Jump to content

Search the Community

Showing results for tags 'VMware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Announcements
    • Malwarebytes News
    • Beta Testing Program
  • Malware Removal Help
    • Windows Malware Removal Help & Support
    • Mac Malware Removal Help & Support
    • Mobile Malware Removal Help & Support
    • Malware Removal Self-Help Guides
  • Malwarebytes for Home Support
    • Malwarebytes for Windows Support Forum
    • Malwarebytes for Mac Support Forum
    • Malwarebytes for Android Support Forum
    • Malwarebytes for iOS Support
    • Malwarebytes Privacy
    • Malwarebytes Browser Guard
    • False Positives
    • Comments and Suggestions
  • Malwarebytes for Business Support
    • Malwarebytes Nebula
    • Malwarebytes Nebula Modules
    • Malwarebytes Endpoint Security
    • Other Malwarebytes Business Products
    • Malwarebytes Business Products Comments and Suggestions
  • Malwarebytes Tools and Other Products
    • Malwarebytes AdwCleaner
    • Malwarebytes Junkware Removal Tool Support
    • Malwarebytes Anti-Rootkit BETA Support
    • Malwarebytes Techbench USB (Legacy)
    • Malwarebytes Secure Backup discontinued
    • Other Tools
    • Malwarebytes Tools Comments and Suggestions
  • General Computer Help and Security Updates
    • BSOD, Crashes, Kernel Debugging
    • General Windows PC Help
  • Research Center
    • Newest Rogue-Ransomware Threats
    • Newest Malware Threats
    • Newest Mobile Threats
    • Newest IP or URL Threats
    • Newest Mac Threats
    • Report Scam Phone Numbers
  • General
    • General Chat
    • Forums Announcements & Feedback

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Location


Interests

Found 5 results

  1. VMWare Horizon is used by University of Oslo for remote computer login and portal to sensitive data management system. Could the following detection a false positive, please. Many thanks. Tony Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 14/07/2022 Scan Time: 01:03 Log File: fa7323f0-02ff-11ed-a25b-fc4596ac94ae.json -Software Information- Version: 4.5.11.202 Components Version: 1.0.1716 Update Package Version: 1.0.57210 Licence: Premium -System Information- OS: Windows 10 (Build 19044.1806) CPU: x64 File System: NTFS User: DESKTOP-CSJCGG0\Tony -Scan Summary- Scan Type: Custom Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 2704794 Threats Detected: 1 Threats Quarantined: 0 Time Elapsed: 6 hr, 31 min, 33 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Warn PUM: Warn -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 0 (No malicious items detected) Registry Value: 0 (No malicious items detected) Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 1 MachineLearning/Anomalous.94%, C:\USERS\TONY\APPDATA\LOCAL\VMWARE\VMWARE HORIZON VIEW CLIENT\APP CACHE\8D38C4A1-0BF9-4D79-90BD-E6B9DB074CD1\CN=EPHORTE,OU=APPLICATIONS,DC=VDI,DC=VMWARE,DC=INT.EXE, No Action By User, 0, 392687, 1.0.57210, , shuriken, , C0BE84D630906621E38E1A51DDE7882A, 09A077720C25B869BB5B476343EEE4387E7D4B14919B7F46D4D4A033CB70DEA9 Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end)
  2. The University of Oslo, Norway, uses VMware Horizon (https://view.uio.no/portal/webclient/#/home) for their virtual machine access. I downloaded VMware Horizon Clients (https://customerconnect.vmware.com/en/downloads/info/slug/desktop_end_user_computing/vmware_horizon_clients/horizon_8#win64) but Malwarebytes reported a MachineLearning/Anomalous.94% scan result. Likely to be a false positive? Log attached. Thanks. log.txt
  3. Hi all, Not sure how much time I'll get to play with it an anger, but I'm trying to set up a malware research rig along the lines of this tutorial here: https://blog.malwarebytes.com/threat-analysis/2012/04/anonymizing-traffic-for-your-vm/ I notice that it's quite old, which is a serious consideration in this game. The first problem I have is that I cannot get JanusVM to run up at all in any way shape or form. I tried setting up VMWare Player on my Linux installation, but every time I tried to launch JanusVM as per the instructions in that article, VMware Player just kept crashing out. I finally found an error in the log, which simple said "Client error 11: exiting" (or words to that effect). Googling this error showed that, whilst I could not find anybody reporting the error when trying to run JanusVM, it seemed to mean "System call failed" at which point I knew this was going to go nowhere. So I tried again on Windows 10, and this time got this: "Error whiloe powering on: The virtual machine configuration may not be modified. The virtual machine failed t start because the legacy configuration is no longer supported. Upgrade the virtual machine or retry the operation on a compatible product." Again, a show-stopping error. JanusVM is very old now - like 2010 - and the only other thing I could find was TorVM which is even older (2008). Does anybody have any ideas? Thanks!
  4. I have two virtual machines running Windows in VMware. (I'm actually a Mac user) I'm wondering if I need 2 licenses for the premium version or if 1 license covers my situation? (I'm assuming 1 license is for 1 computer?) P.S. Does Malwarebytes Anti-Malware Premium really give me more protection in comparison with the free version and Kaspersky Total Security? P.P.S. Isn't there a sale available for the holidays?
  5. Today I started getting the following detection with malware DB v2014.06.12.06, and am wondering if it might be a false detection: Modules: 1 Spyware.Zbot.ED, D:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Plugins\SMS\yFilesAdapter.dll, No Action By User, [4d49de993249f83e46040e3aad53fb05], Registry Values: 1 Spyware.Zbot.ED, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\SHAREDDLLS|D:\PROGRAM FILES (X86)\VMWARE\INFRASTRUCTURE\VIRTUAL INFRASTRUCTURE CLIENT\PLUGINS\SMS\YFILESADAPTER.DLL, 1, No Action By User, [4d49de993249f83e46040e3aad53fb05] Files: 1 Spyware.Zbot.ED, D:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Plugins\SMS\yFilesAdapter.dll, No Action By User, [4d49de993249f83e46040e3aad53fb05], Full logs and DLL attached. Malware Bytes Log 2014-06-12.txt yFilesAdapter.zip
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.