Jump to content

Breid125

Members
  • Content Count

    5
  • Joined

  • Last visited

About Breid125

  • Rank
    New Member
  1. 15/11/2019 8:58:55 AM 6750W10 10.11.103.18 Trojan.Crypt DENY C:\Windows\Installer\MSI848C.tmp 15/11/2019 8:58:57 AM 6750W10 10.11.103.18 Trojan.Crypt DENY C:\Windows\Installer\MSI86CF.tmp 15/11/2019 8:58:58 AM 6750W10 10.11.103.18 Trojan.Crypt DENY C:\Windows\Installer\MSI8B73.tmp password: novirus CiscoJabberSetup.zip
  2. This detection is on a PC used exclusively for JD Edwards development work, given that no internet browsing (confirmed by usage logs) has happened on this PC, we're pretty certain this is a False Positive. --- Malwarebytes Management Server Notification -------------------------------------------- Alert Time: 09/08/2018 6:15:01 AM Server Hostname: MGMTMWB1 Server IP: 10.11.2.128 Notification Catalog: Client Description: Malware threat detected, see details below: 09/08/2018 6:14:23 AM HO4943W764 10.11.105.1 Trojan.AVKill < No action taken > C:\DV900 - BACKUP - 20180617\system\bin32\EndEOneMobileUI.exe 09/08/2018 6:14:23 AM HO4943W764 10.11.105.1 Trojan.AVKill < No action taken > C:\e900\system\bin32\EndEOneMobileUI.exe password: novirus EndEOneMobileUI.zip
  3. Trojan.Downloader.AutoIt C:\Program Files (x86)\Cisco\WFO_QM\bin\SetQmpdStartType.exe Trojan.Downloader.AutoIt C:\Windows\Installer\13dda.msi Trojan.Downloader.AutoIt C:\Windows\Installer\Cisco Unified WFO Monitoring and Recording Services Service Release 6.msi Password: infected WFO.zip
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.