Jump to content

Marcos

Administrators
  • Posts

    37,944
  • Joined

  • Last visited

  • Days Won

    1,504

Everything posted by Marcos

  1. If you suspect memory leaks to be caused by ESET, please generate a complete memory dump as per http://support.eset.com/kb380. When done, compress the dump, collect logs with ELC, upload both archives to a safe location and pm me download links.
  2. Oh no, a test performed by scanning files without further checking them with analysts if they are really malicious and if should be detected? I'd bet that checking them would reveal that at least 99% of them are not subject to detection. Feel free to drop me a link to an archive with those files so that I can check them out.
  3. Let us know if uninstalling, removing "HKEY_LOCAL_MACHINE\SOFTWARE\ESET\ESET Security" and then installing v10.1 from scratch helps.
  4. Version 10.1.219 is home version and is not manageable by ESET Remote Administrator. You should uninstall it and install ESET Endpoint Antivirus v6.5 instead.
  5. Warp.php - detected by ESET as JS/Kryptik.BBC trojan for more than a year.
  6. This forum is not meant to be a means for reporting undetected samples or urls. For instructions how to report them to ESET Research Lab, follow the instructions in the appropriate KB which is also listed in the FAQ section at the right-hand part of this forum. We kindly ask you to stop posting disallowed stuff here as breaking TOS repeatedly may result in account ban. We are not going to block the links just because they offer pharmacy and do not serve any malicious or scam content.
  7. Collect logs with ELC and "Threat detection" selected from the menu, upload the archive to a safe location and pm me a download link. I assume it''s a fileless threat that is present in the registry only.
  8. Internal emails are not scanned by default, however, there's an option to enable it. I'd suggest containing your local customer care to troubleshoot issues with undetected spam or malware on Exchange.
  9. Unfortunately, you didn't mention what product you use. If ESET Endpoint Security or ESET Endpoint Antivirus and it's managed by ESET Remote Administrator, you can create policies via ERA.
  10. ESET Internet Security is actually renamed ESET Smart Security, currently without Anti-Theft.
  11. Try the following: - restart Windows - without launching any application, open the advanced setup, disable SSL/TLS scanning and click OK - re-enable SSL/TLS scanning and click OK - launch Thunderbird Was the problem solved?
  12. The detection is correct. A toolbar is known to be bundled with CCleaer. Not sure if it's still possible to obtain an installer that doesn't contain it from somewhere. Anyways, it's detected as a potentially unsafe application. This detection is disabled by default.
  13. The OP still uses the old ERA v5 and Endpoint v5 that are not managed via ELA and therefore cannot "eat" seats if a computer stops reporting to ERA and is replaced with a new one. In such case, it's enough to delete such computers from ERA as it allows to manages only the number of computers specified in a license file. I'd strongly recommend upgrading to ERA v6 and Endpoint v6 which also provides better protection especially on Windows 10.
  14. The golden rule is that only one real-time protection should be active at a time. If you install ESET or another 3rd party antivirus, Windows will disable Defender. That also happens if an antivirus stops updating due to expired license; it has to deactivate its real-time protection and Defender will activate instead. I'd strongly recommend upgrading ESET to the latest v10 which not only addresses issues from older versions but it also bring improved protection, especially on Windows 10 (in particular, AMSI scanner, advanced script scanner and protected service).
  15. Version 6.5.31 is the version of the whole ERA release. The version of the ERA Server can be found at http://support.eset.com/kb3690/, ie. ERA Server for Windows that belongs to the release is 6.5.522.0.
  16. Try removing ESET in safe mode: http://support.eset.com/kb2289
  17. Please see https://forum.eset.com/topic/12721-after-update-i-have-to-restart-again-and-again/ where you'll find instructions for creating 2 logs that we'll need for analysis.
  18. It appears that both logs were created when unregistering callouts from BFE. Ie. I assume you inadvertently ran "EpfwWfpRegV10.1.2.exe /unreg > reg.txt" instead of "EpfwWfpRegV10.1.2.exe /reg > reg.txt".
  19. It's a protected browser intended mainly for banking transactions. At the top you should also see a label "Secured by ESET".
  20. The license was issued by Microbe Pty Ltd (http://www.microbe.com.au/), hence I'd suggest contacting them.
  21. Well, in such case malware could easily add urls to the list of allowed addresses or to the list of addresses excluded from filtering to evade detection or to enable download of malicious content that would be otherwise blocked.
  22. Please download and run the attached tool as administrator as follows and provide me with the 2 logs: EpfwWfpRegV10.1.2.exe /unreg > unreg.txt EpfwWfpRegV10.1.2.exe /reg > reg.txt EpfwWfpRegV10.1.2.rar
  23. Although I can't answer this question, I doubt that the list is stored in a plain text form so it doesn't matter if it's saved encrypted in the registry or on a disk in a binary file.
×
×
  • Create New...