Malwarebytes Toolset User Guide
Malwarebytes Toolset User Guide
User Guide
8 October 2019
Notices
Malwarebytes products and related documentation are provided under a license agreement containing restrictions
on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license
agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit,
distribute, exhibit, perform, publish, or display any part, in any form, or by any means. You may copy and use this
document for your internal reference purposes only.
This document is provided “as-is.” The information contained in this document is subject to change without notice
and is not warranted to be error-free. If you find any errors, we would appreciate your comments; please report
them to us in writing.
The Malwarebytes logo is a trademark of Malwarebytes. Windows is a registered trademark of Microsoft
Corporation. All other trademarks or registered trademarks listed belong to their respective owners.
Copyright © 2019 Malwarebytes. All rights reserved.
System Requirements
Following are minimum requirements for a computer system on which Malwarebytes Toolset may be installed.
Please note that these requirements do not include any other functionality that the computer is responsible for.
• Operating System: Windows 10, Windows 8.1, Windows 8, and Windows 7
• Application Framework: .NET Framework 4.5
• CPU: 1 GHz or faster with SSE2 technology. This technology is used in most modern Intel x86 processors
as well as AMD’s Athlon 64, Sempron 64, Turion 64 and Phenom CPU families. For further information
about SSE2, please go to:
https://en.wikipedia.org/wiki/SSE2
• RAM: 2 GB (64-bit OS), 1 GB (32-bit OS)
• Free Disk Space: 400 MB
• Recommended Screen Resolution: 1024x768 or higher, 1366x768 recommended
• Active Internet Connection (required for activation, updates, and crash dump analysis)
• Network Discovery/SSDP Discovery Service Enabled (required for Network Devices scanner)
Program Licensing
A valid license is required to use the Malwarebytes Toolset. Validation requires Internet access and is valid for fifteen
(15) days of offline use. Each time Malwarebytes Toolset is launched, a silent revalidation will occur. Should the
license become expired, blocked, or deleted, an error will be displayed, and the user will be given an opportunity to
reenter the license. You can also manage your license key in the Settings component of the Malwarebytes Toolset.
If you need further assistance with your license, contact [email protected].
Offline Usage
The Malwarebytes Toolset is designed to support offline usage for up to 15 days before requiring license
revalidation and for requiring updated definitions for the Malwarebytes Portable Scanner and Malwarebytes
Breach Remediation.
For all other components, or to manually update, use the Check for Updates Tool by doing the following
(recommended daily):
1. Launch Malwarebytes Toolset.
2. Click on the Toolbox component.
3. Go to MyTools and click Check for Updates
4. Select the components you want to update, then click Download
5. Follow any additional steps presented.
We will always check for the latest version of a tool before it is launched from the Toolbox. If a new version is
available, we give you the option to download it or to continue using the version already on the Toolset.
The Mode selector is shown across the top, in the black area. This gives you quick access to the core components of
the Malwarebytes Toolset – Inform, Scan, Toolbox, and Settings. Each of these areas are covered in more detail later
in this document.
The Option selector is displayed vertically, at the left edge of the screen. It
is present only when accessing Inform, Settings, and Scan Results. This allows
you to dive deeper in to sub areas of a particular component of the Toolset.
The majority of the screen in the middle is known as the main window and
is reserved for system information related to the selected option. When in
Scan mode or Toolbox, the area used for the Option selector is allocated for
use by the program as a whole.
The interface size may be increased or decreased at will. The names of the
options will disappear when the interface size decreases beyond a certain
point, leaving only the icons showing.
As you can see, the Security option (the padlock) contains a warning to alert
the user to a security-related situation which should be investigated.
To power Search, the following data points for the supported areas above were indexed:
• Name
• Vendor
• Path to File/Binary
• File Extension
• Tags
The indexed data points for a MyTool can be adjusted by going to the MyTools Editor (Toolbox > MyTools > MyTools
Editor) and editing an entry.
Using Search
To use Search, simply start typing in the Search box and the Toolset will instantly show results with the best match
(or matches) at the top and other results placed into categories. Then, just click on what you want, and the Toolset
will launch it. Note: pressing ctrl+f, will jump you directly to the search box.
You can also select Search Online to request the entered content to be searched using the current default web
browser of the OS. This can be helpful if you are wanting to research an error or piece of information that you have
copied from within one of the many components in the Toolset.
Note: All Inform results can be exported using the Actions menu or via command-line (details in another section). You
can also right-click any field in a Details window to copy it to the clipboard.
System tab
The System tab offers basic technical information about a computer. When servicing a computer, the first thing a
technician must do is to know what they are working with. Problems may be visible on this screen, though deeper
investigation will likely be required. While a wealth of information is available to the technician on this screen, tools
designed specifically for the purpose of evaluating issues on the computer will be discussed later.
Many of the Tiles shown in this area have a clickable Details link, allowing you to find out more about a particular
item. When viewing those details, you may right click any individual detail to copy its value into your clipboard for
use elsewhere.
Please note that the Operating System Details displays the Product Key (license) associated with the operating
system installation, as well as the Firmware Embedded Key (a Windows license key that may be embedded in
firmware by motherboard vendors or by Microsoft for Digital Entitlement). In most cases, this information is unique
to the OS installation and should not be shared.
Hardware
Each major system component is itemized here. Feel free to click any Details link to find out more. Windows settings
for some hardware devices can also be changed here. On portable devices, detailed battery charge and health
information is displayed.
Configuration
Default Browser is not symptomatic of any kind of system problem. Instead, it helps the technician ascertain the
characteristics of the user. That, combined with many other factors, may influence troubleshooting methods.
Application Problems gives insight on applications that have crashed or hung on the system. Clicking the link that
states the number of crashes/hangs will open a list of the detected problems. The list is grouped by the problem
process and includes the Executable that failed, Time of failure, Module that failed, Event type, Exception code, and
detailed error message.
Windows Protection
These items pertain to security features built into Windows operating systems. A brief description of each protection
item is as follows:
• User Account Control (UAC) – which made its debut as part of Windows Vista – requests your authorization
before allowing programs to perform an operation that may affect computer operations or change
performance characteristics. If your computer is not under the control of a system administrator, you may
alter UAC settings.
• Windows Firewall controls access to your computer, with default settings specified for each profile
(domain, private, public). In addition to default settings, you may specify unique new firewall rules, and
modify or delete existing rules.
• Windows Defender is an antivirus program offered by Microsoft on computers using Windows 8 (and
newer) operating systems. Windows Defender was not classified as an antivirus program prior to Windows
8; therefore it would not be listed for earlier operating systems.
Additional Protection
This tab provides information about additional security applications (Malwarebytes and other antivirus/antimalware
applications) installed on the computer. These applications are in addition to those provided by the operating
system. There are no provisions to change settings associated with these external programs. If no antivirus software
is installed, a link to install Malwarebytes will be shown.
For discovered devices, the Network Devices scanner provides the following capabilities:
• Detailed technical information (e.g. IP address, MAC Address, Host Name, UPnP/WSD/WCN details, etc.)
in the right-hand details pane
o Note: A right-click context menu is available with the following functionality:
▪ Copy to clipboard
▪ Open in default web browser (for URL based content)
▪ Search the internet for…
▪ Edit Cell (for Device Name, Manufacturer, MAC Address and Device Type only)
• Configure a network device by jumping out to its web GUI (on supported devices only)
o Please note: The device must advertise a SSDP/UPnP/WCN/WSD Presentation URL
• Ping a device
• Export results to the clipboard, text file, or CSV
Network Adapters
This section shows presence and configuration of network adapters, including adapters used in a virtual machine
environment. You may inspect properties of each adapter. Of special interest here is the display of each adapter’s
IP address, and the method by which each adapter obtains its IP address. If there is a loss in connectivity on a
machine using Dynamic Host Configuration Protocol (DHCP), the IP address will often show a 169.254.x.x IP
address. This address range indicates an inability to receive an IP address from the network’s DHCP server.
System Rollback
This section is focused specifically on disaster recovery measures which have been taken on the computer. System
Restore points are commonly created prior to Windows updates and may also be created prior to installation of any
application which incorporates this process. If you encounter a serious error on your computer, restore points may
provide the most effective answer.
Volume Shadows are used to create snapshots of system files. If problems are encountered with a file which uses
this service, it can be rolled back to a previous version. The rollback process uses the Previous Versions tab of a file’s
Properties page.
History
This section focuses on status of the computer with regard to its daily operations. Boot History has an entry for each
time the computer has been started/restarted, which includes the length of time required to boot the computer to
a fully operational state, as well as how long that session lasted. A copy of Boot History Details is shown below.
A past session which terminated abnormally (e.g. power failure, forced shutdown,
system crash)
When System Events statistics are clicked, Windows Event Viewer opens with a special filter to view only Errors and
Warnings. This allows you to view information pertaining to every critical system event which has occurred in the
life of the system. Operating systems prior to Vista had a maximum file size limitation (300 megabytes), though this
likely caused no issues for users of this information.
Blue Screens tells you how many memory dumps (mini and full) were performed as a result of system crashes (aka
BSODs). Click Details to launch a window with details on the detected crash dump including the Date, Bugcheck
Code, Description, Uptime, System State, and File Path to the crash dump file. You can select a crash dump and click
Analyze to launch the built-in Crash Dump Analyzer. More details are covered in the next section.
All of that can lead to headaches and in the worst of circumstances - an inaccurate diagnosis. To solve for all of
this, the Toolset includes a Crash Dump Analyzer that is fast, easy to use, and accurate. To utilize it simply go
to Inform > History > Blue Screens > Details.
When you launch the Blue Screens Details window (only accessible if the system has crash dumps), you'll see a list
of detected crash dumps from the following locations:
• %WinDir%\MiniDump\*.dmp
• %WinDir%\MEMORY.DMP
This first view aims to give you a quick pre-analysis overview of the following:
• Date - date and time when the crash occurred
• Bugcheck Code - the actual error code of the BSOD/Bugcheck
• Description - description of the crash based on the bugcheck/BSOD error code
• Uptime - total time the operating system had been running for when the crash occurred
• System State - estimated state the OS was in when the crash may have occurred
• File Path - Path to the crash dump file
• Analysis Summary:
o Crash Information - Operating System (with version, Architecture, and Build), Timestamp, Up
Time (of the OS), Stop Code (with error code, error message, and detailed description),
Arguments, and Bucket ID.
o Probably Caused By - Path, Company Name, Description, Product Name, File Version, Product
Version, Last Modified date, and a Comment if the driver is identical, different, or missing on the
system.
▪ NOTE: Some fields will not show if the file is missing from or different on the current
system.
• Stack Trace:
o Call Stack - the ordered list of modules, their called function, and arguments from when the
crash occurred
o Relevant Modules - list of modules from the Call Stack with details on the Path, Company Name,
Description, Last Modified date, and the Current State of the module (e.g. identical, different, or
missing)
▪ NOTE: Some fields will not show if the file is missing from or different on the current
system
• Full Output - Complete raw text output from WinDBG for manual inspection and additional raw technical
details
NOTE: The Malwarebytes Portable Scanner requires Windows 7 and higher as well as .NET 4.5. If it is not installed
(or has been rendered unusable due to malware), please use the Malwarebytes Breach Remediation command-line
utility included in the Toolset which is covered in more detail in the Additional Tools section of this guide.
After a scan is requested, Malwarebytes Portable Scanner connects to Malwarebytes servers to obtain the latest
protection updates. If the computer has no Internet connectivity, it will attempt to use protection updates that were
downloaded previously. If existing updates are not available, you must perform an update using another computer.
► On first use of the Malwarebytes Portable Scanner, downloading protection updates are mandatory.
While a scan is running, Malwarebytes Toolset displays several icons on the main screen which serve as progress
indicators for the scan. These are as follows:
• Grey hourglass – Scan phase not yet executed; will be replaced by either a blue circular animation or a
green hyphen
• Green hyphen – Scan phase not performed (hyper scan and custom scan do not execute all phases)
• Blue circular animation – Scan phase currently running; will be replaced by a green checkmark when
complete
• Green checkmark – Scan phase completed
A light blue bar immediately under the Scan button in the menu pane will also show scan progress. It is difficult to
notice, so it has been supplemented by indicators in the Windows taskbar, as shown below.
Because malware was detected during the scan, the icon is replaced by red as its final
status. When malware is detected during execution of the scan, this icon will immediately
switch from green to red.
When a scan completes without malware being detected, you will see the Summary as shown here.
Non-critical issues which require your attention were detected during the scan
Critical issues which require your attention were detected during the scan
Icons will always be in a color which represents the most serious situation. If all but one of the items tested passed,
the icon shown will be in the color which represents either a critical or non-critical issue.
You may also inspect the Scan Report to look at other information pertaining to the scan.
The left section of the screen shows malware and PUPs/PUMs which were detected, the number of traces detected,
and checkboxes to allow you to select which malware to remove.
Selecting this malware causes the Summary (right) section of the screen to
display the information shown here.
Traces is a new term. It is the number of specific vectors which a threat is
using to attack your computer. The Trojan.MBAMTest malware has two
traces, the directory where the file is stored, and memory which the
running program occupied. If processes were terminated during scan
execution, only the first trace would have appeared.
View Report provides a display which is best described as a hybrid between a “clean” Scan Report screen combined
with a “dirty” Scan Summary screen. If needed, you can click the gear icon in the top of the Summary section and
select to copy the results to the clipboard or export a text file.
Once you have reviewed scan results, you may click Start Removals to initiate the threat removal process. After
performing the removal process, a Repair Report will be displayed in its expanded form. If needed, you can copy
information listed in the Scan Results, Scan Summary, Scan Report or Repair Report by right-clicking an item and
selecting the content to copy. You can also use the gear icon in the Summary section to export a detailed summary
to the clipboard or a text file.
In any event, the Toolset will automatically relaunch after reboot and once a user account logs in. This will start
the post-reboot removal progress window before going to a final Summary of the entire operation.
Here you can pick the type of scan you wish to run, and the options you wish the scan to use. These settings are, for
the most part, identical to the settings used in Malwarebytes for Windows and Malwarebytes Breach Remediation
CLI. Under Process Killing, you may choose whether running processes should be killed. Malwarebytes Toolset uses
a whitelist of known good processes to be excluded from potential termination, and you may add your own through
use of a Custom Whitelist.
If you choose not to use the Malwarebytes Whitelist here, you will not cause your computer to crash. Windows
system processes will continue to function as intended. Non-critical applications (such as browsers or email
programs) would be terminated if a whitelist is not used.
When running a Specific scan, click Edit Paths to select specific files or folders which should be scanned. In the
screenshot below, Add Folders… was used to add a specific folder to scan, and Add Files… was used to select a single
file. To remove a file or folder from the list, highlight the item to remove and click Remove Item.
Malware may exist in files and in processes running in memory. When running a scan on a computer for the first
time, it is probably best to not kill processes, so that you have a clearer picture of the level of infection in that
computer.
Edit Default Scan allows you to customize the default scanning experience for when you click Scan for Malware.
When that option is selected, a screen identical to the Custom Scan screen (shown in the previous subsection) is
displayed. Here, you can customize specifications of your default scan. This does not prevent you from running a
Custom Scan with different specifications whenever you choose.
Manage Quarantine launches the Quarantine Manager, so you can delete or restore items that have been placed in
the quarantine by the Malwarebytes Portable Scanner and the installed instance of the following Malwarebytes
products:
• Malwarebytes for Windows (v 3.6.1+)
• Malwarebytes Endpoint Protection
• Malwarebytes Breach Remediation (v 3.6.1+)
Select Quarantine allows you to select the quarantine to interact with from a drop-down menu. By default, the
Malwarebytes Portable Scanner quarantine is loaded when the Quarantine Manager is launched. The Quarantine
Manager groups items by date of the scan and the family the traces belong to. This allows you to easily manage
items by family, as they may be comprised of many traces, and mirror the reporting layout used by the Malwarebytes
Portable Scanner.
The basic view will list the Family name, the Type of item, and the total number of Traces that comprise that item.
To see the specific traces, simply click on it. That will populate a details side pane that lists all trace details. This
includes type of trace and where it was found on the device.
Update Definitions allows manual update of the definition databases for the Malwarebytes Portable Scanner (64-
bit and 32-bit). This option will launch a Download Updates (aka the MBTS Updater) window to check only for
database updates. If updates are available, click Download and the MBTS Updater will acquire and install them for
you.
You will notice that three issues were detected during this scan. Click View Report to see the results of all tests run
during the Issue Scan. A high-level view is shown below. You can expand each of the items shown here to see exactly
what the scan included. The full list of tests is too large to be included here. If needed, you can copy information
listed in the Scan Results, Scan Summary, Scan Report or Repair Report by right clicking and item and selecting the
content to copy.
Finally, it is important to note that these may not be problems. Malwarebytes Toolset has analyzed typical settings
on many Windows environments (both operating system and service pack permutations) to determine what is
expected. A knowledgeable user may modify settings on their computer, and a computer used in a business
environment may have been fine-tuned by their IT group. When issues are detected, further investigation is
warranted.
Clicking either calendar icon displays a history of the scans of the type selected which have been executed. A
Malware Scan History Log is shown below.
Selecting the first entry on this page causes the results of this scan to be displayed, as shown below.
There are five sections to the Toolbox, which the above screenshot represents as icons. If the user interface is
stretched vertically, each of the buttons also appears with a label as shown here.
MyTools
MyTools provides technicians with the ability to quickly access their favorite tools. You can link to executables,
execute Command Prompt/PowerShell commands, or even launch a custom batch file. The primary tool to manage
MyTools is the MyTools Editor, the first item listed on the MyTools screen. There are several logical steps required
in this section, but when configured properly, those steps will allow this to serve you well.
Add a new tool to the Malwarebytes Toolset. This is typically a tool which you often
use in your repair work.
The below example demonstrates the usage of both system variables (Binary Path) as well as switches (Arguments)
to be utilized during execution of the tool. This tool to appear on the MyTools menu when Malwarebytes Toolset is
running on a Windows 10 computer.
Select updates you wish to download and click Download. The window will update to show status of the download,
and will inform you of final download status. When the download is complete, click Close.
In the next section of this guide, you will notice small clouds at the bottom right of two utilities, and the absence of
a cloud on the MC-Check icon. That indicates that two utilities have updates available, while the third does not.
That standard is used throughout the Toolbox section of this program.
Malwarebytes Anti-Bundleware
Malwarebytes Anti-Bundleware is a program designed to detect and remove bundleware which may have been pre-
installed on your system or automatically installed with another piece of software. More details about this program
can be found on our forums: https://forums.malwarebytes.com/forum/233-malwarebytes-anti-bundleware/.
Malwarebytes Anti-Rootkit
Malwarebytes Anti-Rootkit is a program designed to detect and repair rootkits which may have been placed on your
disk drive via a malware attack. This program is a perpetual beta product, meaning that it is updated only when
there is a specific need.
AdwCleaner
This is one of the most frequently downloaded tools for removal of potentially unwanted programs (PUPs), toolbars
and adware. Addition of AdwCleaner technology to your repertoire helps to provide even more effectiveness to the
services you provide. If AdwCleaner has not been previously downloaded (or an updated version exists), it will be
downloaded and then executed.
► AdwCleaner includes the technology of the Junkware Removal Tool.
Firewall Reset
Computers are often infected by malware which manipulates firewall settings, thus opening the computer to access
from the outside world. This command resets the firewall to the default policy. When Group Policy is used, all
firewall settings are turned off and Group Policy settings pertaining to the firewall are set to not configured.
Network Reset
Many connectivity issues are due to problems with configuration of the various networking components on the
computer. Sometimes this is due to malware, and sometimes not. This option resets most of those components to
initial values. As a result, subsequent networking commands encounter very slight delays as these initial values are
replaced by true operational values. Please note that this option does not accomplish the same goals as a Winsock
Reset, and when required, should be performed before use of a Winsock Reset is considered.
Winsock Reset
If the computer is exhibiting strange connectivity issues that have not been corrected by other diagnostic means,
you may need to reset the winsock catalog. This catalog is used for all Internet connectivity and is a favorite target
of malware. Unless the computer uses customized networking parameters, a reset would not have negative results.
WMI Reset
Windows Management Instrumentation (WMI) is infrastructure built into Windows for managing devices,
applications, data and operating system components. It is also used to share management data and operations with
other operating system components. This reset will rebuild and register the core components of Windows that allow
WMI to function.
Boot to Windows RE
The Windows Recovery Environment (Windows RE) is a bootable offline Windows PE based environment to help one
manually repair or restore their operating system using tools like System Restore, Refresh/Reset (Windows 8+),
Command Prompt, and much more. Windows RE is included by default starting with Windows 7 and can be a
powerful tool for technicians. This option allows a technician to set the assigned Windows RE image of the OS to
load on next boot.
Please note the shaded area of the main screen area, which shows five labeled icons. This is the view you will see
normally. When the screen is compressed vertically, it appears as shown below.
As with all system-level tools, significant damage may easily result from inappropriate usage. If you are not sure
about changing a system setting, please research that setting before making a change from which there may be no
cure.
Command Prompt
This option opens a Windows command prompt (cmd.exe), in Administrator mode. You may navigate to any
directory on any mounted drive and perform command line operations.
Computer Management
This option launches the Computer Management snap-in of the Microsoft Management Console (mmc.exe). Many
system parameters may be inspected here. Event Viewer and Device Manager are available within this option, as
well as being accessible by their own program option.
Device Manager
This option launches the Device Manager snap-in of the Microsoft Management Console (mmc.exe). Entries for
each installed hardware device may be inspected, along with the resources those devices use. Failing or
misconfigured devices will have a warning indicator displayed to alert the user. This option is available as a discrete
menu selection, and as a selectable option in Computer Management.
DiskPart
This tool allows the technician to create new disk partitions, or to delete or modify existing disk partitions. This
program offers a number of configuration options. Please refer to the following page for more information on this
program: https://technet.microsoft.com/en-us/library/bb490893.aspx
Event Viewer
This option launches the Windows Event Viewer snap-in of the Microsoft Management Console (mmc.exe). All
system events may be inspected here.
File Explorer
This option opens Windows Explorer (Windows 7 and earlier) or File Explorer (Windows 8 and newer), allowing
navigation from one drive or directory to another. This option will not provide option to restricted operating system
directories.
Group Policy
This option opens the Local Group Policy Editor, allowing you to modify the Group Policies of the device. This option
will only function on versions of Windows that support the Group Policy Editor.
RegEdit
This option opens the Windows Registry Editor (regedit.exe). Unless you are well versed in working with the
Windows registry, you should make a backup copy of the registry before proceeding.
Services Manager
This option opens the Windows Service Control Manager snap-in of the Microsoft Management Console (mmc.exe).
This tab shows each system service, its operating status, when the service starts, and under which user’s authority.
Settings
This option provides access to system settings on computers using Windows 8, 8.1 and 10 operating systems. This
option will not appear on computers running earlier versions of the Windows operating system.
System Restore
This option provides access to the System Restore wizard so you can roll back the OS to a previous state OR create
a system restore point.
Task Manager
This option opens the Windows Task Manager (taskmgr.exe), allowing inspection of running applications,
processes and services, each on their own tabs. CPU usage and memory usage as well as networking usage are also
available for inspection.
Windows PowerShell
This option opens a Windows PowerShell command prompt ( powershell.exe). You may perform system-level
commands, which include many commands that have not been available in the older Windows command prompt
(cmd.exe). Please note that this option is visible only for operating systems that will support it (Windows 7 and
newer).
Windows Troubleshooters
This option provides access to the troubleshooting tools provided by Microsoft for users of Windows 7 and newer
operating systems. This option will not appear on versions of Windows older than Windows 7.
Windows Update
This option opens the Windows Update option of the Control Panel. You may check for new updates, install or roll
back updates. If updates are controlled by a system administrator (typical in a corporate environment), this option
cannot override that authority.
o Once a Startup Password is enabled, you can change it by clicking Change or remove it by clicking
Remove.
o If you have forgotten your Startup Password, you can recover access by doing the following:
License Details
This section allows you to view your license key and change it if necessary.
• License Key: This shows the current license key being used. Click on it to be prompted with a window to
change it
• License Type: This displays the current type of license being used.
• Expiration Date: The current date your Malwarebytes Toolset license will expire. For license or renewal
questions, contact [email protected]
About
This section shows version details of Malwarebytes Toolset with links to release notes, user guide, and EULA.
Alternatively (or for scripting/automation purposes), you can perform an Inform Export via the following Command
Line option passed to MBTSLauncher.exe or MBTS.exe:
• /scan:inform /LogFile:”Path to file” - Silently runs Inform and outputs results in plain text to the file
specified.
o NOTE: MBTS.exe is not a console app. No output will be sent to the console window while the
export is occurring.
For full details on how to use this utility, please read the Malwarebytes Breach Remediation User Guide. You can
also run mbbr.exe from the Command Prompt with Administrator privileges with no arguments to a list of command
line options, settings, and arguments.
Fab’s AutoBackup 7
To help expand the capabilities of the Malwarebytes Toolset and showcase one of our partners in the tech
community, we have partnered with the wonderful Fabrice Parisot to bring access to Fab's AutoBackup 7 to the
Toolset (license not included). This utility is the industry leader for technicians that want to easily backup, transfer,
and migrate user data and settings on Windows devices. You will find it under the Repair section of the Toolbox
(and Malwarebytes\AutoBackup7Pro).
For more details on this product, check out the included user guide or visit the following website:
https://www.fpnet.fr/
Please note that on first launch, Fab's AutoBackup will ask for your license info (for previous users), offer you an
exclusive discounted license at 25% off (must be launched from the Toolset itself), or utilize a trial version of the
product. Malwarebytes does not directly provide or sell these licenses, and it is up to you to obtain and provide one.
Any Toolbox item supported by the Updater can also be updated upon launch. If there is a new version, you
have the option to download and use that one OR continue to use the older version.
► Does the Malwarebytes Toolset and/or Malwarebytes Breach Remediation support offline usage?
Both products support offline usage. The Toolset must be validated (required on first use) and updated. If these
conditions are met, you can use the Toolset offline for seven (7) days with version 1.3 and fifteen (15) days with
version 1.4+. If you are only using the Malwarebytes Breach Remediation command line utility, it supports
fifteen (15) days of offline usage.
If you need additional automation or scripting capabilities for malware scans, Malwarebytes Breach
Remediation for Windows command line utility is included with the Malwarebytes Toolset. You can find it in the
directory structure here:
• Malwarebytes\MBBRv3\x64\mbbr.exe
• Malwarebytes\MBBRv3\x86\mbbr.exe
• Malwarebytes\MBBRv2\mbbr.exe
► How do I check the SMART Attributes and Disk Errors on a disk drive?
The Disk Drive Issue Scanner of the Malwarebytes Issue Scanner performs this function. Please note that only
failures or issues will be presented, but you can see full details by clicking on the Scan Report. To use the
Malwarebytes Issue Scanner, perform the following:
1. Launch the Malwarebytes Toolset
2. Click on the Scan component.
3. Click on Scan for Issues
4. Follow any additional steps presented.
For additional information, please see the latest Malwarebytes Issue Scanner Technical Reference.
Alternatively, there are generic URLs if the auto-injection system is down/not working correctly.
• Standard Download (No Key): https://toolset.malwarebytes.com/file/mbts
• Full Download (No Key): https://toolset.malwarebytes.com/file/mbts_full
► What is the difference between the Standard and MBTS Full download of Malwarebytes Toolset?
The Standard download is a smaller package with only the following core components:
• Malwarebytes Toolset (Inform, Network Devices Scanner, Portable Scanner, Issue Scanner, and
Toolbox)
Additional standalone components can be downloaded as needed when they are executed via the Toolbox or
downloaded using the MBTS Updater by going to Toolbox ► MyTools ► Check for Updates.
The Full download is a larger package with the following core and standalone components:
• Malwarebytes Toolset (Inform, Crash Dump Analyzer, Network Devices Scanner, Portable Scanner,
Issue Scanner, and Toolbox)
• Malwarebytes Breach Remediation v3 command line utility
• Malwarebytes Breach Remediation v2 command line utility
• Malwarebytes AdwCleaner
• Malwarebytes Anti-Bundleware
• Malwarebytes Anti-Rootkit
• Malwarebytes for Windows (installer)
• Malwarebytes Support Tool
• Fab’s AutoBackup 7
► Are There Command Line/Command Prompt Options for running the Malwarebytes Toolset?
Yes, command line options are available to utilize some components of the Malwarebytes Toolset quickly for
automation and/or scripting purposes. These options can be passed to MBTSLauncher.exe or MBTS.exe. Below
is a list of those options and their applicable syntax:
• /password:”Your Startup Password” - Suppress prompt for your Startup Password.
• /scan:inform /LogFile:”Path to file” - Silently runs an Inform operation and outputs the results in plain text
to the file specified.
Note: MBTS.exe and MBTSLauncher.exe are not a console applications. They will not send output to the
console window once they execute.