Severely malicious running process detected by Windows Defender in 22610 update

%3CLINGO-SUB%20id%3D%22lingo-sub-3299348%22%20slang%3D%22en-US%22%3ESeverely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299348%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EWhile%20installing%20the%20Windows%2011%20Dev%20update%20to%20build%2022610%20today%2C%20Windows%20Defender%20arrested%20%22Severe%22%20malware%2C%20an%20actively%20running%20process%2C%20not%20just%20an%20inactive%20file.%20The%20update%20errored%20with%200xc190011f%20at%20the%20same%20time%2C%20so%2022610%20wasn't%20installed.%3C%2FSTRONG%3E%20The%20only%20recent%20downloads%20I%20have%20were%20never%20run.%2022598%20is%20plenty%20new%2C%20so%20unpatched%20vulnerabilities%20in%20the%20existing%20build%20shouldn't%20be%20why%20it%20became%20infected.%20Only%20a%20blank%20pen%20drive%20was%20connected%20recently.%20The%20Chromium%20browser%20was%20recently%20updated%2C%20so%20it%20wasn't%20an%20exploit%20through%20an%20outdated%20browser.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EThe%20error%20code%20is%200xc190011f%20and%20the%20Windows%20Defender%20detection%20is%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23DF0000%22%3EBehavior%3AWin32%2FPowessere.SA%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23DF0000%22%3Ebehavior%3A%20pid%3A2340%3A209678432966826%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23DF0000%22%3Eprocess%3A%20pid%3A2340%2CProcessStart%3A132957367597465384%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20performed%20a%20Quick%20Scan%20and%20Offline%20Scan%20with%20Windows%20Defender%2C%20updated%20Emsisoft%20Emergency%20Kit%20and%20used%20it%20to%20scan%20from%20the%20Recovery%20Environment%2C%20used%20SFC%20and%20DISM%2C%20performed%20a%20Full%20Scan%2C%20deleted%20Software%20Distribution%2C%20made%20a%20System%20Image%20Backup%2C%20and%20installed%20the%2022610%20update%20again.%20%3CSTRONG%3EThreats%20found.%20At%205%25%2C%20the%20Windows%20Defender%20notification%20appeared%20and%20the%200xc190011f%20error%20code%20in%20Windows%20Update.%3C%2FSTRONG%3E%20This%20was%20reproduced%204%20times%20in%20total%2C%20quicker%20when%20retrying%20without%20having%20deleted%20Software%20Distribution.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EFeedback%20Hub%20link%20with%20screenshots%2C%20video%20recording%2C%20and%20diagnostics%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FAAgsen0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FAAgsen0%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3ENote%20that%20screenshots%20and%20other%20attachments%20are%20only%20visible%20to%20Microsoft.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMicrosoft%20Support%20refused%20this%20issue%20because%20the%20operating%20system%20is%20currently%20under%20development%2C%20as%20if%20that%20makes%20it%20any%20more%20acceptable%20to%20distribute%20malware%20through%20Windows%20Update.%20It%20doesn't%20matter%20that%20it's%20under%20development%2C%20having%20a%20%22Severely%22%20malicious%20update%20for%20download%20is%20intolerable.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIf%20it's%20completely%20unknown%20how%20to%20solve%20the%20%22Severe%22%20Behavior%3AWin32%2FPowessere.SA%20while%20downloading%20build%2022610%20because%20it's%20so%20new%2C%20then%20it's%20not%20that%20difficult%20to%20simply%20pull%2022610%20from%20being%20available%20for%20download.%20I%20know%20this%20is%20the%20wrong%20place%20to%20post%20this%2C%20but%20this%20is%20where%20Microsoft%20Support%20said%20to.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20know%20it's%20not%20supported%2C%20but%20not%20providing%20Behavior%3AWin32%2FPowessere.SA%20has%20to%20be%20maintained%20at%20all%20times.%20Preview%20builds%20being%20unsupported%20translating%20to%20it%20being%20acceptable%20to%20distribute%20Behavior%3AWin32%2FPowessere.SA%20is%20as%20if%20the%20Windows%20Defender%20team%20saying%20they%20don't%20need%20to%20maintain%20their%20antivirus%20signatures%20because%20none%20of%20the%20malware%20is%20their%20own%20and%20therefore%20not%20their%20responsibility%20to%20support.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMicrosoft%20Support%20said%20%22%3CEM%3EThe%20Windows%20Insider%20forum%20is%20a%20peer%20to%20peer%20group%20of%20volunteers%20that%20are%20testing%20future%20beta%20releases%20of%20Windows%2010%20and%20as%20it%20is%20beta%20software%20Microsoft%20offers%20no%20support%20to%20Insiders%20who%20voluntarily%20download%20and%20test%20these%20beta%20builds.%3C%2FEM%3E%22%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETranslation%3A%20%3CEM%3EThe%20Windows%20Insider%20forum%20is%20a%20peer%20to%20peer%20group%20of%20volunteers%20that%20are%20downloading%20malicious%20beta%20releases%20of%20Windows%2011%20and%20as%20it%20is%20beta%20software%20Microsoft%20offers%20no%20assurance%20to%20Insiders%20who%20voluntarily%20download%20and%20test%20these%20beta%20builds%20that%20they%20aren't%20infected%20with%20malware.%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMicrosoft%20Support%20also%20said%20%22%3CEM%3EWhen%20you%20first%20joined%20the%20Insiders%20you%20should%20have%20read%20the%20Terms%20of%20Service%20and%20Code%20of%20Conduct%20prior%20to%20joining.%3C%2FEM%3E%22%20I%20did%20though%2C%20nothing%20in%20the%20agreement%20makes%20it%20any%20more%20acceptable%20to%20provide%20Behavior%3AWin32%2FPowessere.SA%20no%20matter%20how%20buggy%20the%20builds%20may%20have%20to%20be.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%22There%20are%20many%20very%20qualified%20Insiders%20who%20use%20this%20forum%20who%20should%20be%20able%20to%20help%20you.%22%3C%2FP%3E%3CP%3EI%20myself%20do%20spend%20a%20highly%20significant%20amount%20of%20time%20each%20day%20assisting%20others%2C%20and%20did%20for%20myself%2C%20but%20the%20root%20issue%20can%20only%20be%20solved%20by%20Microsoft%20by%20pulling%20the%2022610%20download%20or%20confirming%20the%20Windows%20Defender%20detection%20is%20a%20false%20positive.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%22%3CEM%3EPease%20take%20your%20concern%20to%20Windows%20Insider%20forums%3C%2FEM%3E%22%3C%2FP%3E%3CP%3EAt%20the%20same%20time%2C%20%22%3CEM%3EThe%20Windows%20Insider%20forum%20is%20a%20peer%20to%20peer%20group%20of%20volunteers%3C%2FEM%3E%22%3C%2FP%3E%3CP%3EOnly%20Microsoft%20is%20responsible%20for%20hosting%20the%20download.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIf%20Microsoft%20is%20to%20provide%20severely%20malicious%26nbsp%3BBehavior%3AWin32%2FPowessere.SA%20infected%20updates%20of%20Windows%2011%2C%20that's%20not%20secure%20anyway%2C%20so%20if%20security%20is%20out%20the%20window%20even%20with%20the%20latest%2C%20why%20don't%20I%20just%20revert%20to%20using%20Windows%207%2C%20the%20best%20Windows%20ever%2C%20which%20is%20by%20far%20the%20finest%20ever%20produced%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22unknown.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368187i4A09089FCBA48C3D%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22unknown.png%22%20alt%3D%22unknown.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3301080%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3301080%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1377568%22%20target%3D%22_blank%22%3E%40Callistemon%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOther%20users%20confirm%20that%20disabling%20anti-virus%20protection%20before%20installation%20(%2022610.%20)%20ensures%20proper%20installation%20of%20the%20update!%3CBR%20%2F%3ESo%20you%20have%20to%20decide%20what%20steps%20to%20hook%20up!%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fwindows-insider-program%2Fcan-t-install-windows-11-insider-preview-22610-1%2Fm-p%2F3299821%23M16614%22%20target%3D%22_blank%22%3ECan't%20install%20windows%2011%20Insider%20Preview%2022610.1%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300997%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300997%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F38497%22%20target%3D%22_blank%22%3E%40Little_Joe%3C%2FA%3E%26nbsp%3B%20The%20virtual%20machine%20was%20originally%20installed%20from%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fwipiso%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fwipiso%3C%2FA%3E%26nbsp%3Bfor%20build%2022499%2C%20and%20was%20upgraded%20through%20Windows%20Update%20and%20more%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fwipiso%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fwipiso%3C%2FA%3E%26nbsp%3BISOs%20until%2022598%2C%20and%20now%20Windows%20Update%20is%20attempting%20to%20install%2022610.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300911%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300911%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1377568%22%20target%3D%22_blank%22%3E%40Callistemon%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20just%20had%20this%20exact%20same%20issue.%20Twice.%26nbsp%3B%20Same%20scenario%2C%20same%20error%2C%20same%20apparent%20virus%20detected.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300386%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300386%22%20slang%3D%22en-US%22%3EThis%20problem%20recurs%20in%20other%20users%20-%20the%20insider%20program%2C%20so%20it%20is%20not%20a%20malicious%20process.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300289%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300289%22%20slang%3D%22en-US%22%3EIn%20case%20you%20perform%20multiple%20scans%20with%20different%20Anti-Malware%20products%2C%20I%20believe%20you%20are%20safe.%20However%2C%20in%20case%20you%20have%20sample%20of%20malicious%20files%2C%20and%20you%20believe%20they%20are%20not%20being%20detected%20let%20us%20know.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300128%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300128%22%20slang%3D%22en-US%22%3EIn%20this%20thread%2C%20defender%20reported%20a%20threat%20to%20the%20process%20before%20downloading%20the%20latest%20threat%20definitions%20so%20I%20rated%20it%20as%20correct%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300104%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300104%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F968545%22%20target%3D%22_blank%22%3E%40Andrzej1%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3Enope%2C%20just%20like%20you%20said%20it%20was%20a%20recommendation%20of%20solution%20to%20solve%20the%20problem.%20And%20more%20than%20that%20it%20is%20a%20simple%20quick%20fix...%20Considering%20we%20don't%20have%20the%20full%20detail%20of%20the%20info%20with%20that%20copy%20came%20from.%20But%20you%20if%20you%20think%20you%20want%20to%20tackle%20down%20all%20of%20the%20virus%20with%20other%20issues%20it%20brought%20then%20go%20for%20it.%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Fhtml%2F%408341BD79091AF36AA2A09063B554B5CD%2Fimages%2Femoticons%2Fsmile_40x40.gif%22%20alt%3D%22%3Asmile%3A%22%20title%3D%22%3Asmile%3A%22%20%2F%3E%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300083%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300083%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F38497%22%20target%3D%22_blank%22%3E%40Little_Joe%3C%2FA%3E%3C%2FFONT%3E%26nbsp%3B%20Hi%3C%2FP%3E%3CP%3EI%20do%20not%20understand%20why%20after%20one%20warning%20%2C%20which%20was%20caused%20by%20the%20process%20of%20updating%20the%20test%20version%20-%20do%20you%20recommend%20performing%20a%20clean%20installation%20that%20will%20remove%20everything%3F%3C%2FP%3E%3CP%3EI%20think%20this%20is%20an%20exaggeration!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3300023%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3300023%22%20slang%3D%22en-US%22%3EHello%2C%3CBR%20%2F%3ESuggest%20you%20try%20to%20perform%20a%20clean%20installation%20and%20backup%20your%20data%2C%20otherwise%20you%20could%20spent%20a%20lot%20of%20time%20to%20rescue%20your%20OS....%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299964%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299964%22%20slang%3D%22en-US%22%3E%22this%20confirms%20that%20Microsoft%20Defender%20works%20correctly!...%20it%20%5BWindows%20Defender%5D%20caused%20that%20the%20danger%20was%20no%20longer%20detected!%22%20But%20if%20this%20item%20is%20to%20be%20truly%20malicious%2C%20what%20about%20all%20the%20users%20with%20a%20different%20antivirus%3F%20Why%20should%20users%20have%20to%20use%20use%20Microsoft%20antivirus%20to%20be%20protected%20against%20Microsoft%20update%20malware%3F%20If%20it's%20a%20false%20positive%2C%20then%20that's%20not%20quite%20proper.%3CBR%20%2F%3E%3CBR%20%2F%3E%22The%20warning%20you%20received%20was%20caused%20by%20the%20latest%20version%22%20I%20know%20it%20is%20caused%20by%2022610%2C%20and%20not%20anything%20else%20I%20did.%20That's%20why%20I%20posted%20this.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299958%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299958%22%20slang%3D%22en-US%22%3ENo%2C%20the%20only%20detection%20was%20a%20running%20process%2C%20which%20is%20in%20the%20memory%2C%20and%20it%20did%20not%20specify%20the%20process%20name%2C%20only%20the%20single%20use%20unique%20identifier.%20It%20might%20be%20C%3A%5CWindows%5CSoftwareDistribution%2C%20as%20deleting%20that%20folder%20causes%20it%20to%20take%20longer%20when%20retrying%20before%20the%20malicious%20item%20occurs.%20None%20of%20the%20scanners%20detected%20anything%20that%20was%20saved%20in%20C%3A%5CWindows%5CSoftwareDistribution%20or%20any%20other%20folder.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299882%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299882%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1377568%22%20target%3D%22_blank%22%3E%40Callistemon%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3EGreat%20-%20this%20confirms%20that%20Microsoft%20Defender%20works%20correctly!%3CBR%20%2F%3EThe%20warning%20you%20received%20was%20caused%20by%20the%20latest%20version%2C%20or%20an%20unidentified%20insider%20program%20process%20(Defender%20downloaded%20the%20latest%20threat%20definitions)%20it%20caused%20that%20the%20danger%20was%20no%20longer%20detected!%3CBR%20%2F%3EThank%20you%20for%20your%20post%20because%20such%20problems%20need%20to%20be%20clarified%20-%20of%20course%20you%20understand%20that%20the%20diagnostic%20data%20was%20automatically%20transferred%20to%20Microsoft%20-%20this%20helps%20a%20lot!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299741%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299741%22%20slang%3D%22en-US%22%3EIt%20might%20have%20been%20a%20false-positive%20detection.%3CBR%20%2F%3ESometimes%2C%20the%20Anti-Malware%20engine%20detect%20safe%20component%20as%20unsafe%20based%20on%20their%20behavior.%3CBR%20%2F%3EDo%20you%20know%20the%20location%20of%20files%20or%20components%20which%20detected%20as%20malicious%20earlier%3F%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299581%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299581%22%20slang%3D%22en-US%22%3ENothing%20was%20detected%20by%20the%20Microsoft%20Safety%20Scanner.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299522%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299522%22%20slang%3D%22en-US%22%3EThe%20virtual%20machine%20was%20originally%20installed%20with%20a%2022499%20ISO%20from%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fwipiso%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fwipiso%3C%2FA%3E%3CBR%20%2F%3EIt%20has%20been%20upgraded%20to%2022523%2C%2022533%2C%2022538%2C%2022543%2C%2022557%2C%2022563%2C%2022572%2C%2022579%2C%2022581%2C%2022589%2C%2022593%2C%20and%2022598.%20As%20stated%20in%20the%20original%20post%2C%20a%20Full%20Scan%20with%20Windows%20Defender%20was%20run%2C%20and%20so%20was%20a%20Windows%20Defender%20Offline%20Scan.%20I%20also%20updated%20Emsisoft%20Emergency%20Kit%20and%20used%20it%20to%20scan%20from%20the%20Recovery%20Environment%2C%20and%20SFC%20and%20DISM%20did%20not%20report%20any%20corruption.%20The%20Behavior%3AWin32%2FPowessere.SA%20process%20that%20is%20%22Severely%22%20malicious%20is%20the%20only%20thing%20that%20occurs%2C%20and%20that's%20it.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299519%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299519%22%20slang%3D%22en-US%22%3EOkay%20I%20will%20use%20that%20next%2C%20but%20nothing%20was%20detected%20in%20the%20Windows%20Defender%20Full%20Scan%20or%20with%20Emsisoft%20Emergency%20Kit.%20It%20appears%20no%20malicious%20file%20is%20found%20on%20the%20disk%20even%20immediately%20after%20the%20incident%2C%20but%20only%20the%20process%20actively%20running.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299443%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299443%22%20slang%3D%22en-US%22%3EMicrosoft%20Updates%20are%20clean%20and%20not%20infected.%3CBR%20%2F%3EDid%20you%20install%20the%20Windows%2011%20from%20official%20Microsoft%20website%3F%3CBR%20%2F%3ETry%20run%20a%20full%20scan%20with%20Microsoft%20Defender.%3CBR%20%2F%3EYou%20did%20the%20right%20thing%20by%20sending%20Feedback%20and%20hopefully%20the%20Windows%20team%20will%20investigate%20the%20issue.%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3299356%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3299356%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1377568%22%20target%3D%22_blank%22%3E%40Callistemon%3C%2FA%3E%26nbsp%3B%20Hi%2C%3C%2FP%3E%3CP%3Ehave%20you%20used%20this%20scanner%3F%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fintelligence%2Fsafety-scanner-download%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Safety%20Scanner%20Download%20%7C%20Microsoft%20Docs%26nbsp%3B%3C%2FA%3E%3C%2FP%3E%3CP%3EOf%20course%2C%20if%20possible%2C%20you%20can%20upload%20the%20infected%20file%3A%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fsecurity%2Fintelligence%2Fsafety-scanner-download%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Safety%20Scanner%20Download%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Andrzej1_0-1651313147028.png%22%20style%3D%22width%3A%201135px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F368200iFED62FD89F363919%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22Andrzej1_0-1651313147028.png%22%20alt%3D%22Andrzej1_0-1651313147028.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-3374077%22%20slang%3D%22en-US%22%3ERe%3A%20Severely%20malicious%20running%20process%20detected%20by%20Windows%20Defender%20in%2022610%20update%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3374077%22%20slang%3D%22en-US%22%3EThe%20error%20was%20caused%20by%20Skip_TPM_Check_on_Dynamic_Update%20for%20bypassing%20the%20Despicable%20Requirements%20of%20Windows%2011.%20After%20that%20CMD%20was%20run%20again%20to%20uninstall%2C%20no%20threats%20were%20blocked%20while%20updating%2C%20instead%20a%20Setup%20window%20appeared%20to%20complain%20about%20the%20Despicable%20Requirements%2C%20then%20a%20different%20error%20code%20occurred%20after%20that's%20closed.%20Only%20build%2022610%20had%20this%20issue.%20Once%2022616%20was%20available%2C%20having%20Skip_TPM_Check_on_Dynamic_Update%20made%20the%20Setup%20window%20open%20instead%20of%20being%20blocked%2C%20which%20then%20proceeded%20through%20without%20the%20Despicable%20Requirements.%3C%2FLINGO-BODY%3E
Occasional Contributor

While installing the Windows 11 Dev update to build 22610 today, Windows Defender arrested "Severe" malware, an actively running process, not just an inactive file. The update errored with 0xc190011f at the same time, so 22610 wasn't installed. The only recent downloads I have were never run. 22598 is plenty new, so unpatched vulnerabilities in the existing build shouldn't be why it became infected. Only a blank pen drive was connected recently. The Chromium browser was recently updated, so it wasn't an exploit through an outdated browser.

 

The error code is 0xc190011f and the Windows Defender detection is

Behavior:Win32/Powessere.SA

behavior: pid:2340:209678432966826

process: pid:2340,ProcessStart:132957367597465384

 

I performed a Quick Scan and Offline Scan with Windows Defender, updated Emsisoft Emergency Kit and used it to scan from the Recovery Environment, used SFC and DISM, performed a Full Scan, deleted Software Distribution, made a System Image Backup, and installed the 22610 update again. Threats found. At 5%, the Windows Defender notification appeared and the 0xc190011f error code in Windows Update. This was reproduced 4 times in total, quicker when retrying without having deleted Software Distribution.

 

Feedback Hub link with screenshots, video recording, and diagnostics: https://aka.ms/AAgsen0

Note that screenshots and other attachments are only visible to Microsoft.

 

Microsoft Support refused this issue because the operating system is currently under development, as if that makes it any more acceptable to distribute malware through Windows Update. It doesn't matter that it's under development, having a "Severely" malicious update for download is intolerable.

 

If it's completely unknown how to solve the "Severe" Behavior:Win32/Powessere.SA while downloading build 22610 because it's so new, then it's not that difficult to simply pull 22610 from being available for download. I know this is the wrong place to post this, but this is where Microsoft Support said to.

 

I know it's not supported, but not providing Behavior:Win32/Powessere.SA has to be maintained at all times. Preview builds being unsupported translating to it being acceptable to distribute Behavior:Win32/Powessere.SA is as if the Windows Defender team saying they don't need to maintain their antivirus signatures because none of the malware is their own and therefore not their responsibility to support.

 

Microsoft Support said "The Windows Insider forum is a peer to peer group of volunteers that are testing future beta releases of Windows 10 and as it is beta software Microsoft offers no support to Insiders who voluntarily download and test these beta builds."

 

Translation: The Windows Insider forum is a peer to peer group of volunteers that are downloading malicious beta releases of Windows 11 and as it is beta software Microsoft offers no assurance to Insiders who voluntarily download and test these beta builds that they aren't infected with malware.

 

Microsoft Support also said "When you first joined the Insiders you should have read the Terms of Service and Code of Conduct prior to joining." I did though, nothing in the agreement makes it any more acceptable to provide Behavior:Win32/Powessere.SA no matter how buggy the builds may have to be.

 

"There are many very qualified Insiders who use this forum who should be able to help you."

I myself do spend a highly significant amount of time each day assisting others, and did for myself, but the root issue can only be solved by Microsoft by pulling the 22610 download or confirming the Windows Defender detection is a false positive.

 

"Pease take your concern to Windows Insider forums"

At the same time, "The Windows Insider forum is a peer to peer group of volunteers"

Only Microsoft is responsible for hosting the download.

 

If Microsoft is to provide severely malicious Behavior:Win32/Powessere.SA infected updates of Windows 11, that's not secure anyway, so if security is out the window even with the latest, why don't I just revert to using Windows 7, the best Windows ever, which is by far the finest ever produced?

 

unknown.png

19 Replies

@Callistemon  Hi,

have you used this scanner?

Microsoft Safety Scanner Download | Microsoft Docs 

Of course, if possible, you can upload the infected file:

Microsoft Safety Scanner Download | Microsoft Docs

Andrzej1_0-1651313147028.png

 

Microsoft Updates are clean and not infected.
Did you install the Windows 11 from official Microsoft website?
Try run a full scan with Microsoft Defender.
You did the right thing by sending Feedback and hopefully the Windows team will investigate the issue.
Okay I will use that next, but nothing was detected in the Windows Defender Full Scan or with Emsisoft Emergency Kit. It appears no malicious file is found on the disk even immediately after the incident, but only the process actively running.
The virtual machine was originally installed with a 22499 ISO from https://aka.ms/wipiso
It has been upgraded to 22523, 22533, 22538, 22543, 22557, 22563, 22572, 22579, 22581, 22589, 22593, and 22598. As stated in the original post, a Full Scan with Windows Defender was run, and so was a Windows Defender Offline Scan. I also updated Emsisoft Emergency Kit and used it to scan from the Recovery Environment, and SFC and DISM did not report any corruption. The Behavior:Win32/Powessere.SA process that is "Severely" malicious is the only thing that occurs, and that's it.
Nothing was detected by the Microsoft Safety Scanner.
It might have been a false-positive detection.
Sometimes, the Anti-Malware engine detect safe component as unsafe based on their behavior.
Do you know the location of files or components which detected as malicious earlier?

@Callistemon 

Great - this confirms that Microsoft Defender works correctly!
The warning you received was caused by the latest version, or an unidentified insider program process (Defender downloaded the latest threat definitions) it caused that the danger was no longer detected!
Thank you for your post because such problems need to be clarified - of course you understand that the diagnostic data was automatically transferred to Microsoft - this helps a lot!

No, the only detection was a running process, which is in the memory, and it did not specify the process name, only the single use unique identifier. It might be C:\Windows\SoftwareDistribution, as deleting that folder causes it to take longer when retrying before the malicious item occurs. None of the scanners detected anything that was saved in C:\Windows\SoftwareDistribution or any other folder.
"this confirms that Microsoft Defender works correctly!... it [Windows Defender] caused that the danger was no longer detected!" But if this item is to be truly malicious, what about all the users with a different antivirus? Why should users have to use use Microsoft antivirus to be protected against Microsoft update malware? If it's a false positive, then that's not quite proper.

"The warning you received was caused by the latest version" I know it is caused by 22610, and not anything else I did. That's why I posted this.
Hello,
Suggest you try to perform a clean installation and backup your data, otherwise you could spent a lot of time to rescue your OS....

@Little_Joe  Hi

I do not understand why after one warning , which was caused by the process of updating the test version - do you recommend performing a clean installation that will remove everything?

I think this is an exaggeration!

@Andrzej1 

nope, just like you said it was a recommendation of solution to solve the problem. And more than that it is a simple quick fix... Considering we don't have the full detail of the info with that copy came from. But you if you think you want to tackle down all of the virus with other issues it brought then go for it.:smile:

In this thread, defender reported a threat to the process before downloading the latest threat definitions so I rated it as correct
In case you perform multiple scans with different Anti-Malware products, I believe you are safe. However, in case you have sample of malicious files, and you believe they are not being detected let us know.
This problem recurs in other users - the insider program, so it is not a malicious process.

@Callistemon 

 

I just had this exact same issue. Twice.  Same scenario, same error, same apparent virus detected.  

@Little_Joe  The virtual machine was originally installed from https://aka.ms/wipiso for build 22499, and was upgraded through Windows Update and more https://aka.ms/wipiso ISOs until 22598, and now Windows Update is attempting to install 22610.

@Callistemon 

Other users confirm that disabling anti-virus protection before installation ( 22610. ) ensures proper installation of the update!
So you have to decide what steps to hook up!

Can't install windows 11 Insider Preview 22610.1 - Microsoft Tech Community

The error was caused by Skip_TPM_Check_on_Dynamic_Update for bypassing the Despicable Requirements of Windows 11. After that CMD was run again to uninstall, no threats were blocked while updating, instead a Setup window appeared to complain about the Despicable Requirements, then a different error code occurred after that's closed. Only build 22610 had this issue. Once 22616 was available, having Skip_TPM_Check_on_Dynamic_Update made the Setup window open instead of being blocked, which then proceeded through without the Despicable Requirements.