I have a standalone Windows 7 computer that had RDP open. The source IP was supposed to be restricted, but by mistake it wasn't.
Anyway, I noticed that an unauthorized user was able to crack the password and log in. I found an entry in the APP log with the following line. Is anyone familiar with Pangolin.CracKed.By.Hmily[LCG][DST].exe?
Fault bucket 3368295517, type 1
Event Name: APPCRASH
Response: Not available
Cab Id: 0
These files may be available here:
Rechecking for solution: 0
Report Id: 878f7343-bbb2-11e3-8fce-534e57000000
Report Status: 0