Jump to content

Search the Community

Showing results for 'firefox'.

Didn't find what you were looking for? Try searching for:

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • ESET General Forums
    • ESET Announcements
    • General Discussion
    • Forum FAQ's and Rules
    • Submit a virus, website or potential false positive sample to the ESET lab
  • ESET Home User Products
    • ESET Internet Security & ESET Smart Security Premium
    • ESET NOD32 Antivirus
    • ESET Cyber Security (for Mac)
    • ESET Cyber Security Pro (for Mac)
    • ESET NOD32 Antivirus for Linux Desktop
    • ESET Products for Mobile Devices
    • Web portals
  • Malware Detection and Cleaning
    • Malware Finding and Cleaning
    • ESET Standalone Malware Removal Tools
  • ESET Business User Products
    • ESET Endpoint Products
    • ESET Products for Windows Servers
    • ESET Products for Linux Servers
    • ESET Products for Mobile Devices
    • Remote Management
    • ESET Enterprise Inspector (EDR)
    • ESET Products for Virtualized Environments
    • Encryption
    • ESET Licensing for Business
  • ESET Beta Products
    • ESET Beta Products for Home Users
    • ESET Beta Products for Business Users
  • Slovak and Czech forums
    • ESET NOD32 Antivirus, ESET Internet Security a ESET Smart Security Premium
    • Produkty pre mobilné zariadenia
    • Vírusy a iné hrozby
    • Ostatné


  • Files
    • Early Access
    • Miscellaneous

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL






Found 120 results

  1. I am running Ubuntu Desktop 19.10 (GNOME 3.34.2) and am having a strange problem with NOD32 (64-bit). I have a Firefox (73.0.1) window open to YouTube TV (streaming a TV program) and after a while (~5 minutes), other Firefox windows will stop browsing. The windows/tabs open just fine but won’t display any content nor can I access any URL. It doesn’t matter if I disable the ESET protection or not, the behavior is still the same. However, if I remove NOD32, everything works OK. I’ve tested this multiple times by reinstalling NOD32, and each time the problem returns until I uninstall it. This is a fresh build of Ubuntu 19.10 but I’ve also found this same behavior in Ubuntu 18.04.
  2. At the beginning when the computer was turned on the program was automatically executed, the program uses many resources and can even crash the computer. I managed to disable its execution at startup, and after making an analisys the ESET antivirus did not detected the malware. So, I know the location of the executable "C:\Program Files (x86)\Common Files\OmniSoft" but I don't see how to uninstall this program, It is not at the contoll panel. having access to the location of the program folder, how can I uninstall it?
  3. I found the Error page today (2/28/20) and later found that -- IF I CLK LOGIN on THAT ERROR Page -- it opens to my Anti-Theft page as intended. Firefox 73.0.1 / New Edge Chrom got same error earlier.
  4. Thank you Marcos! I installed 4.0.93 and observed the same behavior so I submitted a ticket along with the customer_info.tgz. I discovered that Chrome also has issues streaming with NOD32 installed. If I try to watch a ‘twitch.tv’ stream, it will black out after a few minutes and sometimes I’ll get an error saying Chrome unexpectedly shut down”. Like with Firefox, disabling NOD32 doesn’t fix the problem, but uninstalling it completely does. I noticed that it requires some 32-bit libraries to run even though it’s supposed to be a 64-bit product. ‘libgtk2.0-0’ (for Ubuntu 19) & ‘libc6-i386’. Hopefully there's no conflict.
  5. I just reanalyzed the Avast noted FireFox update.exe at VT and its 100% clean. Worse none of the cloud sandboxes; i.e. Hybrid-Analysis or Joe's Sandox, detect any abnormal behavior. What this bugger appears to be is a very old legit ver. of FireFox. Suspect it can be run in hidden mode to perform Internet activities and only God knows what else. Look in this registry key for any suspicious .exe's not installed by you; e.g.: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\996E.exe
  6. the same situation here (crying icon; on win7 x64, using chrome or Firefox) Using an IE11 (win7) i did successful login. then i did logout and retried login using firefox. got crying image... then did try login using IE - got the same situation (crying). something very strange is going on . it do not seems to be tightly related to the browser i'm sure, that login using IE to eset site was the first usage of this address on IE. But the second try didn't work... BR, Albinas
  7. I'd like to block https://www.youtube.com/. In URL ADDRESS MANAGEMENT, I add a record *.youtube.com. I've tried IE/Firefox/Vivaldi, https://www.youtube.com/ been blocked. But if I use Chrome to browse https://www.youtube.com/, EEA don't block it. If I block others domain, for example: *.facebook.com, then https://www.facebook.com/ been blocked in IE/Firefox/Vivaldi/Chrome. EEA version: 7.2.2055 How can block YouTube form Chrome?
  8. Also note that from the Avast forum posting, Avast didn't detect this fake FireFox update.exe as malicious. It triggered on the outbound communication from it to a known malicious URL/IP address. My best guess is this bugger is legit software being used for other than legit purposes. Most likely for spyware purposes.
  9. Here's an old thread in the Avast forum dating from 2015 where the behavior observed was almost identical to that on your device: https://forum.avast.com/index.php?topic=92407.0 . The only difference here was the directory where the fake Firefox updater.exe was located was named ComObjects. The OP in this posting stated he had a "new build." This leads me believe that this software was installed by the OEM of the device. In any case, removing that startup entry for the software, prevented it from running thereafter. So my opinion is yes, you have eliminated whatever this thing was. If it reappears, I would start looking for any built-in diagnostic software or the like that was installed by the OEM of your device and uninstall that.
  10. I have a local account. I do not use online anytihng for this win10 debacle. I have SHUTUP switch off almost everything. I have no one drive, I have no microsoft accounts. microspasm have, over the years, clearly demonstrated their mistrust, disgust and lack of customer service for the very people who made them the global garbage patch they now are. As for a Linux recommendation, clearly, the front runner for new folk is Ubuntu. The GUI has evolved vastly over the years, it is stable, useful and easy to get to grips with. The standard desktop version contains all the workable software you would likely need. Installing more software is a doddle and there is a world of passionate, dedicated expert-like folk who will gladly offer any free assistance. There is NO activating online. There is (almost) no snooping - firefox, etc will have crash report info sent off but these things can easily be disabled. Almost everything you could want will be available as Open Source or GPL, etc so no worries about purchasing things. Virtualisation runs far better on the Linux platform than windows via KVM/QEMU. The only caveat that I have encountered is that cut/paste between host/guest and shared folders are a bit trickier to set up than would be the case with a windows setup. However, if you don't want a more hardware-centric virtualisation then you can still employ virtualbox which operates as well as virtualbox does anywhere. Software development tools do NOT require 10Gb or more of install as one gets with visual studio. By the same token, no registration is required such as microspasm force one into so they can spy on more of your activities. If one is a non-gaming user, Linux is ideal. If one is a business user, it could also be ideal but for the fact that the bulk of businesses use BackOffice tools - especially exchange/outlook; the latter of which has been altered so it is not so user-friendly any longer. I was weaned on UNIX (SYSV) and have been a ms/windows tech-type since MSDOS 3.x and windows 3. With every subsequent release, I have disliked windows less and UNIX-like more. The day windows is history will be a glorious day for the whole world! P.S. Once you feel confident enough you can even recompile your Linux kernel to streamline it to your tastes and speed-up your boot times. Personally, I have not recompiled a kernel since using Slakware but it is fun to try and would take far less time today than the 4-7 hours it used to take using pre-pentium intel chips back in 1993.
  11. i did wrote. IE11, firefox 73.0.1 (64-bit), chrome 80.0.3987.122 (Official Build) (64-bit) and in addition the latest Brave. It didn't login at all. shields up/down). All on win7 pro x64.
  12. I know I have turned off cache on my firefox on my computer, i will re enable it
  13. But I uninstalled firefox and this remained, as I started the pc this program started opening pages in the malicious firefox.
  14. Firefox updater is located in C:\Program Files\Mozilla Firefox and it's called updater not update.exe This file is malicious , and it's suspicious Upload it to one of these : https://www.virustotal.com/gui/home/upload https://www.hybrid-analysis.com/ https://app.any.run/submissions/
  15. I finally found a web reference to this Omnisoft fake FireFox garbage. Per this MalwareByte forum posting thread: https://forums.malwarebytes.com/topic/238865-mozilla-pops-up-with-pon-contents-whenever-i-boot-my-pc/?tab=comments#comment-1279613 . Initially it appeared that this might be a rootkit and Kaspersky's TDSS Killer: https://usa.kaspersky.com/downloads/tdsskiller got rid of it. However as the OP posted, looks like the bugger reinfected the installation somehow. This might have been via the previously noted startup entry the malware created. Do as @Nightowl suggested. Run a Custom scan ensuring all drives, folders, files, and networks are selected. Make sure the scan is run as Administrator by clicking on like named button. This should at least let us know if a rootkit is present or the MBR is infected.
  16. Win 10 x(64) 1909, FireFox 73.0.1, Eset IS 13.0.24 Eset is not throwing an alert for blocked Google search list results. Mouse clicking on the URL results in no visual clue the connection was blocked. Nor does the current displayed screen with existing search results change in any way. The block is logged in the event log however. For example: However if I try to access hxxps://www.pcrisk.com from the FireFox address bar, the Eset PUA alert displays:
  17. If your primary concern is browser privacy, you are best served using a browser that is designed for privacy such as FireFox. "Out-of-box:" i.e. w/o adding any extensions, it offers a number of privacy protections such as: Adding the uBlock Origin extension will only strengthen FireFox's native privacy protections. uBO by default uses multiple tracking protection and malware block lists with AdBlock's TPLs being one of them. I have also added Nano Defender to uBO which is an anti anti-adbocker. Web sites are increasingly using anti-adblockers to get around browser adblocking protection. Adding Nano Defender to uBO in FireFox is a "bit tricky" though. The final FireFox extension I use is Decentraleyes which does: Finally, note that Chrome is built for security; not privacy. Being a Google based product, I believe that is self-evident.
  18. Something just occurred to me. This Omnisoft stuff might be related to some extension or the like you installed directly or inadvertently in FireFox. Perhaps something by Mozilla itself. This would at least explain the signed cert. by Mozilla for update.exe.
  19. This C:\program files x(86)\common files\omnisoft\update.exe obviously has nothing to do with FireFox. It's update program is located in its specific C:\program files x(86) or C:\program files directory. For this reason alone, I say the program has nefarious purposes. Software located in C:\program files x(86)\common files directory get there usually as a result of something you downloaded and was placed there via installer method. It could also be adware that that was embedded or possibly even a coin miner since you state it is using a lot of system resources. The first place to check is Windows installed programs via Control Manager for anything that you don't recollect manually installing. I would start by creating an Eset firewall rule to block any outbound traffic from C:\program files x(86)\common files\omnisoft\update.exe. Make sure you enable event alert and log entry creation. When the alert occurs copy the Eset Network protection log entries related to the outbound traffic and post them in a forum reply. This will give us an idea of the server IP addresses the bugger is trying to connect to.
  20. Hi, I have a big problem. ESET Endpoint Security since several day change my general.config.filename value to eset_security_config_overlay.js (Mozilla Firefox about: config). When i Edit this file (add personal values) i am not resolving my problem because if i run mozilla firefox once again, the file rollback to default value. I attached screen from Mozilla Firefox about config. Mozilla Firefox version ESR 60.8 x86 Eset Endpoint Security Please help me, how can i turn off this settings or how can i change content this file.
  21. Actually, my previous comments about Firefox had nothing to do with the Eset forum. Again, I was getting random ones infrequently until I enabled DoH. Another behavior I have seen in regards to uBlock Origin and Firefox is how some search list connections are silently blocked, whereas others will show a block alert from the applicable TPL. For example when using the Google displayed search results list, I can click on a URL and nothing happens. UBlock just silently blocks the connection attempt. No failed connection display, etc.. -EDIT- Appears the above blocking is not being done by uBlock Origin after all. The blocking is being done by Eset PUA blacklist. But no alert is being displayed if its a Google search it URL: Whereas if I try to access hxxps://www.pcrisk.com via Firefox address bar, I will receive an Eset PUA alert. Looks like a bug. Will open a new thread for it.
  22. Make sure you check for updates again: https://www.ghacks.net/2020/01/08/firefox-72-0-1-fixes-a-security-vulnerability-that-is-actively-exploited/
  23. Another interesting observation. My boot drive crashed two weekends ago. My image backup restored OK but boot rec was corrupted and could not restore it using multiple attempts with various options. So I decided it was time to do a fresh Win 10 1909 install. BTW - glad I did; things work now that never did in my previous Win 7 upgraded installation. Anyway, I installed FireFox fresh. Set up uBlock Origin immediately. Thereafter, I started getting strange occasional redirects that never happened with my old FireFox installation. Checking out FireFox settings, DoH was not enabled. Strange since I thought that was done now by default. Enabled DoH w/Cloudfare servers and haven't had one of those redirects since. I can only conclude that this activity had to be originating from my ISP DNS servers.
  • Create New...