GT500

Emsisoft Employee
  • Content Count

    10955
  • Joined

  • Days Won

    313

Everything posted by GT500

  1. Thread reopened per user's request.
  2. You're quite welcome. Since everything seems OK, I am going to go ahead and close this topic. Note: The instructions in this forum topic have been customized based on the logs posted by the person asking for assistance. Please do not attempt to follow any of the instructions in this forum topic, as they could cause damage to your computer. If you require assistance, please start here if you believe your computer is infected, and one of our experts will be happy to assist you by analyzing your logs.
  3. According to Dell, the download at this link is the audio driver for your computer. It might be prudent to uninstall the old audio driver before installing this one, however I just reviewed your OTL Extras log from your first post and I can't find it in the uninstall list... Go ahead and try installing that driver from Dell, and let me know if it helps.
  4. Yes, you can copy files to a CD if the CD is formatted with a UDF filesystem. TDSSKiller can be run from a CD or from a flash drive, if you need to download it from another computer.
  5. I recommend not allowing TDSSKiller to delete anything. Select Cure if it is available, otherwise select Skip.
  6. The following ZIP file contains a batch file which will create the registry entry for you. Please download DebugView from this link: When downloading, make sure to save it on your Desktop instead of clicking 'Run' or 'Open'. Right-click on the 'DebugView' file that you just saved on your Desktop, and select "Extract All". Open the new DebugView folder that was created on your Desktop after extracting. Windows XP and 2000 users should double-click on the file named 'Dbgview'. Windows 7 and Vista users should right-click and select "Run as Administrator". Click on the 'Capture' menu, and select everything except "Log Boot" (you will have to open the menu again after clicking to select an item). Do whatever it is you need to in order to replicate the issue. After you have replicated the issue you can switch back to DebugView and click 'File' and "Save As" in order to save the log to a file on your Desktop. Please attach that log file to a reply so that we may analyze it for errors. You will need to use the More Reply Options button to the lower-right of where you type in your reply in order to access the attachment controls. Note: You may need to ZIP the log file in order to attach it. If you do not have a program such as 7-Zip, WinZip, WinRar, etc. then you can right-click on the log file, go to Sent to, and click on Compressed (zipped) folder. You will be able to attach the ZIP archive to a reply.
  7. Rules are created when the Behavior Monitor asks you about a program. Whether it is 'Monitored', 'Blocked', or 'Allowed' depends on what you select when Emsisoft Anti-Malware asks you about a program. I misunderstood why you were asking about these monitored programs at some point, so my apologies for the confusion. Fixing the sound issue could be difficult, as there are a number of potential causes. It could be a driver issue, it could be a DirectX issue, it could be an issue with the sound card (or the audio chip on the motherboard if it is integrated audio), it could be an issue with the speakers, it can be an issue with the cord that connects the speakers to the computer, and it can even be an issue with the power going into the speakers. Since driver issues can be fairly common, we can start with that, and see if we can fix it. May I ask what model number your computer is, and who made it? This will allow me to look up what drivers to have you download for the audio.
  8. OK, that's in the System Restore, and you won't have to worry about that once the System Restore is emptied. Here's some final instructions for you: 1. Make Sure Java is Updated: Click on the Start button. Click on Control Panel . Click Add or Remove Programs . Look for Java in the list (should be alphabetical), and uninstall all versions of Java that you find listed. Click on this link and download and install the latest Java (the Windows Online download will be faster). 2. Make Sure Adobe Flash is Updated: Click on this link and download the latest version of Adobe Flash Player for your web browser. You will need to close your web browser when installing Flash. 3. Make Sure Adobe Acrobat Reader is Updated: Click on the Start button. Click on Control Panel . Click Add or Remove Programs . Look for any versions of Adobe Reader or Adobe Acrobat Reader in the list (should be alphabetical), and uninstall all of them (if you have Adobe Acrobat, which is the premium software from Adobe, then you do not need to uninstall it). Click on this link to go to the Adobe Reader download page, make sure to unselect any offers for toolbars or other free software, and download and install the latest version of Adobe Reader. (please note that some people do prefer to use third-party PDF viewers such as PDF X-Change Viewer and Foxit Reader which are not as commonly exploited as Adobe Reader, so if you would prefer to use one of those then you do not need to download and install Adobe Reader) 4. Make Sure Your Computer Has The Latest Windows Updates: Click on the Start button. Go to All Programs . Click on Windows Update . If you have never run Windows Update, then it will probably need to install an ActiveX control and update the Windows Update software before it can continue, so make sure you keep an eye out for that pale-yellow bar that pops up at the top of the page when Windows Update needs to install a new component, and click on the yellow bar and select to allow it. Once it is loaded, click on the Express button. It will check for available updates, and once it is done you can click the Install Updates button. It may ask you to accept a license agreement before it installs, so make sure you say Yes . When it is done installing updates, it may ask you to restart your computer, so close anything you are working on and allow it to restart. Note that the update process can take a while, and you may need to run it several times before all of the updates get installed. 5. Web Of Trust Extension: While this is not a requirement, I highly recommend that you click this link and check out the Web Of Trust extension for your web browser. It will add an extra layer of protection to your web browsing for free, and it is especially helpful when doing searches on Google, Yahoo!, Bing, etc. as it will point out what sites are considered trustworthy and what sites are not by drawing a colored circle to the right of each search result. Green means trusted, red means not trusted, yellow is in between, and white means it is not in Web Of Trust's database. 6. Empty The System Restore: Click on the Start button. Right-click on My Computer Select Properties from the list. In the window that pops up, click on the System Restore tab. Click the check box to Turn off System Restore . Click the Apply button at the bottom-right, and answer Yes to the question. Depending on how much data is saved in the System Restore, it could take more than a few minutes to empty it. Click the check box to Turn off System Restore again and click OK to turn the System Restore back on. Click on the Start button again. Go to All Programs . Go to Accessories . Go to System Tools . Click on System Restore . Select Create a restore point on the right, and click Next at the bottom. Enter a description for the restore point, and click Create . Click Close to finish the process.
  9. OK, that log looks better. Are you able to run a scan with Emsisoft Anti-Malware? Does it detect anything?
  10. If you remove the rule, then is the file still detected when running a scan? You can remove the rule by following the instructions in the following screenshot (if it is too small to read, then you can click on it to make it bigger):
  11. Lets try this. Please reset the Windows TCP/IP settings by following these steps: Click on the Start button. Go to All Programs. Go to Accessories. Right-click on Command Prompt and select Run as administrator. Type in netsh int ip reset c:\resetlog.txt and then press Enter on your keyboard. Restart your computer. Let me know if that makes any difference.
  12. Well, a screenshot showing the detection might contain enough information to submit a false positive report. Here's a link to instructions on how to take a screenshot. You can attach it to a reply the same way you have been attaching the logs.
  13. I have written a cleanup script for OTL (if you need to, you may download OTL from this link). Please download the following OTL_Script file, and save it on your desktop. After saving it, open it, run OTL, and copy and paste the contents of the OTL_Script file into the Custom Scans/Fixes box at the bottom of the OTL window: Then click the Run Fix button at the top. Let the program run unhindered, restart your computer when it is done (it may automatically restart your computer on its own). After your computer has restarted, please open OTL again and click the Quick Scan button. Attach the log it produces in your next reply (just the OTL log, as I don't need to see the Extras log again). You will need to click the button that says More Reply Options to the lower-right of where you type your reply to be presented with the attachment controls.
  14. You're quite welcome. Let me know how it goes, and if it makes any difference with the problem. I don't actually think it will fix it, but with a problem like this it is hard to say what will (other than restoring the system to a state it was in before this happened).
  15. OK. It's possible that a failing hard drive combined with one of Online Armor's drivers was the cause of the issue. Let us know if you have any further trouble.
  16. What kind of Internet connection do you have? DSL? Cable? Is there a modem or a router that you connect to your computer to access the Internet?
  17. Topic reopened per user's request, and user's log (which was sent via PM) is attached:
  18. If you can get the Linux disk to work, then you should be able to download files through it and save them on your hard drive. There should be an Internet browser named Konqueror on the Fedora Linux disk, since it is the KDE version and KDE always comes with Konqueror. It may also come with Firefox, as that at least used to be the default browser on Fedora Linux.
  19. OK, that appears to be an actual Microsoft file, and is probably a false positive. Would it be possible for you to export the log from Emsisoft Anti-Malware that shows the detection, and attach it to a reply? You can access the logs by opening Emsisoft Anti-Malware, and going to Logs in the menu on the left.
  20. I have written a cleanup script for OTL (if you need to, you may download OTL from this link) which will tell it how to get rid of the leftover McAfee stuff (note that some of this appears to be related to McAfee drive encryption, so if you used it to encrypt any data then you will need to decrypt it before running this script). Please download the following OTL_Script file, and save it on your desktop. After saving it, open it, run OTL, and copy and paste the contents of the OTL_Script file into the Custom Scans/Fixes box at the bottom of the OTL window: Then click the Run Fix button at the top. Let the program run unhindered, restart your computer when it is done (it may automatically restart your computer on its own). After your computer has restarted, please open OTL again and click the Quick Scan button. Attach the log it produces in your next reply (just the OTL log, as I don't need to see the Extras log again). You will need to click the button that says More Reply Options to the lower-right of where you type your reply to be presented with the attachment controls.
  21. I've split this into another topic since it appears to be a separate issue. That should make it easier for us to help you troubleshoot it. Is there any possibility of getting logs? You may need to disable Debug Mode, restart your computer, and then delete the contents of the logs folder before you re-enable Debug Mode, restart your computer, and reproduce the problem. That will ensure that the logs are a bit smaller in size when you send them.
  22. Currently, it takes advantage of multiple processors or multiple cores automatically. In version 7, our developers plan to give you more control over that with scan settings for thread count and processors/cores to use.
  23. Currently our developers are planning on adding settings for thread count and core usage restrictions to version 7.
  24. My understanding of the Sandboxie issue is that the Emsisoft Anti-Malware service would need to be run inside of Sandboxie in order for the Outlook plugin to be able to communicate with it while Outlook is running in Sandboxie.