Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Remote Power Shell Activity


  • Please log in to reply
No replies to this topic

#1 notgonnarollover

notgonnarollover

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:05:56 PM

Posted 23 July 2017 - 02:58 PM

I have an ex who is a system admin professional.  I am certain he is remote accessing my machine, as content has been altered that would only benefit him.  I have the following Powershell event log entries and want to know if these appear to be normal system generated events, or do they indicate remote access/executed functions.  I have chopped them down to just a few most relevant lines.

 

This is the only computer on my network,  I don't use Powershell myself and  I am certain he gave himself admin access to the machine when pre-breakup he installed software.

Also note the time-stamp for items 2 & 3, as they occur in the same minute

 

 

(1)

 

Log Name:      Microsoft-Windows-PowerShell/Operational
Source:        Microsoft-Windows-PowerShell
Date:          4/7/2017 11:58:08 AM
Event ID:      40962
Task Category: PowerShell Console Startup
Level:         Information
Keywords:      None
User:          SYSTEM
Computer:      DESKTOP-N7SO2QJ
Description:  PowerShell console is ready for user input
 
 
(2)

 

Log Name:      Microsoft-Windows-PowerShell/Operational
Source:        Microsoft-Windows-PowerShell
Date:          4/7/2017 11:28:25 PM
Event ID:      53504
Task Category: PowerShell Named Pipe IPC
Level:         Information
Keywords:      None
User:          DESKTOP-N7SO2QJ\Christie
Computer:      DESKTOP-N7SO2QJ
Description:
Windows PowerShell has started an IPC listening thread on process: 11996 in AppDomain: DefaultAppDomain.
Event Xml:
  <System>
    <Provider Name="Microsoft-Windows-PowerShell" Guid="{A0C1853B-5C40-4B15-8766-3CF1C58F985A}" />
 
 
(3)
Log Name:      Microsoft-Windows-PowerShell/Operational
Source:        Microsoft-Windows-PowerShell
Date:          4/7/2017 11:28:26 PM
Event ID:      4104
Task Category: Execute a Remote Command
Level:         Warning
Keywords:      None
User:          DESKTOP-N7SO2QJ\Christie
Computer:      DESKTOP-N7SO2QJ
Description:
Creating Scriptblock text (1 of 1):
# Copyright © 2008, Microsoft Corporation. All rights reserved.

 



BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users