Jump to content

PCJedi

Members
  • Content Count

    7
  • Joined

  • Last visited

Community Reputation

0 Neutral

About PCJedi

  • Rank
    New Member
  1. Will remote in to machine and reboot. Will report results.
  2. My icon is gone again and when I go to programs and try to "edit" Malwarebytes, it tells me unsuccessful, that I need uninstall and reinstall the program. Shows install date at 1/2020, so it should be correct. This is the 2nd or 3rd time this has done this since we went to the cloud based Endpoint product. Frustrating! This happens on 20% of our machines Any ideas?
  3. I have attached several days of logs. Thank you. protection-log-2018-02-01.txt protection-log-2018-02-02.txt protection-log-2018-02-03.txt protection-log-2018-02-04.txt protection-log-2018-02-05.txt protection-log-2018-02-06.txt protection-log-2018-02-07.txt protection-log-2018-01-25.txt protection-log-2018-01-26.txt protection-log-2018-01-27.txt protection-log-2018-01-28.txt protection-log-2018-01-29.txt protection-log-2018-01-30.txt protection-log-2018-01-31.txt
  4. Please find mb-check-results.zip attached. Thank you Stephen Hopkins mb-check-results.zip
  5. We have a computer with scheduled update and scans (screen capture attached). The schedule is for one update and one scan daily. The logs for the latest day are  2018/02/06 15:20:02 -0600 PC-140519 frontdesk MESSAGE Executing scheduled scan: Quick Scan | Daily | -remove | -terminate 2018/02/06 15:20:02 -0600 PC-140519 frontdesk MESSAGE Scheduled scan executed successfully 2018/02/06 15:21:06 -0600 PC-140519 frontdesk MESSAGE
  6. Subject: Tanechka Threat Date: 13 NOV 27 Threat Description: This threat appears as a set of files in a folder under C:\Windows and in C:\Windows\System32. The threat installs command files, user accounts, administrator accounts and scheduled tasks. The goal of the threat is to execute the scheduled tasks which initiate a data mining operation on outside computers based on IP addresses. The CPU utilization quickly approaches 100%. The ISP notices the activity as malicious DDS efforts. The threat can be disabled and removed manually. The infection returns upon system reboot.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.