Jump to content

Marcos

Administrators
  • Posts

    36,487
  • Joined

  • Last visited

  • Days Won

    1,452

Posts posted by Marcos

  1. Without knowing details about the block it's impossible to tell if it was malicious or legit operations that were blocked. Posting a couple of records from the HIPS log might shed more light. Also note that logging of blocked operations should only be enabled for the time of debugging certain issue, otherwise the HIPS log may continue to grow up quickly until the disk space is exhausted.

  2. Please continue as follows:

    - open the task manager and make sure no browser or email client process is running.

    - disable SSL scanning

    - click OK

    - enable SSL scanning

    - click OK

     

    Should you get an error, copy the information about installed modules from the about and paste it here. If you have the most current modules installed, we'll need a Process Monitor log from the point of enabling SSL scanning for analysis.

  3. If you're able to reproduce the freeze, please configure Windows to generate complete memory dumps as per the instructions here and when a freeze occurs, use the appropriate key combination to create a memory dump. Of course, disabling startup scan tasks is not recommended as they serve as another protection layer and can detect potential new born malware in memory.

  4. The best course of action would be to log file operations during a backup using Process Monitor and to supply Customer care with the log created as well as with a SysInspector log for perusal. It will be enough to leave Process Monitor logging operations only for about a minute. When you have the logs ready, you can upload them to a safe location and PM me the download link or contact Customer care.

  5. Please post a complete record related to the detection from your threat log. The record should look like as follows:

    18. 7. 2013 13:59:44    Real-time file system protection    file    D:\test\kogabontusiq.exe    a variant of Win32/Kryptik.BFXC trojan    cleaned by deleting - quarantined    domain\admin    Event occurred during an attempt to access the file by the application: 

  6. Please check if the issue with CPU spiking goes away after disabling real-time protection. If so, capture all file operations using Process Monitor while reproducing the issue. When done, compress the log along with a current SysInspector log into an archive, upload it to a safe location and pm me the download link.

×
×
  • Create New...