Is there a way to track where threats to endpoints come from? (See threat below)
ICMP.DLL,?Trojan.Dropper.Gen,?%appdata%{9a88e103-a20a-4ea5-8636-c73b709a5bf8}
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.