Jump to content

Marcos

Administrators
  • Posts

    36,251
  • Joined

  • Last visited

  • Days Won

    1,441

Posts posted by Marcos

  1. Please carry on as follows:

    1, Uninstall ESET NOD32 Antivirus.
    2, Run the Uninstall tool in safe mode to make sure it's removed completely.
    3, Install the latest version 11.2.63 from scratch with default settings.

    Should the problem persist, gather logs with ELC and provide the generated archive for perusal.

  2. Appears to be a faulty disk / controller. Run chkdsk to fix disk errors. Consider replacing the HDD.

    "Entry" = "taskhost (1028) WebCacheLocal: Corruption was detected during soft recovery in logfile C:\Users\F......i\AppData\Local\Microsoft\Windows\WebCache\V01.log. The failing checksum record is located at position END. Data not matching the log-file fill pattern first appeared in sector 401 (0x00000191). This logfile has been damaged and is unusable." 07/10/2018 06:06:33 ;

    "Entry" = "The following boot-start or system-start driver(s) failed to load:
    discache
    eamonm
    ehdrv
    spldr
    Wanarpv6" 07/10/2018 10:31:14 ;

    The driver detected a controller error on \Device\Harddisk1\DR2." EXTRA="07/10/2018 09:13:23"
    The driver detected a controller error on \Device\Harddisk1\DR2." EXTRA="07/10/2018 09:13:21"
    The driver detected a controller error on \Device\Harddisk1\DR2." EXTRA="07/10/2018 09:13:20"
    The driver detected a controller error on \Device\Harddisk1\DR2." EXTRA="07/10/2018 09:13:18"

     

  3. 9 minutes ago, Ian Ng said:

    Here attached the log files. I wish it can help to solve the problem.

    In your case the url was accessed by C:\Windows\SysWOW64\Microsoft\Protect\S-1-96-82\RB_1.4.42.60.exe  and Chome. Do you known what the application RB_1.4.42.60.exe is? If you don't use Chrome but another browser ideally without extensions, is the url still blocked?

     

  4. Please provide the subject of the email that you submitted to samples[at]eset.com.

    Batch files and basically scripts in general can be created in millions of ways. Especially if they are very small and run only system commands, it may be even impossible to detect them because some users might use them for legitimate purpose. Example: assume a batch file that adds a new user through the system net command. On one hand, it can be a part of a malicious batch file, however, on the other hand it can be used by administrators for perfectly legitimate purposes. And even if a detection is added, malware writers can obfuscate it in many ways or even wrap it into an executable (that can be again obfuscated / protected) to evade detection.

  5. 36 minutes ago, DamianTodarello said:

    You mean that there will NEVER be a decryptor for filecoder.crysis? Is it impossible to make a decryptor?

    If the author of the ransomware decides to publish the master decryption key, it will be possible. However, as you understand the chances it would happen are very slim.

×
×
  • Create New...