Leaderboard


Popular Content

Showing content with the highest reputation since 10/13/09 in Posts

  1. 6 points
    As announced earlier, we are changing our firewall strategy and will soon merge Emsisoft Internet Security with Emsisoft Anti-Malware, effective as of our next release in October. Instead of developing our own firewall module, we’re going to rely on the built-in Windows Firewall core that has proven to be powerful and reliable. Its only weak point is the fact that anyone can freely change the firewall configuration. In other words, if malware manages to run on the PC with sufficient administrator permissions, it’s able to allow itself to get through the firewall. To resolve this vulnerability, we’ve developed a new Firewall Fortification feature for Emsisoft Anti-Malware’s Behavior Blocker as part of our 2017.8 release. Firewall Fortification detects and intercepts malicious actions from non-trustworthy programs in real time before they can cause any damage. Behavior Blocker alert: Firewall manipulation All 2017.8 improvements in a nutshell Emsisoft Anti-Malware New: Firewall Fortification feature that blocks illegitimate manipulations of Windows Firewall rules. Improved: Forensics logging. Fixed: Rare program freezes on opening the forensics log, confirming of surf protection notifications and during malware detection. Fixed: Computer restart instead of computer shutdown executed, when set for a silent scan. Several minor tweaks and fixes. Emsisoft Enterprise Console Improved certificate handling to avoid connectivity issues. Several minor user interface improvements. Several minor tweaks and fixes. How to obtain the new version As always, so long as you have auto-updates enabled in the software, you will receive the latest version automatically during your regularly scheduled updates, which are hourly by default. New users please download the full installer from our product pages. Note to Enterprise users: If you have chosen to receive “Delayed” updates in the Update settings for your clients, they will receive the new software version no earlier than 30 days after the regular “Stable” availability. This gives you time to perform internal compatibility tests before a new version gets rolled out to your clients automatically. Have a great, well-protected day! View the full article
  2. 3 points
    It means that the tests done by AV-C and AV-T have a clear image of how they think AV software should work. The problem arises when your product doesn't fit the mould. Then you get penalized for not doing what everyone else does, even though what everyone else does may not be in the best interest of the user, to begin with. Best example: Snooping around in your encrypted connections, which literally every AV vendor screwed up at least once in the past and probably will continue to happen, exposing users to potentially greater risks than most malware does. For starters, the test sets aren't nearly as representative anymore. When we participated in AV-T and AV-C both tested with less than 200 samples a month on average. 200 samples out of literally tens of millions. The exact selection isn't clear and not representative of what users deal with either. None of them tests with PUPs for example, even though a simple look at any tech support community will tell you, that it is probably by far the biggest problem users are dealing with. So no, neither of those test scores represents real-life performance and it becomes blatantly obvious when you go to places like Bleeping Computer, GeeksToGo, Trojaner Board, Malekal, and all those other communities where people infected by malware show up for help and look at what products these victims used at the time they became infected. Then you will notice that a lot of these products with perfect scores don't look nearly as perfect in real-life conditions. The reason for this discrepancy is quite simple: Most AV vendors will specifically optimise their products for these tests. The most severe cases are where vendors end up outright cheating and detecting the test environments which then results in a change of behaviour of the product (think Dieselgate, but with anti-virus). But there are many ways you can game these tests. For example: you can try to figure out the threat intel feeds the companies use, then just buy those same threat intel feeds so you have all samples in advance you can track their licenses and supply different signatures to them or use your cloud to treat those test systems differently some particularly shady organisations literally also sell you their sample and malicious URL feed, so you can just outright buy the samples and URLs your product will get tested on later What you end up with as a result is a product that is optimised really really well for the exact scenario they are being tested under using the exact type of URLs and samples these testers use, but that is utterly useless when it comes to anything else. We just really don't want to create this type of product. So when we were asked whether we wanted to continue to participate this year, we discussed the matter internally, looked at what we get out of these tests (meaning: whether these tests have a discernable impact on our revenue) and decided that they are simply not worth it and that the tens of thousands of Euros we spent on them every year would be better spent on extending our team and building new ways of keeping our customers safe.
  3. 3 points
    Hello, a2guard.exe is the visible protection process (to put it simple, the Emsisoft icon you see in the system tray). However actual protection drivers start a lot earlier. For example epp.sys (the Emsisoft Protection Platform driver) starts very early in the Windows boot process in order to ensure a protected system even when no user is logged in yet and no other programs have been started.
  4. 2 points
    https://www.bleepingcomputer.com/news/google/google-will-block-third-party-software-from-injecting-code-into-chrome/ Our Surf Protection works by filtering DNS requests made by running applications. Since EAM doesn't use network filter drivers, it has to achieve this using code injection. Now that Chromium is blocking code injection by third-party applications, our Surf Protection will not work with it until we are able to make some changes. My recommendation is to install uBlock Origin and uBlock Origin Extra (both work in Google Chrome and Vivaldi) to supplement until we can get our Surf Protection working in Chrome again. uBlock Origin is a free content blocker that not only blocks ads, but also used the extensive blacklists of malicious domains available from Malware Domain List and Malware Domains to block malicious content. Note: Vivaldi 1.15 (the current stable version) is based on Chromium 65 with backported security fixes from Chromium 66, 67, and 68. Vivaldi 2.0 is based on Chromium 69, and is currently available in testing builds. Anyone with the stable version of Vivaldi installed will not be effected by this issue. Anyone using a Vivaldi 2.0 snapshot will also experience this issue with Surf Protection. Also note: Due to the added protection of an ad blocker, we recommend uBlock Origin (with uBlock Origin Extra for Chromium based browsers like Google Chrome, Vivaldi, and Opera) regardless of whether or not our Surf Protection is working with your web browser. Anti-Virus/Anti-Malware does not block ads by default (doing so can break some websites), and the companies that sell online advertising do not do a good enough job of preventing their ads from being abused by their clients, and there have been many cases of serious threats in advertisements even on legitimate websites. Please be aware that there is another content blocker called "uBlock". This is not the same thing as uBlock Origin, and is not recommended. The main reason for recommending uBlock Origin is due to its performance and memory usage being better than popular ad blockers (AdBlock, Adblock Plus, AdGuard, etc). If you wish to use one of those instead, then please feel free to do so, however I do not know if they are configured to use Malware Domain List and Malware Domains by default and recommend checking their configuration to ensure they are offering the same level of protection as uBlock Origin. If they are not configured to use these lists of malicious websites, then you should be able to add them through FilterLists.com. Note that this site was down at the time I posted this, so I was not able to check and verify that, however this site lists almost every popular filter list for ad and content blockers and it should include important blacklists like these.
  5. 2 points
    According to several reports, the latest Windows 10 Update pushed on Jan. 3rd is supposed to address the "Meltdown" security problem. However, due to changes to Windows kernel, Microsoft didn't make the update available to users without the "ALLOW REGKEY", and directed users to confirm with AV vendors if their products are compatible with the latest update. So is the current version of EAM compatible with this update?
  6. 2 points
    Emsisoft Anti-Malware is compatible with the Windows update. We also just published an update that sets the compatibility flag for all users of the beta, stable and delayed update feed. Keep in mind, that Microsoft uses the same flag for all anti-virus vendors. That means if you are using multiple anti-viruses or anti-malware applications, you are risking one of those products, like Emsisoft Anti-Malware, flagging the system as compatible, even though one of your other products is not compatible. There is, unfortunately, nothing we can do to prevent this as Microsoft does not account for the scenario of multiple security products being installed on the same system. This is the perfect example why we are recommending against using multiple security products in parallel. For further information, feel free to stop by our blog.
  7. 2 points
    From (very) humble beginnings in a Windows XP Service Pack update, the Windows Firewall has evolved into a capable security tool. Today, its performance is on par with – if not better than – any modern third-party desktop firewall on the market. In light of this, and after a lot of careful consideration, the Emsisoft team made a very conscious decision to rely on the Windows Firewall moving forward, which ultimately led to us merging Emsisoft Internet Security with Emsisoft Anti-Malware. This will allow us to concentrate our efforts on building a bulletproof product while using our Behavior Blocker technology to further strengthen the already rock-solid Windows Firewall. To put it simply, using Windows Firewall in conjunction with Emsisoft Anti-Malware will provide better protection for our users, and that is our number one objective above all else. Since our announcement of the Emsisoft Internet Security and Emsisoft Anti-Malware merger, we have received a lot of positive feedback. However, we also got a lot of questions. We want to take the time to answer the most frequently asked questions in a bit more detail: So are you going to remove the firewall completely? The answer to that question is not as simple as it may seem at first. Firewalls are usually divided into two parts: A so-called packet filter, which usually deals with incoming packets and is therefore often called an inbound firewall; and an application filter that deals with applications wanting to access the network or internet, which is why it is often also referred to as an outbound firewall. Emsisoft Anti-Malware has always had an application filter as part of its Behavior Blocker and that will continue to be true. The difference between the outbound firewall in Emsisoft Anti-Malware and Emsisoft Internet Security is that the former makes decisions autonomously, while the later, at least in theory, allowed you to also use your manual rules. In practice, the default for Emsisoft Internet Security was to automatically allow all outbound connections and the majority of all our users never changed it. Why did you make the change? Was Emsisoft Internet Security less secure than the Windows Firewall? No. All firewalls on modern versions of Windows are based on the same technologies provided by Microsoft. In addition, inbound firewalls in particular are incredibly straightforward to implement, as they only block or allow access based on simple rules. That is why there is absolutely no difference in protection provided between any of the inbound firewalls on the market, including the Windows Firewall. However, the Windows Firewall does have some benefits: Support for Windows Networking like Home Groups is a lot better in the Windows Firewall out of the box. There is no need to tweak any rules manually as was often the case for Emsisoft Internet Security. It is easier to use. This is mostly because third-party applications will take care of creating all necessary firewall rules for you. That is not an option that Emsisoft Internet Security could provide, as most software vendors don’t care about third-party firewalls. The Windows Firewall also provides much better compatibility. Third-party software vendors usually test their products with the Windows Firewall as it is part of Windows, but almost never test their product’s compatibility with aftermarket firewall products. Last but not least, the Windows Firewall also provides a lot more configuration possibilities to expert users and allows for much more complex rulesets than the inbound firewall offered as part of Emsisoft Internet Security. But there are also a couple of disadvantages, which is where Emsisoft Anti-Malware 2017.8 comes in: Intelligent outbound firewall: The outbound firewall part of the Windows Firewall will by default allow every application to connect. This behaviour is actually identical with Emsisoft Internet Security, which also allowed any application to connect to the network or the internet unhindered by default. While both products can be manually configured to block programs from accessing the internet, most users don’t want to deal with this responsibility. This is where the intelligent outbound firewall that is part of our Behavior Blocker comes in, which will prevent malicious applications from communicating with the internet automatically while not getting in the way of benign applications. Enhanced malware protection: The Windows Firewall on its own does not provide any protection against more sophisticated attempts to bypass its outbound firewall through advanced techniques like code injection. Code injection essentially allows malware to take over a trusted program in order for its internet communication to pass through the firewall unhindered. Again, the Behavior Blocker in Emsisoft Anti-Malware is incredibly good at detecting and preventing these kinds of attacks. Windows Firewall Fortification: The functions Windows Firewall provides to software vendors to automatically create rules for their applications in the Windows Firewall for ease of use are also pretty much unprotected. That means that malware can and does create rules for itself automatically. In version 2017.8, we extended our Behavior Blocker technology to protect the exposed Windows Firewall functions from malicious usage. This gives you control over which of your applications are allowed to create Windows Firewall rules for you and which aren’t. This is what we refer to as “Windows Firewall Fortification”. To sum things up, for inbound filtering, the Windows Firewall is just as solid a choice as any other firewall product on the market, including Emsisoft Internet Security. It provides better compatibility and is easier to use for the majority of users. Its drawbacks mostly revolve around its outbound filtering capabilities, which are perfectly complemented by the enhanced Behavior Blocker that is part of Emsisoft Anti-Malware 2017.8 and later. Where can I find the new Windows Firewall Fortification options? The new options are part of the Emsisoft Anti-Malware Behavior Blocker. As such, you can find them under Protection/Application Rules: In addition, whenever the Behavior Blocker sees any application it doesn’t know to be trustworthy attempting to create new firewall rules or change the firewall status, it will attempt to auto-resolve the situation by blocking the attempt: If you have auto-resolve disabled, it will simply ask. Where can I find the “advanced configuration possibilities” you talk about? My Windows Firewall only has a couple of options! The default dialog to configure the Windows Firewall can be incredibly deceptive at first. The advanced configuration dialog is stashed away behind an innocuous looking link in the normal Windows Firewall configuration dialog: Windows Firewall dialog with link to Advanced settings Clicking that link will expose the real configuration of the Windows Firewall where you have full access to all the rules it adheres by. That looks awfully complicated. Are there easier methods? There exist a slew of additional applications that sit on top of the Windows Firewall and attempt to enhance it by making rule creation and management easier. Some of the most popular are: TinyWall (Free) – http://tinywall.pados.hu/ Windows Firewall Control (Freemium) – https://www.binisoft.org/wfc.php Glasswire (Paid) – https://www.glasswire.com/ That being said, we think that the majority of users probably won’t find these tools to be necessary. That is also why we decided against creating our own Windows Firewall front-end and focus our development efforts on improving the complementary and enhanced technology in our Behavior Blocker instead. So what do you recommend I should do? We strongly believe that the combination of Emsisoft Anti-Malware and the Windows Firewall is the best option for almost every user. For the past 12 years while developing our product, we used this exact combination in all of our internal performance evaluations of our technology. Our malware research team works hard to make sure that even the most advanced threats are blocked immediately across all our products. So yes, Emsisoft Anti-Malware blocks the same malware that Emsisoft Internet Security blocks out of the box – no configuration, paying extra or jumping through hoops needed. If you do feel the need to make sure that certain legitimate applications can’t access the internet, the Windows Firewall does offer the ability to do so via its Advanced Settings. If you find that method to be too inconvenient, going with one of the many front-ends may be an option for you. We do know that a small minority of Emsisoft Internet Security users believe that the Windows Firewall must have backdoors implemented by Microsoft to allow them to spy on their users. In all our research, we haven’t found one and neither have hundreds of other security professionals that constantly review Windows for possible backdoors and vulnerabilities. We also think it is important to keep in mind that every single firewall product for Windows Vista and later uses the very same frameworks to implement packet and application filtering. There is no difference between the Windows Firewall, Emsisoft Internet Security and any other third party firewall from a technical point of view. If Microsoft were to backdoor their products to allow unhindered communication, this backdoor would probably be part of the Windows Filter Platform or the NDIS Lightweight Filter Framework, which are the underlying technologies all firewall products are built upon, and affect every firewall product equally. If you still prefer to use a firewall product other than the Windows Firewall, we recommend you contact the software company creating your new firewall product of choice beforehand to ask them whether they implement their own firewall or rely on the Windows Firewall as well. Most firewalls and internet security suites dropped their own implementation in favour of the Windows Firewall many years ago. So we suggest you ask them first to make sure you don’t end up with a Windows Firewall front-end instead. Do you have more questions? Post them in the comments and we’ll answer them. Have an excellent (malware-free) day! View the full article
  8. 2 points
    Local is your machine, "this end" of a conversation. Remote is whatever machine's at the other end.
  9. 2 points
    I think you have made your point of view crystal clear for everyone, iwarren. Do we really nede more posts?
  10. 2 points
    That would help in this particular instance (alerts during an uninstall), however every rule that exists can decrease performance, so rules are generally not kept if they are not needed.
  11. 2 points
    You must have had Beta Updates enabled as EIS 11 is still beta, and that kind of problems can happen with Betas Remedy. Uninstall 11 and then install 10 again and make sure that "Beta Updates" is disabled (unchecked)
  12. 2 points
    Good morning. Can we expect to get a fix for the updates not working soon, please? Having to disable the firewall to get updates seems an important bug to me. Thanks in advance and best regards, François
  13. 2 points
    I don't have any insight in the test-methodology apart from what the article states, but a few observations make me doubt the relevancy of this test: The test compares a number of different products: antirootkit scanners and anti-malware scanners. This makes no sense to me. TDSSkiller is an excellent Antirootkit scanner in my opinion, but it is a limited tool, you cannot compare this with a anti-malware scanner like EEK or MBAM because its simply a different product. The tested malware is for the most part very, very old and not seen in the wild anymore, even though the article states 2015 and "in the wild" in the title. To give a few examples: Alureon/TDL3/4 hasn't been around "in the wild" for at least 3 years (and thats estimating it very loosely) The article listed is from 2010 (!) http://contagiodump.blogspot.gr/2011/02/tdss-tdl-4-alureon-32-bit-and-64-bit.html?m=1 The same goes for ZeroAccess/Max++. The latest usermode version of that rootkit was active in 2013 and after the botnet was taken down for a large part, there has been no re-emergence of this malware. However, its kernelmode version was quite a bit older, this was last seen in 2011. Sure, its interesting to see how products perform against such rootkits, but how useful is it? Those rootkits were "retired" for a very good reason, they can no longer infected today's OS versions. Finally, I'm not one to make accusations, but I don't like "sponsored by..." tests. I'm fully willing to believe that Zemana was indeed the best product to remove all these infections, but I just think its not the best strategy for any testing lab to let a sponsor also participate in the tests, just to avoid any possible doubt as to the objectiveness of the test results.
  14. 2 points
    The Shariff solution looks very elegant and I'm watching the project for quite some time. They released a new version a few months ago https://github.com/heiseonline/shariff It doesn't 100% meet our requirements but we may adapt some things from it and replace our current social media buttons. It's already in the works.
  15. 2 points
    Derzeit bieten wir Email Support auf Deutsch, Englisch, Franzoesisch, Spanisch, Niederlaendisch, Russisch und Italienisch an.
  16. 2 points
    Hello, Jenn Welcome to the Emsisoft Support Forums. My name is Kevin, and I will be helping you fixing your problems. Please change your user name to something that is not your email address. All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread also read the Emsisoft Support Forums Terms of Use To Highlight a few:
  17. 2 points
    Hi und Herzlich Willkommen beim Emsisoft Support Forum! Systemscan mit FRST Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: FRST 32-Bit | FRST 64-Bit (Wenn du nicht sicher bist: Start > Computer (Rechtsklick) > Eigenschaften) Starte jetzt FRST. Ändere ungefragt keine der Checkboxen und klicke auf Scan. Die Logdateien werden nun erstellt und befinden sich danach auf deinem Desktop. Bitte beide Logfiles in der nächsten Anwort anhängen.
  18. 1 point
    Hi Damaxx, can you share the decryptor. Wanted try it will work for my files or not.....
  19. 1 point
    You can technically just remove all entries from your hosts file using Notepad. Just delete everything except the "127.0.0.1 localhost" entry if there is any. Lines starting with "#" are comments by the way. Pretty much. We are not an ad blocker, no. You use uBlock Origin which is pretty much the best adblocker you can get. So you are well covered in that area already. Correct. When you try to click the link, it will block access to the site. But I do understand that a lot of people would like to know before they click, which is why we consider adding it. Interestingly enough WOT got in trouble for the very same thing that some AVs are doing with their extension. You can always set up your own DNS server locally or in a cheap VPS box online. DNS also can be tunneled via various secure protocols (DNS-over-HTTPS for example). Those use methods that provide k-anonymity. Firefox in addition also sends "fake" requests if I remember correctly so the hoster of the block list does not know whether that was a website you actually surfed to or a random request. If you are so concerned, just host your own VPN. Get a cheap VPS with bitcoin at njal.la for example, host OpenVPN and your own DNS server on it and there will be no link between you and the VPS. It's serious overkill though.
  20. 1 point
    Please upload an encrypted file or ransom note to ID-Ransomware and copy/paste the results here for one of the experts to look at. https://id-ransomware.malwarehunterteam.com
  21. 1 point
    You can only delete files from Pastebin if you have an account and were logged in when you created the pastes. If you were not logged in to an account, then they will only be deleted if you selected the option to delete them after a certain period of time when you created the pastes. It looks like all three pastes have already been removed, so I assume you already figured out how to do it. FYI: @Wagner you can find the links to your pastes by going to the top of the forums, clicking on the icon near the upper-right that looks like an envelope, and selecting the conversation where you sent them to me from the list. There's also a link at the bottom of the list to go to your inbox, where you can see all private conversations that you have created or are taking part in.
  22. 1 point
    I am looking for an anti-malware solution from a vendor that has a strong commitment to privacy and is against SSL/HTTPS Scanning (TLS interception), with no PUPs or unnecessary (heavy) tools. Hard to find. If Emsisoft can come up with such a product for MacOS, I would be more than happy.
  23. 1 point
    It should be made clear, perhaps, that running EAM on its own is sufficient protection for the average user whose surfing habits can be considered normal. If you surf in "uncharted waters" and/or if your level of paranoia is above average, however, a layered approach to security is something that should be taken into consideration.
  24. 1 point
    With EAM it would normally be a2service.exe and EmDmp.exe (the latter being our crash report tool), however I would believe that depends on whether or not you use the Enterprise Console to manage EAM from another computer/server (CommService.exe is used when EAM is connected to the Enterprise Console).
  25. 1 point
    License conversion should have been done an hour or two ago (from the time I am posting this), and EIS should convert to EAM as soon as it downloads the 2017.9 update. You can force that to happen sooner by manually updating if you would like to.
  26. 1 point
    Just an opinion here, but the folks at Emsisoft are doing what they can to provide a FREE service to restore peoples' files, and for that no one has any reasonable ground on which to complain. I too have wondered as to their status, but with updates like Sarah's, I know that it's not being ignored. How much could they possibly share on a topic that most would likely not understand? For my own situation, I have reached out to a specialist recovery service, and they claim to be able to restore my files for ~2000$, but I am waiting for the folks at Emsisoft because I'm confident they'll come up with something in a reasonable amount of time. And also because no matter the cost to my company, I refuse to negotiate with terrorists. Meanwhile I have been redoing lost work as needed. All in all, still probably less cost than the $2k being quoted. If Fabian and the rest of Emsisoft's brain trust can fix this, you better believe I'm buying their product!
  27. 1 point
    Glad we could be of assistance.
  28. 1 point
    If you are concerned about PowerShell: Uninstall it. Most people don't need it anyway. It's one less infection vector to worry about.
  29. 1 point
    It was a false positive caused by BitDefender's anti-virus engine (which we use along with our own anti-virus technology to increase effectiveness). The false positive was fixed by BitDefender, and when the update was downloaded Emsisoft Anti-Malware offered to restore the falsely detected file from the quarantine. There should be no harm in doing this. As for the logs, I don't see anything wrong in them. Here's a couple of things you can try, and see if you get different results: Disable all of your extensions and see if Walmart.com works normally. If it does, turn your extensions back on one at a time, trying Walmart.com after each one until it works, until you find the offending extension. Try another web browser to see if Walmart.com works in it (Vivaldi for instance is a Chromium-based browser that can install Google Chrome extensions).
  30. 1 point
    Our MRCR decryption tool has been updated to version 1.0.0.42 to handle Merry X-Mas Bruce. Download: https://decrypter.emsisoft.com/download/mrcr Usage Guide: https://decrypter.emsisoft.com/howtos/emsisoft_howto_mrcr.pdf
  31. 1 point
    Nothing should be able to delete files in the EIS folder while EIS is running. Application Rules are created automatically in EIS for trusted programs, so this is a sign that it recognized the digital signature and allowed it.
  32. 1 point
    Hello BlackSun, Thank you for your patience. As for when exactly Emsisoft Mobile Security performs automatic scans, it scans on install and on update for every installed app. Malicious apps are identified based on md5 and some info from android manifest, the scan result database is in the cloud. We are scanning the URLs using the cloud database, we do not scan the contact of the traffic. All requests are HTTPS and authenticated and we send the entire URL to the cloud as there might be domains partial infected. No, there is no logging. I'm not sure if I understand the whole question but I guess you named one of the reasons on your own. Also personally I would mean, in general even if my car features an airbag I wouldn't want to miss ESP Hope my reply can be helpful for you. Let me know if I can assist any further.
  33. 1 point
    Let's take a fresh look. Run fresh scans with Emsisoft Emergency Kit (EEK) and FRST, attach the new EEK and FRST scans to your reply. Be sure to let me know how things are running.
  34. 1 point
    Hello, Files encrypted by CyptXXX cannot be decrypted. Copy the below code to Notepad; Save As fixlist.txt to your Desktop. HKU\S-1-5-21-4030903130-206575615-503288527-1107\...\Run: [AdobeBridge] => [X] ShellIconOverlayIdentifiers: ["DropboxExt1"] -> {FB314ED9-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei ShellIconOverlayIdentifiers: ["DropboxExt2"] -> {FB314EDA-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei ShellIconOverlayIdentifiers: ["DropboxExt3"] -> {FB314EDD-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei ShellIconOverlayIdentifiers: ["DropboxExt4"] -> {FB314EDE-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei ShellIconOverlayIdentifiers: ["DropboxExt5"] -> {FB314EDB-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei ShellIconOverlayIdentifiers: ["DropboxExt6"] -> {FB314EDF-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei ShellIconOverlayIdentifiers: ["DropboxExt7"] -> {FB314EDC-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei ShellIconOverlayIdentifiers: ["DropboxExt8"] -> {FB314EE0-A251-47B7-93E1-CDD82E34AF8B} => Keine Datei Startup: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk [2014-08-15] ShortcutTarget: Dropbox.lnk -> C:\Users\GIA\AppData\Roaming\Dropbox\bin\Dropbox.exe (Keine Datei) Startup: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Outlook 2010.lnk [2011-01-12] ShortcutTarget: Microsoft Outlook 2010.lnk -> C:\Windows\Installer\{91140000-0011-0000-0000-0000000FF1CE}\outicon.exe () GroupPolicyScripts: Beschränkung <======= ACHTUNG FF HKLM\...\Firefox\Extensions: [{BBDA0591-3099-440a-AA10-41764D9DB4DB}] - C:\ProgramData\Symantec\Symantec Endpoint Protection\12.1.5337.5000.105\Data\IPSFF => nicht gefunden 2015-09-23 10:09 - 2015-09-23 10:09 - 0000538 _____ () C:\Users\GIA\AppData\Roaming\Spell.cfg C:\Users\GIA\AppData\Local\Temp\avgnt.exe AlternateDataStreams: C:\Users\GIA\Desktop\untitled1.2d:DocumentSummaryInformation [57] AlternateDataStreams: C:\Users\GIA\Desktop\untitled1.2d:SummaryInformation [93] AlternateDataStreams: C:\Users\GIA\Desktop\untitled1.2d:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0] AlternateDataStreams: C:\Users\GIA\Desktop\untitled2.2d:DocumentSummaryInformation [57] AlternateDataStreams: C:\Users\GIA\Desktop\untitled2.2d:SummaryInformation [93] AlternateDataStreams: C:\Users\GIA\Desktop\untitled2.2d:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0] AlternateDataStreams: C:\Users\Public\Documents\untitled1.2d:DocumentSummaryInformation [57] AlternateDataStreams: C:\Users\Public\Documents\untitled1.2d:SummaryInformation [93] AlternateDataStreams: C:\Users\Public\Documents\untitled1.2d:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0] AlternateDataStreams: C:\Users\Public\Documents\untitled2.2d:DocumentSummaryInformation [57] AlternateDataStreams: C:\Users\Public\Documents\untitled2.2d:SummaryInformation [93] AlternateDataStreams: C:\Users\Public\Documents\untitled2.2d:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0] AlternateDataStreams: C:\Users\Public\Documents\untitled3.2d:DocumentSummaryInformation [57] AlternateDataStreams: C:\Users\Public\Documents\untitled3.2d:SummaryInformation [93] AlternateDataStreams: C:\Users\Public\Documents\untitled3.2d:{4c8cc155-6c1e-11d1-8e41-00c04fb9386d} [0] C:\Users\user\AppData\Local\apn Reg: reg delete "HKEY_USERS\.DEFAULT\SOFTWARE\APN" /f Reg: reg delete "HKEY_USERS\S-1-5-18\SOFTWARE\APN" /f Reg: reg delete "HKEY_USERS\S-1-5-21-2077324914-3877335992-1976814142-1000\SOFTWARE\SOFTONIC" /fClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version.
  35. 1 point
    Enter bestätigt grundsätzlich immer das gerade aktive Steuerelement (Button, Checkbox, etc.). Wenn der Fenster-Fokus daher (zufällig oder nicht) auf dem Button zum Löschen ist, löscht ein Drücken der Enter-Taste natürlich. Mit der Tab-Taste kann man den Fokus von einem Element zum anderen springen lassen. Das Problem hier ist, dass die Liste selbst nicht als aktives Steuerelement angesehen wird und daher die Funktion außerhalb anspringt. Ich werde das als Anregung weitergeben, damit das geändert wird. Vielen Dank!
  36. 1 point
    EAM is an Antivirus and Behavior BLocker all in one. You don't need ESET, and actually it could cause conflicts.
  37. 1 point
    Blocking of IP addresses needs to be done in the Firewall rules. The Surf Protection is intended to block domain names, and doesn't work the same as the Firewall rules do. That being said, there is a bug in Emsisoft Internet Security that appears to be preventing rules to block IP addresses from being processed, so this feature appears to be temporarily unavailable until we can release a beta version with a fix for it.
  38. 1 point
    @Alexstrasza Read AGAIN! I disabled EIS Firewall and tried other options to find out what the problem with EIS STANDALONE is. It's the firewall part. It's having issues.
  39. 1 point
    Dear Captain, Our licensing system allows up to five hardware changes withing every 24 hours. As the generated machine key changes if you change specific hardware components or re-install/upgrade OS our system will count a hardware change in such cases. So you could change hardware or OS up to five time each day without any problems. Please let us know if we can assist any further.
  40. 1 point
    OK, we can continue this once you are able to return home to do further debugging. It's probably a local issue with the Internet Service Provider, however there's some debug information that we can try getting to help find out what is going on.
  41. 1 point
    go to custom scan -> filter for file extensions
  42. 1 point
    when they push a new version or some times is normal to see that you can not connect to the download server... just wait... normally the problems solve by itself... it happens to me every time they push a new ver of the product
  43. 1 point
    Copy the below code to Notepad; Save As fixlist.txt to your Desktop. Winlogon\Notify\ScCertProp: wlnotify.dll [X] SearchScopes: HKCU - {1CC943C3-8235-4EED-884E-245B285BF2B4} URL = SearchScopes: HKCU - {471DD9C9-2AC3-4A25-AEDE-51AE5D86E66D} URL = SearchScopes: HKCU - {B9D9C6DA-A667-4146-9070-A9AED61345C1} URL = C:\Users\Zaika\AppData\Local\Temp\avgnt.exe C:\Users\Zaika\AppData\Local\Temp\Quarantine.exe Reg: reg delete "HKEY_USERS\S-1-5-21-2835325914-3951994643-1403611485-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM" /v "DISABLETASKMGR" /f Reg: reg delete "HKEY_USERS\S-1-5-21-2835325914-3951994643-1403611485-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM" /v "DISABLEREGISTRYTOOLS" /fClose Notepad.NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work. NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system Run FRST64 and press the Fix button just once and wait. If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart. The tool will make a log on the Desktop (Fixlog.txt). Please attach it to your reply. Note: If the tool warns you about an outdated version please download and run the updated version.
  44. 1 point
    I would believe that the makers of Private Internet Access are working on getting the executables digitally signed.
  45. 1 point
    malware1, You're right. Somethings seems wrong with the detection on VT. We'll check what's wrong.
  46. 1 point
    Yes, I can help you after you get back. Just send me a PM and I can open the thread, and we will continue from where we left off.
  47. 1 point
    open a command-prompt (cmd.exe) enter the name of the setup-file and add /DIR=, followed by the path to the directory where you want to install it. fx. EmsisoftAntiMalware6Setup.exe /DIR="H:\Programs\EAM" tip: first rename the file to fx. EAM.exe, then open a command-prompt, that will save a lot of typing....
  48. 1 point
    Details können wir derzeit noch keine verraten, aber die beiden nächsten großen Projekte auf unserer Todo-Liste sind: * Emsisoft Anti-Malware 7.0 * Emsisoft Emergency Kit 2.0
  49. 1 point
    Good day! help on how to remove this virus Trojan.Win32.Qhost!E2 ??? the program Emsisoft Anti-Malware writes that can not delete it! help please
  50. 1 point
    I installed the new version of OpenOffice.org (which is "OpenOffice.org 3.3" released on January 25, 2011 - not "LibreOffice". By the way, LibreOffice is just a fork...) a couple of days ago and after selecting Install Mode, no pop-ups came up. Usually the easiest way to stop pop-ups during programs installation is to be sure to make use of the Install Mode option. In your case, it seems something went wrong...
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up