Jump to content

itman

Most Valued Members
  • Posts

    12,466
  • Joined

  • Last visited

  • Days Won

    329

Posts posted by itman

  1. 1 hour ago, Marcos said:

    If the javascript scanner works, then the update didn't affect ESET.

    Then why is the alert shown in red color? I have never seen that before as I recollect. 

    Also my other questions; no action given and nothing quarantined? Because it's HTML code, Eset JavaScript scanner just blocks the code execution and that's it?

    -EDIT- Below is a screen shot of the actual Eset alert. Appears my above assumption of in-memory execution blocking is correct. Also, I guess the red color is now used to show an actual threat and orange/brown used for simulated malware detection? Details on alert color coding scheme in log files would be helpful in the Eset online help.

    Eset_Alert.thumb.png.c9a805c374e223f90860d3a858727cf5.png

  2. 13 hours ago, xkajxkajx said:

    I think ESET is restricting  MY USER ACCOUNT  to delete or modify  some registry entries . PROVE ME WRONG .

    If this was the case, you should have been receiving HIPS alerts about modification of registry keys. Did you check your Eset HIPS log for entries related to your registry modification activities? If none of the prior apply, Eset is not preventing any of the registry key modifications you are performing.

  3. Win 10 Home x(64) 1809, Internet Security 12.0.31

    Never saw this one before. IE11 detected threat is shown in red color in the Eset associated log. Although no action appears to have occurred per log entry, I assume nothing malicious happened since the Eset alert stated threat was deleted. Note that nothing for this exists in Quarantine.

    Eset_Malware.thumb.png.60f5fdb3408743bf721376b22cc80c7e.png

     

     

  4. 40 minutes ago, novice said:

    So, what the point in running ESET firewall in default mode if something which is no-no in your security book is allowed out????

    If a worm is able to install itself, the first thing it will try to do is connect outbound TCP port 445.

    Eset by default doesn't block outbound TCP port 445 since if your on a internal network and share files or printers, it is valid communication. I am not on a network and as such, don't share files or printers.

  5. As far as the inbound port 445 traffic, your router should be blocking any unsolicited inbound traffic on that port. That means something on your PC is most likely sending outbound TCP traffic on port 445. This is a no-no in my security book but the Eset firewall by default rule will allow it. The culprit my best guess is the above noted process.

  6. First up is the Microsoft Publication Service Device Host that is connecting to a Russian IP address per Robtex lookup:

    Quote

    5.145.203.195

    whois
    Smoltelecom PPPoE (dynamik IPs pool2)
    route
    5.145.192.0/18
    bgp
    AS44265
    asname
    SMOLTELECOM-NET
    descr
    Dummy description for 5.145.192.0/18AS44265
    location
    Smolensk, Russia

     

    Per Microsoft:

    Quote

    Publication Services enables a WSD device to advertise (publish) its functionality and then offer its functions as Web services over IP-based networks. It also enables devices to find (discover) and access Web services of other devices and computers on the same network. From a user's perspective, NCD technologies will largely eliminate the experiential difference between using devices directly connected to a computer and those virtually connected over a network (including the Internet). As explained above, typically a developer will uniformly access NCDs using higher-level publication services and function discovery.

    https://msdn.microsoft.com/en-us/library/bb756908.aspx/

    Why that process is running let alone installed on an end user PC is beyond me.

     

     
  7. You might want to review this article on how Emotet is spread: https://www.us-cert.gov/ncas/alerts/TA18-201A 

    Quote

    Emotet is disseminated through malspam (emails containing malicious attachments or links) that uses branding familiar to the recipient; it has even been spread using the MS-ISAC name.

    Use an e-mail client and configure it to disable active content and not automatically open e-mail attachments. Also Eset will scan all the incoming e-mail prior to arrival on your hard disk. Or, go to the extreme and configure the e-mail client to only receive e-mail in text format such as I do.

  8. On ‎12‎/‎16‎/‎2018 at 9:06 PM, xkajxkajx said:

    Tried to remove them in the registry, but they keep coming back everytime I reboot or log off ?!.

    HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers

    According to this article: https://www.techspot.com/guides/1670-windows-right-click-menu/ , you're not deleting the entries from the correct registry keys:

    Quote

    Navigate to Computer\HKEY_CLASSES_ROOT\*\shell and Computer\HKEY_CLASSES_ROOT\*\shellex to find many application context menu entries and delete the ones you no longer want.

     

  9. Do a Google search using this: "access to xmlhttprequest at from origin has been blocked by cors policy". Appears it's a security issue with the web site you mentioned.

    Why Eset protocol filtering would trigger it, I really don't have a clue. You can always exclude that web site from protocol filtering at your own risk.

  10. 59 minutes ago, Marcos said:

    was able to find only one report of this issue, however, it's not clear what actually fixed it for the user: https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/measured-boot-library-encountered-a-failure-and/b3b41312-abb3-4ea0-9a7b-17c1a2ed5506.

    Yeah, saw that previously. Ran the bcdboot command and it didn't make any difference.

    Further research yields:

    Quote

    Secure Boot and Measured Boot are only possible on PCs with UEFI 2.3.1 and a TPM chip. Fortunately, all Windows 10 PCs that meet Windows Hardware Compatibility Program requirements have these components, and many PCs designed for earlier versions of Windows have them as well.

    https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process

    My PC motherboard has a BIOS and it doesn't have a TPM chip. So chalk this one up to the "never ending" 1809 snafus. At least it doesn't appear to bork the boot processing.

  11. Just upgraded to Win 10 x(64) 1809 Home yesterday.

    Seeing this in my Win Event Kernel-Boot log:

    Measured Boot library encountered a failure and entered insecure state. InitState: 1, StatusCode: 0xC0000001, Failure Address: 0x945657, Reference Address: 0xA4E840, Reason: 1.

    As far as I am aware of, measured boot relates to loading of Windows Defender or third party AV ELAM driver.
     

  12. First, make sure you have "Enable detection of potentially unwanted applications, unsafe applications, and suspicious applications" enabled  in the Eset GUI Detection Engine section. If so, did you manually override one of those detections and install some software you wanted?

    Run a full system scan as administrator. If Eset detects nothing or even if it does so, then run a scan using AdwCleaner. You can download it here: https://www.malwarebytes.com/adwcleaner/ . This should clean up any remnants. Finally, it is recommended to reset your browser settings back to default value.

  13. 4 hours ago, Rami said:

    Why is the Windows Firewall running?

    It starts at boot time and its front-end processing is disabled when Windows Security Center initializes. Note that the Eset GUI processing which includes its firewall rules doesn't fully initialize until WCS initializes. Also the Eset firewall does interface with the Win firewall for its inbound rule processing which is enabled by default. Bottom line - the Win firewall is not fully disabled and non-operational when the Eset firewall is enabled. Eset's firewall processing does however take precedence over the Win firewall processing. Hence when you view the Win firewall settings in Control Panel, it is noted the Eset firewall is "managing" the Win firewall operation.

    Anyway, my original posting is no longer an issue, at least presently, since I just upgraded to Win 10 1809.

×
×
  • Create New...