How to Remove the Walliant Virus

Walliant is a small wallpaper app that looks innocuous from the outside but possesses some questionable functionalities that aren’t immediately obvious to the user. Just like other sketchy software like the Altisik Service or the Weather Zero app, installing this software on your PC means granting it permission to route other user’s traffic through your device.

This practice is especially invasive and can lead to all sorts of problems. Similar functions are often found in malicious programs of the Trojan Horse category, so it won’t be wrong to refer to Walliant as a Trojan.

Sure, the app technically tells you about its unwanted functions in its EULA, but the issue here is that most users get Walliant installed on their PCs without realizing it. This rogue software mostly installs silently, through file-bundles, so most people have zero idea of when or how they got it in their systems.

It should be obvious by now, but we still need to say it – if you have Walliant on your PC, you must remove it ASAP and we can help you with that.

Walliant Removal Tutorial

Walliant will often resist traditional removal and will require some more advanced steps to fully get rid of it. However, we still recommend trying to uninstall it the conventional way first, because, if this works, it can save you a ton of time:

  1. Open the Start Menu. Navigate to Settings (the gear button) and locate and open Apps.
  2. Sort the programs by installation date and look for Walliant. Also look for any other unfamiliar recent installations (Walliant often piggybacks on other suspicious software).
  3. When you find it, select it, click the Uninstall button, and follow the prompts to delete the app.
  4. Then go to the folder where it was installed and manually delete any leftovers. The folder where Walliant normally gets installed is C:\UserNames\UserName\AppData\Local\Programs\Walliant.

Restart the system. Sometimes, that alone can solve the problem. If it doesn’t, don’t panic. More steps are ahead, and they’ll help clear the stubborn malware.

Video walkthrough for this step:

SUMMARY:

NameWalliant
TypeTrojan
Detection Tool

Before You Begin: Things to Keep in Mind

Malware like Walliant constantly evolves. Its creators adjust the code to make it sneakier, harder to detect, and more persistent. This guide works for now, but that doesn’t mean it always will even though we always seek to update our removal tutorials.

Additionally, the manual process can take time and requires a bit of technical know-how. Not everyone enjoys manual methods.

For all these reasons, we offer an alternative solution that is faster, safer, and much easier to apply. It comes in the form of an advanced anti-malware tool called SpyHunter, which you can find on the current page. It will eliminate Walliant in no time and make your system clean and secure again.

How to Get Rid of Walliant Version 1.0.0.1

The following steps are for the removal of Walliant version 1.0.0.1 and version 1.0.16.1, but they will most likely work with other versions too.

If you are determined to deal with this malware on your own, there are two preparatory steps you must perform first.

Start by revealing any hidden files and folders on your PC: Open the Start Menu, type in Folder Options, select the View tab. Enable the “Show hidden files and folders” option and click Apply > OK.

show hidden files and folders

Video walkthrough for this step:

Next, download a free utility called LockHunter. Many users prefer not to download third-party software and we respect this, but in this case, getting LockHunter is non-negotiable.

The tool is necessary to delete files that malware has locked and without it, you may be unable to complete some of the following steps. So download LockHunter now, install it, and proceed with the removal of Walliant.

Remove Walliant App Processes From the Task Manager

Walliant loves to run in the background. Its processes can hog your system’s resources and your Internet bandwidth as well as make the app’s removal more difficult. Therefore, you must first isolate them, delete their related files, and then quit the processes.

Start by opening the Task Manager with Ctrl + Shift + Esc. You’ll need to switch to More Details to see everything running if the Task Manager is in compact mode.

Then sort by Memory or CPU usage the listed processes. Look for Walliant and other unfamiliar processes. Even if you don’t find anything named “Walliant”, this doesn’t mean there aren’t any rogue processes, so keep looking. Malware often hides its identity.

If you find something that seems like it doesn’t belong in your Task Manager, right-click the rogue process.

walliant task manager
The Walliant process in the Task Manager.

Choose Open File Location. Delete the entire folder where it hides. If it won’t delete, LockHunter can force it. Right-click the folder and use the option “What’s locking this folder?”. This will give you the option to delete it in a newly opened window, so click it.

Once deleted, end the process in Task Manager by selecting it and then clicking on End Task.

Repeat for any other suspicious processes. The malware might be using more than one.

7-day Free Trial w/Credit card, no charge upfront or if you cancel up to 2 days before expiration; Subscription price varies per region w/ auto renewal unless you timely cancel; notification before you are billed; 30-day money-back guarantee; Read full terms and more information about free remover.

Video walkthrough for this step:

How to Delete Persistent Files with Lock Hunter

How to Delete Walliant Virus Files

Now you must hunt down and eliminate any remaining files linked to Walliant. There are many locations in the systems where such files can be hidden. You must check them all and eliminate anything suspicious. Use the help of LockHunter if needed.

First, go to C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup. Delete everything there except a file named desktop.ini (if such a file is present there).

Do the same in C:\Users\YourUsername\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup.

Now go back to your C: drive and check the Program Files and Program Files (x86) folders. Look for unfamiliar folders. If something looks shady, delete it.

Next, go to these two locations and delete the respective Walliant folder stored there:

  • C:\Users\%user%\AppData\Local\Programs\Walliant
  • C:\Users\%user%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Walliant

Last but not least, clean out the Temp folder. You’ll find it in C:\Users\YourUsername\AppData\Local\Temp. Clear out everything stored in it. These are just temporary files, so you can safely delete them all.

Get Rid of Walliant Tasks in the Task Scheduler

Hackers often use the Task Scheduler to keep malware running and users often forget to check it for rogue tasks. Don’t make that mistake:

Open the Task Scheduler from the Start Menu (just search for it there).

Look through the tasks listed in the Task Scheduler Library (top-left). Check what each task does by double-clicking it and selecting the Actions tab.

task scheduler

If any task points to a suspicious .exe file, a questionable script, or anything stored in AppData or Roaming, delete it. Just first make sure to remember the name and location of the file it ran, so you can also go to it and delete it.

This step is crucial. If you miss any scheduled tasks, the malware could reinstall itself. It’s like hitting pause instead of stop. Therefore, don’t rush and check all listed tasks (they shouldn’t be that many).

Video walkthrough for this step:

Uninstall Walliant Version 1.0.0.1 and 1.0.16.1 Through the System Registry

The Windows Registry often contains malware traces. Walliant can leave entries that will try to bring it back, even after you delete most of the files.

This is a tricky step and you’ll need precision because deleting something you shouldn’t can cause system problems. If you aren’t confident you can handle it, consider the automatic removal method that uses the SpyHunter removal tool.

Open the Registry Editor by typing regedit into the Start Menu, right-clicking the first item, and running it with admin rights.

Press Ctrl + F to search. Type Walliant and click Find Next. Delete any matching registry keys (folders) in the left panel. Keep searching and deleting until nothing remains.

Then, search for the names of any suspicious processes you found earlier in Task Manager. Again, delete them as they appear.

Now manually navigate to the following registry keys in the left panel and delete them:

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\{E72E2194-F430-4F4A-A262-1C8FF081B3A5}_is1
  • HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Tracing\Walliant_RASAPI32
  • HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Tracing\Walliant_RASMANCS
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bam\State\UserSettings\S-1-5-21-4034801188-898772650-1781001302-1001\\Device\HarddiskVolume3\Users\UserName\AppData\Local\Programs\Walliant\unins000.exe
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\bam\State\UserSettings\S-1-5-21-4034801188-898772650-1781001302-1001\\Device\HarddiskVolume3\Users\UserName\AppData\Local\Temp\LSQpqU8a\is-VOH0Q.tmp\walliant.tmp

Lastly, go to these keys, but don’t delete them. Instead, click on them, and check their values in the right panel. If you see any sketchy-looking values linked to Walliant or other unknown apps, delete the specific values.

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run
  • HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run
  • HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
  • HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
  • HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce\Setup
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services

With this step completed, the rogue app should be gone from your machine. Restart your PC, and open the Task Manager again to see if the Walliant processes are gone. Also check your system tray for any sketchy icons. If you don’t see Walliant there either, this means your PC is probably clean.

Video walkthrough for this step:

In case Walliant is still in your system, run a full system scan with SpyHunter and delete any rogue data it finds. Then the malware should be fully removed.


About the author

blank

Lidia Howler

Lidia is a web content creator with years of experience in the cyber-security sector. She helps readers with articles on malware removal and online security. Her strive for simplicity and well-researched information provides users with easy-to-follow It-related tips and step-by-step tutorials.

18 Comments

  • please, could you help me? because of this walliant, my computer shut down. I’m using windows 10. my screen says, ‘Choose an option.’ I tried to reset it, it didn’t work. my computer never turns on. when I saw the first walliant land on my computer, I looked it up. I didn’t read this article, but I installed anti-virus applications, I deleted my browser history. and because the computer was new, I didn’t have much information to steal. but then when I tried to reduce the authority of the virus, I authorized it. and my computer never turns on right now. I don’t know what I’m going to do. please help me.

    • hi bstark
      at this point i would suggest to you to preinstall your windows as you said there is no important data on your computer. The process will erase everything bad in your computer.

    • Hi
      can you describe me exactly what is happening? The delete option doesn’t show up or when you right click on the registry key or folder, nothing show us ?

      • \Device\HarddiskVolume2\Users\UserName\AppData\Local\Programs\Walliant\walliant.exe
        says unable to delete all specified date when i tried to delete

        • Hi nick,
          did you follow the instructions, you have to delete specific items(values) in the Registry editor described in Step 6.

  • # unchecky_begin
    # These rules were added by the Unchecky program in order to block advertising software modules
    0.0.0.0 0.0.0.0 # fix for traceroute and netstat display anomaly
    0.0.0.0 tracking.opencandy.com.s3.amazonaws.com
    0.0.0.0 media.opencandy.com
    0.0.0.0 cdn.opencandy.com
    0.0.0.0 tracking.opencandy.com
    0.0.0.0 api.opencandy.com
    0.0.0.0 api.recommendedsw.com
    0.0.0.0 rp.yefeneri2.com
    0.0.0.0 os.yefeneri2.com
    0.0.0.0 os2.yefeneri2.com
    0.0.0.0 installer.betterinstaller.com
    0.0.0.0 installer.filebulldog.com
    0.0.0.0 d3oxtn1x3b8d7i.cloudfront.net
    0.0.0.0 inno.bisrv.com
    0.0.0.0 nsis.bisrv.com
    0.0.0.0 cdn.file2desktop.com
    0.0.0.0 cdn.goateastcach.us
    0.0.0.0 cdn.guttastatdk.us
    0.0.0.0 cdn.inskinmedia.com
    0.0.0.0 cdn.insta.oibundles2.com
    0.0.0.0 cdn.insta.playbryte.com
    0.0.0.0 cdn.llogetfastcach.us
    0.0.0.0 cdn.montiera.com
    0.0.0.0 cdn.msdwnld.com
    0.0.0.0 cdn.mypcbackup.com
    0.0.0.0 cdn.ppdownload.com
    0.0.0.0 cdn.riceateastcach.us
    0.0.0.0 cdn.shyapotato.us
    0.0.0.0 cdn.solimba.com
    0.0.0.0 cdn.tuto4pc.com
    0.0.0.0 cdn.appround.biz
    0.0.0.0 cdn.bigspeedpro.com
    0.0.0.0 cdn.bispd.com
    0.0.0.0 cdn.bisrv.com
    0.0.0.0 cdn.cdndp.com
    0.0.0.0 cdn.download.sweetpacks.com
    0.0.0.0 cdn.dpdownload.com
    0.0.0.0 cdn.visualbee.net
    # unchecky_end

    0.0.0.1 scinstallcheck.mcafee.com

    0.0.0.1 mssplus.mcafee.com

  • # Copyright (c) 1993-2009 Microsoft Corp.
    #
    # This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
    #
    # This file contains the mappings of IP addresses to host names. Each
    # entry should be kept on an individual line. The IP address should
    # be placed in the first column followed by the corresponding host name.
    # The IP address and the host name should be separated by at least one
    # space.
    #
    # Additionally, comments (such as these) may be inserted on individual
    # lines or following the machine name denoted by a ‘#’ symbol.
    #
    # For example:
    #
    # 102.54.94.97 rhino.acme.com # source server
    # 38.25.63.10 x.acme.com # x client host

    # localhost name resolution is handled within DNS itself.
    # 127.0.0.1 localhost
    # ::1 localhost

    • Hi hehe,
      is there more text bellow

      # localhost name resolution is handled within DNS itself.
      # 127.0.0.1 localhost
      # ::1 localhost

      Are there any other entries?

  • Could Walliant be used to access someone else’s webcam, I’m concerned after i heard it somewhere and i also discovered that i had it on my computer.

Leave a Comment