Solved

Where are the 15 trojans that Eset Smart Security found?

Posted on 2011-09-08
3
712 Views
Last Modified: 2012-06-27
Where are the 15 trojans that Eset Smart Security found?

I POP3-downloaded e-mails from my webmail at Just Host to Outlook 2003. During download, I received warning messages from Eset Smart Security about a total of 15 Trojans in those e-mail messages. But I can not find these now. And now, when I move a folder in Outlook 2003 to another folder, it goes very slowly. So I'm afraid that it's because these Trojans have infected my laptop now.

I have a logfile in Eset and I can view the 15 Trojans there, but no path to them is displayed.
0
Comment
Question by:hermesalpha
3 Comments
 

Author Comment

by:hermesalpha
Comment Utility
The 15 Trojans are in Outlook, I can view them there. But I think Eset Smart Security quarantined them. Anyway, I need to navigate to these 15 files so I can wipe them away with White Canyon's Secure Clean.
0
 
LVL 29

Accepted Solution

by:
Sudeep Sharma earned 250 total points
Comment Utility
This link would help you in deleting the files in the Quarantine

http://kb.eset.com/esetkb/index?page=content&id=SOLN2150

Sudeep
0
 
LVL 61

Assisted Solution

by:btan
btan earned 250 total points
Comment Utility
Not sure if this is this is the latest path ....Every user has a dedicated quarantine folder, files quarantined under the local system account are stored in the ""C:\WINDOWS\system32\config\systemprofile\Application Data\Eset\Quarantine" folder. It may be a hidden folder so turn on the explorer folder view option to reveal the hidden. For deletion, better to go thru the UI suggested by Sudeep

The command line would be useful to scan with defined option on where you will want the quarantine path or even not to copy infected file into quarantine folder. But suggest stay with what was provided as default since it will be guarded by AV.

http://kb.eset.com/esetkb/index?page=content&id=SOLN2285
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
forensics for web activity 4 53
outlook, calendar 21 39
Outlook for Mac Meeting Rooms 2 23
room finder - outlook 2016 2 17
Not sure what the best email signature size is? Are you worried about email signature image size? Follow this best practice guide.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
This Experts Exchange video Micro Tutorial shows how to tell Microsoft Office that a word is NOT spelled correctly. Microsoft Office has a built-in, main dictionary that is shared by Office apps, including Excel, Outlook, PowerPoint, and Word. When …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now