Malwarebytes Malware Remediation User Guide Version 2.5.2A 3 February 2016

Malwarebytes Malware Remediation User Guide Version 2.5.2A 3 February 2016

Malwarebytes Malware Remediation User Guide Version 2.5.2A 3 February 2016 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. You may copy and use this document for your internal, reference purposes only. This document is provided “as-is.” The information contained in this document is subject to change without notice and is not warranted to be error-free. If you find any errors, we would appreciate your comments; please report them to us in writing. The Malwarebytes logo and Malwarebytes Malware Remediation are trademarks of Malwarebytes. Windows, Windows Vista, Windows 7, Windows 8 and Windows 10 are registered trademarks of Microsoft Corporation. ArcSight is a registered trademark of Hewlett-Packard Development Company. L.P. All other trademarks or registered trademarks listed belong to their respective owners. Copyright © 2016 Malwarebytes. All rights reserved. Contents 1.0 Introduction ................................................................................................... 1 1.1 What’s New ......................................................................................................... 1 1.2 Key Features ....................................................................................................... 1 1.3 System Requirements ..................................................................................... 2 1.4 External Access Requirements .................................................................... 2 2.0 Using Malwarebytes Malware Remediation ........................................ 3 2.1 License Key Status ............................................................................................ 3 2.2 Getting Started .................................................................................................. 3 2.2.1 Interactions with Anti-Rootkit Scanning.................................................................. 5 2.3 Remediation Now or Later? .......................................................................... 5 2.3.1 Remediation Scan .............................................................................................................. 5 2.3.2 Selective Remediation Scan ........................................................................................... 5 2.3.3 Diagnostic Scan .................................................................................................................. 7 2.4 Excluding Items from Scanning ................................................................... 7 2.5 Restoring Items from Quarantine............................................................... 8 3.0 Command Line Parameters .................................................................... 10 3.1 Conventions ..................................................................................................... 10 3.2 Command Line Overview ............................................................................ 10 3.3 Command Line Reference ........................................................................... 11 3.3.1 register ................................................................................................................................11 3.3.2 update ..................................................................................................................................11 3.3.3 version .................................................................................................................................11 3.3.4 scan .......................................................................................................................................12 3.3.5 errorout ...............................................................................................................................15 3.3.6 quarantine ..........................................................................................................................15 3.3.7 settings ................................................................................................................................16 4.0 Scan Log ........................................................................................................ 19 4.1 <header> Section ........................................................................................... 19 4.1.1 <date> ..................................................................................................................................19 4.1.2 <logfile> ..............................................................................................................................19 4.1.3 <isadmin> ...........................................................................................................................19 4.2 <engine> Section ........................................................................................... 19 4.2.1 <version> ............................................................................................................................19 4.2.2 <malware-database> .....................................................................................................19 4.2.3 <rootkit-database> .........................................................................................................20 4.2.4 <licensedatabase> ...........................................................................................................20 4.2.5 <file-protection> ..............................................................................................................20 4.2.6 <web-protection> ...........................................................................................................20 4.2.7 <self-protection> .............................................................................................................20 4.3 <system> Section ........................................................................................... 20 4.3.1 <hostname> .......................................................................................................................20 4.3.2 <ip> .......................................................................................................................................20 4.3.3 <osversion> .......................................................................................................................20 4.3.4 <arch> ..................................................................................................................................20 4.3.5 <username> .......................................................................................................................20 4.3.6 <filesys> ..............................................................................................................................21 4.4 <summary> Section ...................................................................................... 21 4.4.1 <type> ..................................................................................................................................21 4.4.2 <result> ...............................................................................................................................21 4.4.3 <objects> ............................................................................................................................21 4.4.4 <time> ..................................................................................................................................21 4.4.5 <processes> .......................................................................................................................21 4.4.6 <modules>..........................................................................................................................21 4.4.7 <keys> ..................................................................................................................................21 4.4.8 <values> ..............................................................................................................................21 4.4.9 <datas> ................................................................................................................................21 4.4.10 <folders> .............................................................................................................................21 4.4.11 <files>...................................................................................................................................21 4.4.12 <sectors> ............................................................................................................................22 4.5 <options> Section .......................................................................................... 22 4.5.1 <memory> ..........................................................................................................................22 4.5.2 <startup> ............................................................................................................................22 4.5.3 <filesystem> ......................................................................................................................22 4.5.4 <archives> ..........................................................................................................................22

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    41 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us