Jump to content

Recommended Posts

Hi, 

I've been having a wacatac problem for years now. Two powershell windows on startup. Windows security notices it but doesn't do anything about it. Malwarebytes doesn't notice it. 

Read the forums and what I've understood is that every fix is individual. 

Could you give me a hand in the matter? 

Link to post
Share on other sites

  • Replies 50
  • Created
  • Last Reply

Top Posters In This Topic

  • Root Admin

Good day @Skele and :welcome:

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 
Spoiler

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

Correction. Malwarebytes did notice a PUP.optional.ebon and quarantined it. This has appeared several times before. Either the scanning and trying to remove wacatac reduced the powershell windlws to one or quarantining that reduced it to one. 

Link to post
Share on other sites

  • Root Admin

Windows Defender believes this file is a Trojan. If Windows Defender has not deleted it already I'd recommend you delete it.

C:\Users\TRSkele\Desktop\Siirto\KTK\Raportityms.rar

 

Are mounting virtual drivers with Power ISO?
Not sure you need to launch it every time the computer starts, but up to you.

HKLM-x32\...\Run: [PWRISOVM.EXE] => C:\Program Files\PowerISO\PWRISOVM.EXE [455872 2020-06-22] (Power Software Limited -> Power Software Ltd)

 

Please uninstall the following from Control Panel

CCleaner  (computer experts no longer recommend this program)
Adobe Flash Player 32 NPAPI (Flash is no longer supported)

 

 

Please run the following fix after uninstalling the items above. Then, once the fix has been completed, please attach the FIXLOG.txt file on your next reply.

 

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.
NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

Please make sure you disable any real-time antivirus or security software before running this script. Once completed, make sure you re-enable it.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1:  This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed. The use of an external password manager is highly recommended instead of using your browser to store passwords.

NOTE-3: As part of this fix it will also reset the network to default settings including the firewall. If you have custom firewall rules you need to save please export or save them first before running this fix.

The following directories are emptied:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome, and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Discord cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.

fixlist.txt

Thanks

 

Link to post
Share on other sites

Hi,

Removed the rar and PowerISO. Because I don't need them anymore.

I did not remove CCleaner or Flash. I need both of them.

Ran the fixlist. Took about 30 minutes. It restarted the computer. Did it's thing. I logged in.

Still got one powershell pop-up. Opened my browser, which remembered the site I was last on and remembered account names. Good thing I don't save my passwords.

Interesting thing is, I've got a G15 keyboard which tells me things like network usage. My computer downloaded something a bit after the restart. Checked windows update. Wasn't that one. There's nothing else that does that without a prompt.

Fixlog.txt

Link to post
Share on other sites

  • Root Admin

Not sure where or how you're using Flash. Adobe has discontinued it and websites using it are at great risk of having their website infected as well as infecting user's computers.

https://www.adobe.com/products/flashplayer/end-of-life.html

 

From the log

Windows Resource Protection found corrupt files and successfully repaired them.

 

Please run the following and post back the log when done.

Microsoft Safety Scanner

Please make sure you Exit out of any other program you might have open so that the sole task is to run the following scan.   
That goes especially for web browsers, make sure all are fully exited out of and messenger programs are exited and closed as well
 

STEP 1

Please set File Explorer to SHOW ALL folders, all files, including hidden ones.  Use OPTION ONE or TWO of this article

https://www.tenforums.com/tutorials/7078-turn-off-show-all-folders-windows-10-navigation-pane.html

STEP 2

I suggest a new scan for viruses & other malware. This may take several hours, depending on the number of files on the system and the speed of the computer.

The Microsoft Safety Scanner is a free Microsoft stand-alone virus scanner that can be used to scan for & remove malware or potentially unwanted software from a system. 

The download links & the how-to-run-the tool are at this link at Microsoft 

https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download

 

Look on the Scan Options & select the FULL scan.

Then start the scan. Have lots of patience. It may take several hours.

  • Once you see it has started, take a long long break;  walk away.  Do not pay credence if you see some intermediate early flash messages on the screen display.  The only things that count are the End result at the end of the run.
  • The scan will take several hours.  Leave it alone. It will remove any other remaining threats as it goes along.  Take a very long break, do your normal personal errands .....just do not use the computer during this scan.

This is likely to run for many hours as previously mentioned  ( depending on the number of files on your machine & the speed of the hardware.)

The log is named MSERT.log  and the log will be at C:\Windows\debug\msert.log

Please attach that log with your next reply.

 

 

It is normal for the Microsoft Safety Scanner to show detections during the scan process. It is scanning for basically all bread crumbs or traces of files and registry entries that "might" be or have been part of some infection or previous infection.

That DOES NOT mean the computer is infected. Once the scan has been completed it uploads the log to their Cloud service which then uses Artificial Intelligence to determine if in fact any of the traces are an infection or not.

Then it writes into the log on your computer what it found.

 

Thanks

 

Link to post
Share on other sites

A quick synopsis of the amount of time things took.

When I did the first part (Malwarebytes to Farbar) the restart speed was alot faster.

Before I did the Microsoft Safety Scanner, the speed of the restart was slower before going to the password screen. (Might be a driver thinking to himself about his life choices now that he finished re-hab or something more sinister.) One good thing. There was no powershell window at that restart. Might be that the one I saw was a false positive or I just didn't happen to see it in time or it's hiding. Who knows.

Microsoft Safety Scanner didn't find anything so I hope that's good. Either that or the viruses have destroyed more than they should have. One thing that bothers me is the "AntivirusEnabled = False" in the fixlog. But hey, you're the expert.

An extra thing thanks to my keyboard. Half of my RAM is in use (usually it's 10 %). Checked task manager and the one that uses it the most seems to be Sysmain and Firefox (I'm using Firefox to access this forum). But the maximum amount they use is about 700 MB out of 16 GB.

RAMusage.jpg

msert.log

Link to post
Share on other sites

  • Root Admin

No, hopefully, we've gotten rid of the PowerShell attack. The memory is fine, you have a lot of things running. That's what 16GB of RAM is for.

I'm running 64GB of RAM and not too much running and it sucks up quite a bit too which is normal.

image.png

 

Please temporarily exit out of Malwarebytes and run the following

 

SecurityCheck by glax24              

I would like you to run a tool named SecurityCheck to inquire about the current security update status of some applications.

  • Download SecurityCheck by glax24: https://tools.safezone.cc/glax24/SecurityCheck/SecurityCheck.exe
  • If Microsoft SmartScreen blocks the download, click through to save the file
  • This tool is safe.   Smartscreen is overly sensitive.
  • If SmartScreen blocks the file from running click on More info and Run anyway
  • Right-click  with your mouse on the Securitycheck.exe  and select "Run as administrator"  and reply YES to allow to run & go forward
  • Wait for the scan to finish. It will open a text file named SecurityCheck.txt Close the file.  Attach it with your next reply.
  • You can find this file in a folder called SecurityCheck, C:\SecurityCheck\SecurityCheck.txt

 

image.png

image.png

image.png

 

Thank you

 

 

Link to post
Share on other sites

Shut down Malwarebytes.

Ran the SecurityCheck with administrator privileges. Went well, except the one pop-up (How's your cyrillic). Wife translated it to being almost the same as the last English message about log being complete.

Started Malwarebytes again.

Extra: Did a scan with Malwarebytes when I woke up (hours before your last message), just to check if MB has anything to say about the extra memory usage. Didn't say anything, but I added the log just in case.

Howsyourcyrillic.jpg

SecurityCheck.txt MBscan090720221024.txt

Link to post
Share on other sites

Had to restart the computer, because of a thunderstorm.

Checked the RAM usage again and this time it's back to normal. 10% usage. Malwarebytes is using most of it. Sysmain is using 80 MB, not the 400 MB it was using. No powershell pop-ups.

The reason why I'm suspicious about it, is that, according to howtofix.guide, Wacatac:

  • Creates RWX memory. There is a security trick with memory regions that allows an attacker to fill a buffer with a shellcode and then execute it. Filling a buffer with a shellcode isn’t a big deal. It’s just data. The problem arises when the attacker can control the instruction pointer (EIP), usually by corrupting a function’s stack frame using a stack-based buffer overflow and then changing the execution flow by assigning this pointer to the address of the shellcode.

I don't know if this means that it could basically make a reg-file (or similar) that starts a program through RAM, which would execute when the computer is restarted. You probably know better what the howtofix description means.ce: https://howtofix.guide/trojanwin32-wacatac-bml/hfddjhdf

Link to post
Share on other sites

  • Root Admin

We're not done. We'll be doing more scans. I'm busy this weekend so I may or may not reply until Sunday or Monday

 

Please Uninstall, Update, or otherwise address the following as appropriate for your computer.

 

-------------------------- [ SecurityUtilities ] --------------------------

KeePass Password Safe 2.46 v.2.46 Warning! Download Update


--------------------------- [ OtherUtilities ] ----------------------------

Notepad++ (64-bit x64) v.8.1.4 Warning! Download Update

OpenOffice 4.1.7 v.4.17.9800 Warning! Download Update


------------------------------ [ ArchAndFM ] ------------------------------

WinRAR 5.91 (64-bit) v.5.91.0 Warning! Download Update


------------------------------- [ Imaging ] -------------------------------

GIMP 2.10.24 v.2.10.24 Warning! Download Update


-------------------------- [ IMAndCollaborate ] ---------------------------

Discord v.0.0.309 Warning! Download Update

-------------------------------- [ Java ] ---------------------------------

Java 8 Update 331 (64-bit) v.8.0.3310.9 Warning! Download Update
Uninstall old version and install new one (jre-8u333-windows-x64.exe).

-------------------------------- [ Media ] --------------------------------

VLC media player v.3.0.16 Warning! Download Update

--------------------------- [ AdobeProduction ] ---------------------------
Adobe Flash Player 32 NPAPI v.32.0.0.465 Warning! This software is no longer supported. Please uninstall it.


---------------------------- [ UnwantedApps ] -----------------------------
CCleaner v.6.01 Warning! Suspected demo version of anti-spyware, driver updater or optimizer. If this program is not familiar to you it is recommended to uninstall it and execute PC scanning using Malwarebytes Anti-Malware. Possible you became a victim of fraud or social engineering. Computer experts no longer recommend this program.

 

 

When done, then run the following 3rd party Antivirus scanner

 

 

Let me have you run a different scanner to double-check. I don't expect it to find anything, but no harm in checking.

I would suggest a free scan with the ESET Online Scanner

Go to https://download.eset.com/com/eset/tools/online_scanner/latest/esetonlinescanner.exe

  • It will start a download of "esetonlinescanner.exe"
  • Save the file to your system, such as the Downloads folder, or else to the Desktop.
  • Go to the saved file, and double click it to get it started. 
  • When presented with the initial ESET options, click on "Computer Scan".
  • Next, when prompted by Windows, allow it to start by clicking Yes 
  • When prompted for scan type, Click on Full scan 
  • Look at & tick  ( select )   the radio selection "Enable ESET to detect and quarantine potentially unwanted applications"   and click on the Start scan button.
  • Have patience.  The entire process may take an hour or more. There is an initial update download.
  • There is a progress window display.
  • You should ignore all prompts to get the ESET antivirus software program.   ( e.g. their standard program).   You do not need to buy or get or install anything else.
  • When the scan is completed, if something was found, it will show a screen with the number of detected items.  If so, click the button marked “View detected results”.
  • Click The blue “Save scan log” to save the log.
  • If something was removed and you know it is a false finding, you may click on the blue ”Restore cleaned files”  ( in blue, at the bottom).
  • Press Continue when all done.  You should click to off the offer for “periodic scanning”.

 

Note: If you do need to do a File Restore from ESET please follow the directions below

[KB2915] Restore files quarantined by the ESET Online Scanner version 3

https://support.eset.com/en/kb2915-restore-files-quarantined-by-the-eset-online-scanner

 

Link to post
Share on other sites

No, worries. I'm on vacation so I have time to wait. 

Updated:

- keepass

- notepad ++

- winrar

- gimp

- discord

- vlc

- java

Removed:

- openoffice

- npapi (I might need it but we'll see) 

Didn't do anything about CCleaner. If you can recommend a free registry file cleaner, I might remove it. If not, it will stay. That's basically the only thing I use it for. 

I started the Eset scan. I will send the results after about 6-8 hours, unless I wake up in the middle of the night. 

Link to post
Share on other sites

There's not much difference. Only difference I see is the speed of starting the system, lack of powershell windows, lack of windows defender alerts (haven't tested it yet) and the knowledge that even reliable chinese laser manufacturers can infect you.

The reason why I haven't touched the subject so far is that I hadn't realized that windows defender wasn't able to remove wacatac. When I started looking into it, the MB forums seemed to have the best advice and even though I don't like keeping Malwarebytes on my computer all the time, I saw you as a reliable source.

Link to post
Share on other sites

  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following to help you better protect your computer and privacy Tips to help protect from infection

Thank you

 

 

Link to post
Share on other sites

  • Root Admin

Please run the following scans. I'll check back on  you again sometime tomorrow.

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 
Spoiler

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.