You’re not alone — different AVs often disagree. Short answer: Microsoft Defender’s cloud/ML flagged QtWebKit4.dll as Trojan:Win32/Wacatac.C!ml (a Wacatac‑family trojan/downloader). Kaspersky Free and Malwarebytes Free can miss some ML/heuristic hits (or that specific build) — that doesn’t mean Defender is wrong, but it does mean you should verify and follow containment steps.
Why detectors differ (brief)
- Different engines/signatures: each vendor uses different pattern signatures, heuristics and cloud‑ML models.
- Timing/coverage: Defender’s cloud rules may have newer heuristics for this sample.
- Packing/obfuscation: packed or custom binaries sometimes evade some engines but trigger ML heuristics in others.
- Location/context: a DLL living in AppData\Roaming\secure is suspicious (many legit Qt DLLs live in app folders), which raises heuristic scores.
Risk summary for this detection
- Trojan:Win32/Wacatac.* = family/heuristic label for downloaders/backdoors (often used as droppers). The DLL itself may not immediately encrypt files, but it can provide persistence and download stage‑2 malware (ransomware, RATs, stealers). Treat it as potentially dangerous until proven otherwise.
What to do now — do these in order (high priority)
1) Leave it quarantined. Do NOT restore.
2) If the PC is still online, disconnect it from the network (unplug Ethernet / disable Wi‑Fi).
3) Run Microsoft Defender Offline now (reboot scan outside Windows):
- Windows Security → Virus & threat protection → Scan options → Microsoft Defender Offline → Scan now.
4) Back up your important personal files (documents/pictures) to an external HDD — only from the infected machine if necessary, then scan that backup from a known‑clean PC (or bootable rescue ISO) before opening files. Don’t back up programs/system files.
5) Run a rescue/offline scan (best): create a Kaspersky Rescue or Bitdefender Rescue USB on a clean PC, boot the infected PC and do a full scan. Rescue ISOs find persistent/rootkit components that in‑OS scans can miss.
6) Do additional one‑off scans from a clean machine: ESET Online Scanner, Microsoft Safety Scanner (msert), or run defender/other AV against your external drive(s).
Collect evidence & verification (help me help you)
- If you want me to interpret the detection, paste one of these here:
- The SHA‑256 hash for the DLL (compute on the infected machine before removing — or from Defender quarantine if it shows the hash), or
- The VirusTotal link you used.
Command to get hash (PowerShell, run as Admin):
Get-FileHash "C:\Users\<you>\AppData\Roaming\secure\QtWebKit4.dll" -Algorithm SHA256
Quick checks you can run (paste outputs if you want help interpreting)
- Running processes and full paths:
powershell -Command "Get-Process | Where-Object {$_.Path} | Select Id,ProcessName,Path | Format-Table -AutoSize"
- Autoruns / persistence (better: use Autoruns GUI and File→Save then paste the text)
reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /s
schtasks /query /fo LIST /v | findstr /I "secure"
- Network connections:
netstat -ano | findstr ESTABLISHED
If you find evidence of credential theft or remote access
- Change all important passwords from a different clean device (email, banks, Microsoft account, Steam, etc.). Enable MFA.
- If you find persistent items (Run keys, scheduled tasks, services) pointing to the “secure” folder, or unusual outbound connections, assume compromise and consider reinstalling Windows after backing up only verified personal data.
False positive possibility
- It’s possible but with a VirusTotal detection count like the one you posted earlier (30/72) false positive is unlikely. If you still suspect FP, submit the sample to Microsoft for re‑analysis (Windows Defender Security Intelligence) and to VirusTotal with a comment that you believe it might be benign — but don’t restore until vendors confirm.
About your copied files (external HDD)
- Do NOT run executables from the external drive until you scan it from a known‑clean PC or with a rescue ISO.
- Re‑download installers/ISOs/portable apps from official sources if you cannot verify checksums. Media and documents are lower risk but should still be scanned.
I can do any of these for you (pick one)
A) Interpret the VirusTotal/engine list if you paste the VT link or the SHA‑256.
B) Walk you step‑by‑step to create and run a rescue USB (Kaspersky/Bitdefender).
C) Walk you through collecting Autoruns / reg keys / netstat output safely and interpret them.
D) Give the exact commands to run Defender offline and to scan your external drive from a clean PC.
Which do you want to do next?