Jump to content

MrWrighty

Members
  • Posts

    87
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by MrWrighty

  1. I have had both Eset Cyber Security and Eset Anti Virus 6.4 (Well latest versions as of today) installed on MAC OS Sierra and both are causing the systemUIService and occasionally the Wi-Fi services to hang.

    Both Eset products eventually crash (reports sent to Apple) but neither service returns to a running state, I have to force a reboot to get things stable again. Once I have uninstalled the Eset products the system remains stable.

    Mac Mini 1.4Ghz, 480GB SSD, 4GB Ram.

  2. If that is the case, why is ERA Console and Server telling me I have the latest version. There is no indication from the product that I am under protected.

    Surely under the circumstances ERA should indicate there are later versions available.

    By the way there is no warning screen just a file ### DECRYPT MY FILES ###.txt which I cannot open (Access Denied)

     

  3. Just been hit by Cry36. All files encrypted and the last part of the name includes [don-corleone@mortalkombat.su].vs95l

    Running 4.5 File Security on server and 5.0 Set Endpoint protection on all clients. All managed by Remote Administrator.

    Real time protect had been disabled by the encryptor program on the server.

    Set failed to recognise the encryptor files.

    Server is SBS2011 and Clients are Windows 7 64bit and Windows 10 64bit.

    Have run the ESETEternalBlueChecker.exe and the server passed the test. It is fully patched.

    How did this get through.

  4. 3 minutes ago, Marcos said:

    It could be caused by a 3rd party tool or possibly by malware. Please generate a Procmon boot log and also collect ELC logs as per the instructions linked in my signature. When done, compress the Procmon log(s), upload the archive together with ELC logs to a safe location and pm me download links.

    Try scanning with MalwareBytes first before re-installing. If it is malware then this should pick it up. 

  5. Windows 10 64bit NOD 32 offered and automatic upgrade to V9 which I accepted and proceeded to up grade.

     

    The upgrade failed and according to your online instruction manually did and update then attempted again. It failed again.

     

    I was prompted to reboot which I did, but now Windows is failing to reboot. I am getting an BSOD critical_process_died.

     

    Windows 10 is now continually trying to repair itself with an automatic repair and Diagnostics. I was offered a restore but this too appears to have failed as the PC never reboot.

     

    Extremely unhappy about what has happened.

  6. Its probably the way the updates are rolled out. A point release is more a bug fix update rather than any feature additions which would normally roll out under a new master revision i.e. 9 to 10.

     

    If the differences are big enough then it would have to be a conscious decision  to upgrade rather than update through the existing software. This ensures you have read the release notes and that it won't impact your usage in anyway without you knowing about it.

  7. You need to find the source process that is running and kill it, then remove tmp files in the users account.

     

    Customer of mine just been hit big time, encrypted 58000 Files. According to Eset it should also delete all VSS shadow copies but that doesn't seem to have happen as I am able to restore from previous versions.

  8. Well it looks like I have finally found a solution.

     

    It appears that the installation of Eset Endpoint AV changes the permissions of ~/library/preferences/loginwindow.plist to root:wheel.

     

    I found this courtesy of MagerValp on https://magervalp.github.io/2015/08/17/scep-outlook-crash.html. His problem stemmed from 

     

    System Center 2012 Endpoint Protection + Outlook 2011 = Crash

     

    ​He commented that System Centre 2012 Endpoint Protection was a rebrand of Eset/NOD32 hence my interest. His post is very recent 17th Aug 2015.

     

    He wrote the following script to fix the permission issue: -

     

    #!/bin/bash

     
    # Restore ownership of user preference files.
    for preffolder in /Users/*/Library/Preferences; do
        if [[ -d "$preffolder" ]]; then
            uidgid=$(stat -f "%u:%g" "$preffolder")
            chown -hR "$uidgid" "$preffolder"
        fi
    done
     
    I have now run this script on my MAC running El Capitan, Outlook 2011 and Eset V6.1.16.0 and I now have a running stable Outlook.
  9. Just upgraded to El Capitan 10.11 and Endpoint AV will not start showing error Unsupported OS: OS X 10.11.

     

    I have Version 6.0.24.0 installed.

     

    According to your own documentation it should be compatible.

     

    I have found reference to version 6.1.12.0 which is now apparently available but I cannot find a download for it anywhere.

  10. I am confused as I have the same policy for all clients, both XP 32bit and Windows 7 64Bit.

     

    I have a policy set up that is rolled out to each client. The policy has all realtime protection features enabled. When I look at the local XP machine settings Scan on file open and Scan on File Execution are set to No but on the Windows 7 Machines is set to Yes.

     

    In ERA when I check the configuration via ERA it says Scan on File open No and Scan on file Execution No.

     

    Why is the configuration view not reflecting the actual settings on the machine.

  11. OK when downloading the cloudcar file I was presented with a warning about the file having not been downloaded much and could be harmful. It did let me download and save the file.

     

    I also tried the same file on a standalone V5 Installation and it correctly quarantined the file.

     

    All machines have Realtime file system protection on, web access protection on and email client protection on, controlled by profiles from ERA.

     

    The MalwareBytes log is below, I have replaced the users folder with xxxxxxx for security.

     

    Malwarebytes Anti-Malware

    www.malwarebytes.org
     
    Scan Date: 18/08/2015
    Scan Time: 14:11:36
    Logfile: MBAW.txt
    Administrator: Yes
     
    Version: 2.1.8.1057
    Malware Database: v2015.08.18.04
    Rootkit Database: v2015.08.16.01
    License: Free
    Malware Protection: Disabled
    Malicious Website Protection: Disabled
    Self-protection: Disabled
     
    OS: Windows XP Service Pack 3
    CPU: x86
    File System: NTFS
    User: Administrator
     
    Scan Type: Threat Scan
    Result: Cancelled
    Objects Scanned: 38136
    Time Elapsed: 4 min, 52 sec
     
    Memory: Enabled
    Startup: Enabled
    Filesystem: Enabled
    Archives: Enabled
    Rootkits: Disabled
    Heuristics: Enabled
    PUP: Enabled
    PUM: Enabled
     
    Processes: 1
    Trojan.TeslaCrypt, C:\Documents and Settings\xxxxxxxxxxx\Application Data\vcwnpd.exe, 3100, Delete-on-Reboot, [da72cb3f42496dc900bf6bf353ade21e]
     
    Modules: 0
    (No malicious items detected)
     
    Registry Keys: 0
    (No malicious items detected)
     
    Registry Values: 1
    Trojan.TeslaCrypt, HKU\S-1-5-21-3856658756-1690372353-575384576-1163\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|MSCONFIG, C:\Documents and Settings\xxxxxxxxxx\Application Data\vcwnpd.exe, Quarantined, [da72cb3f42496dc900bf6bf353ade21e]
     
    Registry Data: 0
    (No malicious items detected)
     
    Folders: 0
    (No malicious items detected)
     
    Files: 1
    Trojan.TeslaCrypt, C:\Documents and Settings\xxxxxxxxxx\Application Data\vcwnpd.exe, Delete-on-Reboot, [da72cb3f42496dc900bf6bf353ade21e], 
     
    Physical Sectors: 0
    (No malicious items detected)
     
     
    (end)
×
×
  • Create New...