top of page
aweconmalan

Why You Need Kaspersky Antivirus 6.0.4.1424 for Your Online Security



  • Download Security Check from here or here and save it to your Desktop. Double-click SecurityCheck.exe

  • Follow the onscreen instructions inside of the black box.

  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

  • NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me. Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.Make sure the following options are checked:Internet Services

  • Windows Firewall

  • System Restore

  • Security Center/Action Center

  • Windows Update

  • Windows Defender

  • Other Services

  • Press "Scan".

  • It will create a log (FSS.txt) in the same directory the tool is run.

  • Please copy and paste the log to your reply.

  • Please download MiniToolBox and run it.Checkmark following boxes:Report IE Proxy Settings

  • Report FF Proxy Settings

  • List content of Hosts

  • List IP configuration

  • List Winsock Entries

  • List last 10 Event Viewer log

  • List Installed Programs

  • List Devices (do NOT change any settings here)

  • List Users, Partitions and Memory size

  • Click Go and post the result. Download Malwarebytes' Anti-Malware (aka MBAM): -anti-malware/ to your desktop.* Double-click mbam-setup.exe and follow the prompts to install the program.* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.* If an update is found, it will download and install the latest version.* Once the program has loaded, select Perform quick scan, then click Scan.* When the scan is complete, click OK, then Show Results to view the results.* Be sure that everything is checked, and click Remove Selected.* When completed, a log will open in Notepad.* Post the log back here.Be sure to restart the computer.The log can also be found here:C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txtOr at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txtDownload Malwarebytes Anti-Rootkit from HERE to your Desktop.Unzip downloaded file.

  • Open the folder where the contents were unzipped and run mbar.exe

  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.

  • DO NOT click on the Cleanup button. Simply exit the program.

  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt

  • Please download Rkill (courtesy of BleepingComputer.com) to your desktop.There are 2 different versions. If one of them won't run then download and try to run the other one.You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.rKill.exe: iExplore.exe (renamed rKill.exe): Double-click on the Rkill desktop icon to run the tool.

  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.

  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.

  • If not, delete the file, then download and use the one provided in Link 2.

  • Do not reboot until instructed.

  • If the tool does not run from any of the links provided, please let me know.

If normal mode still doesn't work, run the tool from safe mode.When the scan is done Notepad will open with rKill log.Post it in your next reply.NOTE. rKill.txt log will also be present on your desktop.NOTE Do NOT wrap your logs in "quote" or "code" brackets.




Kaspersky Antivirus 6.0.4.1424.



  • Download Temp File Cleaner (TFC)Alternate download: -Tools/TFC.exeDouble click on TFC.exe to run the program.Click on Start button to begin cleaning process.TFC will close all running programs, and it may ask you to restart computer. Please download AdwCleaner by Xplode onto your desktop.Close all open programs and internet browsers.

  • Double click on adwcleaner.exe to run the tool.

  • Click on Scan button.

  • When the scan has finished click on Clean button.

  • Your computer will be rebooted automatically. A text file will open after the restart.

  • Please post the contents of that logfile with your next reply.

  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

  • Please download Junkware Removal Tool to your desktop.Shut down your protection software now to avoid potential conflicts.

  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".

  • The tool will open and start scanning your system.

  • Please be patient as this can take a while to complete depending on your system's specifications.

  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.

  • Post the contents of JRT.txt into your next message.

  • Please run a free online scan with the ESET Online ScannerDisable your antivirus program

  • Tick the box next to YES, I accept the Terms of Use

  • Click Start

  • Accept any security warnings from your browser.

  • Check Scan archives

  • Click Start

  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.

  • When the scan completes, click on List of found threats

  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.NOTE. If Eset doesn't find any threats it'll NOT produce any log.



Antivirus by McAfee is a complete antivirus application which safeguards your DiskStation. It checks for updates automatically and lets you schedule virus scans when your DiskStation is not being used in order to consume less system resources. 2ff7e9595c


0 views0 comments

Recent Posts

See All

Comments


bottom of page