Jump to content

m4v3r1ck

ESET Insiders
  • Posts

    448
  • Joined

  • Days Won

    9

Posts posted by m4v3r1ck

  1. UPDATE! | SOLVED!

    Because I killed the internet connection as soon as I saw the accounts added, I was not able to check the Anti Theft (AT) status.

    @Marcos a big thank you to you! It was indeed the caused by the AT ghost account, I changed it immediately to another and for me much more recognisable ghost-name! I apologize for my panic-attack.

    Pff guys, I'm really sorry for stirring up things around here :wacko:, never had encountered this issues before, since I use ESET AT.

    For now all-systems-are-GO! A very BIG thank you for all who tried to help me solve this headache 

    Note to self: keep better track of your system thingies & RTFM! 

    Cheers

  2. 1 hour ago, itman said:

    Here's what is strange. The accounts the malware are creating show the "admin" symbol but they are missing the wording "local administrator account."

    Personally if you have malware that can at will create local admin accounts, it might be time to do a "repair" or full Win 10 reinstall. I would try the "repair" in place option first. I assume you haven't created periodic full image backups?

    You can also try a system restore to some previous time where malware activity wasn't present. Doubtful about the effectiveness of that but it's worth a shot. 

    Thanks for chiming in @itman, appreciated! This is an e-mail I found in the Apple Mail junk folder, please note that yesterday I booted my Windows 10 SSD in a NOT ISOLATED Vmware Fusion VM, but picked it up and booted as native "BootCamp" partition with regular shares Win10 <-> macOS

    58acbc59867c9_ScreenCap2017-02-21at22_41_30.thumb.jpg.7ffab05a7221260f7ceca2b06b4b7ba0.jpg

    Here's the screen for the copied user account:

    58acc06e821f2_ScreenCap2017-02-21at23_20_19.jpg.b97b82f1d513cc173b18283768cb1ed7.jpg

    Any thoughts guys?

    TIA!

  3. Hi all,

    I urgently need some serious help tackling my issue! As stated in the titles my SSD-WIN10PRO is out of control creating additional strange user names. After deleting them manually, I now even face a security risk, because some process is even copying my own "username" as "username1"? :o

    58ac25e7cdefc_ScreenCap2017-02-19at20_54_29.jpg.e75053569a0e8b71a43222f6b235fff5.jpg

    58ac25eb29981_ScreenCap2017-02-19at21_03_24.jpg.8d69ec363586b76070024c84f0154c49.jpg

    58ac25e847911_ScreenCap2017-02-19at20_56_55.jpg.f657c80aff8ea1cf4b7e3fcdceecc1c0.jpg

    58ac25e9a4b22_ScreenCap2017-02-19at20_58_47.thumb.jpg.3359e1d1f9051ae3b69b595d6106739b.jpg


    Running ESET SS 10.0.390.0 with latest updates. I rebooted my SSD-WIN10PRO as an isolated VM now in VMware Fusion, killing the internet connection as well!

    Help much needed and appreciated ATM!

    Cheers

     

    ScreenCap 2017-02-19 at 20.59.39.jpg

  4. 1 hour ago, planet said:

     

     

    I'm happy to see that with the new Forum recently, these two things are now possible -- notifications for receiving kudos, as well as being able to provide a reason for editing posts. Thank you! :D

    ;)

  5. On 1/10/2017 at 5:27 PM, Ren said:

    I already unchecked external HDD but it still check it :-)

    Regarding to your screencaps, you are mixing things up a bit. Cap #1 are the settings for the Real-Time Protection, #2 are the settings to perform Computer Scans for internal and external drives with Smart/In-depth/Context selections. In your screen #2 a scan is performed By profile setting and selected only your Macintosh HD.

    Please note that you have to set up and select your drives in Scan Targets for all scan scenarios in the Scan Profile Setups for Computer Scan (Smart/In-depth/Context)!

    ScreenCap 2017-01-31 at 23.23.15.jpg

    1. Select Scan Profile

    2. Select Setup for Scan Targets (see selections above)

    Greetz

  6. Thanks for your reply, appreciated!

    Yes, to monitor every single connection by any application, inbound and/or outbound the best way to go is using the "interactive mode". It's more time consuming, but sets my own mind at ease. It also gives you a great insight - e.g. when testing beta-software - what the behaviour is in connecting to what server and which protocol its using like http(s).

    I'm an insider for Windows as well. The ESET SS software goes bananes - in interactive mode - when doing the first time clean install of Windows. Heh, its fun to watch the telemetry entering your computer!

    The GRC Leakage Tester sends an inbound connection to the firewall, when in "interactive mode" you have the option to rule in/out the connection you find suspicious. See my screens. The last test is to rule out that some other process then the ESET firewall is blocking the connection. The combination of both let's you check if your firewall is oke.

    If you have any more questions please don't hessitate to ask them here on the forum, a great place te be! I'm still on the steep learning curve myself! ?

    Greetz

  7. Just a quick Q: Did you DENY & ALLOW the rules correctly by clicking twice on the OK button after removing/adding the rules for the GRC Leakage Tester, according the sequence advised in this test? Perhaps you could share some screencaps on where ESS failed on you?

    I want to share my test sequence with you, perhaps other users running this test, being my first! ;)

    1. Test sequence start:

    ScreenCap 2017-01-28 at 23.36.18.jpg

    2. Run Leakage Tester -> create rule and remember permanent: DENY

    ScreenCap 2017-01-29 at 00.03.10.jpg

    3. Result Unable To Connect

    ScreenCap 2017-01-28 at 23.36.49.jpg

    4. ESS added the create rule (#417) and remember permanent: DENY

    ScreenCap 2017-01-28 at 23.37.35.jpg

    5. Removing (#417 -> #416) the create rule and remember permanent: DENY (note: don't forget to OK + OK the removal!)

    ScreenCap 2017-01-28 at 23.38.31.jpg

    6. Run Leakage Tester again -> create rule and remember permanent: ALLOW

    ScreenCap 2017-01-29 at 00.14.21.jpg

    7. ESS added the create rule (#417) and remember permanent: ALLOW

    8. Result Firewall Penetrated

    ScreenCap 2017-01-28 at 23.39.21.jpg

    9. Removing (#417 -> #416) the create rule and remember permanent: ALLOW (note: don't forget to OK + OK the removal!)

    10. Close the GRC Leakage Tester application

    Greetz

  8. On 1/6/2017 at 4:47 AM, Marcos said:

    As of v10, ESET Internet Security has replaced ESET Smart Security and does not contain Anti-Theft. Anti-Theft is now a part of ESET Smart Security Premium. As an existing customer, you can still install and use ESET Smart Security which contains Anti-Theft too.

    WOW when I booted my VM after a 10 days absense, I NOTICED that Anti-Theft is back on track in my ESET SS v10 10.0.386.0 (NON-PREMIUM version)!!!

    ScreenCap 2017-01-22 at 20.37.39.jpg

    Thank you ESET! ;)

    Greetz!

  9. Hi Ren, you can set them in the preferences of ESET CS(P) for RTP & CS:

    In main preferences select RTP:

    1.jpg

    Select your desired Media to Scan. Better leave this one selected for RM:

    2.jpg

    In main preferences select CS:

    3.jpg

    Select SPS (1) for several profiles and then select the ST (2) for each profile that you want to change. Repeat for each SPS needed.
     

    4.jpg


    Select desired scan targets BY PROFILE SETTINGS: 

    5.jpg

    OR select desired scan targets BY DRIVE TYPE -> i.e. in your case only Local Drives.

    6.jpg

    Select the drives you want to scan and click OK!

    Hope this will help you! Q's? Just let me know!

    Greetz

  10. Hi @TomFace,

    I received an e-mail notification with your added link to the post from @SCR about the same spelling typo:

    1. Did I post in the wrong subforum? Seems to be a double then. Thanks for that!

    2. I can't find your edited quote/post in which you added the link. A bit confusing, but not an issue of course.

    Greetz

×
×
  • Create New...