
    • Shutdown any other programs that you are running now before continuing.
    • Now click the Start button.
    • Be patient while the tool repairs the selected items.
    • It should reboot automatically when finished.

    After reboot, check to see if your firewall is working.



    Re run RogueKiller again, just a scan and attach log.
    Same for Hitman please.


    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. Vako

    Vako Private E-2

    Ok, first hitman pro could not connect to the net so I had to do the early warning thing for it to run.
    Roguekiller did not show the results it previosly had. Did all steps, when restarted a black screen came out saying HITMAN Pro version .....

    Fail and points to the dir where the zpyemhvct.exe is at, then logs back in

    When did the rest of the steps hitman came with the same result showing the darn zpyemhvct.exe again.. Below all logs..
     

    Attached Files:

  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Download and run OTM.


    Download OTM by Old Timer and save it to your Desktop.


    Code:
    :Files
    C:\Users\TxnerT\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zpyemhvct.exe
    
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large http://farm3.static.flickr.com/2782/4174320048_f01c448b32_o.png button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it in your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.



    Re run Hitman again, just a scan, and attach log for me to see.
     
  5. Vako

    Vako Private E-2

    All processes killed
    ========== FILES ==========
    File/Folder C:\Users\TxnerT\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zpyemhvct.exe not found.
    ========== COMMANDS ==========

    [EMPTYTEMP]

    User: All Users

    User: Default
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Default User
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    User: Public
    ->Temp folder emptied: 0 bytes

    User: TxnerT
    ->Temp folder emptied: 38260 bytes
    ->Temporary Internet Files folder emptied: 66729586 bytes
    ->Java cache emptied: 7767318 bytes
    ->FireFox cache emptied: 34006251 bytes
    ->Google Chrome cache emptied: 282738563 bytes
    ->Flash cache emptied: 1023 bytes

    User: UpdatusUser
    ->Temp folder emptied: 0 bytes
    ->Temporary Internet Files folder emptied: 0 bytes

    %systemdrive% .tmp files removed: 0 bytes
    %systemroot% .tmp files removed: 312489 bytes
    %systemroot%\System32 .tmp files removed: 0 bytes
    %systemroot%\System32 (64bit) .tmp files removed: 0 bytes
    %systemroot%\System32\drivers .tmp files removed: 0 bytes
    Windows Temp folder emptied: 15 bytes
    %systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 1381392732 bytes
    %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 61010 bytes
    RecycleBin emptied: 238415 bytes

    Total Files Cleaned = 1,691.00 mb


    OTM by OldTimer - Version 3.1.21.0 log created on 11042013_135537

    Files moved on Reboot...
    C:\Users\TxnerT\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat moved successfully.
    File C:\Windows\temp\~bd5D18.tmp not found!
    File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat scheduled to be moved on reboot.

    Registry entries deleted on Reboot...




    Code:
    HitmanPro 3.7.8.208
    www.hitmanpro.com
    
       Computer name . . . . : LEGEND
       Windows . . . . . . . : 6.1.1.7601.X64/4
       User name . . . . . . : Legend\TxnerT
       UAC . . . . . . . . . : Disabled
       License . . . . . . . : Free
    
       Scan date . . . . . . : 2013-11-04 14:16:32
       Scan mode . . . . . . : Normal
       Scan duration . . . . : 9m 0s
       Disk access mode  . . : Direct disk access (SRB)
       Cloud . . . . . . . . : Internet
       Reboot  . . . . . . . : No
    
       Threats . . . . . . . : 2
       Traces  . . . . . . . : 4
    
       Objects scanned . . . : 2,083,301
       Files scanned . . . . : 19,292
       Remnants scanned  . . : 558,523 files / 1,505,486 keys
    
    Malware _____________________________________________________________________
    
       C:\program files (x86)\common files\adobe\adobe flash player\flashplayer_update.exe
          Size . . . . . . . : 6,639,870 bytes
          Age  . . . . . . . : 576.5 days (2012-04-07 01:30:16)
          Entropy  . . . . . : 7.7
          SHA-256  . . . . . : 50A4463E5DDBDFAD509C8DD5DBCA0858486B8C9AF6AE2B89D463B937A582CF53
        > Emsisoft . . . . . : Trojan.Win32.CoinMiner!A2
          Fuzzy  . . . . . . : 101.0
          References
             HKU\S-1-5-21-3984871074-3827112338-3617424434-1000\Software\Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\program files (x86)\common files\adobe\adobe flash player\flashplayer_update.exe
    
       C:\Users\TxnerT\AppData\Roaming\vertex\vertex.exe
          Size . . . . . . . : 954,880 bytes
          Age  . . . . . . . : 2.0 days (2013-11-02 14:36:24)
          Entropy  . . . . . : 6.2
          SHA-256  . . . . . : E3B312BFFB8C5B24BD85C61340D780F4B78672DFFB1A31380AECBCDDF754D1F8
          Product  . . . . . : LoveByte
          Description  . . . : LoveByte
          Version  . . . . . : 1.0.0.0
          Copyright  . . . . : Copyright ©  2013
        > Kaspersky  . . . . : HEUR:Trojan.Win32.Generic
          Fuzzy  . . . . . . : 108.0
          Forensic Cluster
             -0.0s C:\Users\TxnerT\AppData\Roaming\vertex\
              0.0s C:\Users\TxnerT\AppData\Roaming\vertex\vertex.exe
              0.1s C:\Windows\Prefetch\VERTEX.EXE-7CA3C3A8.pf
              2.4s C:\Qoobox\Quarantine\C\Users\TxnerT\AppData\Roaming\r58Ies.tmp.vir
              2.6s C:\Users\TxnerT\AppData\Roaming\TxnerT.txt
    
    
    Potential Unwanted Programs _________________________________________________
    
       HKU\S-1-5-21-3984871074-3827112338-3617424434-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{4D2D3B0F-69BE-477A-90F5-FDDB05357975} (Claro)
    
    
    
     
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You can have Hitman delete the Potential Unwanted Program. :) Once you have... rescan with it, and check it's still there or not. Let me know. (It's a Claro reg entry)
     
  7. Vako

    Vako Private E-2

    What about the other 2 programs that say trojan?
     
  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    The adobe entry is not malware. Vertex was something I assumed you had installed. If not then have it delete it too.
     
  9. Vako

    Vako Private E-2

    Then we should be good. Thanks a lot :D
     
  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Most welcome! Safe surfing. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.

    7. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds