| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | malwarebytes.. fails |
August, The Malwarebytes v160 scan finished. The report showed there was a Trojan.Downloader File called W.EXE in the Administrative Users account in: C:\Documents and Settings\the Admin account name\Local Settings\Temp\ and a Trojan.Downloader Registry Key in: HKLM\SYSTEM\CurrentControlSet\Services\ I pressed the Save Log button, and took a photo of the screen that showed where the file would be saved to. Then I pressed the Remove Selected button and saw a Pop Up telling me to Restart the system, so I clicked on the Yes button on the Pop Up. After I logged back in to the Admin account I was using, I opened Windows Explorer and navigated to the Log directory but there wasn't any files in it, but the Quarantine directory had 4 new files in it, two of them were named QUAR File, the other two were named Data File. I guess after I get done using all of the Malware/Virus scanners I will go grab a Update to Malwarebytes and run it again on All hard drives. Another ROUNDTUIT! ;-) * SLMR 2.1a #T348 * Honesty is the 1st chapter in the book of wisdom.T.Jeffer --- SBBSecho 2.12-Linux* Origin: telnet & http://cco.ath.cx - Dial-Up: 502-875-8938 (1:2320/105.1) SEEN-BY: 3/0 633/267 640/954 712/0 313 550 620 848 953 @PATH: 2320/105 0/0 261/38 712/848 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.