Install the app
How to install the app on iOS

Follow along with the video below to see how to install our site as a web app on your home screen.

Note: This feature may not be available in some browsers.

Here's A Possible Virus

DVDR_Dog

Ultimate Donator
Donator
VIP
Joined
Nov 5, 2018
Messages
2,971
I suspect I must have picked this up when installing a crack.
About every 15 minutes or so and some event sets it off.
What happens is a Powershell window pops up just for a second or less. I have been unable to determine much about it since it happens so quickly. From what I see (but don't believe) is something about a a validation count.
I think it had something related to a patch that was supposed to be a fix for Revo.
Doesn't matter, time for a fresh install when stuff like this happens.
Anybody have any ideas? Two A/V programs can't find anything. It's just that power shell program executing so often can't be good.
 
Reset your Browser settings.

Other thing is check your scheduled events. Ive had this kind of attack a lot in the past, but I dont get the issue ony more. If I do, just do a reset and sorted.
 
I wiped the system, I am paranoid. Just wondering what this program was doing. I thought it was a bit strange when there was an additional step for the install. I guess I was in a hurry.
 
OK here's the answer. The program that carries the payload is YT Saver. Too bad it's the one program that works. The payload is using powershell to contact "activatorcounter com" at 104.21.41.88 port 443, and IP 172.67.163.70 port 443. I haven't had time to reverse engineer the program, it's got a bunch of modules. I have the program blocked w/firewall so it keeps trying quite a lot.
I have blocked the program outbound connections until I find another working replacement.
 
Chuck 7 Zip at the exe installer and unpack it.

If they are a set of bodge artisits that packed it just delete out of it what you dont want and repack it.

If they used Install shield youll get a nag saying the program didnt load but it will.
 
OK here's the answer. The program that carries the payload is YT Saver. Too bad it's the one program that works. The payload is using powershell to contact "activatorcounter com" at 104.21.41.88 port 443, and IP 172.67.163.70 port 443. I haven't had time to reverse engineer the program, it's got a bunch of modules. I have the program blocked w/firewall so it keeps trying quite a lot.
I have blocked the program outbound connections until I find another working replacement.
I´m having 3 of those powershell windows blinking fast when computer restart, I can´t reas what is that about. Could you please explain how do you catch this virus?
 
You dont catch virus or malware just get rid of it.

1. Right click on your task bar and select "TASK MANAGER"

2. If only the processes list is visible click on SHOW MORE or DETAILS so that you get multiple tabs across the top.

3. Select STARTUP APPS

4. This is a list of all the programs that like to be loaded when the system boots. Some are completely unnecessary right click on the ones you which to disable and select disable in the list.

5. Once youve removed the ones you think you dont need (you can always enable them later) best to do a restart and see if the issue of shell windows is gone

6. If it is then all is good, mostly powershell or cmd calls are done to install drivers for hardware at the start of the load. Some older tools require the loading in this way.

7. If its still there, chack the list again and look for something you know isnt on your PC. Again disable it.

This method is just for the basic junk that gets attached to links on web pages. I would advise that you run a complete . FULL SCAN with a virus scanner and also run MALWAREBYTES it is free to use manually and you can pay subs on it too, entirely your choice

If its still there after this then let us know
 
You dont catch virus or malware just get rid of it.

1. Right click on your task bar and select "TASK MANAGER"

2. If only the processes list is visible click on SHOW MORE or DETAILS so that you get multiple tabs across the top.

3. Select STARTUP APPS

4. This is a list of all the programs that like to be loaded when the system boots. Some are completely unnecessary right click on the ones you which to disable and select disable in the list.

5. Once youve removed the ones you think you dont need (you can always enable them later) best to do a restart and see if the issue of shell windows is gone

6. If it is then all is good, mostly powershell or cmd calls are done to install drivers for hardware at the start of the load. Some older tools require the loading in this way.

7. If its still there, chack the list again and look for something you know isnt on your PC. Again disable it.

This method is just for the basic junk that gets attached to links on web pages. I would advise that you run a complete . FULL SCAN with a virus scanner and also run MALWAREBYTES it is free to use manually and you can pay subs on it too, entirely your choice

If its still there after this then let us know
I followed you recommendations, it seems that Malwarebytes resolved the problem, thank you,
 
Process Lasso is great "IF" you know about it and have it installed.

Some of the junk Ive come across since 1979 tends to inhibit the loading or installing of anything that can get rid of it

I think the all time classic one, simple code limited the use of the PC to 30 seconds then forced it to reset. Took me a while to work out what was happening. Nothing listed in the Task Manager and didnt have enough time to get into services. Spin up HDD and 128MB of ram and processors slower than my watch had, thin it was early 2000s.
Finally ended up ripping the hard drive out of the PC and stuck it in a dock. God didnt help. Some clever little person had tied the code into the boot.ini file and tucked the 32kb file away in the windows folder. A stunning little device it was, LSS if the names right. Wrote a sscript to junk it on reboot.

<Wanders off down memory lane>
 
You really have to watch those powershell calls. They are "hit and run" trojans. In my case this was embedded in the installation code. It wasn't obvious how it was packed, I suspect it was a one -time insertion into the sys32 folder. It wasn't a separate piece of code, it may have been wrapped into a .dll.
It's worthy of note virustotal, Windows Defender and my resident Malwarebytes full install all cleared the pre-install code and still clear after the installation. I spent some time looking for the infected code but gave up.
The code in question was in iDownerGo 10.2.1 Multilingual. There's the first tell, no group name on the release. Something to keep in mind. This program is a YouTube downloader. Dealing with YT lately is a real cat and mouse game. What works today may not next week.
TL:DR Don't download cracked program without a group's name on the release. I won't go into why, its just groups do that to gain cred. Nobody wants to be associated with infected code.
 
Well it looks like the payload inserts itself with Bluetrait agent. Not sure what it has embedded into, but I have found both iDownGo and YT downloader's crack uses the same named software. Hmmm. Still searching for a clean YouTube downloader cracked. I imagine the nature of those programs makes it very easy to mask some viral code due to the nature of the program.
 
Well it looks like the payload inserts itself with Bluetrait agent. Not sure what it has embedded into, but I have found both iDownGo and YT downloader's crack uses the same named software. Hmmm. Still searching for a clean YouTube downloader cracked. I imagine the nature of those programs makes it very easy to mask some viral code due to the nature of the program.
I'm using YT Downloader in one of my infected machines!
 
I seem to be in the same boat all of a sudden and I cannot find the culprit to save my life...

Did a fresh W10 install, put all my stuff back the way it was and a few hours later, out of the blue, PowerShell opened and closed super fast and my machine started acting up and now PowerShell and/or Chrome constantly get detected by Malwarebytes as something (no idea what) repeatedly attempts to make an outbound connection to "activatorcounter.com" and 2 specific IPs, namely "188.114.96.3" and "188.114.97.3".

I've tried everything (that I know of, at least) from scanning my rig with Defender, Malwarebytes, HitmanPro, Norton Power Eraser, Adlice Diag, Kaspersky Virus Removal Tool and ESET Online Scanner, to blocking the website and both IPs via Windows Firewall, to completely uninstalling and manually deleting any remains that had anything to do with MediaHuman's YouTube Downloader and YouTube to MP3 Converter (the ONLY two things similar, if not the same, as the potential suspects already mentioned in the replies above), to personally checking every corner of Task Manager and so on, but so far everything appears to have been in vain.

Now VirusTotal and a few Google links are telling me that the "activatorcounter.com" website is safe but are flagging the aforementioned IPs as malicious and I really am at a loss here since #1 - I have no idea what is causing this and #2 - is this a serious threat? And if it potentially or surely is, just HOW serious are we talking here? Because I don't fall for scams or anything like that so if that were the worst thing that could happen, I'd be more than ok with it, HOWEVER I'd like to somehow maybe confirm that by allowing this outbound connection, I'm not allowing ANYONE to hack me and/or steal data one way or another.

But in any case and until further notice (specifically until I get some answers, preferably from you fine guys and gals), for now I have allowed the website (without the IPs) through Malwarebytes (I am fully aware that by doing so I am potentially putting myself at risk, but bare with me for just a few more seconds) BECAUSE when Malwarebytes constantly blocks PowerShell from sending anything outbound, this website (TheWindowsForum), along with a few other sites, do not work anymore and neither do some Chrome extensions but as soon as I allow it to do whatever it's doing, everything suddenly works again, so basically when that malware (for lack of a better term so far) is being blocked, I seem to be limited in certain aspects with regards to operating my rig to its full potential, whereas when it's left unchecked to do whatever it is that it's doing, everything works fine.

Lastly, this is literally the only website I found that even mentions "activatorcounter.com", hence why I came here, so if anyone has had any revelations or breakthroughs or any new ideas in the last few weeks since the final reply was made in this topic, I'd really love some input. Actually scratch that - ANY AND ALL input/suggestions/etc. are more than welcome!

Thank you in advance.




EDIT:

Actually, while I'm here, is anyone familiar with something called Adware.PhoenixInvicta? It's apparently tied to Chrome with regards to extensions or something along those lines (I have a few folders and files that point to" AppData/Local/Google/Chrome/User Data/Default/Local Extension Settings" and a registry value that leads to "CHROME/PREFERENCEMACS/Default") and no matter how many times I quarantine and/or delete the threats via Malwarebytes, they end up coming back the next day or upon the next PC restart or shut down/boot (and sometimes merely a few hours later).

And, for what it's worth, if it helps, upon visiting "Local Extension Settings", I'm met with roughly 13-ish items (sometimes the number is higher, sometimes lower) and each and every folder has a very strange name, i.e.:

"ammjkodgmmoknidbanneddgankgfejfh"
"hgeljhfekpckiiplhkigfehkdpldcggm"
"oombnmpbbhbakfpfgdflaajkhicgfaam"

You get the idea. What the heck is this? What exactly is it tied to and how can I pinpoint the specific extension/s that's causing this? (to ultimately get rid of it) Also, why is Malwarebytes the only software detecting Adware.PhoenixInvicta? Defender and ESET have not given a single notification about any danger related to it.

Again, thank you in advance.
 
Last edited:
Back
Top