Jump to content

How do I really know with a MB scan?

Recommended Posts

How do I really know if the MB scan is real, and not affected by Malware/Viruses that could potentially cause it to skip scanning certain areas or processes?

Running the scanner, it seems awfully fast like almost as if it's doing a partial scan as it seems to jump in progress. I don't know if I trust that.

Link to post
Share on other sites

  • Staff

***This is an automated reply***


Thanks for posting in the Malwarebytes for Windows Help forum.

If you are having technical issues with our Windows product, please do the following:

Malwarebytes Support Tool - Advanced Options

This feature is designed for the following reasons:

  • For use when you are on the forums and need to provide logs for assistance
  • For use when you don't need or want to create a ticket with Malwarebytes
  • For use when you want to perform local troubleshooting on your own

How to use the Advanced Options:

  1. Download Malwarebytes Support Tool
  2. Double-click mb-support-X.X.X.XXXX.exe to run the program
    • You may be prompted by User Account Control (UAC) to allow changes to be made to your computer. Click Yes to consent.
  3. Place a checkmark next to Accept License Agreement and click Next
  4. Navigate to the Advanced tab
  5. The Advanced menu page contains four categories:
    • Gather Logs: Collects troubleshooting information from the computer. As part of this process, Farbar Recovery Scan Tool (FRST) is run to perform a complete diagnosis. The information is saved to a file on the Desktop named mbst-grab-results.zip and can be added as an email attachment or uploaded to a forum post to assist with troubleshooting the issue at hand.
    • Clean: Performs an automated uninstallation of all Malwarebytes products installed to the computer and prompts to install the latest version of Malwarebytes for Windows afterwards. The Premium license key is backed up and reinstated. All user configurations and other data are removed. This process requires a reboot.
    •  Repair System: Includes various system-related repairs in case a Windows service is not functioning correctly that Malwarebytes for Windows is dependent on. It is not recommended to use any Repair System options unless instructed by a Malwarebytes Support agent.
    • Anonymously help the community by providing usage and threat statistics: Unchecking this option will prevent Malwarebytes Support Tool from sending anonymous telemetry data on usage of the program.
  6. To provide logs for review click the Gather Logs button
  7. Upon completion, click OK
  8. A file named mbst-grab-results.zip will be saved to your Desktop
  9. Please attach the file in your next reply.
  10. To uninstall all Malwarebytes Products, click the Clean button.
  11. Click the Yes button to proceed. 
  12. Save all your work and click OK when you are ready to reboot.
  13. After the reboot, you will have the option to re-install the latest version of Malwarebytes for Windows.
  14. Select Yes to install Malwarebytes.
  15. Malwarebytes for Windows will open once the installation completes successfully.













If you are having licensing issues, please do the following: 


For any of these issues:

  • Renewals
  • Refunds (including double billing)
  • Cancellations
  • Update Billing Info
  • Multiple Transactions
  • Consumer Purchases
  • Transaction Receipt

Please contact our support team at https://support.malwarebytes.com/hc/en-us/requests/new to get help

If you need help looking up your license details, please head here: Find my premium license key



Thanks in advance for your patience.

-The Malwarebytes Forum Team

Link to post
Share on other sites


While it is always possible for an unseen threat or a threat that was present on the system prior to Malwarebytes being active or installed to potentially subvert detection, such cases are rare and the countermeasures against such tactics are a regular aspect of the product's development and the efforts of Malwarebytes' Research team to thwart the methods of malicious actors.

That said, with regards to the speed with which some items during a Malwarebytes scan are processed, it is quite normal to see portions where many items are checked very rapidly.  This is especially true during the registry analysis portions of the scan as the registry isn't a structure composed of files and folders the way that normal files and directories on a drive are.  Instead, the registry is merely a file/set of files that act as a sort of directory or database of various settings and options for the system, such as instructing the system on how to handle files, loading points for startup items and which files to use for the various hardware installed on the system.  Because of this, scanning the registry goes very quickly as all of the information it contains are essentially just text, so parsing and reading it to look for malicious entries is much quicker and simpler than scouring folders and files for malware.

I hope that helps to set your mind at ease, though also keep in mind that if you are using the free version of Malwarebytes, it has no real-time protection to guard against threats and also lacks the numerous more proactive protection capabilities which guard against threats entering the system in the first place, many of which rely on powerful heuristics and behavioral analysis rather than strictly relying on databases and threat signatures to identify malicious activity.

You can learn more about the various protection layers in Malwarebytes Premium by reviewing the information on this page.  It illustrates in brief how the various layers of Malwarebytes' real-time protection function to thwart attacks throughout the various phases of the kill chain/attack chain.  The Premium version also includes self-protection through its Chameleon self-defense driver which prevents tampering and termination of Malwarebytes' processes and components on disk.  This helps to protect against attacks from targeted malware that might try to stop Malwarebytes from running or trying to tamper with its databases to evade detection.

Link to post
Share on other sites

  • Root Admin

For future reference, the only time one should use real information is when dealing with items like financial, general banking, medical, or legal issues. For everything else if at all possible you should try your best to not use your real name.

Let me get some other logs please. You can send it to me in a private message if you like.



To begin, please do the following so that we may take a closer look at your installation for troubleshooting:

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to your desktop, please upload that file on your next reply

Thank you


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.