I know I haven't uploaded any programs related to these files, so should II be worried about these files? I do suspect that the computer is being used as a botnet based on these files. Can anyone verify if it is indeed compromised and how I can clean it if it is? Please note, this is a work computer and has not been used (to my knowledge) for anything unsafe.
Free Guide: Managing storage for virtual environments
Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!