TIP: Click on subject to list as thread! ANSI
echo: windows
to: AUGUST ABOLINS
from: Ed Vance
date: 2012-01-11 12:24:00
subject: malwarebytes.. fails

August,

The Malwarebytes v160 scan finished.

The report showed there was a Trojan.Downloader File called W.EXE in the
Administrative Users account in:

C:\Documents and Settings\the Admin account name\Local Settings\Temp\

and a Trojan.Downloader Registry Key in:

HKLM\SYSTEM\CurrentControlSet\Services\

I pressed the Save Log button, and took a photo of the screen that
showed where the file would be saved to.

Then I pressed the Remove Selected button and saw a Pop Up telling me to
Restart the system, so I clicked on the Yes button on the Pop Up.

After I logged back in to the Admin account I was using, I opened
Windows Explorer and navigated to the Log directory but there wasn't any
files in it, but the Quarantine directory had 4 new files in it,
two of them were named QUAR File, the other two were named Data File.

I guess after I get done using all of the Malware/Virus scanners I will
go grab a Update to Malwarebytes and run it again on All hard drives.

Another ROUNDTUIT!    ;-)


 * SLMR 2.1a #T348 * Honesty is the 1st chapter in the book of wisdom.T.Jeffer
--- SBBSecho 2.12-Linux
* Origin: telnet & http://cco.ath.cx - Dial-Up: 502-875-8938 (1:2320/105.1)
SEEN-BY: 3/0 633/267 640/954 712/0 313 550 620 848 953
@PATH: 2320/105 0/0 261/38 712/848 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.