03-25-2019 09:47 AM
03-26-2019 05:35 AM
03-26-2019 05:53 AM
03-26-2019 05:59 AM
03-26-2019 08:38 AM
03-27-2019 07:50 AM
Ch3vr0n wrote:
It's blatant rootkit level malware in the bios. Mine gets disabled on every boot and they should have the balls to do it to, or remove it all together. Let the user decide if they want to use it, not push that crap through bios. A new system builder would freak out not knowing about this in the bios, and on a fresh windows install be like "WTF where did this come from, new system"
03-27-2019 06:12 PM
Ch3vr0n wrote:
It's blatant rootkit level malware in the bios. Mine gets disabled on every boot and they should have the balls to do it to, or remove it all together. Let the user decide if they want to use it, not push that crap through bios. A new system builder would freak out not knowing about this in the bios, and on a fresh windows install be like "WTF where did this come from, new system"
03-26-2019 08:59 AM
03-28-2019 06:22 AM
01-18-2024 02:24 PM
More people should see your message. This happened to me today when updating the "TUF GAMING Z790-PLUS WIFI - Device SDK" to ver. 3.00.21 (2024/01/16) via Armoury Crate. Bitdefender Real-time Protection stopped installation of this and quarantined the file and flagged it with Trojan Gen:Variant.Jaik.94758 (C:\Program Files (x86)\ASUS\ArmouryDevice\dll\MBLedSDK\Bongiovi_MB\x86Includes\Bon7D8C.tmp).
Could be false positive detection, however 3 hours since I contacted ASUS Support, without any answer, an update was made to the TUF GAMING Z790-PLUS Core SDK.