-
Posts
37,915 -
Joined
-
Last visited
-
Days Won
1,503
Everything posted by Marcos
-
There's another forum dedicated to v7 beta and an ongoing dicussion about this issue. Having said that, we'll draw this topic to a close.
-
Whenever you experience issues with BSOD, please provide the memory dump created during the crash and compressed in an archive to ESET for analysis. Feel free to drop me a personal message with a download link to speed up the analysis.
-
We've fixed it during a remote session. There was a shortcut in the startup folder attempting to load a non-existing dll.
-
Unfortunately, this is not possible. Creating general rules for files just by name while ignoring the path would be dangerous as the rules would be easily applied for malware, too, if the same file name was used by malware.
-
I reckon Leadbolt is detected as a potentially unwanted application (PUA) which is a fully optional detection.
-
Yeah, sorry, it's was early morning and I misread the post
-
It seems to be a weird tactics to make own software totally undocumented for 3rd party vendors and then offer own solutions. Note that ESET scans email for malware regardless of the email client use provided that it's received via POP3(S)/IMAP(S) protocols. The only module that won't work without a dedicated email client plug-in is antispam.
-
I'd suggest enabling logging of all files so that you can see what's actually being scanned.
-
If you have the full version of Malwarebytes installed, you should disable its real-time protection (especially if you have Windows XP).
-
Please confirm or deny my assumption that automatic updates are downloaded fine as long as an automatic update task is scheduled and the only issue is that Application update gets stuck.
-
The issue is being investigated. I was able to update v7 without an issue on Windows XP so far.
-
It's not wise to restore malware just in order to get rid of this message. Please create a SysInspector log and send it to me attached to a personal message.
-
Detection was actually added in update 6862 on Feb 2, 2012 and it's been detected since then: c:\test\9c0b098ca31c83cd2baa703ea657ac9a8c852cb8.htm - JS/Kryptik.HK trojan