How to Remove the YPSX_CLOUD, Agile2.vbs, YTPX Malware

A new malware emerged in the 1st week of August 2023 that has infected many computers already. The origin of the malware is yet to be traced, but the malware adds six scheduled tasks, each of which runs rhc.exe, wscript.exe agile2.vbs, ytcheckts.vbs, and php.exe.

Here’s how to remove the infection.

Resolution

Step 1: Run TrendMicro online scanner

First, run TrendMicro Online Scanner, as it seems to be effective for this malware. Please visit the following link to download the scanner.

Free Online Virus Scan | Trend Micro: https://www.trendmicro.com/en_in/forHome/products/housecall.html


(Img Src: Microsoft Answers)


Step 2: Remove the rogue tasks and folders

Option 1: Run ypsx_remove.bat

  • Download ypsx_remove.bat (zipped) and save it to the desktop.
  • Unzip the archive and extract the Batch file to the desktop.
  • Right-click “ypsx_remove.bat” and choose Run as administrator.

The batch file removes the rogue scheduled tasks and the folders typically added by the malware.




Option 2: Run the commands manually.

Open an admin Command Prompt and run these commands one by one:

schtasks.exe /delete /tn "\WDNA" /f
schtasks.exe /delete /tn "\WDNA_LG" /f
schtasks.exe /delete /tn "\YTPX Cloud LG" /f
schtasks.exe /delete /tn "\YTPXCheck" /f
schtasks.exe /delete /tn "\YTPXCheck LG" /f
schtasks.exe /delete /tn "\VSPXService" /f
schtasks.exe /delete /tn "\VSPXService_LG" /f
schtasks.exe /delete /tn "\WNVIDIA_FACTORY_LG" /f
schtasks.exe /delete /tn "\wupdatecloud" /f
schtasks.exe /delete /tn "\wupdatecloud_LG" /f
schtasks.exe /delete /tn "\ServiceGPUTaskUpdate" /f
schtasks.exe /delete /tn "\APTXService" /f
schtasks.exe /delete /tn "\APTXService_LG" /f
schtasks.exe /delete /tn "\Window Update" /f
taskkill /f /im php.exe
taskkill /f /im rhc.exe
rd /s /q "%AppData%\ypsx_cloud_v2"
rd /s /q "%AppData%\wupdater_cloud"
rd /s /q "%AppData%\ContentCloud"
rd /s /q "%LocalAppData%\wupdater_cloud"
rd /s /q "%LocalAppData%\ContentCloud"
rd /s /q "%LocalAppData%\CDContent"
rd /s /q "%LocalAppData%\WDZCloud"
rd /s /q "%LocalAppData%\ypsx_cloud_v2"
rd /s /q "%LocalAppData%\updates"
rd /s /q "%LocalAppData%\HintonJer"
rd /s /q "%LocalAppData%\KbLobs"
rd /s /q "%LocalAppData%\wtraff_cloud"

powershell.exe -command gci $env:Appdata -filter 'rhc.exe' -depth 3
powershell.exe -command gci $env:LocalAppdata -filter 'rhc.exe' -depth 3

The last two commands verify if the unneeded program still exists (perhaps under a different folder name) on the disk. If rhc.exe appears in the directory listing, delete the parent folder manually.

Important

The above Batch file removes the entries typically added by this specific malware. Your computer may be infected by a different version of this malware that uses other folder names. Following up with a manual verification using Autoruns or the Farbar Scanner tool is best.


One small request: If you liked this post, please share this?

One "tiny" share from you would seriously help a lot with the growth of this blog. Some great suggestions:
  • Pin it!
  • Share it to your favorite blog + Facebook, Reddit
  • Tweet it!
So thank you so much for your support. It won't take more than 10 seconds of your time. The share buttons are right below. :)

Ramesh Srinivasan is passionate about Microsoft technologies and he has been a consecutive ten-time recipient of the Microsoft Most Valuable Professional award in the Windows Shell/Desktop Experience category, from 2003 to 2012. He loves to troubleshoot and write about Windows. Ramesh founded Winhelponline.com in 2005.

Leave a Comment