Jump to content

Recommended Posts

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4146

Windows 6.0.6002 Service Pack 2

Internet Explorer 8.0.6001.18904

5/26/2010 7:48:47 PM

mbam-log-2010-05-26 (19-48-47).txt

Scan type: Quick scan

Objects scanned: 122870

Time elapsed: 12 minute(s), 1 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\Temp (Trojan.Dropper) -> Not selected for removal.

Link to post
Share on other sites

That's what I was thinking it probably was. Here is the developer's log:

Malwarebytes' Anti-Malware 1.46

www.malwarebytes.org

Database version: 4146

Windows 6.0.6002 Service Pack 2

Internet Explorer 8.0.6001.18904

5/26/2010 8:42:41 PM

mbam-log-2010-05-26 (20-42-41).txt

Scan type: Quick scan

Objects scanned: 123130

Time elapsed: 10 minute(s), 35 second(s)

Memory Processes Infected: 0

Memory Modules Infected: 0

Registry Keys Infected: 0

Registry Values Infected: 0

Registry Data Items Infected: 0

Folders Infected: 0

Files Infected: 1

Memory Processes Infected:

(No malicious items detected)

Memory Modules Infected:

(No malicious items detected)

Registry Keys Infected:

(No malicious items detected)

Registry Values Infected:

(No malicious items detected)

Registry Data Items Infected:

(No malicious items detected)

Folders Infected:

(No malicious items detected)

Files Infected:

C:\Temp (Trojan.Dropper) -> Not selected for removal. [C7EF3D782AC13171614C678C64588552]

Link to post
Share on other sites

We would not detect this file @ other locations . Malware frequently uses this location to launch infections and since real files should not be dropped/running from root we tighten up what we let happen there to better protect you .

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.