Wednesday, February 24, 2016
Quasi-Failover DHCP 2008 R2
New-MailboxExportRequest not recognized
To fix this run the below command in PowerShell from the Exchange server.
Log out then log back in and you should be fine to to go.
Solution found at:
https://social.technet.microsoft.com/Forums/exchange/en-US/d6bbff4b-8be0-4b4f-925d-1c5db5c31cc4/newmailboxexportrequest-is-not-recognized-as-the-name-of-a-cmdlet?forum=exchangesvrgenerallegacy
Monday, February 8, 2016
Trojan-Downloader.Win32.VB.eql (Translated)
Trojan-Downloader.Win32.VB.eql
Translated from
https://securelist.social-kaspersky.com/ru/descriptions/Trojan-Downloader.Win32.VB.eql
Technical details
This Trojan downloads without your knowledge on your computer other software. The program is a Windows application (PE EXE-file). Its size is 1509125 bytes.
Installation
Once launched, the Trojan copies its body to the Windows system directory under the name "WINSP00L.EXE":
% System% \ WINSP00L.EXE
To start automatically each time you start the system, the Trojan adds a link to its executable file in the system registry:[HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Run]
"WINSP00L" = "% System% \ WINSP00L.EXE"
Load
Once launched, the Trojan extracts from its body to the catalog "E_4" in the temporary directory of the current user the following files:
% Temp% \ E_4 \ krnln.fnr - 1110016 bytes
% Temp% \ E_4 \ shell.fne - 61440 bytes
% Temp% \ E_4 \ eAPI.fne - 335872 bytes
% Temp% \ E_4 \ internet.fne - 196608 bytes
% Temp% \ E_4 \ spec.fne - 86016 bytes
% Temp% \ E_4 \ RegEx.fne - 167936 bytes
% Temp% \ E_4 \ dp1.fne - 126,976 bytes
% Temp% \ E_4 \ com.run - 278528 bytes
Then copy them to the Windows system directory under the same name:% System% \ krnln.fnr
% System% \ shell.fne
% System% \ eAPI.fne
% System% \ internet.fne
% System% \ spec.fne
% System% \ RegEx.fne
% System% \ dp1.fne
% System% \ com.run
In addition, it removes the Windows system directory files:% System% \ ul.dll - 2404 bytes
% System% \ og.dll - 692 bytes
% System% \ og.edt - 512 bytes
After completing these steps, the Trojan accesses the following address:http: //www.*****base.cn/install.htm pn = M080410?
At the time of writing, this link was not working. The file is located on this link is stored in the temporary Internet files directory and launched for execution. Filename - random. And also drawn to the following address:http://www.microsoft.com
http://hi.baidu.com/siletoyou
http://www.baihe.googlepages.com/ul.htm
http://www.bloguser.googlepages.com/au.htm
After that, remove the file from its body with a name composed of the current date and time, for example 20090929153554.exe and places it in the Windows system directory:% System% \ 20090929153554.exe
This file has a size of 9216 bytes.
The extracted file gets executed and then deleted.
In addition, the Trojan spreads via removable media under the name "Recycled.exe". "Autorun.inf" file is also created to automatically run the Trojan file in the root directory of removable media.
Removal Instructions
- Using Task Manager to terminate the Trojan process:
WINSP00L.EXE
- Delete the original Trojan file (its location on the infected computer will depend on how the program originally penetrated the victim machine).
- Delete the copy of the Trojan:
% System% \ WINSP00L.EXE
- Remove files and directories created by the Trojan:
% Temp% \ E_4 \ krnln.fnr % Temp% \ E_4 \ shell.fne % Temp% \ E_4 \ eAPI.fne % Temp% \ E_4 \ internet.fne % Temp% \ E_4 \ spec.fne % Temp% \ E_4 \ RegEx.fne % Temp% \ E_4 \ dp1.fne % Temp% \ E_4 \ com.run % Temp% \ E_4 % System% \ krnln.fnya % System% \ shell.fne % System% \ eAPI.fne % System% \ internet.fne % System% \ spec.fne % System% \ RegEx.fne % System% \ dp1.fne % System% \ com.run % System% \ ul.dll % System% \ og.dll % System% \ og.edt
[HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Run] "WINSP00L" = "% System% \ WINSP00L.EXE"
- Check removable media for files:
Recycled.exe autorun.inf
In case of detection - remove them. - Clear Temporary Internet Files directory, containing infected files ( How to delete infected files from Temporary Internet Files folder? ):
- And perform a full scan of your computer with Kaspersky Antivirus Update your antivirus databases ( download a trial version ).
Tuesday, February 2, 2016
Robocopy to the backup rescue
Robocopy to the backup rescue
The main reason I found out about this PR is that this clients Backup Exec kept failing. After fighting with the Backup Exec for over a week I finally found in the error logs something about this PR. This is what was making the Backup Exec fail. I could get into a lengthy discussion on this and at some point in time I might do that.
Thursday, January 14, 2016
Get Exchange Server Database Size and Mailbox Size
Get Exchange Server Database Size and Mailbox Size
Friday, October 16, 2015
Download MP3s with Powershell
Change the 2 variables $theurl ; the website URL, and $storagedir ; the place you want to store them and watch it go. It has some thing built into it that takes care of url variables, direct url, and some url encoding issues. I tried to comment it as much as I could.
Thursday, September 10, 2015
Turn off those Firewalls–Remotely–With PowerShell
Yet again I was given a task at work. This task was to turn off the Firewalls on hundreds of servers. So instead of logging into each one manually and changing the profiles on all the Firewall Profiles; Domain, Private and Public. I decided let us let PowerShell shine again.Now, they didn’t want the Firewall Services stopped, just the Profile states to be off. So after a little research and some help from some co-workers I put this script together.
Let’s talk about something thing through before I go into the script. The easiest way to turn off these Profile states is to run.
netsh advfirewall set allprofiles state off
This of course needs to be run locally on the machine. So I figured why not just use psexec to run the script. So I made a loop for the servers, looped it on the psexec and away it ran.. It ran VERY slowly. I had hundreds of these to run through. This would not work. So I decided to try and use PowerShell Invoke-Command. This required to have a session started using Enter-PSSession. Which of course gave this error.
Enter-PSSession : Connecting to remote server Server01 failed with the following error message : WinRM cannot process the request
Well that’s not going to work because I need to have the WinRM service installed. I don’t have the much time to get approvals to install the WinRM service on all these machines. So I remembered one of my coworkers had run scripts against a remote machine the other week using PowerShell. So I asked for his secret. The secret was Invoke-WmiMethod. Here is the code simply put.
Invoke-WmiMethod -class Win32_process -name Create -ArgumentList (“CMD.EXE /C netsh advfirewall set allprofiles state off”) –ComputerName Server01
This actually runs the script against the server with no Invoke-Command or other service to be installed. So I set off to write the full script and it is FAST. Sooo much faster than I was hoping for.
$command = "netsh advfirewall set allprofiles state off"
$cmd = "CMD.EXE /C " +$command
ForEach ($server in Get-Content "c:\scripts\computers.txt")
{
$theProc = Invoke-WmiMethod -class Win32_process -name Create -ArgumentList ($cmd) -ComputerName $server
If($theProc.ReturnValue -eq "0"){write-host "$server - Completed successfully"}else{write-host "$server - Completed UNsuccessfully"}
}
Now one of the downfalls of this is, you don’t know if the script worked. Of course you can go see on the server if the script did what it was supposed to do, but that is not what I am talking about. Basically you don’t get the output of the cmd. All you get is ReturnValue of 0 if the command went through correctly. Not that your script ran successfully. Just that your little cmd soldier has been sent into the field with the operations it was told to do successfully.