Jump to content

lightof7ustice

Members
  • Posts

    21
  • Joined

Posts posted by lightof7ustice

  1. Regards.

    I used a scanner to do a full scan and forgot to add K.'s folders to the exclusion at the first time. A file in this folder, namely

    C:\ProgramData\Kaspersky Lab\AVP21.17\Bases\Cache\sw2.2df75168301c74eb.kmc|>file_3

    was detected by the scanner and may be deleted. 

    What is this file and this folder? Do I have to reinstall K. to repair it?

    And btw, one more general question. How to tell if the program is damaged and how to fix it normally? I see there is no (kinda old school though) Repair option in the Control Panel-Program-Programs and Features section for K. or say in its installer.

    Thanks.

  2. I wonder what functionalities are disabled if not activated? Since Kaspersky probably knows this issue and would change the registration in the future, maybe it's totally fine (IMO) to keep it inactivated until the registration form is moved to Kaspersky website.

     

  3. Thank you for the help @harlan4096 & @Flood and Flood's wife,

    Well, I must say it's very strange that after I clear not only Adobe but the whole cache/cookie/history, it's still not blocked. 

    But anyway, I'm still very grateful for the assistance of both of you. Maybe it's due to other programs like Adguard or the DNS. As long as it's not a big problem for the firewall itself or other functions, I guess I can stop trying for now.

    Shall I report this bug to the developers, and how if possible?

    2024-05-16183042.thumb.png.c0b877d99d5857c7e6170e4acbffc500.png

    • Like 2
  4. 17 minutes ago, harlan4096 said:

    My rule:

     

    image.thumb.png.cc11ca9b841042860dc525ddd9c717f0.png

     

    And my results:

     

    image.thumb.png.61a3ac59f33cc353a745dbdb00f0460e.png

    I change to www.adobe.com. The outcome is as followed:

    The block history is logged in the Reports-Firewall now, which is different from the previous time (I suppose the Packet rule probably only records the exact URL matching the rule, just my guess though). But I can still visit the website www.adobe.com, maybe it's designed like this?

    2024-05-16173556.thumb.png.417a262cfd5e7c7b14abfae05fd5e644.png2024-05-16173604.thumb.png.afbe702b338fd7a87c6f6b589645122c.png2024-05-16173626.thumb.png.2104cc977a7b79aa26720c2636189d3d.png2024-05-16173747.thumb.png.8eadd0540aea097c5b3676a18faf760b.png

    • Like 2
  5. 6 hours ago, harlan4096 said:

    Try removing the 1st line:

     

    127.0.0.1 acrobat.adobe.com

     

    Also, You may add a packet rule in Kaspersky FireWall:

     

    image.thumb.png.b871f3f67c7ba8bd180e0ce8b5d61b75.png

     

    Here "harswaretimes.in" it's the URL example... but not sure if it can block only specific levels of a dominion, as You are requesting, in Your case: adobe.com, just try...

    Thank you for the answer.

    I tried both "*.adobe.com" and "adobe.com", but the rule is not working, I can still visit adobe.com, the same after reboot. Did I do something wrong?2024-05-16153347.thumb.png.431f920afd71daa5c8508c2fbe2549c6.png2024-05-16153443.thumb.png.25db64f2fad465403abcce41cc48ed87.png

    • Like 1
  6. Thank you @harlan4096 for the reply,

    May I ask one more question about the hosts approach?

    So basically,

    If I use

    127.0.0.1 acrobat.adobe.com

    it could block the files but it also blocks the official website for Acrobat.

    If I use

    127.0.0.1 acrobat.adobe.com/*
    127.0.0.1 acrobat.adobe.com/dc-home2-dropin/demo-files/en-US/demo.pdf
    0.0.0.0 https://acrobat.adobe.com/dc-home2-dropin/demo-files/en-US/demo.pdf
    127.0.0.1 acrobat.adobe.com/dc-home2-dropin/demo-files/en-US/demo/verb-compress-pdf/demo-compressed-high.pdf
    0.0.0.0 https://acrobat.adobe.com/dc-home2-dropin/demo-files/en-US/demo/verb-compress-pdf/demo-compressed-high.pdf

    it's not blocking anything.

    Is it possible to block the 2 files or download attempts but not Acrobat official website?

  7. Hi all.

    I don't know why,  but recently Adobe Acrobat Reader (probably, according to the file and link) has been trying to download 2 demo PDFs from its website through the links below. Since I have Internet Download Manager, the links always toggle the IDM, then it pops out the download task window. This happens almost once every day, so quite annoying. Is there a way to block those links for all the programs with Kaspersky's firewall or Intrusion prevention, so that Acrobat will not try to download those files and IDM will not jump out to help with that? I tried to use the Packet rules of the firewall but it was not quite intuitive.

    P.S. I thought Acrobat was not supposed to behave like this.

    The links:

    https://acrobat.adobe.com/dc-home2-dropin/demo-files/en-US/demo.pdf
    https://acrobat.adobe.com/dc-home2-dropin/demo-files/en-US/demo/verb-compress-pdf/demo-compressed-high.pdf

    2024-05-15205129.thumb.png.e06ade7d0d247cad22ba214ff3e7213d.png2024-05-15205144.thumb.png.1a4acc170e368700ee47f21f92e5d898.png

     

  8. 6 minutes ago, Berny said:

    @lightof7ustice

    You are talking about “potential malware”  did you obtain the verdict from KOTIP ?

    Hi, I was about to update. Yeah, I uploaded it to KOTIP again and ran a dynamic analysis just now. This time it's clean. Can't find the detection on 24th April.

    But from the reports I got from other sandboxes stating it was malicious, and I ran it on my virtual machine, I was considering it suspicious. I'm not sure if it's OK to post technical support ticket ID here, but this one is in one of the tickets I'd like to follow up.

    2024-05-04191325.thumb.png.32a87baf903493957241239dc7a76ce6.png

  9. Hello,

    I submitted 2 tickets for missed malware at Consumer Support. No further updates after I was asked to provide samples in the attachment and I did so. Is it possible to follow up after that?

    Apart from that, one potential malware I submitted on KOTIP (opentip) is detected as Trojan, but still labeled as Not categorized, is there any reason for that outcome? I was thinking since it's detected already, it can be categorized as so.

    Thanks in advance.

    2024-05-04154728.thumb.png.77c3b7e59d6abe673257974128baf69f.png

  10. I recently manually updated from KIS 21.3 to Kaspersky Premium 21.16 with an overwrite installation. I saw from some fan forums saying it's recommended to first uninstall and then install rather than overwrite as the latter leaves registry residuals and services. So I checked in my registry, and I found the registry residuals are mainly in the key HKEY_LOCAL_MACHINE\SYSTEM\Setup\FirstBoot\Services, for example in the screenshot.

    scrrenshot.thumb.png.9ca5075ca0a0ef45c5c22f58aa9a1641.png

     

     

    Given this key, just out of some sort of minor neat freak, is it safe to delete the values for the 21.3 version? Besides, I didn't see values for 21.16 in this key, is it abandoned and replaced by other functions in newer versions?

    Last thing, is it true that "first uninstall then install" is better than "overwrite installation"? 

×
×
  • Create New...