Приветствую. Популярный способ попадания вирусов на компьютер — установка их с нужным софтом. Скачивая взломанные программы, активированные игры, разные репаки, русифицированное ПО — вы рискуете получить вирус. Любой софт, который был модифицирован не производителем — может быть опасным.
Trojan:Win32/Zpevdo — что это такое?
Судя по официальному описанию — троян, который может получать команды на исполнение от хакера.
Угроза Trojan:Win32/Zpevdo обнаруживается защитником Windows Defender.
Может быть обнаружен в обновлении к игре Lineage, а также в MU Online, Endless War:
В большинстве случаев на игровых форумах пишут — ложная тревога, рекомендуют добавить в список исключений файл/целую папку игры.
На одном игровом форуме указана информация — антивирус определяет угрозу Trojan:Win32/Zpevdo из-за невозможности расшифровать некоторые exe/bin/dll-файлы. Проблема наблюдается у Avast, ESET NOD32, Avira, встроенном защитнике Windows.
Также обнаруживается в инструментах для взлома софта/игр (кряки, кейгены, активаторы).
Стоит учитывать — самодельный софт/компонент без цифровой подписи иногда расценивается как вирус.
После обнаружения угроза переносится в карантин (вкладка Журнал), откуда можно восстановить:
Trojan:Win32/Zpevdo — что это за троян?
Судя по официальной информации — классический троян.
Троян — вирус, который после попадания на ПК предоставляет возможность хакеру исполнять команды на удаленном компьютере.
Задача трояна — проникнуть на ПК, после чего установить связь с командным центром и выполнять команды.
Команды могут быть любые — копирование определенных файлов, создать архив профильных папок браузеров, копирование лицензий ПО, поиск файлов.
Обычно трояны предназначены для кражи конфиденциальной информации (пароли/логины), может присутствовать функция записи всех нажатых кнопок клавиатуры (кейлоггер).
Trojan:Win32/Zpevdo — как удалить?
Чтобы избавиться — существует два варианта:
Утилиты для проверки ПК:
После — устанавливаем Kaspersky Total Security, запускаем глубокое сканирование.
Данный способ позволит максимально эффективно просканировать компьютер на вирусы.
Заключение
Опасный файл также можете проверить на сервисе VirusTotal. скорее всего при обнаружении защитником Windows Defender — на VirusTotal картина будет еще хуже.
Win32 (Windows XP, Windows Vista, Windows Seven, Windows 8)
Метод заражения Zpevdo Trojan
Zpevdo Trojan копирует свои файл(ы) на ваш жёсткий диск. Типичное имя файла (random file).exe. Потом он создаёт ключ автозагрузки в реестре с именем Zpevdo Trojan и значением (random file).exe. Вы также можете найти его в списке процессов с именем (random file).exe или Zpevdo Trojan.
Если у вас есть дополнительные вопросы касательно Zpevdo Trojan, пожалуйста, заполните эту форму и мы вскоре свяжемся с вами.
Скачать утилиту для удаления
Скачайте эту программу и удалите Zpevdo Trojan and (random file).exe (закачка начнется автоматически):
* SpyHunter был разработан американской компанией EnigmaSoftware и способен удалить удалить Zpevdo Trojan в автоматическом режиме. Программа тестировалась на Windows XP, Windows Vista, Windows 7 и Windows 8.
Функции
Удаляет все файлы, созданные Zpevdo Trojan.
Удаляет все записи реестра, созданные Zpevdo Trojan.
Программа способна защищать файлы и настройки от вредоносного кода.
Программа может исправить проблемы с браузером и защищает настройки браузера.
Антивирусная поддержка в режиме 24/7 входит в комплект поставки.
Скачайте утилиту для удаления Zpevdo Trojan от российской компании Security Stronghold
Если вы не уверены какие файлы удалять, используйте нашу программу Утилиту для удаления Zpevdo Trojan.. Утилита для удаления Zpevdo Trojan найдет и полностью удалит Zpevdo Trojan и все проблемы связанные с вирусом Zpevdo Trojan. Быстрая, легкая в использовании утилита для удаления Zpevdo Trojan защитит ваш компьютер от угрозы Zpevdo Trojan которая вредит вашему компьютеру и нарушает вашу частную жизнь. Утилита для удаления Zpevdo Trojan сканирует ваши жесткие диски и реестр и удаляет любое проявление Zpevdo Trojan. Обычное антивирусное ПО бессильно против вредоносных таких программ, как Zpevdo Trojan. Скачать эту упрощенное средство удаления специально разработанное для решения проблем с Zpevdo Trojan и (random file).exe (закачка начнется автоматически):
Функции
Удаляет все файлы, созданные Zpevdo Trojan.
Удаляет все записи реестра, созданные Zpevdo Trojan.
Программа может исправить проблемы с браузером.
Иммунизирует систему.
Антивирусная поддержка в режиме 24/7 через систему GoToAssist входит в комплект поставки.
Наша служба поддержки готова решить вашу проблему с Zpevdo Trojan и удалить Zpevdo Trojan прямо сейчас!
Оставьте подробное описание вашей проблемы с Zpevdo Trojan в разделе Техническая поддержка. Наша служба поддержки свяжется с вами и предоставит вам пошаговое решение проблемы с Zpevdo Trojan. Пожалуйста, опишите вашу проблему как можно точнее. Это поможет нам предоставит вам наиболее эффективный метод удаления Zpevdo Trojan.
Как удалить Zpevdo Trojan вручную
Эта проблема может быть решена вручную, путём удаления ключей реестра и файлов связанных с Zpevdo Trojan, удалением его из списка автозагрузки и де-регистрацией всех связанных DLL файлов. Кроме того, отсутствующие DLL файлы должны быть восстановлены из дистрибутива ОС если они были повреждены Zpevdo Trojan.
Чтобы избавиться от Zpevdo Trojan, вам необходимо:
1. Завершить следующие процессы и удалить соответствующие файлы:
Предупреждение: вам необходимо удалить только файлы, контольные суммы которых, находятся в списке вредоносных. В вашей системе могут быть нужные файлы с такими же именами. Мы рекомендуем использовать Утилиту для удаления Zpevdo Trojan для безопасного решения проблемы.
2. Удалите следующие папки:
3. Удалите следующие ключи и\или значения ключей реестра:
Предупреждение: Если указаны значения ключей реестра, вы должны удалить только указанные значения и оставить сами ключи нетронутыми. Мы рекомендуем использовать Утилиту для удаления Zpevdo Trojan для безопасного решения проблемы.
Как предотвратить заражение рекламным ПО? Мы рекомендуем использовать Adguard:
4. Сбросить настройки браузеров
Zpevdo Trojan иногда может влиять на настройки вашего браузера, например подменять поиск и домашнюю страницу. Мы рекомендуем вам использовать бесплатную функцию «Сбросить настройки браузеров» в «Инструментах» в программе Spyhunter Remediation Tool для сброса настроек всех браузеров разом. Учтите, что перед этим вам надо удалить все файлы, папки и ключи реестра принадлежащие Zpevdo Trojan. Для сброса настроек браузеров вручную используйте данную инструкцию:
Для Internet Explorer
Если вы используете Windows XP, кликните Пуск, и Открыть. Введите следующее в поле Открыть без кавычек и нажмите Enter: «inetcpl.cpl».
Если вы используете Windows 7 или Windows Vista, кликните Пуск. Введите следующее в поле Искать без кавычек и нажмите Enter: «inetcpl.cpl».
Выберите вкладку Дополнительно
Под Сброс параметров браузера Internet Explorer, кликните Сброс. И нажмите Сброс ещё раз в открывшемся окне.
Выберите галочку Удалить личные настройки для удаления истории, восстановления поиска и домашней страницы.
После того как Internet Explorer завершит сброс, кликните Закрыть в диалоговом окне.
Предупреждение: В случае если это не сработает используйте бесплатную опцию Сбросить настройки браузеров в Инструменты в программе Spyhunter Remediation Tool.
Найдите папку установки Google Chrome по адресу: C:\Users\»имя пользователя»\AppData\Local\Google\Chrome\Application\User Data.
В папке User Data, найдите файл Default и переименуйте его в DefaultBackup.
Запустите Google Chrome и будет создан новый файл Default.
Настройки Google Chrome сброшены
Предупреждение: В случае если это не сработает используйте бесплатную опцию Сбросить настройки браузеров в Инструменты в программе Spyhunter Remediation Tool.
Для Mozilla Firefox
В меню выберите Помощь > Информация для решения проблем.
Кликните кнопку Сбросить Firefox.
После того, как Firefox завершит, он покажет окно и создаст папку на рабочем столе. Нажмите Завершить.
Предупреждение: Так вы потеряте выши пароли! Рекомендуем использовать бесплатную опцию Сбросить настройки браузеров в Инструменты в программе Spyhunter Remediation Tool.
If you see the message reporting that the Trojan:Win32/Zpevdo.B was identified on your computer, or in times when your computer system functions too slowly as well as give you a huge amount of migraines, you absolutely comprise your mind to scan it for Zpevdo and also tidy it in an appropriate way. Today I will certainly show to you just how to do it.
It is better to prevent, than repair and repent!
Most of Zpevdo are made use of to earn a profit on you. The criminals elaborates the variety of bad programs to take your credit card information, online banking credentials, and various other data for deceitful objectives.
Threat Summary:
Name
Zpevdo Trojan
Detection
Trojan:Win32/Zpevdo.B
Details
Zpevdo tool that looks legitimate but can take control of your computer.
Fix Tool
Kinds of viruses that were well-spread 10 years ago are no longer the source of the problem. Currently, the problem is more evident in the areas of blackmail or spyware. The challenge of taking care of these problems needs new tools and also new approaches.
Does your antivirus regularly report about the “Zpevdo”?
If you have actually seen a message showing the “Trojan:Win32/Zpevdo.B found”, after that it’s a piece of great news! The malware “Trojan:Win32/Zpevdo.B” was spotted as well as, probably, deleted. Such messages do not imply that there was a truly active Zpevdo on your gadget. You can have simply downloaded and install a documents which contained Trojan:Win32/Zpevdo.B, so your anti-virus software automatically erased it before it was released as well as triggered the difficulties. Additionally, the malicious manuscript on the contaminated website could have been discovered and also protected against prior to triggering any type of troubles.
Microsoft Defender: “Trojan:Win32/Zpevdo.B”
In other words, the message “Trojan:Win32/Zpevdo.B Found” during the common use your computer does not imply that the Zpevdo has actually completed its objective. If you see such a message after that maybe the proof of you going to the infected page or loading the destructive documents. Try to avoid it in the future, but don’t bother way too much. Explore opening the antivirus program as well as examining the Trojan:Win32/Zpevdo.B detection log data. This will provide you more info regarding what the specific Zpevdo was found as well as what was especially done by your anti-virus software program with it. Of course, if you’re not certain sufficient, refer to the manual scan– at any rate, this will certainly be helpful.
How to scan for malware, spyware, ransomware, adware, and other threats.
If your system operates in an exceptionally slow way, the website open in a weird fashion, or if you see ads in the position you’ve never ever anticipated, it’s feasible that your computer obtained infected and also the infection is currently active. Spyware will track all your tasks or reroute your search or home pages to the areas you don’t intend to check out. Adware may infect your internet browser as well as also the whole Windows OS, whereas the ransomware will attempt to obstruct your PC and also demand a significant ransom money quantity for your very own documents.
Regardless of the sort of trouble with your PC, the very first step is to check it with Gridinsoft Anti-Malware. This is the best anti-malware to find and cure your computer. Nevertheless, it’s not a simple antivirus software. Its goal is to fight contemporary threats. Now it is the only product on the market that can just clean up the PC from spyware as well as various other viruses that aren’t even detected by normal antivirus programs. Download, mount, and also run Gridinsoft Anti-Malware, then check your PC. It will assist you through the system clean-up procedure. You do not need to get a license to cleanse your PC, the preliminary permit gives you 6 days of an entirely free trial. Nevertheless, if you intend to secure yourself from long-term hazards, you possibly require to think about acquiring the license. By doing this we can guarantee that your computer will no longer be infected with viruses.
How to scan your PC for Trojan:Win32/Zpevdo.B?
To scan your computer for Zpevdo and to remove all identified malware, you need to get an antivirus. The existing variations of Windows include Microsoft Defender — the built-in antivirus by Microsoft. Microsoft Defender is generally quite good, nonetheless, it’s not the only thing you need to find. In our point of view, the very best antivirus software is to utilize Microsoft Defender in combo with Gridinsoft.
This way, you might obtain a complicated defense against the selection of malware. To look for viruses in Microsoft Defender, open it as well as start fresh check. It will extensively scan your device for pc virus. And also, obviously, Microsoft Defender works in the background by default. The tandem of Microsoft Defender and Gridinsoft will establish you free of the majority of the malware you could ever come across. Consistently arranged checks may likewise secure your device in the future.
Use Safe Mode to fix the most complex Trojan:Win32/Zpevdo.B issues.
If you have Trojan:Win32/Zpevdo.B type that can hardly be eliminated, you might require to think about scanning for malware beyond the usual Windows functionality. For this purpose, you require to start Windows in Safe Mode, thus stopping the system from loading auto-startup items, possibly including malware. Start Microsoft Defender examination and after that scan with Gridinsoft in Safe Mode. This will aid you discover the infections that can not be tracked in the normal mode.
Use Gridinsoft to remove Zpevdo and other junkware.
It’s not sufficient to merely use the antivirus for the security of your computer. You require to have an extra detailed antivirus solution. Not all malware can be identified by typical antivirus scanners that largely try to find virus-type hazards. Your system might teem with “trash”, for instance, toolbars, internet browser plugins, unethical internet search engines, bitcoin-miners, as well as various other types of unwanted programs used for making money on your inexperience. Be cautious while downloading programs on the internet to prevent your gadget from being loaded with unwanted toolbars as well as various other scrap information.
Nevertheless, if your system has actually currently obtained a particular unwanted application, you will certainly make your mind to delete it. Most of the antivirus programs are uncommitted about PUAs (potentially unwanted applications). To get rid of such software, I suggest buying Gridinsoft Anti-Malware. If you use it periodically for scanning your PC, it will assist you to remove malware that was missed by your antivirus program.
Frequently Asked Questions
🤔 How Do I Know My Windows 10 PC Has Trojan:Win32/Zpevdo.B?
Take note that the symptoms above could also arise from other technical reasons. However, just to be on the safe side, we suggest that you proactively check whether you do have malicious software on your computer. One way to do that is by running a malware scanner.
🤔 How to scan my PC with Microsoft Defender?
If you want to save some time or your start menu isn’t working correctly, you can use Windows key + R on your keyboard to open the Run dialog box and type “windowsdefender” and then pressing enter.
From the Virus & protection page, you can see some stats from recent scans, including the latest type of scan and if any threats were found. If there were threats, you can select the Protection history link to see recent activity.
If the guide doesn’t help you to remove Trojan:Win32/Zpevdo.B virus, please download the GridinSoft Anti-Malware that I recommended. Also, you can always ask me in the comments for getting help.
Written by Tomas Meskauskas on 14 October 2021 (updated)
What is Win32/Zpevdo?
Win32/Zpevdo is high-risk trojan designed to modify Windows Firewall settings. This malware typically infiltrates systems when another trojan is installed (a result of «chain infections») or when users visit malicious websites. The presence of Win32/Zpevdo trojan makes the system more vulnerable to other infections.
As mentioned above, Win32/Zpevdo modifies Windows Firewall settings. Specifically, it runs a number of commands to add certain rules. Be aware that Windows Firewall is extremely important for system security. This component is responsible for controlling incoming/outgoing network traffic.
For instance, it might block malicious websites (prevent users from inadvertently visiting them), block harmful communications/traffic and applications that are initiating these connections. Windows Firewall can be configured and, by default, determines a number of rules that are followed when handling network data transactions.
These rules can be modified and certain exceptions can be added. This is useful for advanced users, however, cyber criminals can take advantage and use malicious applications (such as Win32/Zpevdo) to perform such modifications. They can add exceptions/rules that enable malicious traffic, and thus the system becomes vulnerable.
In effect, Windows Firewall might simply stop blocking malicious traffic, which can lead to further system infections.
Threat Summary:
Name
Win32/Zpevdo virus
Threat Type
System modification trojan, Windows Firewall hijacker.
Detection Names (BitTorrent.exe)
Avast (Win32:SaliCode), BitDefender (Win32.Sality.3), ESET-NOD32 (Win32/Sality.NBA), Kaspersky (Virus.Win32.Sality.gen), Full List (VirusTotal)
Symptoms
Trojans are designed to stealthily infiltrate victim’s computer and remain silent, and thus no particular symptoms are clearly visible on an infected machine.
Distribution methods
Infected email attachments, malicious online advertisements, social engineering, software cracks.
Damage
Stolen banking information, passwords, identity theft, victim’s computer added to a botnet.
Malware Removal (Windows)
To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner. ▼ Download Combo Cleaner To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
There are many trojan-type infections on the internet including, for example, Dynamer, Emotet, Megalodon, Hancitor, and TrickBot.
These infections often record personal data (e.g., logins/passwords, banking information, keystrokes, etc.) or inject malware with other infections. Modifying Windows Firewall settings is quite unusual behavior, however, all of these infections pose a significant threat to your privacy and computer safety. Therefore, you should eliminate these threats immediately.
How did Win32/Zpevdo infiltrate my computer?
Cyber criminals typically proliferate Win32/Zpevdo using other trojans and malicious websites. Trojans cause «chain infections». They stealthily infiltrate the system, and continue to inject it with additional malware. Malicious websites execute scripts that stealthily download and install malware.
Trojans of this type are often proliferated using spam email campaigns, fake software updaters/cracks, and third party software download sources. Spam campaigns are used to send hundreds of thousands of emails that contain deceptive messages encouraging users to open attached malicious links/files.
Fake updaters infect systems by exploiting outdated software bugs/flaws or simply downloading and installing malware rather than updates. Cracks also have similar behavior. Their purpose is to activate paid software free of charge, however, most cracking tools are fake and cyber criminals use them to proliferate malware.
Thus, users are much more likely to infect computers rather than gaining access to paid features.
Third party download sources (e.g., peer-to-peer [P2P] networks, freeware download websites, free file hosting sites, etc.) present malware as legitimate software. In doing so, cyber criminals trick users into manually downloading and installing malware. In summary, the main reasons for computer infections are poor knowledge and careless behavior.
How to avoid installation of malware?
The key to computer safety is caution. Therefore, to prevent this situation, be very cautious when browsing the internet and downloading/installing software. Handle all email attachments with care. Files/links received from suspicious email addresses should never be opened. Attachments that are irrelevant should also be ignored.
Download your apps from official sources only, preferably using direct download links. Third party download/installation tools often include malware, and thus these tools should never be used.
The same applies to software updates. Keeping installed applications/operating systems up-to-date is paramount, however, use implemented functions or tools provided by the official developer only. Be aware that software piracy is a cyber crime/illegal. Furthermore, the risk of system infections is extremely high.
Therefore, never consider cracking installed applications. Have a reputable anti-virus/anti-spyware suite installed and running. This software can detect and eliminate malware before the system is harmed. If you believe that your computer is already infected, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate infiltrated malware.
Win32/Zpevdo detections in various malware databases:
Instant automatic malware removal: Manual threat removal might be a lengthy and complicated process that requires advanced computer skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below: ▼ DOWNLOAD Combo Cleaner By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by Rcs Lt, the parent company of PCRisk.com read more.
Quick menu:
How to remove malware manually?
To remove this malware we recommend using Combo Cleaner Antivirus for Windows. If you wish to remove malware manually, the first step is to identify the name of the malware that you are trying to remove. Here is an example of a suspicious program running on a user’s computer:
If you checked the list of programs running on your computer, for example, using task manager, and identified a program that looks suspicious, you should continue with these steps:
Download a program called Autoruns. This program shows auto-start applications, Registry, and file system locations:
Restart your computer into Safe Mode:
Windows XP and Windows 7 users: Start your computer in Safe Mode. Click Start, click Shut Down, click Restart, click OK. During your computer start process, press the F8 key on your keyboard multiple times until you see the Windows Advanced Option menu, and then select Safe Mode with Networking from the list.
Video showing how to start Windows 7 in «Safe Mode with Networking»:
Your computer will now restart into the «Advanced Startup options menu». Click the «Troubleshoot» button, and then click the «Advanced options» button. In the advanced option screen, click «Startup settings». Click the «Restart» button. Your PC will restart into the Startup Settings screen. Press F5 to boot in Safe Mode with Networking.
Video showing how to start Windows 8 in «Safe Mode with Networking»:
Windows 10 users: Click the Windows logo and select the Power icon. In the opened menu click «Restart» while holding «Shift» button on your keyboard. In the «choose an option» window click on the «Troubleshoot», next select «Advanced options». In the advanced options menu select «Startup Settings» and click on the «Restart» button.
In the following window you should click the «F5» button on your keyboard. This will restart your operating system in safe mode with networking.
Video showing how to start Windows 10 in «Safe Mode with Networking»:
Extract the downloaded archive and run the Autoruns.exe file.
In the Autoruns application, click «Options» at the top and uncheck the «Hide Empty Locations» and «Hide Windows Entries» options. After this procedure, click the «Refresh» icon.
Check the list provided by the Autoruns application and locate the malware file that you want to eliminate.
You should write down its full path and name. Note that some malware hides process names under legitimate Windows process names. At this stage, it is very important to avoid removing system files. After you locate the suspicious program you wish to remove, right click your mouse over its name and choose «Delete».
After removing the malware through the Autoruns application (this ensures that the malware will not run automatically on the next system startup), you should search for the malware name on your computer. Be sure to enable hidden files and folders before proceeding. If you find the filename of the malware, be sure to remove it.
Reboot your computer in normal mode. Following these steps should remove any malware from your computer. Note that manual threat removal requires advanced computer skills. If you do not have these skills, leave malware removal to antivirus and anti-malware programs.
These steps might not work with advanced malware infections. As always it is best to prevent infection than try to remove malware later. To keep your computer safe, install the latest operating system updates and use antivirus software.
To be sure your computer is free of malware infections, we recommend scanning it with Combo Cleaner Antivirus for Windows.
Click to post a comment
About the author:
I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats. Contact Tomas Meskauskas.
PCrisk security portal is brought by a company RCS LT. Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.
Our malware removal guides are free. However, if you want to support us you can send us a donation.
PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.
Global malware activity level today:
Increased attack rate of infections detected within the last 24 hours.