Skip navigation
All Places > For Home > Documents
Log in to create and rate content, and to follow, bookmark, and share content with other members.

What are the different scan options in Malwarebytes Anti-Malware?

Document created by dshull Employee on May 12, 2017Last modified by jyamada on Jun 11, 2017
Version 3Show Document
  • View in full screen mode

Malwarebytes Anti-Malware v.2.x has three different scan options for user to choose from; these are described below.

 

 

Threat Scan:

Threat Scans will scan the most common areas where malware is detected, including the following items:

  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Registry Objects: Configuration changes which may have been made to the Windows registry.
  • File System Objects: Files stored on your computer's local disk drives which may contain malicious programs or code snippets.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects — as well as in other areas — which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats cannot reassemble themselves.

 

Custom Scan:

Custom scans allow you to customize what files and folders are scanned by Malwarebytes. This option is useful if you want to perform one scan for a particular folder, or if you would like to scan an entire drive.

 

Hyper Scan:

Hyper scans are only available for Malwarebytes Trial or Premium users. This scan is a faster scan that will search for threats that are currently active on your computer. Hyper scans will scan these items:

  • Memory Objects: Memory which has been allocated by operating system processes, drivers, and other applications.
  • Startup Objects: Executable files and/or modifications which will be initiated at computer startup.
  • Heuristic Analysis: Analysis methods which we employ in the previously-mentioned objects — as well as in other areas — which are instrumental in detection of and protection against threats, as well as the ability to assure that the threats cannot reassemble themselves

 

Attachments

    Outcomes