Posted 29 June 2016 - 09:32 AM
Hi again, KingDavidlll!
And finally, the program worked perfectly!
The complete sentence was...Gradually, the developer made some changes in his programs' source code, recompiled and republished the executable, and finally, the program worked perfectly!
Also do you publish your results anywhere on what you find with each different tool that you use? I'm curious to read about what you have learnt!
For each different tool that I use, I usually do not publish my results unless I am in doubt about the results, and therefore need help from the AII or MRL forums (I have done that a couple of times, especially when I was all new to this).
Most anti-malware tools are non-diagnostic and use a predefined and frequently updated database (blacklisting), to subsequently scan the computer for malware, and finally present the scan results (threats) with options for removal or keeping (the latter especially if False Positives).
Only a few anti-malware tools are diagnostic, and scan the computer for both goodware and malware, and finally present the scan results without distinguishing between what is good and bad, thus leaving it up to the end user to decide what to remove and whatnot. This type of tools also uses whitelisting to exclude default Microsoft entries in order to reduce the length of the scan log results(, which often tend to get long). In order to remove something with this type of tools, the end user can create fix scripts which are then carried out line-by-line (like a batch file), often consisting of scan log entries copied into the script by the end user(, but also various commands if need be).
Diagnostic anti-malware tools that have publicly available tutorials, include Farbar Recovery Scan Tool (FRST) and OldTimer's List-It (OTL), while others like Zoek and ComboFix require expert education in anti-malware schools (i.e. here at BC) to best learn how to read their logs, create fixes from them and learn how to remove malware.
And, like I said, even though I am a former programmer, unfortunately I lack the necessary commitment / obligation to apply for such education..., which, although sounding somewhat selfish, to help anyone else but myself, sorry...
On a side note however, nowadays I am able to spot a lot of malware in my own first MRL forum topic.
And, once again; Thank you!
Edited by midimusicman79, 30 June 2016 - 09:11 AM.
MS Win 10 Pro 64-bit, EAM Pro/EEK, MB 3 Free, WPP, SWB Free, CryptoPrevent Free, NVT OSA and Unchecky, WFW, FFQ with uBO, Ghostery, Grammarly Free and HTTPS Ew. Acronis TI 2018, K. Sw. Upd. AM-tools: 9-lab RT BETA, AdwCleaner, Auslogics AM, aswMBR, Avira PCC, BD ART, catchme, Cezurity AV, CCE, CKS, ClamWin P., Crystal Sec., DDS, DWCI, EMCO MD, eScan MWAV, ESS/EOS, FGP, FMTB, FRST, F-SOS, FSS, FreeFixer, GMP, GMER, hP BETA, HJT, Inherit, JRT, K. avz4, KVRT, K. TDSSKiller, LSP-Fix, MB 3 Free, MBAR BETA, MA Stinger, NMC, NoBot, NPE, NSS, NVT MRF (NMRF), OTL, PCC, QD, RCS, RSIT, RKill, Rs, SC, SR, SAP, SVRT, SAS, SL, TMHC, TSA ART, UHM, Vba32 AR, VRS, WR (AiO), Xvirus PG, ZAM, ZHPC, ZHPD and Zoek. I have 23 Years of PC Experience. Bold = effective.