That doesn't sound like the target a malware writer would want to attack, while at the same time letting the other DLL/OCX register and the scan run. I scanned with MBAM, Avira, Dr.Web and PandaOnline and the scans were clean (except for Dr. Web and Panda reporting some false positives in uninstalled software). I had been having serious registry problems a few weeks ago with regsvr32 failing and jscript and vbscript not working. They were cured by running a script like yours, except it applied to the entire registry. See: Solving setup errors by using the SubInACL tool I think my original problem was caused by changing my Windows username (the real one, not the login one). I successfully changed all references to it in registry keys, but I had an old QuickTime installed whose ownership was the old name. As a result, a lot of keys for filetypes and scripting now had owners who didn't exist, so the keys couldn't be deleted or modified. The SubInACL script fixed all that, but perhaps the original problem -- or the extreme cure -- created some other issues. I finally succeeded in registering MBAMext by brute force. I examined the registry on another machine that had a successful installation of MBAM 1.27. I exported all the registry keys related to MBAMext and added them to my machine's registry. The MBAM scan context menu item now works. [small suggestion: the log would be improved if it included the pathname of the folder or file scanned.] I have attached the REG files to this post in a ZIP archive in case others will find them helpful. Thanks for you help and for the great product! MBAMextReg.zip MBAMextReg.zip