Jump to content

Marcos

Administrators
  • Posts

    37,013
  • Joined

  • Last visited

  • Days Won

    1,469

Posts posted by Marcos

  1. If you're able to reproduce the freeze, please configure Windows to generate complete memory dumps as per the instructions here and when a freeze occurs, use the appropriate key combination to create a memory dump. Of course, disabling startup scan tasks is not recommended as they serve as another protection layer and can detect potential new born malware in memory.

  2. The best course of action would be to log file operations during a backup using Process Monitor and to supply Customer care with the log created as well as with a SysInspector log for perusal. It will be enough to leave Process Monitor logging operations only for about a minute. When you have the logs ready, you can upload them to a safe location and PM me the download link or contact Customer care.

  3. Please post a complete record related to the detection from your threat log. The record should look like as follows:

    18. 7. 2013 13:59:44    Real-time file system protection    file    D:\test\kogabontusiq.exe    a variant of Win32/Kryptik.BFXC trojan    cleaned by deleting - quarantined    domain\admin    Event occurred during an attempt to access the file by the application: 

  4. Please check if the issue with CPU spiking goes away after disabling real-time protection. If so, capture all file operations using Process Monitor while reproducing the issue. When done, compress the log along with a current SysInspector log into an archive, upload it to a safe location and pm me the download link.

  5. If possible, please answer the following questions:

    - What type of Internet connection do you use? (3G, wi-fi,...)

    - Are you able to open websites in a browser when experiencing the issue?

    - Does changing the type of connection make a difference?

    - Does uninstalling EMS v1 and installing EMS v2 make a difference?

×
×
  • Create New...