Jump to content

melboy

Experts
  • Posts

    333
  • Joined

  • Last visited

Everything posted by melboy

  1. Delete that file and try this one: http://www.malwarebytes.org/mbam/program/mbam-setup.exe What OS are you using? In vista ( sorry, XP myself), dont you right click and choose run as administrator?
  2. Are you installing specifically because you have malware issues? If so, try renaming the file to webman.exe or similar. This is because some malware blocks MBAM by name. If not and it's another issue, can you clarify that.
  3. Is it a bug? Imo its Defender doing it's job, warning me of potentially unwanted behaviour. Do i trust the program? Of course i do! Some might want to see the warning, some not
  4. Open Windows Defender Tools > options scroll down to Advanced Options and under Do not scan these files or locations click add and navigate to mbamswissarmy click OK. You should stop seeing the warning from WD. The path typically in XP is C:\WINDOWS\system32\drivers\mbamswissarmy.sys
  5. Have you tried renaming it? Right click the installer file and choose rename . Rename it Eric.exe or something similar.
  6. This might help: http://www.malwarebytes.org/forums/index.php?showtopic=5364
  7. If you use a program such as spybot to block changes to your homepage you should read this: http://www.malwarebytes.org/forums/index.php?showtopic=5364
  8. Hey, Joe Its on the FP board. I found it and got the same results from Jotti and VT. http://malwarebytes.org/forums/index.php?s...amp;#entry22795
  9. In the meantime you could use this suggestion i've been using: http://www.dellcommunity.com/supportforums...id=68769#M68769
  10. from what i can gather from the net, please tell me if i'm wrong, the file mc21.tmp is a temporary file created when a service uses the temporary driver MchIngDrv. would RootkitRevealer be likely to use this or not? i've scanned with the full arsenal (MBAM, SAS ,a2, avira,defender,spybot, AVG anti rootkit, blacklight) and nothing more than tracking cookies come up.
  11. same here. if it helps , jumping to location shows the image path \??\C:\WINDOWS\TEMP\mc21.tmp. i'm sure , (not 100%) , that this was a temp file created by microsoft/systernals rootkit revealer. Malwarebytes' Anti-Malware 1.17 Database version: 864 19:20:40 17/06/2008 mbam-log-6-17-2008 (19-20-35).txt Scan type: Full Scan (C:\|D:\|) Objects scanned: 84672 Time elapsed: 14 minute(s), 5 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 1 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\mchInjDrv (Trojan.Agent) -> No action taken. Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected)
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.