Jump to content


  • Posts

  • Joined

  • Last visited


0 Neutral

About dalevross

  • Birthday 09/18/1984

Contact Methods

  • Website URL

Profile Information

  • Location
    Lansdowne, PA
  1. Well I could google it, but it would make this thread useful for people in a similar position. I haven't added the individual files yet and prior to adding the ProgramData folder I got an alert. I was wondering if there's a way I can trigger a false positive. Something that'll get quarantined so that I can test if the exclusion work.
  2. Thanks, @exile360! That's exactly what I was looking for.
  3. Hi, I wasn't entirely comfortable with some of the information that was recorded in the results, it would be nice if we could obfuscate PC names and user profiles as I'm not sure how those relate to the potential issue. I did some basic sanitization of the names, but I assumed this could throw off any hashes if any were included to tamper proof the process. I'll add it anyways. mbst-grab-results.zip
  4. I had Avira installed and read where the programs play well together. I've noticed however, that whenever I choose to quarantine what is found by malwarebytes, the following is logged after an alert " In accordance with security guidelines, the Administrator has blocked access to the registry". I've since added the C:\Program Files\Malwarebytes\Anti-Malware\ folder as an exception, and will do the x86 folder too, but I'm wondering what the best approach is as I'm not sure my current approach is iron -clad. Ideally, I'd like to allow the executable attempting to do what needs to be done only. PS. This is a 64 bit PC, so I'm wondering if the current exception would be be only one necessary.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.