Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Where are the 15 trojans that Eset Smart Security found?

Posted on 2011-09-08
3
742 Views
Last Modified: 2012-06-27
Where are the 15 trojans that Eset Smart Security found?

I POP3-downloaded e-mails from my webmail at Just Host to Outlook 2003. During download, I received warning messages from Eset Smart Security about a total of 15 Trojans in those e-mail messages. But I can not find these now. And now, when I move a folder in Outlook 2003 to another folder, it goes very slowly. So I'm afraid that it's because these Trojans have infected my laptop now.

I have a logfile in Eset and I can view the 15 Trojans there, but no path to them is displayed.
0
Comment
Question by:hermesalpha
3 Comments
 

Author Comment

by:hermesalpha
ID: 36507966
The 15 Trojans are in Outlook, I can view them there. But I think Eset Smart Security quarantined them. Anyway, I need to navigate to these 15 files so I can wipe them away with White Canyon's Secure Clean.
0
 
LVL 29

Accepted Solution

by:
Sudeep Sharma earned 250 total points
ID: 36511999
This link would help you in deleting the files in the Quarantine

http://kb.eset.com/esetkb/index?page=content&id=SOLN2150

Sudeep
0
 
LVL 63

Assisted Solution

by:btan
btan earned 250 total points
ID: 36518175
Not sure if this is this is the latest path ....Every user has a dedicated quarantine folder, files quarantined under the local system account are stored in the ""C:\WINDOWS\system32\config\systemprofile\Application Data\Eset\Quarantine" folder. It may be a hidden folder so turn on the explorer folder view option to reveal the hidden. For deletion, better to go thru the UI suggested by Sudeep

The command line would be useful to scan with defined option on where you will want the quarantine path or even not to copy infected file into quarantine folder. But suggest stay with what was provided as default since it will be guarded by AV.

http://kb.eset.com/esetkb/index?page=content&id=SOLN2285
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
OnPage: Incident management and secure messaging on your smartphone
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question