Basic


Scanning With Malwarebytes’

Click the Free Version

Malwarebytes’ uses several sites to store files on for download ,   DOWNLOAD SITES      or HERE

  • Double-click mbam-setup.exe user posted imageand follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
  • Update Malwarebytes’ Anti-Malware
  • Launch Malwarebytes’ Anti-Malware
  • Then click Finish.
  • If an update is found, it will download and install the latest version.

ISSUE: I need to get the latest database onto a computer that cannot access the Internet.

SOLUTION: You can manually copy the database from a working computer using a flash drive or CD onto the infected PC. Their database file is stored in the following locations.

    • Windows XP and 2000
    • C:\Documents and Settings\All Users\Application Data\Malwarebytes\Malwarebytes’ Anti-Malware\rules.ref
    • Windows Vista and Windows 7:
    • C:\ProgramData\Malwarebytes\Malwarebytes’ Anti-Malware\rules.ref
  • Once the program has loaded, select Perform Quick scan, then click Scan.

Mbam 1

  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is checked, and click Remove Selected.
  • If it asks for a Restart DO SO, Very Important

What is the difference between the three scan types in Malwarebytes Anti-Malware?

  • Quick Scan: (Highly Recommended as your First Scan):
    • Processes and files running in memory
    • Files and folders that infections are known install themselves
    • Registry
    • Heuristics checks to look for new and unknown infections
    • Quick Scan is highly optimized for both scan time speed and thorough detections
  • Flash Scan: (Note: If anything is found by a Flash Scan, then it is recommended that you also perform a Quick Scan to verify there are no additional threats on your system)
    • Processes and files running in memory
    • Heuristics checks to look for new and unknown infections
  • Full Scan:
    • Processes and files running in memory
    • All files and folders
    • Registry
    • Heuristics checks to look for new and unknown infections
    • Optionally, scans mapped drives (internal/external)

Note: Malwarebytes’ Anti-Malware uses Inno Setup instead of the Windows Installer Service to install the program. If installation continues to fail in normal mode, try installing and scanning in safe mode. Doing this is usually not advised as MBAM is designed to be at full power when running in normal mode and loses some effectiveness for detection & removal when used in safe mode. For optimal removal, normal mode is recommended so it does not limit the abilities of MBAM. Therefore, after completing a scan it is recommended to uninstall MBAM using the clean=up tool mbam-clean.exe then reinstall it from HERE in normal mode and perform another Quick Scan.

Should I scan with Malwarebytes Anti-Malware in Safe Mode?

Unless otherwise directed always run Malwarebytes Anti-Malware in normal mode. Malwarebytes Anti-Malware is not designed to find all infections when in safe mode. Safe mode will not always load all infection components.

Protection

In the unregistered version of Malwarebytes Anti-Malware, the protection tab shows a comparison of the two versions, highlighting the added features available in the PRO Version. Clicking on the comparison image or Buy Now takes the user to the Malwarebytes Anti-Malware online store.

Mbam Free

In the registered version of Malwarebytes Anti-Malware, the protection tab displays various options now available to protect the system from malicious threats, utilizing the advanced protection module along with the scheduler.

Mbam Pro

  • Enable filesystem protection: Malicious file execution blocking is enabled. If the tray icon for the protection module is not already running, it will start and will enable both protection components if they are both set to start when the protection module starts. If the tray icon is already running, it will simply enable or disable Filesystem Protection.
  • Enable malicious website blocking: Malicious website blocking is enabled. If the tray icon for the protection module is not already running, it will start and will enable both protection components if they are both set to start when the protection module starts. If the tray icon is already running, it will simply enable or disable Website Blocking
  • Start protection module with Windows: This option will start the Protection Module during system startup and place a tray icon in the system tray.
  • Start file execution blocking when protection module starts: This option detects and blocks malicious processes and prompts the user to take action upon detection.
  • Start malicious website blocking when protection module starts: This option blocks access to known malicious websites.
  • Show tooltip balloon when malicious website it blocked: This option will generate a tray icon notification whenever a malicious IP address is blocked. Details such as the application name, the connection type as well as the port number are shown on Windows Vista and higher operating systems.

IP Blocker Mbam

Scheduler:

Allows the user to schedule scans and updates to fit individual needs. An optional predefined update is included during activation. See the  Scheduler section for details.

Updates

The update tab allows the program and database to be updated with a single click on the “Check for Updates” button. This tab contains current database information for Malwarebytes Anti-Malware. It also displays the latest news from Malwarebytes. It is recommended that all free users check daily for updates using this tab, and all PRO users may utilize the scheduler to keep Malwarebytes Anti-Malware updated automatically.

Mbam Updates 1

When you check for updates manually you’ll see the update progress dialog.

Mbam Update 2

Upon completion of the update you’ll see the confirmation message displaying what the database version was prior to the update as well as the database version that it has been updated to.

Mbam Update 3

Quarantine

The quarantine tab holds all potential threats found on the system. It provides the user the option to delete these items and also the flexibility to restore a legitimate item from the quarantine. If you are unsure about a particular threat, be sure to do a search on the Internet for more information or visit our online community to learn more about it.

Mbam Quarantine 1

  • Delete: To delete a single quarantined item permanently, select (by clicking) the item from the list, then click the “Delete” button.
  • Delete All: To delete all quarantined items permanently, click the “Delete All” button.
  • Restore: To restore an item from the quarantine, click the “Restore” button.
  • Restore All: To restore all items from the quarantine, click the “Restore All” button.

False Positives

Every anti-malware program will eventually produce a false positive detection. A false positive occurs when an anti-malware product detects a file as malicious when in fact, it is legitimate. Malwarebytes Anti-Malware is not a perfect product and they try their best to prevent these false positives. In the event of a false positive, please proceed with the following before contacting them.

  1. Use a search engine to verify that others do not think the item is malicious.
  2. Once you are sure that Malwarebytes Anti-Malware has detected a false positive with a legitimate application, it is time to let them know.
  3. Start Malwarebytes Anti-Malware using the /developer command line. This is a crucial step as it will generate a developer’s log where the false positive has occurred.
  4. Contact them at www.malwarebytes.org/support and be sure to include a copy of this developer’s log. It is crucial that they receive this log in order to analyze and resolve the issue quickly.

Logs

The logs tab allows you to manage your saved log files. To view a specific log file, select it from the list and click “Open” or simply double-click on it to view its contents. These logs are named based on the date and time. They contain valuable information such as the actions taken by Malwarebytes Anti-Malware when a scan is finished. It is recommended that you keep at least a month worth of logs for record keeping before deleting them off of the computer.

Your protection logs created by the protection module will also be displayed here so that you may view or delete them. They log information such as scheduled updates which have been processed, infections which have been detected by the protection module and websites which have been blocked by the protection module.

  • Open: To view a log file, select (by clicking) a log file from the list and click the “Open” button.
  • Delete: To delete a log file, select (by clicking) a log file from the list and click the “Delete” button.
  • Delete All: To delete all log files, click the “Delete All” button.

Ignore List

The ignore list tab allows you to manage a list of items which both the scanner and protection module will exclude from scanning and detection. Programs such as other security products are usually recommended to add as you want both applications to complement each field of specialty and provide the added layer of protection without encountering conflicts and performance issues.

Add: To set the exclusion manually from being scanned both by the scanner and the protection module in the PRO version, click on the “Add” button and use the browse window to locate the file or folder that you want to exclude from being scanned. This option is useful for resolving performance conflicts with other security software, such as your resident antivirus program. Simply add the program folders of your security software to the Ignore List.

Delete: To remove a single item (file/folder/IP address) from the Ignore list, such as a file or folder, select (by clicking) the on the item listed and click “Delete”.

Delete All: To remove all items from the Ignore list immediately, click “Delete All”.

Addressing possible threats from scanned results:

  1. Upon a scan completion, Malwarebytes Anti-Malware will indicate that there are infected objects.
  2. Click “Show Results” in the main Malwarebytes Anti-Malware window.
  3. The Scanner tab will open showing infected items.
  4. Select only the item(s) Malwarebytes Anti-Malware should not consider as a risk, click “Ignore” to allow.
  5. Click “Remove Selected” to remove the threats remaining in the list.
  6. If there are no additional threats left, Malwarebytes Anti-Malware will display a message stating that there are no threats left to remove. Click “OK” to continue.

Accessing a Blocked Website: In order to bypass and access a potentially malicious website which has been blocked by Malwarebytes Anti-Malware, perform the following step.

  1. Navigate the web browser to the blocked website or IP address again.
  2. A balloon tip notification will pop up from the task tray indicating that access to the website has been blocked.
  3. Right-click on the Malwarebytes Anti-Malware tray icon, hover the mouse pointer over to “Add to Ignore List”. Left-click on the IP address number that you want to add to the ignore list.

Security Risk: Once an IP address is added to the Ignore List, any website that uses that IP address will be able to bypass Malwarebytes Anti-Malware.

Settings

The settings tab allows you to configure Malwarebytes Anti-Malware to work just how you want it. These additional options are categorized in three sections: General Settings, Scanner Settings, Updater Settings, and Scheduler Settings, the last of which will be covered in its own section of this documentation.

General Settings

Mbam Settings 1

  • Terminate Internet Explorer During Threat Removal (unchecked by default): Enabling this option allows Malwarebytes Anti-Malware to terminate Internet Explorer browser automatically before removing detected threats resided within the Temporary Internet Files folder. If this setting is not enabled, a reboot may be required to complete the threat removal process of these types of infections.
  • Anonymously Report Usage Statistics: The option will automatically collect statistical information on malware threats detected on the system and reports to our threat research center. No personally identifiable or personal information is collected. Statistics can be viewed at: http://www.malwarebytes.org/malwarenet.php.
  • Create Right Click Context Menu: A Scan with Malwarebytes Anti-Malware option is now available when a file or folder is right-clicked, enabling users to quickly scan an individual file/folder.
  • Automatically Save Log File After Scan Completes: This option automatically create a saved log file each time a scan is performed.
  • Open Log File Immediately After Saving: This option will automatically open the log file after a scan is completed.
  • Warn If Database Is Outdated By: This option will provide a pop-up notification indicating a database has elapsed the pre-determined number of days without an update.
  • Language: This drop-down menu allows the user to select the preferred language used by Malwarebytes Anti-Malware.

Scanner Settings

Mbam Settings 2

  • Scan Memory Objects: This scanning option will include a scan of all processes running in memory when a scan is performed to check for actively running infections.
  • Scan StartUp Objects: This scanning option will include a scan of the Windows registry to check for installed threats and malicious alterations of certain Windows settings.
  • Scan Registry Objects: This scanning option will scan files and folders on the system to check for infected files. The number of files and folders scanned and their location varies depending on the type of scan.
  • Scan Filesystem Objects: This scanning option will perform a check of key files, folders and registry locations against our very powerful heuristics database to look for infections not found by the other parts of the scan
  • Scan Additional Items Against Heuristics: This option enables our latest heuristics detection engine to perform a more advanced analysis of the system for new threats not in our detection database, possibly finding threats the other parts of the scan cannot yet find.
  • Enable Advanced Heuristics Engine (Heuristics Shuriken): This option is enabled by default, allowing Advanced Heuristics Engine to add another layer of protection to detect new and unknown malware.
  • Action for Potentially Unwanted Programs (PUP): This option detects known, non-malicious software which may causes undesirable performance or issues for the computer.
  • Action for Potentially Unwanted Modifications (PUM): This option identifies system setting modifications which may have an adverse effect or direct impact of available functionality or resources of the system.
  • Action for Peer-To-Peer Software (P2P): This option detects file sharing software installed on the system. Available actions and definition for the above 3 settings:
  • Do not show in results list: Items of this type will not be detected or shown in the scanned results list.
  • Show in results list and check for removal: Items of this type will be detected, shown in the results list and marked for removal.
  • Show in results list and do not check for removal: The detected item is shown in the scan results list but will not be selected for removal. Each item must be checked manually for removal.

Updater Settings

Mbam Settings 3

  • Download and Install Program Update if available: When this box is checked, new program and database update will be automatically downloaded and installed.
  • Use Proxy Server To Download Updates: When this option is checked, the user may set proxy server settings so that Malwarebytes Anti-Malware will be able to update via the internet proxy connection. Server address and the port number is required for a successful proxy connection.
  • Use Authentication: When this option is checked, it allows the user to enter the authentication information, working in conjunction with the “Use Proxy Server To Download Updates” option.

Scheduler Settings

The Scheduler Settings tab allows you to configure scheduled updates and scans. This feature is only available in the PRO version of Malwarebytes Anti-Malware and is available after the product has been activated with a valid ID and Key. You’ll also get to try this feature if you use the free trial, however it will cease to function once your trial expires.

Mbam Scheduler Settings 1

You may click an existing scheduled item and use the Edit button to modify the scheduled task or the Delete button to remove it. Clicking the Add button allows you to create a new scheduled task as shown below. Use the radio buttons next to Type: to select what type of scheduled task you wish to create (Scan or Update).

Scheduling a scan

Mbam Scheduling a Scan

  • Frequency:This is where you select how often you want your scheduled scan to occur. Available options are Hourly, Daily, Weekly, Monthly, Once, and On reboot.
  • Starting on:This is where you choose the date and time that the scheduled scan should run for the first time. You may click in the box itself to change the date or time and you may also change the date by clicking on the small calendar icon on the right side of the box.
  • Recover if missed by: This is set to 0 by default, but if set to any other number (1-23), the task will attempt to run if the scheduled time was missed because the system was turned off during the actual scheduled time and the system is running within the number of hours that ‘Recover if missed by’ is set to. For example, if you have a daily scan set to run at 12:00AM, but your computer was not running at 12:00AM and you have ‘Recover if missed by’ set to 8 hours, if your PC is running any time between 12:00AM and 8:00AM, the scheduled scan will execute. This option is unavailable for monthly and on reboot scans.
  • Repeating every: This is where you select how often the scheduled scan repeats. Available options are 1-23 hours for hourly scans, 1-60 days for daily scans, and 1-8 weeks for weekly scans. This option is unavailable for scans set to run on reboot.
  • Wake computer from sleep to perform task: This option will have Malwarebytes Anti-Malware attempt to wake your computer from sleep mode to execute the scheduled scan. Unfortunately this does not work on all system configurations. This option is unavailable for scans set to run on reboo.
  • Perform scheduled scan silently from system account: This will have Malwarebytes Anti-Malware run the scan from the hidden SYSTEM user account, resulting in the scan running in the background without the scanner window showing. Upon completion of the scan, regardless of whether or not threats were found, the scan will terminate.
  • Terminate program when scan completes successfully: This will have Malwarebytes Anti-Malware close if no threats were detected. This checkbox is automatically selected and cannot be unchecked if you have also enabled the ‘Perform scheduled scan silently from system account’ option.
  • Remove and quarantine all threats automatically: This will have Malwarebytes Anti-Malware remove any detected threats. Note that it also honors your scanner settings for PUP, PUM and P2P objects, so if any or all are not set to be selected for removal, they will not be removed.
  • Save log file regardless of user settings: This will have Malwarebytes Anti-Malware save a logfile upon completion of the scan even if ‘Automatically save log file after scan completes’ is unchecked under your general settings.
  • Restart the computer if required for threat removal: This will have Malwarebytes Anti-Malware reboot your computer without any notice should a threat be detected and removed during your scheduled scan which requires a reboot to complete the removal process. Note:You will not have the opportunity to save anything you are working on when this restart occurs so cany open files in other programs will not be saved.
  • Add: Once you have your scan configured the way you want it, click the Add button to add it to the scheduler.
  • Cancel: If you’ve decided not to add your scheduled scan after all or not to make any changes to the one you were editing, click Cancel and no changes will be made and no new scheduled scan will be added.

Scheduling an update

Mbam Scheduling a Update

  • Frequency: This is where you select how often you want your scheduled check for updates to occur. Available options are Realtime, Hourly, Weekly, Monthly, Once, and On reboot.
  • Starting on: This is where you choose the date and time that the scheduled update should run for the first time. You may click in the box itself to change the date or time and you may also change the date by clicking on the small calendar icon on the right side of the box.
  • Recover if missed by: This is set to 0 by default, but if set to any other number (1-23), the task will attempt to run if the scheduled time was missed because the system was turned off during the actual scheduled time and the system is running within the number of hours that ‘Recover if missed by’ is set to. For example, if you have a daily update set to run at 12:00AM, but your computer was not running at 12:00AM and you have ‘Recover if missed by’ set to 8 hours, if your PC is running any time between 12:00AM and 8:00AM, the scheduled update will execute. This option is unavailable for monthly and on reboot updates.
  • Repeating every: This is where you select how often the scheduled update check repeats. Available options are 1-59 minutes for realtime updates, 1-23 hours for hourly updates, 1-60 days for daily updates, and 1-8 weeks for weekly updates. This option is unavailable for all other frequencies.
  • Wake computer from sleep to perform task: This option will have Malwarebytes Anti-Malware attempt to wake your computer from sleep mode to execute the scheduled update. Unfortunately this does not work on all system configurations. This option is unavailable for updates set to run realtime or on reboot.
  • Show tooltip balloon after successful update: This option will have Malwarebytes Anti-Malware’s tray icon used for realtime protection notify you when a successful update has occurred, but only if the database was actually updated. In order to receive this notification, Malwarebytes Anti-Malware’s protection module must be running, however it does not require that either component of the protection module be enabled.
  • Run flash scan after successful update: This will have Malwarebytes Anti-Malware run a flash scan to check your system for any active threats which might reside on your system. It’s useful for verifying that you aren’t infected with anything which was not detected in the previous database but is now detected in the one which was just downloaded by the updater. This scan cannot be set to run silently.
  • Add: Once you have your update configured the way you want it, click the Add button to add it to the scheduler.
  • Cancel: If you’ve decided not to add your scheduled update after all or not to make any changes to the one you were editing, click Cancel and no changes will be made and no new scheduled update will be added.

More Tools

The more tools tab is where you find other useful tools that we have included with Malwarebytes Anti-Malware.(see pic below)

The Chameleon link will take you HERE

Malwarebytes Chameleon technologies get Malwarebytes Anti-Malware installed and running when blocked by malicious programs.

The Anti-Rootkit link HERE

Tutorial

QUOTE:

” Disclaimer

This is beta software, for consumer and approved partner use only, use at your own risk, and by proceeding you are agreeing to the terms of our license agreement, enclosed as “License.rtf”.

All Beta versions are non-final products. Malwarebytes does not guarantee the absence of errors which might lead to interruption in normal computer operations or data loss. Precautions should be taken. The types of infections targeted by Malwarebytes Anti-Rootkit can be very difficult to remove. Please be sure you have any valued data backed up before proceeding, just as a precaution.

While we encourage and invite participation, Malwarebytes Anti-Rootkit BETA users run the tool at their own risk. Malwarebytes bears no responsibility for issues that may arise during use of this tool, however all reasonable efforts will be made by Malwarebytes to assist in recovery should the need arise.

If you continue experiencing problems or MBAR fails to completely detect and remove a rootkit from your system
then please contact us by filling out the form at HERE   “

FileASSASSIN link HERE

FileASSASSIN can eradicate any type of locked files from your computer.

If you use a computer, you’ve probably come across at least one of the following messages:

  • Cannot delete file: Access is denied.
  • Make sure the disk is not full or write-protected and that the file is not currently in use.
  • The source or destination file may be in use.
  • The file is in use by another program or user.

These messages commonly appear when you’re trying to delete files deposited by a malware infection, though occasionally a file just goes on lockdown. Whatever the reason for the locked file, File ASSASSIN can remove it.

Start-Up Lite link HERE.

StartUpLite provides a safe, easy, and efficient way to eliminate unnecessary applications that start when you turn on your computer.

By disabling or removing unnecessary entries, StartUpLite can dramatically shorten your startup time with just a few clicks of the mouse. Stop waiting and start computing.

NOTE: This is a screenshot of the new Mbam 1.7.0.1400 BETA

Mbam 1.7

About

The about tab has the basic information and disclaimer regarding Malwarebytes Anti-Malware. To learn more about Malwarebytes, click on www.malwarebytes.org button and it will launch your web browser to go to our website. Click on the Help button will open this help file.

Mbam About

Error Codes

This document explains some common Malwarebytes Anti-Malware error codes. Please contact us at www.malwarebytes.org/support if you have encountered an error not listed here..

PROGRAM_ERROR_COMMAND_LINE
The command line syntax was either invalid or formatted incorrectly.

PROGRAM_ERROR_LIMITED_USER
User does not have sufficient privileges to perform an elevated program task. Administrator privileges are required.

PROGRAM_ERROR_LOAD_DATABASE
Database was missing or corrupted, an attempt to download the database was unsuccessful.

PROGRAM_ERROR_NO_ITEMS_SELECTED
Please ensure that at least one item under Scanner Settings other than “Enable advanced heuristics engine. (Heuristics.Shuriken)” is selected.

PROGRAM_ERROR_NOT_REGISTERED
User does not have access to a PRO only feature.

PROGRAM_ERROR_UPDATING
Attempt to obtain update when internet connection was not available.

PROGRAM_ERROR_SCHEDULER_ADD
There was an error adding a duplicate task into scheduler.

PROGRAM_ERROR_SCHEDULER_REMOVE
There was an error removing the scheduled task.

PROGRAM_ERROR_OS_NOT_SUPPORTED
The operating system is not supported. This application only runs on Windows 2000 and higher.

PROGRAM_ERROR_MISSING_FILE
A file necessary to run this application is missing. Please reinstall the application.

PROGRAM_ERROR_LOAD_RESOURCE
An error occurred trying to load a resource from the resource file. Please reinstall the application.

PROGRAM_ERROR_PROTECTION_MODULE
An error occurred starting the Protection Module. Please ensure you have administrator rights.

Command Line Parameters

Malwarebytes Anti-Malware supports a variety of command line parameters, which can be used from either a command prompt, batch file or script. (Note: some of these parameters are available in the PRO version only.)

mbam.exe <parameters>

(where parameters is one or more of the following)

  • /errorsilent: suppresses all critical errors and writes the last error to <root-drive>\mbam-error.txt where <root-drive> is the hard drive where Windows is installed, also known as the System Drive.Example:mbam.exe /errorsilent will suppress all errors when the program is running.
  • /proxy <required server> <optional port> <optional username> <optional password>: allows the user to update through a proxy server. Leave blank to remove any proxy settings previously set.Examples:
    • mbam.exe /proxy will remove the proxy settings.
    • mbam.exe /proxy proxy.com 80 will use proxy.com on port 80 with no credentials.
    • mbam.exe /proxy proxy.com 80 admin password will use proxy.com with the specified credentials.

     

  • /logtofolder <optional path>: allows the user to save all log files to the specified folder. If this folder does not exist, Malwarebytes Anti-Malware attempts to create it. If the path is blank, changes are reverted to default settings. These logs do not show up on the Logs tab.Example:mbam.exe /logtofolder C:\mbam_log_files will save all future log files to the location C:\mbam_log_files.Note: Protection logs created by the protection module will be saved to the same location you select
  • /logtofile <optional path>: allows the user to save all log files to the specified file. If this file does not exist, Malwarebytes Anti-Malware attempts to create it. Newest entries are appended to top of the file. If the path is blank, changes are reverted to default settings. This log does not show up on the Logs tab.
    Example:mbam.exe /logtofile C:\mbam_log_files\mbam-log.txt will save all future log files to the location C:\mbam_log_files\mbam-log.txt.Limitations: The path, in the above case C:\mbam_log_files, must exist. This option will not create folders if they don’t exist, only the log file.Note: Protection logs created by the protection module will always still only be saved to the default location
  • /register: allows the user to register the program without displaying the main dialog box.Examples:mbam.exe /register 12345-67890 AAAA-BBBB-CCCC-DDDD will register the product using the license key passed in the parameters.Limitations: Protection must be enabled using the program user interface if it is to be enabled before the system restarts.
  • /developer: this command line parameter is used to execute the program in developer mode and will create a log with encrypted information on items detected in a scan. It is used for reporting false positives and allows the researchers to determine why an item is being detected.Example: mbam.exe /developer will start the program with detailed detection information.Note: When reporting a false positive, please be sure to use the /developer switch and provide the resulting log to the researchers.
  • /update <optional -silent>: allows the user to update the product and database.Examples:
    • mbam.exe /update will attempt to update the database or program, depending on settings.
    • mbam.exe /update -silent will attempt to update the database or program silently. The -silent switch will not function in the Free version.

     

  • /scan <optional -quick or -full or -flash> <optional -silent> <optional -remove> < optional -terminate> <optional -reboot> <optional -log>: initiates a scan with the selected options.Parameters:
    • -quick: initiates a quick scan.
    • -full: initiates a full scan using saved drives in the registry.
    • -flash: initiates a flash scan of memory and heuristics only.
    • -terminate: closes the program after a scan completes and no threats were found (cannot be used with -silent). If an item is detected, the program remains open so that the user can decide whether or not to remove the detected threat(s). The -terminate switch will not function in the Free version.
    • -log: overrides the save log checkmark on the settings tab. If the Automatically save log after scan completes option is unchecked, a log file will still be saved when the -log parameter is used.
    • -silent: hides the GUI while scanning (does not need to be used with -terminate). The -silent switch will not function in the Free version.
    • -reboot: reboots the computer if necessary, only valid if -remove is used. The -reboot switch will not function in the Free version.
    • -remove: automatically removes threats and saves a log file. Unless -silent is specified, GUI stays open. The -remove switch will not function in the Free version.

    Examples:

    • mbam.exe /scan will run a default scan.
    • mbam.exe /scan -full will run a full scan.
    • mbam.exe /scan -flash -terminate will run a flash scan and terminate if no objects are detected.
    • mbam.exe /scan -quick -log -silent -remove -reboot will run a quick scan silently, save logs, automatically remove threats, and reboot if necessary.

    Limitations:

    • -terminate parameter cannot be used with the -silent parameter since the program will automatically terminate when the -silent parameter is used.
    • -reboot parameter is only valid if used with the -remove parameter.

     

  • /schedule <options /update or /scan -quick or /scan -full or /scan -flash> <options /realtime or /hourly or /daily or /weekly or /monthly or /once or /onreboot>: these items allow the user to choose the frequency for the scheduled update or scan to occur:
    • <optional /starting mm/dd/yyyy hh:mm:ss>: this item allows the user to set the time for the scheduled scan or update to start.
    • For /realtime omit this – the current time is assumed.
    • For /random – this item selects a random time to set the scheduled scan or update to occur. /random may only be used with /hourly or /daily and randomizes the Hour and Minute or Hour and Minute and Second respectivelyLimitations: Not supported with /onreboot for scans or /realtime or /onreboot for updates.
    • <optional /every X where X is a number for the frequency of the scan or update to occur, this is required for every option except /once and /onreboot> <optional /recover X where X is the number of hours for the scan or update to attempt to run again if the computer was unavailable during the scheduled time, this is not valid with /onreboot>
    • <optional /wakefromsleep>: may be used with a scan or an update. Malwarebytes Anti-Malware will attempt to wake the computer from sleep to perform the scheduled scan or update.Limitations: Not supported with /onreboot for scans or /realtime or /onreboot for updates.
    • <optional /flash executes a Flash Scan after a successful updateNote: only used with /update>

    Examples:

    • /schedule /scan -quick -remove -terminate -log /daily /starting 08/10/2010 23:00:00 /every 1 /silent /wakefromsleep will schedule silent daily Quick Scan starting on August 10th, 2010 at 11:00PM that will repeat every 1 day, remove threats, reboot if necessary, force the creation of a scan log and will attempt to wake the computer from sleep to perform the scan.
    • /schedule /update /flash /realtime /every 5 will schedule an update to occur in real-time once every 5 minutes and set a Flash Scan to occur after each successful update.

     

  • /unschedule <optional /all or /all -update or /all -scan>.
    Note: You can remove individual scans or updates by not including the /all switch and specifying the exact switches used to create the scan or update

    • /all removes all scheduled scans and updates.
    • /all -update removes all scheduled updates.
    • /all -scan removes all scheduled scans.

    Examples:

    • /unschedule /all will delete all scheduled updates and scans
    • /unschedule /all -scan will delete all scheduled scans
    • /unschedule /all -update will delete all scheduled updates
    • /unschedule /scan -quick -remove -terminate -log /daily /starting 08/10/2010 23:00:00 /every 1 /silent will delete a scheduled silent daily Quick Scan that was set to start on August 10th, 2010 at 11:00PM that was set to repeat every 1 day, remove threats, reboot if necessary, and force the creation of a scan log.
    • /unschedule /update /flash /realtime /every 5 will delete a scheduled update that was to occur in real-time once every 5 minutes and with a Flash Scan set to occur after each successful update.

     

  • /setpassword sets or changes the password to access certain features of the product. Quotes are required around the password you wish to set.Examples:
    • /setpassword “malwarebytes” sets the password to malwarebytes
    • /setpassword “newpassword” “oldpassword” changes the password from oldpassword to newpassword

     

  • /clearpassword <password>: removes the password.Example:
    • /clearpassword “malwarebytes removes all password protection if the password was password

Contact Malwarebytes

In the event you would like to contact Malwarebytes, please do so at www.malwarebytes.org/support.

Malwarebytes’ Exclusions

Advertisements

Posted October 30, 2012 by Wide Glide in Malwarebytes' Antimalware

All Things Equal

A fine WordPress.com site

Everything Anti-Malware!

Reviews, Step-by-Step Guides,Toolkits and News

TechNet Blogs

Malware Removal

SUPERAntiSpyware Blog

Malware Removal

Security Garden

Malware Removal

S!Ri.URZ

Malware Removal

miekiemoes' Blog

Malware Removal

Malwarebytes Labs

Malware Removal

Metallica's blog

About malware

Malware Removal

Opera News

Malware Removal

WordPress.com

WordPress.com is the best place for your personal blog or business site.

%d bloggers like this: