DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Program Files/Malwarebytes/Anti-Malware/Languages/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Program Files/Malwarebytes/Anti-Malware/Languages/lang_ru.qm
<d!`ݧru_RUBN]!;7;G;x;;;;*CDM!OOO`OCOOO[[s[[[ED^hb0u(̽(ۙ(f(aG7G"GHU|HUHUHUdHU:HUJQ1UEUЄU%UUFgUAZlZlR\\^\T\\__ɶ_b_
_	_L_t@%Z?KFSW  I&^()"+"5?"/*0XU0^yz?dž*/"/M9E%EPEEEETm%5%O%%%%%k%$%?%͸%%ص#Zصص.صbصZصgص3صصAEصص-`c`!TTn0y0U<UH5;H5H5H5#H51H5AH5G4LLALGoLVLLVE]VEVE'ZCZsddc~ffEmf)fhvbvvvG)v3v\YMhuV~~~(~3L~h/}k}\e;3e7eeeEee&e3eRe!e=3eD/eIeM4}(T[K؎UD؎ې}V
UEE:n?>npPī;/!%"37U#wM##c#\|(G(7++9n+P)+P)03j23jA3j4T}5g
8<a393~UB2EwEQFl ɕFs#=G	GfGHw9EHw9!IlSIl߄IlBKJ6kJ6uJ6UJ6J6J6zJ6"J6
J69J6NJ6J6iJ6J6J6^J6ztJ6J6%J6J6HJ6,J6?J6J6CNJ6MJ6V+J6EJ6sJ6J6J9J3J9NJ9`2J9>KL7/}L7TQLZ^Lb\LbLb>LTYMBM0#MUMXNMύMNTOlPP~~nvQ(Rt~R`RARRRTTcTGTLVVEVd&VVV6]VZVٹVVΣ}VУWizX8YC]YCYSZ#-Z|Z|Z|UZ|nZ5[Z[Z[Z+[_S[hrv[j|[|[|[|[|[|[|c[|Q[|[|4\\f8\Y\X\e\#7\܇]]EVf]^
eae4iFi
isIk-tk/tUk5tmvn%olq$t>&|R|R1%߸Vk>[!.W8H..Ry=m
	_N	آ|Ng|N
[HFoNs6t17L~KW5"”ٮU'Yz  5o"R]wՈ֭3L-ާO|߈uZ6:X;I^I^,I^gI^I^}I^~MT+iգ"k
A
A6
AJ(DFsP)5)s^scwpt.t(A	I$%^%D(v.d0t6֮k9A41E'FLL,L#L#L#L`\N`NRtXvSX[]%].@_	7+_Ǟ\d$Nfh0xh0hCIiNjkdldGo]DMqsywv)y."g|ƅGͺ$$$$$[g\I^55f#;,{?۳4b۳Z}PgE/-^v^:uI/W<p,L]|J*G_7/VniʟH˙uHPIϖt
ϖt)nП 9MaK%LntlEl.x |e4c{7c0[
,>OTK>vXQz")g')g,΀-	-078}u,];$#FF3@LAOoU.tYF<Z[`Ibsem~Lfmqd,su5?v)}v>v>!w5w%˛~.|D"X"enj+&+&)C'z{dԒ{d_I*<<ë!]i/˾]C,99m#'-iu2C^c9,Kj3,»]VnV^^i%]3ԅ})cێrNv[~nԸ{^
f<6C9}B!s?B4@.zMCY3c+_3@343#31	l5l\09>BR,%('_()>$o?+N2+O8-4S/>]2U@3%456q6:*]:_;<n*>E?>A4L*N=N#NDWO.YSHTfVY)JY?Yl[bxY+FbOe&gngni<rtwNxI~1fs؞oo Gܓ{0?%ygU:͓(0	R͓1t͓V#W'W'2ƶ@XHMM	Rju.6C)B/)))%`)2)Z)S)<)CWnyƅǎoTȸngLLϫ{kpY|!IIIII
5}}JN#4#&.n\A$ z̒f=M4656C6lRYH#Oʓʳ
4#ФCZ`Jeh$,4z6de8IP E.HlK{=K{K{!&K{. K{VK{7L3M[SBTX֎"Yޮ_2NKbYbCdfreiM[eiOeibf3<j2k{lo,qwr;r{vwixsz^=2z^z^z^&z^ z^-z^Vpz^{${؅̢{؅ss/y>.~L2$ƾuh.`IIIIII5vI^\IImIIʈIhIIIUjI_wIIIٛI"II" nn]S<nD{4;!{48(ep.1GY>,]~]=.-7d7=^FW3EFCu>?^Uo)2)V#3#Y#i#?^-t
---MlM(j	>hD{vvdvȨv}3vyP5ۨvgwwC*6*P*M**X*A*C*ZuozZX|gg gqgPg5
n21DD	5Te,tadD9`9<.Q&PMVB
VIkdk!kkFkkr	5
bn~t>[M@'tՎS.gw8u
C$r-$rA$rM-=4Tw4TM4T_4T8[|C8[|]F8[|8[|&<FC<Fǘ>?JEu6E%E%E%D"FV;HGHGK4'K4OQpRGTtuU7ZhnmZTZTYZTK\z\<n_9d{fjyh#eme.Pn1Ӡn1qO&{[m9&hROad'dc$FkgKv4L565ˎ5%C~WL;nAndnnn+nn$?n1qnZ!nnAJnFD^2)dL/v.$.ހ..
...5~._d+W7+U&Bl~)%3VgNgs@FF7`~`~t`~mm#C.0S<1S]SSSSSp7#qŨ	ŰP/	&	
ȱDV~DЪӇnT^0W<=d<D`ڼ:9n܍>#1MMݝM<zyƱii5Y7NIn{[b"U~}@wlac:*Yo{^5U^C^~bҸSN!'QZ&3Ŝ'>(5!_+
25z6;8T8VKk;m;-;3$BnoF+G({4JԮMMMM7;MCM:MOMX^N&3N&Z
UNV
%HV
%sW>)ZS[2[~[T]^	D`~e`'sVa~c>ce2اi6k%#Lk%#k%#hXl mNn}o׾ooo@oFp.0p.Up._r)s;sBտy{<:{؅x|}NY|>G}+;v[YbÊVc̞ВjgqS^S^umt7~zCB.lnlLmİ~db}^m1nGZ~5^>G4+X~Jz_,pJ^6|6k%"gZ%QP%S'%S(!)5i)\e,~]1O6y;~\c;;,@\֏@4JABCABABqAuDG^uPc3PcDYc[)q]F7]\ޓ]\@0_v1b'^c*dd~NJfZ]i>i>'}lQlfY`lfY_lfYm|Sn1noNwz-zvRzv5-zwzwzwbzwż|~|IAH(^/@&s@$@@@"@n@GX@(@S@1PW$:W$dW$?#H3!/3!gmlvlO!4߆7787D7P/be[N-NUZ23m23DCn6OnnA>}k.'c.tJ1 09ë^-fm.g>oI2IWsЪ}Ъ144 X_P!:ؕ뙛DdQeMnY_.5oε&A;Ơz{	)j11\4
\4&\4I5M$NO62C|I4

O
R
#g=?R[s5 Ҏk"&#b_$Ao)N*,|.512012:#57Fn
:;y5;D<{<c?aP}?ac?ay?ae?a@?an/?atN?E3`vE3FdAH InXNOyNPfZ\>U]hw]h4Zd0nf?Xh;m*mn)d}~~/~/(z(W("(%%e%%%BC%IL@s@	@KS~n`Th~bCbf_CK!=b=iu52h!C8C^R&yR)RRR0	
	$	;]!SBr!ms&ms*Yi,@>@EĤ(ʶZʶ^ʶ|)|
-3MEXztޒS$].Li)e*uN*R_9`r>D~?õSK#`Q/֠	-`	-?z	-G	-	-z	-	-o]	-	-X	-	Bd	S[	Sѓ	~מ	Y	
s	Y	YE	D	D	CcA	Cc	D(	Dx	Y	d>	C	CU	>	@"	Y	#~	0	X	9	!	"n	"ns	%b	&fYW	'/F	'#uJ	)4S1	*N	*m͘	*mB	.tD	0/:	2ޠ	5Sڦ	5G	5܍	59	7599	<6	<	<	<	<	<%	<@	<F}	=	?l$	G,tL	I	I	J22	Jm	MZ	R&dA	R\~	SQ_	W\9\	X	Yw	^
)`	^~	`3	bm	b:M'	c%m	gF	g	0	n	oL	v"%			C1	Cx	r'	r(	[F	K)		CG	R		R)	sݷ			d	`	 H	I		/^		UH	T)7	T-6	T6	4		&	.L		:	xϹ	m	1O		.	qS	r	s(	|o	}	~=	DŽ	.k	 è	!	"	#	#ޏ	&	'^	3	F߬		6	{	~T	~	n	¥SD	hm	C	u'X	u'\	u'	u' 	u'0	u'7	u'F	u'\	u'	u'	u'	u'!	u'lX	u'J(	u'_7	u'	u'	u'Q	u'U	u'pi		J	ҏ	~				p	.	w
	fY		$3	$b	5P	st	#	#4		U		뿵l		O	n	b~K	R(	N(	Q	&	1	g
Yr4
.'

Rq

w
Q
R
N~
nO

$	
'9&
00
20A
20H
<ԾN
?
?-)y
?-)r
Av
AZ
E= .
Ev
H)
Iy
J^
O$
Y4db
Z$
\\q
aP
aP
aP
aPk
aP
aP
cP؊
dU
gt
i
l'|
m~w
n-'
xH%
xH:
xHD
yh
٧

ِ
pn&
\
\$
\^,
R%
s_
D
[
6
6
}?
}
}#
}02
}X
}99

S
nd
_
s
n
'Sǻ
'S0
'S
'S
'Sw
'sB
~
>>
v

.L
^k

\
u

O
ɕ
?~
R
#T
I
I
>I
$
"l
ch
c
.v
f8:
Ub
t
?Mv
I
>0
~

&
»
8d
8
4/
Qt
̮h
΢I
OI
a
ԇ>
S
%YZR
hb
߯r
\P
\0k
\B
\?
F	=s
F	_P
F	?
F	
F	
F	 
F	-
F	V
F	
F	7:
F	>

i
p
}
^X
-,

>.
UJI9Y~K<(O_
@~
r
r
XIR=ySMxp^"y@)-5..5=~V=~pA#']GnMQhWprY`j__`9`cZdؾf0f0f0@;~: 	).9K..F).IG?c]>n>>J>m>	YW̸1 iJM3Jrr>wT(d!A5>A5@@"F)$)>Oj5jʿjשj:Iz(MH![cF[f:
f
b.ÕAÕÕԶÕ.MǧMM]MFNG\iTnd#069	wQ2O"LRvis5s[0sjs/ 6?;P8BM-Ijd*ejNC.\d\dx#x#<4?;t	(lc5509iMdA ؄$'no'{+$-n0J|1t2$7T_<T=KBF#GG=GXG.GKNj:Qi<Q@RVb	RVRVRVRVwRVSRV5X`YX[Ĺ\[D&n\[D
\[D=\cKf/fKDfKDmD`nSn[nn,&nr|4Rr|4r|4LmrNDSs>ms>2tvAvYvv%v2vZevv<)vBxE|S}jar7LLc)RHA?9\\;_	)Jd4LgPv>w`:o0wF}Y]:%O-
o$o$o$EzzzzH^ܸ^f*cJz@*slsbɠwɠɠɠlɠTɠ
-#Ӎ#2<|ف60ʃϻ%~vОRx1e6?Pแmo?~Pnn;5c`n}Ybq>;>K6D]6D6D86D>6d/z
<f

$_c
v
l
	.pD

U'
Y

UTcx

UT

UT

UT\
?s
}@
'N$
l
_
zڈ
מ
"[
%"	
(]
*p
+"C
13B
J
OP
P
RC!
T^e
`(>
`<u
mGz
qy.#L

7Cs
7C0
7CI
4
Pp
PbJ
P܆
x
Ua

s[
>џ
l
Ɵ
)a

R
W
0

7
 
%S
¦e
<
<
3.+
\[
#2_
Q
Q
[C0
܅>W
*uX
{#
嫞I
Q\
Q
Q
N
\}
\k
\q
->El
^
D6
Da
6?*
6
Ii'tIW^'^&:^i7i&i{i`iKiiiuLL<LE $n5$P.|&&r&()-I+$./@TZ/@T/@T<327I]:;c^>">">"%>"%>"8>"D>";>"P>"XD>IEmEmEm^E1O
IoTZX^D$^DsdoVdʒgm7h<mWqTrsis$s )xL}|u|u9|u)|S|||c|ƺ||	XH9;9i9'9H9(a9eI9g9g9{.;+9Ԧ5[azD&7C1b؞C}n$_$)ROGRII]'?.͞.	ίdϟv6*$f8 g㿅SdSŵyqtwУ6y0uX]4!خ6R;	'H	' 	'


+o*tfR[& 1&&'t(`*-Nϰ.|^,7
89Ew;Nl;D; =_Vp???h??
DHs{IZ'M0O;$PyrPyQr?R]ZTsMjU0OYZA +ZnŦ]x#Q`"`EbvbbcU`dJsg1gOj~\lO.ppp%szsds<sdssds
}IFFC2@-7/9?i4tNCWNQxBUy<2UX$ZF?USsmtabb@`g#-#@3S~h~~6~~\L
/f%f	!ޡ.+&DߖON#0ȣG<bK}
vd|0|Շ|8|U|/Y|By|N$4eyi,0B@>=CB>5 ?@8;>65=85:Affected Application:AEBlockedNotification0:@KBLCloseAEBlockedNotification*-:A?;>9B 701;>:8@>20=Exploit blockedAEBlockedNotification#@>25=L 70I8BK:Protection Layer:AEBlockedNotification5B>4 70I8BK:Protection Technique:AEBlockedNotification0I8B0 2 @50;L=>< 2@5<5=8 >1=0@C68;0 8 701;>:8@>20;0 0B0:C M:A?;>9B0. 'B>1K C7=0BL 1>;LH5, ?@>A<>B@8B5 >BG5B.]Real-Time Protection detected and blocked an exploit attempt. To learn more, view the report.AEBlockedNotification"@>A<>B@5BL >BG5BView ReportAEBlockedNotification0:@KBLCloseARWBlockedNotification<O:Name:ARWBlockedNotification B:@KBL :0@0=B8=Open QuarantineARWBlockedNotification
CBL:Path:ARWBlockedNotification(@>3@0<<K-2K<>30B5;8
RansomwareARWBlockedNotification@>3@0<<0-2K<>30B5;L >1=0@C65=0 8 701;>:8@>20=0 70I8B>9 2 @50;L=>< 2@5<5=8. -B>B >1J5:B 1>;LH5 =5 ?@54AB02;O5B >?0A=>AB8.RRansomware detected and blocked by Real-Time Protection. It is no longer a threat.ARWBlockedNotification@>3@0<<0-2K<>30B5;L >1=0@C65=0 8 ?><5I5=0 2 :0@0=B8= 70I8B>9 2 @50;L=>< 2@5<5=8. -B>B >1J5:B 1>;LH5 =5 ?@54AB02;O5B >?0A=>AB8. 'B>1K ?>;=>ABLN C40;8BL ?@>3@0<<C-2K<>30B5;L, >B:@>9B5 :0@0=B8=.Ransomware detected and quarantined by Real-Time Protection. It is no longer a threat. To delete the ransomware entirely, open the Quarantine.ARWBlockedNotification"8?:Type:ARWBlockedNotification(@>3@0<<K-2K<>30B5;8
RansomwareARWExclusionController ?@>3@0<<5About	AboutPage<0:5B >1=>2;5=8O :><?>=5=B>2: Component Update Package: 	AboutPage>65B5 ;8 K ?@54AB028BL A515 <8@ 157 2@54>=>A=KE ?@>3@0<<? K <>65<.'Imagine a world without malware. We do.	AboutPage<Malwarebytes Anti-Ransomware 1K;0 A>740=0 ;N4L<8, :>B>@K5 25@OB, GB> 24>E=>2;5==>5 A>>1I5AB2> 8 1;5ABOI89 :>4 <>3CB ?>1548BL 2@54>=>A=K5 ?@>3@0<<K.</b><p><p>@>3@0<<0 Malwarebytes Anti-Ransomware ?@54>AB02;O5BAO =0 CA;>28OE :0: 5ABL. >@?>@0F8O Malwarebytes >B:07K205BAO >B :0:8E-;81> ?@O<KE 8;8 ?>4@07C<5205<KE 30@0=B89, 2:;NG0O, 2 G0AB=>AB8, ?>4@07C<5205<K5 30@0=B88 B>20@=>9 ?@83>4=>AB8 8 2>7<>6=>AB8 8A?>;L7>20=8O 2 >?@545;5==KE F5;OE. 8 ?@8 :0:8E >1AB>OB5;LAB20E :>@?>@0F8O Malwarebytes =5 =5A5B >B25BAB25==>AB8 70 :0:85-;81> ?@O<K5, =5?@O<K5, ?>1>G=K5, D0:B8G5A:85, HB@0D=K5 8;8 :>A25==K5 C1KB:8, B0: 8;8 8=0G5 A2O70==K5 A 8A?>;L7>20=85< 40==>3> ?@>3@0<<=>3> >15A?5G5=8O, 2:;NG0O, 2 G0AB=>AB8, ?>B5@N M:A?;C0B0F8>==KE :0G5AB2, 40==KE 8;8 ?@81K;8, ?5@5@K2K 2 E>7O9AB25==>9 45OB5;L=>AB8   =57028A8<> >B ?@8G8= 8E 2>7=8:=>25=8O 8 2840 >B25BAB25==>AB8,   0 B0:65 70 C1KB:8, ?@8G8=5==K5 ?> =5>AB>@>6=>AB8 8;8 8=K< >1@07><.Malwarebytes Anti-Ransomware is built by folks who believe an inspired community and brilliant code can defeat malware.</b><p><p>Malwarebytes Anti-Ransomware is provided as is. Any expressed or implied warranties, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose is disclaimed. In no event shall the author be liable for any direct, indirect, incidental, special, exemplary, or consequential damages, including, but not limited to, loss of use, data, or profits; or business interruption, however caused and on any theory of liability, including negligence or otherwise, arising in any way from the use of this program.	AboutPage6#254><;5=85 B@5BL59 AB>@>=KThird-party notices	AboutPageF Malwarebytes. A5 ?@020 70I8I5=K.%© Malwarebytes. All rights reserved.	AboutPage4<b>AB>@8O >1=0@C65=89</b><b>Detection History</b>AccessPolicyModel@<b>0I8B0 2 @50;L=>< 2@5<5=8</b><b>Real-Time Protection</b>AccessPolicyModel0<b>!@54AB2> ?@>25@:8</b><b>Scanner</b>AccessPolicyModel <b>0@0<5B@K</b><b>Settings</b>AccessPolicyModel6<b>0:@KBL Malwarebytes</b><b>Shut down Malwarebytes</b>AccessPolicyModel6<b>#40;8BL Malwarebytes</b><b>Uninstall Malwarebytes</b>AccessPolicyModel>ABC? 70?@5I5=
Access DeniedAccessPolicyModel#G5B=0O 70?8ALAccountAccessPolicyModel"!?8A>: @07@5H5=89
Allow ListAccessPolicyModelB<5=0CancelAccessPolicyModelR06<8B5 OK, GB>1K C40;8BL 2A5 @07@5H5=8O.#Click OK to remove all permissions.AccessPolicyModelB>1@065=85DisplayAccessPolicyModel(0I8B0 >B M:A?;>9B>2Exploit ProtectionAccessPolicyModel
1I55GeneralAccessPolicyModelAB>@8OHistoryAccessPolicyModel~0I8B0 >B 2@54>=>A=>3>  8 ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<<Malware and PUP ProtectionAccessPolicyModel#254><;5=8O
NotificationsAccessPolicyModelOKOkAccessPolicyModel$>;8B8:0 >B:;NG5=0Policy DisabledAccessPolicyModel">;8B8:0 2:;NG5=0Policy EnabledAccessPolicyModel0@0=B8=
QuarantineAccessPolicyModel<0I8B0 >B ?@>3@0<<-2K<>30B5;59Ransomware ProtectionAccessPolicyModel
BG5BReportAccessPolicyModel(;0=8@>2I8: ?@>25@>:Scan SchedulerAccessPolicyModel57>?0A=>ABLSecurityAccessPolicyModelK 225;8 =525@=K9 ?0@>;L.  >60;C9AB0, ?@>25@LB5 ?0@>;L 8 22548B5 53> 5I5 @07.DThe password you entered is incorrect.  Please verify and try again.AccessPolicyModel=8<0=85!WarningAccessPolicyModel,0I8B0 2 A5B8 =B5@=5BWeb ProtectionAccessPolicyModel@#G5B=0O 70?8AL >68405B 0:B820F88Account activation pendingAccountActivationPendingDialog>=OB=>Got itAccountActivationPendingDialogC6=0 ?><>IL?
Need help?AccountActivationPendingDialogj;O 7025@H5=8O 0:B820F88 ?>4?8A:8 A;54C5B A=0G0;0 A>740BL CG5B=CN 70?8AL. 'B>1K ?@8ABC?8BL : @01>B5, ?5@5948B5 ?> AAK;:5, C:070==>9 2 A>>1I5=88, :>B>@>5 <K B>;L:> GB> 0< >B?@028;8.To finish activating your subscription, you need to create an account first. Click the link in the email we just sent you to get started.AccountActivationPendingDialog@>60;C9AB0, 22548B5 25@=K9 :;NG.Please enter a valid Key.ActivateDialogModelv>60;C9AB0, 22548B5 25@=K9 ID ;8F5=788 8 ;8F5=78>==K9 :;NG.(Please enter a valid license ID and Key.ActivateDialogModel:B828@>20BLActivateActivateLicenseDialog*:B828@>20BL ?>4?8A:CActivate subscriptionActivateLicenseDialog
0704BackActivateLicenseDialog>B>2>DoneActivateLicenseDialogT>;CG8BL ?>4@>1=K5 8=AB@C:F88 ?> 0:B820F88$Get detailed activation instructionsActivateLicenseDialogID ;8F5=788
License IDActivateLicenseDialog"8F5=78>==K9 :;NGLicense KeyActivateLicenseDialog*8F5=78O 0:B828@>20=0License activatedActivateLicenseDialog6>B5@O;8 ;8F5=78>==K9 :;NG?Lost license key?ActivateLicenseDialog</ ?>;CG8; ;8F5=78N 2<5AB5 A ID!My license came with a License IDActivateLicenseDialog8C6=0 4>?>;=8B5;L=0O ?><>IL?Need more help?ActivateLicenseDialog4B:@KBL <>N CG5B=CN 70?8ALOpen my accountActivateLicenseDialog\>60;C9AB0, 22548B5 459AB28B5;L=K9 ID ;8F5=788Please enter a valid license IDActivateLicenseDialogh>60;C9AB0, 22548B5 459AB28B5;L=K9 ;8F5=78>==K9 :;NG Please enter a valid license keyActivateLicenseDialogC?8BL ;8F5=78NPurchase a licenseActivateLicenseDialog'B>1K 0:B828@>20BL %1 =0 MB>< :><?LNB5@5, 22548B5 ;8F5=78>==K9 :;NG 2 ?>;5 =865.>To activate %1 on this computer, enter your License Key below.ActivateLicenseDialog'B>1K 0:B828@>20BL premium-25@A8N =0 MB>< :><?LNB5@5, ?>60;C9AB0, 2>948B5 2 A2>N CG5B=CN 70?8AL 8 450:B828@C9B5 4@C3>5 CAB@>9AB2> 8;8 ?@8>1@5B8B5 =>2CN ?>4?8A:C, ?>72>;ONICN 8A?>;L7>20BL ?@>3@0<<C =0 1>;LH5< :>;8G5AB25 CAB@>9AB2.To activate Premium on this computer, log in to your account and deactivate another device or upgrade to a larger subscription.ActivateLicenseDialog*>1@> ?>60;>20BL 2 %1
Welcome to %1ActivateLicenseDialog^K 4>AB83;8 >3@0=8G5=8O =0 :>;8G5AB2> CAB@>9AB2You’ve hit your device limitActivateLicenseDialogE-mailEmailActivateOrSignInPage22548B5 ;8F5=78>==K9 :;NGEnter license keyActivateOrSignInPage01K;8 ?0@>;LForgot passwordActivateOrSignInPage8;8OrActivateOrSignInPage0@>;LPasswordActivateOrSignInPaget>60;C9AB0, 22548B5 459AB28B5;L=K9 04@5A M;5:B@>==>9 ?>GBKPlease enter a valid emailActivateOrSignInPage>9B8 2 A8AB5<CSign inActivateOrSignInPage>948B5 2 A8AB5<C 8;8 22548B5 ;8F5=78>==K9 :;NG, GB>1K 0:B828@>20BL ?>4?8A:C =0 %1BSign in or enter your license key to activate your %1 subscriptionActivateOrSignInPagel>9B8 2 A8AB5<C A ?><>ILN CG5B=>9 70?8A8 Malwarebytes.(Sign in using your Malwarebytes account.ActivateOrSignInPage>AB83=CB> <0:A8<0;L=>5 :>;8G5AB2> ?>?KB>: 2E>40. K <>65B5 ?>2B>@8BL ?>?KB:C G5@57 10 <8=CB.WYou've reached the maximum number of sign in attempts. You can try again in 10 minutes.ActivateOrSignInPageH2545= =525@=K9 e-mail 8/8;8 ?0@>;L.(Your email and/or password is incorrect.ActivateOrSignInPage,51-?@>F5AA ?@8;>65=8OApplication Web ProcessAllowListModel$09;FileAllowListModel
0?:0FolderAllowListModelIP-04@5A
IP AddressAllowListModel81=0@C65==0O 0B0:0 M:A?;>9B0Identified Exploit AttemptAllowListModel 0745; @55AB@0Registry KeyAllowListModel =0G5=85 @55AB@0Registry ValueAllowListModel51-A09BWebsiteAllowListModel>1028BLAdd
AllowListPageK 459AB28B5;L=> E>B8B5 C40;8BL 87 A?8A:0 MB8 @07@5H5==K5 >1J5:BK?3Are you sure you want to clear these allowed items?
AllowListPage4G8AB8BL A?8A>: @07@5H5=89Clear Allow List
AllowListPageG8AB8BL 2A5	Clear all
AllowListPageA;8 ?@>3@0<<0 Malwarebytes 701;>:8@>20;0 157>?0A=K9 >1J5:B, 4>102LB5 53> AN40, GB>1K 8A:;NG8BL 53> 87 ?>A;54CNI8E ?@>25@>:._If Malwarebytes blocks something you know is safe, add it here to skip it in future detections.
AllowListPage<OName
AllowListPage"8?Type
AllowListPage&( 0AH8@5==K5 >?F88)
(Advanced)AllowListTypeButton.">;L:> 2 premium-25@A88Premium onlyAllowListTypeButton-:A?;>9BKExploitsAntiExploitExclusionController;>:8@>20BL 0B0:8, <>45;8@C5<K5 2 @0<:0E B5AB>2 =0 ?@>=8:=>25=85!Block penetration testing attacksAntiExploitPenetration59AB285ActionAntiExploitReportsPageA5 D09;K (*)
All files (*)AntiExploitReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK >BG5B0?3Are you sure you want to delete these report items?AntiExploitReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB>B >1J5:B >BG5B0?1Are you sure you want to delete this report item?AntiExploitReportsPage
0704BackAntiExploitReportsPage0B0DateAntiExploitReportsPage*#40;8BL >1J5:B >BG5B0Delete Report ItemAntiExploitReportsPage,#40;8BL >1J5:BK >BG5B0Delete Report ItemsAntiExploitReportsPage201;>:8@>20==K5 M:A?;>9BKExploits blockedAntiExploitReportsPage">A;54=85 30 4=59Last 30 daysAntiExploitReportsPage#@>25=LLayerAntiExploitReportsPage5AB>?>;>65=85LocationAntiExploitReportsPage!>E@0=8BL D09;	Save fileAntiExploitReportsPage."5:AB>2K5 D09;K (*.txt)Text files (*.txt)AntiExploitReportsPage#3@>70ThreatAntiExploitReportsPageT 0AH8@5==K5 =0AB@>9:8 70I8BK >B M:A?;>9B>2$Advanced Exploit Protection settingsAntiExploitSettingsDialogF><?;5:A=K5 0;3>@8B<K 70I8BK ?0<OB8Advanced memory protectionAntiExploitSettingsDialogP0I8B0 ?@8;>65=89 =0 >A=>25 8E ?>2545=8OApplication behavior protectionAntiExploitSettingsDialog4#A8;5=85 70I8BK ?@8;>65=89Application hardeningAntiExploitSettingsDialog>40BL 70O2:CApplyAntiExploitSettingsDialogp7<5=5=85 MB8E =0AB@>5: <>65B ?>2;8OBL =0 ?@>872>48B5;L=>ABL :><?LNB5@0.  5:><5=4C5BAO 87<5=OBL MB8 =0AB@>9:8 B>;L:> ?@8 =0;8G88 A>>B25BAB2CNI8E C:070=89 A;C61K ?>445@6:8 Malwarebytes.Changing these settings can affect your computer’s performance. Avoid making changes unless instructed to by Malwarebytes Support.AntiExploitSettingsDialog0I8B0 JavaJava protectionAntiExploitSettingsDialog$>45;8@>20=85 0B0:Penetration TestingAntiExploitSettingsDialogF>AAB0=>28BL ?0@0<5B@K ?> C<>;G0=8NRestore DefaultsAntiExploitSettingsDialog::B820F8O ;8F5=788 MBARW BETAMBARW BETA License ActivationArwDashboardModel0:B820F8O ;8F5=788 MBARWMBARW License ActivationArwDashboardModel>7=8:;0 ?@>1;5<0 ?@8 0:B820F88 Malwarebytes Anti-Ransomware BETA.

A;8 MB> ?@54C?@5645=85 ?@>4>;605B ?>O2;OBLAO, ?>60;C9AB0, A>>1I8B5 > ?@>1;5<5 =0 D>@C<5, ?>A2OI5==>< beta-25@A8O< =0H8E ?@>4C:B>2:
https://forums.malwarebytes.org/.There was a problem activating your Malwarebytes Anti-Ransomware BETA.

If you continue to see this message, please report the issue in the BETA forum:
https://forums.malwarebytes.org/.ArwDashboardModel>7=8:;0 ?@>1;5<0 ?@8 0:B820F88 ?@>4C:B0 Malwarebytes Anti-Ransomware.

A;8 MB> ?@54C?@5645=85 ?@>4>;605B ?>O2;OBLAO, ?>60;C9AB0, A>>1I8B5 > ?@>1;5<5 =0 D>@C<5 ?>445@6:8:
https://forums.malwarebytes.org/.There was a problem activating your Malwarebytes Anti-Ransomware product.

If you continue to see this message, please report the issue in the support forum:
https://forums.malwarebytes.org/.ArwDashboardModelA:;NG5=85	ExclusionArwExclusionsPageModel"8? 8A:;NG5=8OExclusion TypeArwExclusionsPageModel$09;FileArwExclusionsPageModel A:;NG5=85 D09;0File exclusionArwExclusionsPageModel
0?:0FolderArwExclusionsPageModel A:;NG5=85 ?0?:8Folder exclusionArwExclusionsPageModel>B>2>DoneAutoActivationCompleterA;8 0H 70:07 2:;NG05B >?F8N 70I8BK :>=D845=F80;L=>AB8 (Privacy), ?>60;C9AB0, 2>A?>;L7C9B5AL 8=AB@C:F8O<8 ?> 0:B820F88, ?@82545==K<8 2 M;5:B@>==>< A>>1I5=88. <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/support/privacy-guide'>#7=0BL 1>;LH5</a>If your purchase includes Privacy, check your email for activation instructions. <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/support/privacy-guide'>Learn more</a>AutoActivationCompleteV0H0 ;8F5=78O =0 Malwarebytes 0:B828@>20=0.-Your Malwarebytes license has been activated.AutoActivationComplete0:@KBLCloseAutorenewFailedDialog5 B5@O9B5 70I8BC. >60;C9AB0, >1=>28B5 A2>8 ?;0B56=K5 40==K5, ?>:0 =5 8AB5: A@>: 459AB28O ?>4?8A:8.XDon’t lose your protection. Update your payment info before your subscription expires.AutorenewFailedDialog21=>28BL ?;0B56=K5 40==K5Update payment infoAutorenewFailedDialogJ0< =5 C40;>AL ?@>4;8BL 0HC ?>4?8A:C)We were unable to renew your subscriptionAutorenewFailedDialog;03>40@O 02B><0B8G5A:8< >1=>2;5=8O< K 1C45B5 70I8I5=K >B =>259H8E C3@>74Automatic updates protect against the latest threatsBannerAdCycler2 01>B09B5 2 A5B8 C25@5==>Browse with confidenceBannerAdCyclerC?8BLBuy nowBannerAdCyclerf#?@02;5=85 :815@157>?0A=>ABLN   70 AG8B0==K5 <8=CBK'Cybersecurity you can manage in minutesBannerAdCycler`0I8B8B5 =5 B>;L:> :><?LNB5@. 0I8B8B5 A2>9 4><.4Don't just protect your computer. Protect your home.BannerAdCycler<03@C609B5 D09;K 157 :>;510=89Download without doubtBannerAdCyclerN10O >?5@0F8>==0O A8AB5<0 <>65B 1KBL 70@065=0 2@54>=>A=K<8 >1J5:B0<8)Every operating system can get infectionsBannerAdCyclerz!=>20 ?>GC2AB2C9B5 A51O 2 157>?0A=>AB8 =0 ?@>AB>@0E =B5@=5B0Feel safe on the Internet againBannerAdCyclerH>;CG8B5 <>I=>5 A@54AB2> :815@157>?0A=>AB8 157 A;>6=KE =0AB@>5:. 0I8B8B5 A2>8 :><?LNB5@K 2 A5B8 8 :@8B8G5A:8 206=K5 D09;K A ?><>ILN @5H5=8O Malwarebytes for Teams.Get powerful cybersecurity without the complicated controls. Protect your endpoints and critical files with Malwarebytes for Teams.BannerAdCyclerR%0:5@K ?@OGCB 2@54>=>A=>5  2 D09;0E, :>B>@K5 <K 703@C605< :064K9 45=L. 4=0:> Malwarebytes Premium =59B@0;87C5B 2A5 C3@>7K, =5 4020O 8< =0=5AB8 2@54 0H5<C CAB@>9AB2C.Hackers are great at hiding malware in everyday downloads. Malwarebytes Premium catches these threats before they have a chance to infect you.BannerAdCycler#7=0BL 1>;LH5
Learn moreBannerAdCycler@54>=>A=K5 >1J5:BK ?>@060NB CAB@>9AB20 Mac, Android 8 Chrome =5 B0: G0AB>, :0: , >4=0:> =5 B0: G0AB> =5 >7=0G05B =8:>340. 5A?;0B=> CAB0=>28B5 >7=0:><8B5;L=CN 25@A8N Malwarebytes =0 2A5 A2>8 CAB@>9AB20.Mac, Android, and Chrome devices may not get as many infections as PCs, but "fewer" isn't the same as "zero." Try Malwarebytes on all your devices for free.BannerAdCycler0 MB>B @07 =5C4>1AB20 >B >=;09=-C3@>7 AB0=CB 459AB28B5;L=> ?>A;54=8<86Make this the last time you worry about online threatsBannerAdCyclerp@>3@0<<0 Malwarebytes Premium 2:;NG05B 2 A51O 70I8BC 2 A5B8 =B5@=5B, :>B>@0O 2KO2;O5B 8 =59B@0;87C5B 0B0:8 8725AB=KE >=;09=-<>H5==8:>2 8 1;>:8@C5B 459AB28O 4@C38E ?>4>7@8B5;L=KE ;8F.cMalwarebytes Premium includes Web Protection, which looks out for known and suspected online scams.BannerAdCycler0I8B0 Malwarebytes Premium: >AB>O==0O 70I8B0 2 @50;L=>< 2@5<5=88Malwarebytes Premium protection: Real-time, all the timeBannerAdCyclerMalwarebytes Premium 70I8I05B 0A >B E0:5@>2, <>H5==8:>2 8 2>@>2, B0: GB> K <>65B5 A<5;> =068<0BL =0 ;N1CN AAK;:C.gMalwarebytes Premium protects you from hackers, scammers, and thieves so you can click with confidence.BannerAdCyclerdMalwarebytes Premium 02B><0B8G5A:8 =59B@0;87C5B 2@54>=>A=>5 , 1;>:8@C5B 0B0:8 <>H5==8:>2 8 CAB0=02;8205B >1=>2;5=8O, B0: GB> 0< C65 =5 ?@845BAO 15A?>:>8BLAO >1 >=;09=-C3@>70E.Malwarebytes Premium stops malware, blocks scams, and updates itself automatically so you'll never have to worry about online threats again.BannerAdCyclerMalwarebytes Premium =59B@0;87C5B 2@54>=>A=>5 , 28@CAK 8 4@C385 2@54>=>A=K5 >1J5:BK, =5 70<54;OO @01>BC 0H53> :><?LNB5@0.YMalwarebytes Premium stops malware, viruses, and more without bogging down your computer.BannerAdCycler:Malwarebytes for Teams 70I8I05B 0H 187=5A 8 =5 <5H05B @01>B5. 0AB@>82 ?0@0<5B@K 157>?0A=>AB8 70 AG8B0==K5 <8=CBK, K <>65B5 A>A@54>B>G8BLAO =0 2545=88 45;.Malwarebytes for Teams protects your business without disrupting it. With security you can manage in minutes, you can focus on running your business.BannerAdCyclerP0=8<09B5AL A2>8< 45;><   A Malwarebytes(Mind your own business with MalwarebytesBannerAdCycler6!><=5205B5AL 2 =0456=>AB8 251-A09B0? ! ?@>3@0<<>9 Malwarebytes Premium K <>65B5 A<5;> >B:@K20BL ;N1>9 A09B, 7=0O, GB> K =0456=> 70I8I5=K 2 A5B8 =B5@=5B.uNot sure if a site is risky? With Malwarebytes Premium, you can visit it anyway knowing Web Protection has your back.BannerAdCycler=;09=-C3@>7K =0?@02;5=K =5 B>;L:> =0 . 5A?;0B=> CAB0=>28B5 >7=0:><8B5;L=CN 25@A8N Malwarebytes =0 CAB@>9AB20 ?>4 C?@02;5=85< Android 8 iOS.bOnline threats aren't exclusive to PCs. Try Malwarebytes on your Android and iOS devices for free.BannerAdCyclerR0I8B8B5 A51O >B <>H5==8G5A:8E 251-A09B>2Protect against scam sitesBannerAdCyclerv!M:>=><LB5 A@54AB20 8 >15A?5GLB5 :815@70I8BC 4;O 2A59 A5<L8'Save on protection for the whole familyBannerAdCyclerC4LB5 =0 H03 2?5@548 =>259H8E >=;09=-C3@>7   A A8AB5<>9 :815@70I8BK, :>B>@0O >1=>2;O5BAO 02B><0B8G5A:8.VStay ahead of the latest online threats with cybersecurity that updates automatically.BannerAdCycler~;>:8@C9B5 2@54>=>A=>5  4> B>3>, :0: >=> A<>65B =02@548BL 0<*Stop malware infections before they happenBannerAdCyclerB5 15A?>:>9B5AL >1 >=;09=-C3@>70E"Stop worrying about online threatsBannerAdCycler@5 15A?>:>9B5AL >1 >=;09=-C3@>70E. >A?>;L7C9B5AL ?@>3@0<<>9, :>B>@0O 2A5 45;05B 02B><0B8G5A:8: 2K?>;=O5B ?@>25@:8, 1;>:8@C5B 28@CAK 8 CAB0=02;8205B >1=>2;5=8O.aStop worrying about online threats. Get protection that scans, blocks, and updates automatically.BannerAdCycler'5< 1>;LH5 CAB@>9AB2 K 70I8I05B5 A ?><>ILN ?@>3@0<<K Malwarebytes, B5< <5=LH5 K ?;0B8B5 70 70I8BC :064>3> CAB@>9AB20. >A?>;L7C9B5AL =0H8< ?0:5B=K< ?@54;>65=85< 8 70I8B8B5 1>;LH5 CAB@>9AB2 70 <5=LH85 45=L38.The more devices you protect with Malwarebytes, the less you pay per device. Take advantage of our bundled pricing and protect more for less.BannerAdCycler#AB0=>28B5 >7=0:><8B5;L=CN 25@A8N Malwarebytes =0 CAB@>9AB20 Mac, Android 8 Chrome,Try Malwarebytes on Mac, Android, and ChromeBannerAdCycler#AB0=>28B5 >7=0:><8B5;L=CN 25@A8N Malwarebytes =0 A2>8 <>18;L=K5 CAB@>9AB20'Try Malwarebytes on your mobile devicesBannerAdCyclerD>:0 K =5 70I8B8B5 2A5 A2>8 CAB@>9AB20, K 1C45B5 >AB020BLAO CO728<K<8 4;O 0B0:. 5A?;0B=> CAB0=>28B5 >7=0:><8B5;L=CN 25@A8N Malwarebytes =0 2A5 A2>8 CAB@>9AB20.}Unless all your devices are protected, you may still be vulnerable to attacks. Try Malwarebytes on all your devices for free.BannerAdCycler@1=>28B5 ?@>3@0<<C 4> Malwarebytes Premium, GB>1K 2>A?>;L7>20BLAO 70I8B>9 2 @50;L=>< 2@5<5=8, :>B>@0O 1;>:8@C5B =>2>5 2@54>=>A=>5 , =5 4020O 5<C =0=5AB8 C40@.mUpgrade to Malwarebytes Premium to get real-time protection that intercepts new malware before it can strike.BannerAdCycler57 4>;6=>9 70I8BK 2@54>=>A=K5 >1J5:BK <>3CB ;53:> @0A?@>AB@0=OBLAO A >4=>3> CAB@>9AB20 =0 4@C3>5. @8>1@5B8B5 =0H ?0:5B ?@>4C:B>2   8 K 70 <5=LH85 45=L38 70I8B8B5 2A5 CAB@>9AB20, :>B>@K<8 ?>;L7C5BAO 0H0 A5<LO.Without protection, it's easy for infections to spread from one device to another. Protect all your family's devices for less with our bundled pricing.BannerAdCycler;>:8@>20BL 0B0:8, <>45;8@C5<K5 2 @0<:0E B5AB>2 =0 ?@>=8:=>25=85!Block penetration testing attacksBlockPenetrationDialogB<5=0CancelBlockPenetrationDialog:B820F8O 40==>9 =0AB@>9:8 70459AB2C5B 03@5AA82=K5 0;3>@8B<K 1;>:8@>2:8, >15A?5G820NI85 70I8BC >B M:A?;>9B>2, >4=0:> MB> <>65B ?@825AB8 : ;>6=K< A@010BK20=8O< 8;8 :>=D;8:B0< ?@>3@0<<K A 4@C38<8 ?@8;>65=8O<8.Enabling this setting provides aggressive blocking capabilities for Exploit Protection but may potentially result in false-positives or other application conflicts.BlockPenetrationDialog:;NG8BLTurn onBlockPenetrationDialog2 5:;0<0/@5:;0<=K5 B@5:5@KAds/TrackersBrowserGuardCardB:@K209B5 A09BK 1KAB@>, 701K2 > @5:;0<5, <>H5==8:0E 8 B@5:5@0E.@Browse faster and leave ads, scammers, and trackers in the dust.BrowserGuardCardBrowser Guard
Browser GuardBrowserGuardCard(5A?;0B=0O CAB0=>2:0Free installBrowserGuardCard#AB0=>2:0	InstalledBrowserGuardCard@54>=>A=>5 MalwareBrowserGuardCard!C?5@! @0C75@ @01>B05B 157 ?@>1;5<. 8:0:>9 @5:;0<K, <>H5==8:>2 8 B@5:5@>2.UNice! You're browsing fast and clean. Leaving ads, scammers and trackers in the dust.BrowserGuardCard5 CAB0=>2;5=>
Not installedBrowserGuardCard>H5==8:8ScamsBrowserGuardCard,@>25@:0 >1=>2;5=89...Checking for updates...CheckForUpdatesDialog,03@C7:0 >1=>2;5=8O...Downloading update...CheckForUpdatesDialog>=OB=>Got itCheckForUpdatesDialog#AB0=>28BLInstallCheckForUpdatesDialog.#AB0=>2:0 >1=>2;5=8O...Installing update...CheckForUpdatesDialog
>765LaterCheckForUpdatesDialog:5@A8O Malwarebytes 0:BC0;L=0Malwarebytes is up to dateCheckForUpdatesDialogB"@51C5BAO ?5@570?CA: MalwarebytesMalwarebytes restart requiredCheckForUpdatesDialogNMalwarebytes ?5@570?CAB8BLAO G5@57: %1AMalwarebytes restarting in: %1sCheckForUpdatesDialogOKOKCheckForUpdatesDialog>60;C9AB0, 4>648B5AL 7025@H5=8O ?@>25@:8, ?@5645 G5< ?@>25@OBL =0;8G85 >1=>2;5=89.?Please wait for the scan to finish before checking for updates.CheckForUpdatesDialog45@570?CAB8BL MalwarebytesRestart MalwarebytesCheckForUpdatesDialog 45B ?@>25@:0...Scan in progress...CheckForUpdatesDialog'B>1K 7025@H8BL CAB0=>2:C MB>3> >1=>2;5=8O, =C6=> ?5@570?CAB8BL ?@>3@0<<C Malwarebytes.@To finish installing this update, Malwarebytes needs to restart.CheckForUpdatesDialog(1=>2;5=85 7025@H5=>Update completeCheckForUpdatesDialog5@A8O: %1Version: %1CheckForUpdatesDialogj0< =C6=> 2@5<O, GB>1K ?@8<5=8BL =5:>B>@K5 >1=>2;5=8O&We need a moment to apply some updatesCheckForUpdatesDialog >1@> ?>60;>20BLWelcomeCheckForUpdatesDialogP!@>: 459AB28O ?@>1=>9 25@A88 %1 =0G0;AO.Your trial of %1 starts now.CheckForUpdatesDialogp@5645 G5< =0G0BL ?@>1=K9 ?5@8>4, =C6=> >1=>28BL 70I8BC.HBefore your trial starts, let's make sure your protection is up to date.CheckForUpdatesDialogModel6@>25@:0 =0;8G8O >1=>2;5=89Check for updatesCheckForUpdatesDialogModel0:@KBLCloseCheckForUpdatesDialogModelOKOKCheckForUpdatesDialogModel2>43>B>2:0 ?@>1=>9 25@A88Preparing your trialCheckForUpdatesDialogModel.5@5703@C78BL :><?LNB5@Restart computerCheckForUpdatesDialogModel("@51C5BAO ?5@570?CA:Restart requiredCheckForUpdatesDialogModelN5 C405BAO ?@>25@8BL =0;8G85 >1=>2;5=89Unable to check for updatesCheckForUpdatesDialogModel 40==K9 <><5=B =5 C405BAO ?@>25@8BL =0;8G85 >1=>2;5=89. >60;C9AB0, ?>2B>@8B5 ?>?KB:C ?>765.BUnable to check for updates at the moment. Please try again later.CheckForUpdatesDialogModel 40==K9 <><5=B =5;L7O ?@>25@8BL =0;8G85 >1=>2;5=89, ?>A:>;L:C ?@>25@:0 =0;8G8O >1=>2;5=89 C65 2K?>;=O5BAO.DUnable to check now, because an update check is already in progress.CheckForUpdatesDialogModel5>1E>48<> ?5@5703@C78BL :><?LNB5@, GB>1K ?5@5<5AB8BL 2 :0@0=B8= 2@54>=>A=K5 >1J5:BK, >1=0@C65==K5 2 E>45 ?@54K4CI59 ?@>25@:8. >60;C9AB0, ?5@5703@C78B5 :><?LNB5@, ?@5645 G5< ?@>25@OBL =0;8G85 >1=>2;5=89.Your computer needs to restart to complete the quarantine process for a previous scan. Please restart your computer before checking for updates.CheckForUpdatesDialogModelB"@51CNBAO 4>?>;=8B5;L=K5 459AB28OAdditional action requiredChromeActionRequired0:@KBLCloseChromeActionRequired#7=0BL :0:	Learn howChromeActionRequiredR>7<>6=>, MB> ?@>87>H;> 87-70 A8=E@>=870F88, 2K?>;=O5<>9 0H8< 1@0C75@>< Chrome.
'B>1K @5H8BL MBC ?@>1;5<C, ?>60;C9AB0, 87<5=8B5 =0AB@>9:8 A8=E@>=870F88 1@0C75@0 Chrome.This may be due to your Chrome browser sync activity.
To resolve the issue, you need to edit your browser
sync settings in Chrome.ChromeActionRequiredt48= 8 B>B 65 >1J5:B 1K; ?><5I5= 2 :0@0=B8= =5A:>;L:> @07.1We have quarantined the same item multiple times.ChromeActionRequired%1 <8;;8>=%1 <8;;8>=0%1 <8;;8>=>2
%1 million(s)Common%1+ <8;;8>=>2%1+ millionCommon~-B0 DC=:F8O 4>ABC?=0 B>;L:> 2 >7=0:><8B5;L=>9 8 Premium-25@A88.=This feature is only available in Trial and Premium versions.Common> 2K?>;=5=8O ?5@5703@C7:8 =5:>B>@K5 DC=:F88 ?@>3@0<<K 1C4CB >3@0=8G5=K.?Some functionality may be limited until your computer restarts.CriticalPromptTray0:@KBLCloseCuUpdateFailedDialogK?>;=5=85 >4=>3> 8;8 =5A:>;L:8E M;5<5=B>2 B5:CI53> >1=>2;5=8O 7025@H8;>AL =5C40G59. >60;C9AB0, ?@>25@LB5 ?>4:;NG5=85 : =B5@=5BC, 0 70B5< ?>2B>@8B5 ?>?KB:C. A;8 0< =C6=0 ?><>IL, ?>A5B8B5 <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4pcgethelp'><u>251-A09B =0H59 A;C61K ?>445@6:8</u></a>.5One or more items in the current update did not complete successfully. Please check your internet connection and try again. If you need more help, visit our <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4pcgethelp'><u>support site</u></a>.CuUpdateFailedDialogK?>;=5=85 >4=>3> 8;8 =5A:>;L:8E M;5<5=B>2 B5:CI53> >1=>2;5=8O 7025@H8;>AL =5C40G59. >60;C9AB0, ?@>25@LB5 ?>4:;NG5=85 : =B5@=5BC, 0 70B5< ?>2B>@8B5 ?>?KB:C. A;8 0< =C6=0 ?><>IL, ?>A5B8B5 <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4pcgethelp'>251-A09B =0H59 A;C61K ?>445@6:8</a>..One or more items in the current update did not complete successfully. Please check your internet connection and try again. If you need more help, visit our <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4pcgethelp'>support site</a>.CuUpdateFailedDialog">7=8:;0 ?@>1;5<0Something went wrongCuUpdateFailedDialogK1@0BL 2A5
Select allCustomTableViewA5 2K1@0==K5 M;5<5=BK 1K;8 CA?5H=> C40;5=K. $09; 6C@=0;0 1K; A>E@0=5= 2 ?0?:C 6C@=0;0.`All selected items have been removed successfully. A log file has been saved to the logs folder.DORModel5BNoDORModel0YesDORModel"@51C5BAO ?5@5703@C78BL :><?LNB5@ 4;O ?>;=>3> C40;5=8O C3@>7.
K?>;=8BL ?5@5703@C7:C A59G0A?cYour computer needs to be restarted to complete the removal process.
Would you like to restart now?DORModel@8 >B:;NG5=88 70I8BK 2 A5B8 =B5@=5B B0:65 1C45B >B:;NG5=0 70I8B0 >B 1@CBD>@A-0B0:. @>4>;68BL?dBrute Force Protection will be disabled while Web Protection is turned off. Do you wish to continue?DashboardModelB<5=0CancelDashboardModel$>4:;NG5=85 : A5B8Network ConnectionDashboardModel0@0<5B@K A5B8Network SettingsDashboardModelOKOKDashboardModel00@0<5B@K ?@>:A8-A5@25@0Proxy SettingsDashboardModelB:;NG8BLTurn OffDashboardModelBB:;NG8BL 70I8BC 2 A5B8 =B5@=5B?Turn off Web Protection?DashboardModel5 C405BAO A2O70BLAO A A5@25@>< ;8F5=789. @>25@LB5 =0AB@>9:8 ?>4:;NG5=8O : A5B8 8;8 >1@0B8B5AL 70 ?><>ILN : A8AB5<=><C 04<8=8AB@0B>@C.nUnable to contact license server. Check your network connection or contact your system administrator for help.DashboardModel5 C405BAO A2O70BLAO A A5@25@>< ;8F5=789. @>25@LB5 ?0@0<5B@K A5B8 8;8 >1@0B8B5AL 70 ?><>ILN : A8AB5<=><C 04<8=8AB@0B>@C.lUnable to contact license server. Check your network settings or contact your system administrator for help.DashboardModel5 C405BAO A2O70BLAO A A5@25@>< ;8F5=789. @>25@LB5 =0AB@>9:8 ?@>:A8-A5@25@0 8;8 >1@0B8B5AL 70 ?><>ILN : A8AB5<=><C 04<8=8AB@0B>@C.jUnable to contact license server. Check your proxy settings or contact your system administrator for help.DashboardModel'B>1K ?>;CG8BL 1>;55 =0456=CN 70I8BC, CAB0=>28B5 ?>A;54=55 >1=>2;5=85. -B> 15A?;0B=>.5For stronger security, get the new update. It's free.DashboardNotificationsBanner,8AB5:05B G5@57 %1 4=59expires in %1 daysDashboardNotificationsModel<A@>: 459AB28O 8AB5:05B A53>4=O
expires todayDashboardNotificationsModel ?@>3@0<<5About
DashboardPageP0I8B0 >B ?@>3@0<<-2K<>30B5;59 >B:;NG5=0&Anti-Ransomware Protection is disabled
DashboardPageN0I8B0 >B ?@>3@0<<-2K<>30B5;59 2:;NG5=0%Anti-Ransomware Protection is enabled
DashboardPage1@0B=0O A2O7LFeedback
DashboardPage A?@028BL A59G0AFix Now
DashboardPage(@>A<>B@5BL A2545=8OGet Details
DashboardPage.#AB0=>28BL =>2CN 25@A8NInstall New Version
DashboardPage"#AB0=>28BL A59G0AInstall Now
DashboardPage&Malwarebytes Endpoint Security @01>B05B =0 >A=>25 ?5@54>2KE B5E=>;>389 8 ?@>0:B82=> 70I8I05B <br/>0H 187=5A >B ?@>3@0<<-2K<>30B5;59.   <a href='https://links.malwarebytes.com/link/business-arw' style='color:#6EAC49;text-decoration:none;'><b>5A?;0B=0O ?@>1=0O 25@A8O</b></a>Malwarebytes Endpoint Security delivers leading-edge, proactive<br/>protection to businesses against ransomware. &nbsp; <a href='https://links.malwarebytes.com/link/business-arw' style='color:#6EAC49;text-decoration:none;'><b>Get a free trial</b></a>
DashboardPage20I8B0 2 @50;L=>< 2@5<5=8Real-Time Protection
DashboardPage:;NG8BL 70I8BCStart Protection
DashboardPage B:;NG8BL 70I8BCStop Protection
DashboardPage-B> beta-25@A8O. ><?0=8O Malwarebytes 708=B5@5A>20=0 2 0H8E 845OE, :>B>@K5 ?><>3CB =0< CA>25@H5=AB2>20BL MB>B ?@>3@0<<=K9 ?@>4C:B. >60;C9AB0, =0?@02;O9B5 =0< A2>8 :><<5=B0@88, ?@54;>65=8O 8;8 >BG5BK >1 >H81:0E, 8A?>;L7CO :=>?:C 1@0B=0O A2O7L, @0A?>;>65==CN =865.This is a BETA release. Malwarebytes is very interested in hearing your thoughts to help us improve the product. Please submit any feedback, suggestions or bug reports by clicking the Feedback button below.
DashboardPageJ5 C40;>AL 0:B828@>20BL 0HC ;8F5=78NYour license failed to activate
DashboardPageF0H0 A8AB5<0 ?>425@305BAO >?0A=>AB8Your system is at risk
DashboardPage*0H0 A8AB5<0 70I8I5=0Your system is protected
DashboardPage(0?CAB8BL >1=>2;5=85
Update NowDatabaseOutOfDateNotification0I8B=K5 0;3>@8B<K ?@>3@0<<K Malwarebytes =5 O2;ONBAO 0:BC0;L=K<8. K?>;=8B5 >1=>2;5=85   8 K 70I8B8B5 A51O >B A0<KE A>2@5<5==KE C3@>7.\Your Malwarebytes protection is not up to date. Update to stay safe from the latest threats.DatabaseOutOfDateNotification00H8 >1=>2;5=8O CAB0@5;8Your updates are not currentDatabaseOutOfDateNotification'B>1K 7025@H8BL ?5@5<5I5=85 2@54>=>A=KE >1J5:B>2 2 :0@0=B8=, =5>1E>48<> ?5@5703@C78BL :><?LNB5@.LIn order to complete the quarantine process, you must restart your computer.DeleteOnRebootNotificationtMalwarebytes Anti-Ransomware C40;8;0 ?@>3@0<<C-2K<>30B5;O.=Malwarebytes Anti-Ransomware has removed a ransomware threat.DeleteOnRebootNotification5BNoDeleteOnRebootNotification(5@5703@C78BL A59G0A
Reboot NowDeleteOnRebootNotification,"@51C5BAO ?5@5703@C7:0Reboot RequiredDeleteOnRebootNotification,"@51C5BAO ?5@5703@C7:0Reboot requiredDeleteOnRebootNotification<K?>;=8BL ?5@5703@C7:C A59G0A?Would you like to restart now?DeleteOnRebootNotification0YesDeleteOnRebootNotification'B>1K CA?5H=> 7025@H8BL MB>B ?@>F5AA, =5>1E>48<> ?5@5703@C78BL :><?LNB5@.EYour computer must be restarted to successfully complete the process.DeleteOnRebootNotification&AB>@8O >1=0@C65=89Detection HistoryDetectionHistoryCardj1J5:BK, ?><5I5==K5 2 :0@0=B8= ?@8 ?>A;54=59 ?@>25@:5Items quarantined last scanDetectionHistoryCard4A53> >1J5:B>2 2 :0@0=B8=5Total items in quarantineDetectionHistoryCard"!?8A>: @07@5H5=89
Allow ListDetectionHistoryPage&AB>@8O >1=0@C65=89Detection HistoryDetectionHistoryPageAB>@8OHistoryDetectionHistoryPage<1J5:BK, ?><5I5==K5 2 :0@0=B8=Quarantined itemsDetectionHistoryPage59AB285:Action:DetectionNotification0:@KBLCloseDetectionNotification`Malwarebytes 701;>:8@>20;0 ?@>3@0<<C-2K<>30B5;O.-Malwarebytes has blocked ransomware activity.DetectionNotification$><5I5= 2 :0@0=B8=Moved to QuarantineDetectionNotification@>F5AA:Process:DetectionNotification>1=0@C65=0 ?@>3@0<<0-2K<>30B5;LRansomware DetectedDetectionNotificationT@>F5AA ?@>3@0<<K-2K<>30B5;O =59B@0;87>20=Ransomware process stoppedDetectionNotificationOKOK
DialogService
0704BackEXP259EmailCollectionR@54>AB02;OO A2>9 e-mail, K A>3;0H05B5AL ?>;CG0BL @5:;0<=K5 A>>1I5=8O 8 A2545=8O > =>2KE ?@>4C:B0E. -B> B0:65 87<5=8B 0H8 =0AB@>9:8 ?>;CG5=8O 8=D>@<0F8>==KE A>>1I5=89.By providing your email, you agree to receive product and marketing emails. This will also change your existing communication preferences.EXP259EmailCollection@>4>;68BLContinueEXP259EmailCollection@@>4>;68BL 157 M;5:B@>==>9 ?>GBKContinue without emailEXP259EmailCollection.4@5A M;5:B@>==>9 ?>GBK
Email addressEXP259EmailCollectionK 1C45< ?@8AK;0BL 0< C254><;5=8O > A>AB>O=88 :815@70I8BK, 0 B0:65 @5:><5=40F88 8 A:84:8.LGet cybersecurity alerts, tips, and discounts delivered right to your inbox.EXP259EmailCollectiont>60;C9AB0, 22548B5 459AB28B5;L=K9 04@5A M;5:B@>==>9 ?>GBKPlease enter a valid emailEXP259EmailCollection&:B828@>20BL A59G0AActivate nowEXP259OnboardingIntroFlow2Z#65 5ABL ?>4?8A:0 =0 
Malwarebytes Premium 
?3Already have a 
Malwarebytes Premium 
subscription?EXP259OnboardingIntroFlow2C?8BLBuy nowEXP259OnboardingIntroFlow20G=5<!Let’s get startedEXP259OnboardingIntroFlow20?CA:09B5 15A?;0B=K5 ?@>25@:8, GB>1K =0E>48BL 
 8 C40;OBL 2@54>=>A=K5 >1J5:BK, 
 ?@>=8:H85 2 A8AB5<C.<Run free scans to detect 
 and remove existing 
 infections.EXP259OnboardingIntroFlow2L0G0BL 8A?>;L7>20=85 15A?;0B=>9 25@A88Start for freeEXP259OnboardingIntroFlow2%>B8B5 ?>;CG8BL 4>ABC? : 70I8B5 
 Malwarebytes Premium, 
 @01>B0NI59 2 @568<5 24/7??Want access to 
 Malwarebytes Premium 
 24/7 threat protection?EXP259OnboardingIntroFlow2>>1@> ?>60;>20BL 2 MalwarebytesWelcome to MalwarebytesEXP259OnboardingIntroFlow2
0704BackEXP259StartForFreeR@54>AB02;OO A2>9 e-mail, K A>3;0H05B5AL ?>;CG0BL @5:;0<=K5 A>>1I5=8O 8 A2545=8O > =>2KE ?@>4C:B0E. -B> B0:65 87<5=8B 0H8 =0AB@>9:8 ?>;CG5=8O 8=D>@<0F8>==KE A>>1I5=89.By providing your email, you agree to receive product and marketing emails. This will also change your existing communication preferences.EXP259StartForFree@>4>;68BLContinueEXP259StartForFree@@>4>;68BL 157 M;5:B@>==>9 ?>GBKContinue without emailEXP259StartForFree.4@5A M;5:B@>==>9 ?>GBK
Email addressEXP259StartForFreeK 1C45< ?@8AK;0BL 0< C254><;5=8O > A>AB>O=88 :815@70I8BK, 0 B0:65 @5:><5=40F88 8 A:84:8KGet cybersecurity alerts, tips, and discounts delivered right to your inboxEXP259StartForFree<15A?;0B=0O 25@A8O MalwarebytesMalwarebytes freeEXP259StartForFreet>60;C9AB0, 22548B5 459AB28B5;L=K9 04@5A M;5:B@>==>9 ?>GBKPlease enter a valid emailEXP259StartForFreeK ?@54CA<>B@5;8 14-4=52=K9 ?@>1=K9 ?5@8>4 Malwarebytes Premium, =0 ?@>BO65=88 :>B>@>3> K A<>65B5 >BA;56820BL 2A5 C3@>7K 2 @568<5 24/7. >A;5 7025@H5=8O ?@>1=>3> ?5@8>40 K <>65B5 ?@>4>;60BL 8A?>;L7>20BL 15A?;0B=CN 25@A8N ?@>3@0<<K 8;8 ?@8>1@5AB8 premium-25@A8N.We included a 14-day trial of Malwarebytes Premium with 24/7 threat monitoring. After your trial, you can continue using the free version or buy Premium.EXP259StartForFree( | 5A?;0B=0O 25@A8O | FreeEXP259StartFreeFlow2" | Premium-25@A8O
 | PremiumEXP259StartFreeFlow2h<html><style type="text/css"></style>><8<> 15A?;0B=KE ?@>25@>:, B5?5@L K 8<55B5 4>ABC? : <span style="color: %1"><br>DC=:F8O< Malwarebytes Premium 2 B5G5=85 14 4=59</span></html><html><style type="text/css"></style>In addition to free scans, you now have access to <span style="color: %1"><br>Malwarebytes Premium features for 14 days</span></html>EXP259StartFreeFlow2B5A?;0B=0O 25@A8O 4>ABC?=0 2A5340Always freeEXP259StartFreeFlow2
0704BackEXP259StartFreeFlow2>=OB=>Got itEXP259StartFreeFlow22:B82=0 2 B5G5=85 14 4=59Included for 14 daysEXP259StartFreeFlow2 CG=K5 ?@>25@:8 ?>72>;ONB C40;OBL 2@54>=>A=K5 >1J5:BK, ?@>=8:H85 2 A8AB5<C,Manual scans to clean up existing infectionsEXP259StartFreeFlow2\15A?5GLB5 70I8BC >B =>2KE C3@>7 2 @568<5 24/72Prevent new infections with 24/7 threat protectionEXP259StartFreeFlow2 0A?8A0=85 ?@>25@>: ?>72>;O5B 02B><0B8G5A:8 70?CA:0BL 8E 2 C4>1=>5 2@5<O*Scheduled scans to run at your convenienceEXP259StartFreeFlow2\Trusted Advisor >?B8<878@C5B 70I8BC CAB@>9AB207Trusted Advisor dashboard to optimize device protectionEXP259StartFreeFlow251-70I8B0 1;>:8@C5B 0B0:8 >=;09=-<>H5==8:>2 8 D8H8=3>2KE A09B>27Web protection to block online scams and phishing sitesEXP259StartFreeFlow2K <>65B5 8A?>;L7>20BL 15A?;0B=CN 25@A8N Malwarebytes ?>A;5 >:>=G0=8O ?@>1=>3> ?5@8>40.eYou’ll have the option to continue using the free version of Malwarebytes at the end of your trial.EXP259StartFreeFlow2V>1028BL D09; 8;8 ?0?:C 2 A?8A>: @07@5H5=89'Add a file or folder to your Allow ListEditExclusionDialogp>1028BL >1=0@C65==K9 @0=55 M:A?;>9B 2 A?8A>: @07@5H5=894Add a previously detected exploit to your Allow ListEditExclusionDialogJ>1028BL 251-A09B 2 A?8A>: @07@5H5=89 Add a website to your Allow ListEditExclusionDialogF>1028BL >1J5:B 2 A?8A>: @07@5H5=89Add an item to your Allow ListEditExclusionDialogZ 07@5H8BL ?@8;>65=8N ?>4:;NG0BLAO : =B5@=5BC/Allow an application to connect to the InternetEditExclusionDialog
0704BackEditExclusionDialogB<5=0CancelEditExclusionDialog>B>2>DoneEditExclusionDialogA;8 ?@>3@0<<0 Malwarebytes 701;>:8@>20;0 157>?0A=K9 >1J5:B, 4>102LB5 53> 2 A?8A>: @07@5H5=89, GB>1K 8A:;NG8BL 53> 87 ?>A;54CNI8E ?@>25@>:.nIf Malwarebytes detects something you know is safe, add it to your Allow List to skip it in future detections.EditExclusionDialogA;8 ?@>3@0<<0 Malwarebytes 701;>:8@>20;0 4>25@5==><C ?@8;>65=8N 4>ABC? 2 =B5@=5B, 4>102LB5 53> AN40, GB>1K 2>AAB0=>28BL 4>ABC?.tIf Malwarebytes stopped an application you trust from connecting to the Internet, add it here to restore its access.EditExclusionDialogA;8 4>1028BL ?0?:C 2 A?8A>: @07@5H5=89, B> 2A5 A>45@60I85AO 2 =59 ?>4?0?:8 8 D09;K B0:65 1C4CB 4>102;5=K.aIf you add a folder to your Allow List, all the files and subfolders inside it will be added too.EditExclusionDialog!>E@0=8BLSaveEditExclusionDialog'B>1K 2>AAB0=>28BL 4>ABC? : 251-A09BC 8 8A:;NG8BL 53> 87 ?>A;54CNI8E ?@>25@>:, 22548B5 53> URL-04@5A 8;8 IP-04@5A.ZTo restore access to a site and skip it in future detections, enter its URL or IP address.EditExclusionDialog'B>1K 2>AAB0=>28BL 4>ABC? : ?@8;>65=8N A 8725AB=K< M:A?;>9B><, >B<5BLB5 ?>;5 2>7;5 =53> 8 =06<8B5 >B>2>gTo restore access to an application with a known exploit, check the box next to it and click “Done”EditExclusionDialogB<5=0CancelEnableProtectionDialog'B>1K ?>;CG8BL 4>ABC? : MB8< =0AB@>9:0<, 2:;NG8B5 70I8BC >B M:A?;>9B>2.5To access these settings, turn on Exploit Protection.EnableProtectionDialog'B>1K ?>;CG8BL 4>ABC? : MB8< =0AB@>9:0<, 2:;NG8B5 70I8BC >B 2@54>=>A=>3> .5To access these settings, turn on Malware Protection.EnableProtectionDialog:;NG8BLTurn onEnableProtectionDialog<:;NG8BL 70I8BC >B M:A?;>9B>2?Turn on Exploit Protection?EnableProtectionDialogF:;NG8BL 70I8BC >B 2@54>=>A=>3> ?Turn on Malware Protection?EnableProtectionDialog$@8;>65=8O (*.exe)Applications (*.exe)ExclusionApplicationPage
17>@BrowseExclusionApplicationPage$K1@0BL ?@8;>65=85Select an applicationExclusionApplicationPage@8;>65=85ApplicationExclusionExploitPage%MHHashExclusionExploitPage(-:A?;>9BK =5 =0945=KNo exploits detectedExclusionExploitPage4A:;NG8BL 87 2A5E ?@>25@>:Exclude from all detectionsExclusionFileFolderPageTA:;NG8BL 87 2A5E ?@>25@>:: Premium-25@A8O$Exclude from all detections: PremiumExclusionFileFolderPageA:;NG8BL B>;L:> 87 ?>8A:0 2@54>=>A=>3>  8 ?>B5=F80;L=> =565;0B5;L=KE >1J5:B>2CExclude from detection as malware or potentially unwanted item onlyExclusionFileFolderPage^A:;NG8BL B>;L:> 87 ?>8A:0 ?@>3@0<<-2K<>30B5;59)Exclude from detection as ransomware onlyExclusionFileFolderPage~A:;NG8BL B>;L:> 87 ?>8A:0 ?@>3@0<<-2K<>30B5;59: Premium-25@A8O2Exclude from detection as ransomware only: PremiumExclusionFileFolderPage$@028;0 8A:;NG5=89Exclusion rulesExclusionFileFolderPageK1@0BL D09;
Select a fileExclusionFileFolderPage,K1@0BL D09; 8;8 ?0?:CSelect a file or folderExclusionFileFolderPageK1@0BL ?0?:CSelect a folderExclusionFileFolderPage@>102;5=> 251-8A:;NG5=85 4;O %1.Added a web exclusion for %1.ExclusionSuccessfulNotification0:@KBLCloseExclusionSuccessfulNotification,@>A<>B@5BL 8A:;NG5=8OView ExclusionsExclusionSuccessfulNotification051-8A:;NG5=85 4>102;5=>Web Exclusion AddedExclusionSuccessfulNotification0 07@5H8BL D09; 8;8 ?0?:CAllow a file or folderExclusionTypePageJ 07@5H8BL @0=55 >1=0@C65==K9 M:A?;>9B#Allow a previously detected exploitExclusionTypePage$ 07@5H8BL 251-A09BAllow a websiteExclusionTypePageZ 07@5H8BL ?@8;>65=8N ?>4:;NG0BLAO : =B5@=5BC/Allow an application to connect to the InternetExclusionTypePage$>1028BL URL-04@5A	Add a URLExclusionWebsitePage">1028BL IP-04@5AAdd an IP addressExclusionWebsitePaged2548B5 URL-04@5A. @8<5@: www.excludedwebsite.com-Enter a URL. Example: www.excludedwebsite.comExclusionWebsitePageL2548B5 IP-04@5A. @8<5@: 123.45.67.90*Enter an IP address. Example: 123.45.67.90ExclusionWebsitePage525@=K9 D>@<0BInvalid FormatExclusionWebsitePage2545=K =54>?CAB8<K5 40==K5. >60;C9AB0, 22548B5 459AB28B5;L=K9 IPV4-04@5A.HThe information entered is not valid. Please enter a valid IPV4 address.ExclusionWebsitePagez2545= =525@=K5 40==K5. >60;C9AB0, 22548B5 :>@@5:B=K9 04@5A.?The information entered is not valid. Please enter a valid URL.ExclusionWebsitePage>1028BL D09;Add FileExclusionsPage4>1028BL D09; 2 8A:;NG5=8OAdd File ExclusionExclusionsPage>1028BL ?0?:C
Add FolderExclusionsPage6>1028BL ?0?:C 2 8A:;NG5=8OAdd Folder ExclusionExclusionsPage>102LB5 D09;K, :>B>@K5 K E>B8B5 8A:;NG8BL 87 ?>8A:0 2@54>=>A=KE ?@>3@0<<.>Add files which will be excluded from detection as ransomware.ExclusionsPage0B53>@8OCategoryExclusionsPage4G8AB8BL A?8A>: 8A:;NG5=89Clear ExclusionsExclusionsPageA:;NG5=8O
ExclusionsExclusionsPageCBLPathExclusionsPage#40;8BLRemoveExclusionsPage>4,80 | 16 000+ >B7K2>2 :;85=B>24.80 | 16K+ customer reviewsExp299TrialExpiringDialog<html><style type="text/css"></style><span style="color:%1">3,75 $ 2 <5AOF ?@8 5653>4=>9 >?;0B5</span></html>i<html><style type="text/css"></style><span style="color:%1">$3.75 per month billed annually</span></html>Exp299TrialExpiringDialog<html><style type="text/css"></style><span style="color:%1">Malwarebytes Free</span></html>[<html><style type="text/css"></style><span style="color:%1">Malwarebytes Free</span></html>Exp299TrialExpiringDialog<html><style type="text/css"></style><span style="color:%1">Malwarebytes Premium</span></html>^<html><style type="text/css"></style><span style="color:%1">Malwarebytes Premium</span></html>Exp299TrialExpiringDialog<html><style type="text/css"></style>@>1=K9 ?5@8>4 <span style="color:%1">%2</span>.</html>X<html><style type="text/css"></style>Your trial <span style="color:%1">%2</span>.</html>Exp299TrialExpiringDialog^;>:8@C5B <>H5==8G5A:85 8 2@54>=>A=K5 251-A09BK"Blocks fake and malicious websitesExp299TrialExpiringDialogC?8BLBuy nowExp299TrialExpiringDialog|C?8B5 A59G0A, GB>1K A>E@0=8BL 70I8B=K5 DC=:F88 premium-25@A88"Buy now to keep Premium protectionExp299TrialExpiringDialogPG8I05B 70@065==>5 CAB@>9AB2> >B 28@CA>2$Cleans up an already-infected deviceExp299TrialExpiringDialog>@>4>;68BL A 15A?;0B=>9 25@A859Continue with freeExp299TrialExpiringDialog:@>3@0<<0 Malwarebytes Premium 70 AG8B0==K5 A5:C=4K C40;O5B 2@54>=>A=>5  A 0H53> CAB@>9AB20, 0 B0:65 1;>:8@C5B 2=5H=85 C3@>7K 2 @568<5 @50;L=>3> 2@5<5=8. lMalwarebytes Premium removes malware from your device in seconds, and blocks incoming threats in real time. Exp299TrialExpiringDialogDB:;NG05B C254><;5=8O =0 2@5<O 83@!Pauses notifications while gamingExp299TrialExpiringDialogH0I8I05B 0A >B ?@>3@0<<-2K<>30B5;59!Protects files against ransomwareExp299TrialExpiringDialogb0I8I05B >B E0:5@>2 0H8 845=B8D8:0F8>==K5 40==K5#Protects your identity from hackersExp299TrialExpiringDialogz59B@0;87C5B 2@54>=>A=>5 , :>B>@>5 70<54;O5B @01>BC A8AB5<K!Stops malware that slows you downExp299TrialExpiringDialog>4,80 | 16 000+ >B7K2>2 :;85=B>24.80 | 16K+ customer reviewsExp299TrialExpiringDialog2<html><style type="text/css"></style><span style="color:%1">3,75 $ 2 <5AOF ?@8 5653>4=>9 >?;0B5</span></html>i<html><style type="text/css"></style><span style="color:%1">$3.75 per month billed annually</span></html>Exp299TrialExpiringDialog2<html><style type="text/css"></style>@>1=K9 ?5@8>4 <span style="color:%1">%2</span>.</html>X<html><style type="text/css"></style>Your trial <span style="color:%1">%2</span>.</html>Exp299TrialExpiringDialog2\2B><0B8G5A:85 ?@>25@:8 4;O >G8AB:8 :><?LNB5@0)Automatic scans to clean up your computerExp299TrialExpiringDialog2^;>:8@C5B 2@54>=>A=K5 8 <>H5==8G5A:85 251-A09BK"Blocks malicious and fake websitesExp299TrialExpiringDialog2C?8BLBuy nowExp299TrialExpiringDialog2|C?8B5 A59G0A, GB>1K A>E@0=8BL 70I8B=K5 DC=:F88 premium-25@A88"Buy now to keep Premium protectionExp299TrialExpiringDialog2>@>4>;68BL A 15A?;0B=>9 25@A859Continue with freeExp299TrialExpiringDialog2B@0605B 0B0:8 2@54>=>A=>3> , =0F5;5==K5 =0 DC=:F8>=0;L=>ABL ?@>3@0<<2Crushes malware attacks that corrupt your programsExp299TrialExpiringDialog2"5A?;0B=0O 25@A8OFreeExp299TrialExpiringDialog2:@>3@0<<0 Malwarebytes Premium 70 AG8B0==K5 A5:C=4K C40;O5B 2@54>=>A=>5  A 0H53> CAB@>9AB20, 0 B0:65 1;>:8@C5B 2=5H=85 C3@>7K 2 @568<5 @50;L=>3> 2@5<5=8. lMalwarebytes Premium removes malware from your device in seconds, and blocks incoming threats in real time. Exp299TrialExpiringDialog2 CG=K5 ?@>25@:8 ?>72>;ONB C40;OBL 2@54>=>A=K5 >1J5:BK, ?@>=8:H85 2 A8AB5<C,Manual scans to clean up existing infectionsExp299TrialExpiringDialog2Premium-25@A8OPremiumExp299TrialExpiringDialog20I8I05B >B ?@>3@0<<-2K<>30B5;59 0H8 4>:C<5=BK 8 D09;K A D8=0=A>2>9 8=D>@<0F8598Protects your documents, financial files from ransomwareExp299TrialExpiringDialog20I8I05B >B E0:5@>2 0H8 845=B8D8:0F8>==K5 40==K5 8 0HC :>=D845=F80;L=>ABL/Protects your identity and privacy from hackersExp299TrialExpiringDialog259B@0;87C5B 2@54>=>A=>5 , :>B>@>5 70<54;O5B @01>BC :><?LNB5@00Stops malware that degrades computer performanceExp299TrialExpiringDialog2*4,70 | 11 555 >B7K2>24.70 | 11,555 reviewsExp315LearnMore<html><style type="text/css"></style><span style="color:blue">3,33 $ 2 <5AOF, 5653>4=0O >?;0B0</span></html>k<html><style type="text/css"></style><span style="color:blue">$3.33 per month billed annually</span></html>Exp315LearnMore<html><style type="text/css"></style><span style="color:blue">Malwarebytes Free</span></html>]<html><style type="text/css"></style><span style="color:blue">Malwarebytes Free</span></html>Exp315LearnMore<html><style type="text/css"></style><span style="color:blue">Malwarebytes Premium</span></html>`<html><style type="text/css"></style><span style="color:blue">Malwarebytes Premium</span></html>Exp315LearnMore<html><style type="text/css"></style><span style="color:blue">>4@>1=55 > <br> Malwarebytes Premium</span></html>p<html><style type="text/css"></style><span style="color:blue">More about <br> Malwarebytes Premium</span></html>Exp315LearnMore^;>:8@C5B <>H5==8G5A:85 8 2@54>=>A=K5 251-A09BK"Blocks fake and malicious websitesExp315LearnMoreC?8BLBuy nowExp315LearnMorePG8I05B 70@065==>5 CAB@>9AB2> >B 28@CA>2$Cleans up an already-infected deviceExp315LearnMore:@>3@0<<0 Malwarebytes Premium 70 AG8B0==K5 A5:C=4K C40;O5B 2@54>=>A=>5  A 0H53> CAB@>9AB20, 0 B0:65 1;>:8@C5B 2=5H=85 C3@>7K 2 @568<5 @50;L=>3> 2@5<5=8. lMalwarebytes Premium removes malware from your device in seconds, and blocks incoming threats in real time. Exp315LearnMoreDB:;NG05B C254><;5=8O =0 2@5<O 83@!Pauses notifications while gamingExp315LearnMoreH0I8I05B 0A >B ?@>3@0<<-2K<>30B5;59!Protects files against ransomwareExp315LearnMoreb0I8I05B >B E0:5@>2 0H8 845=B8D8:0F8>==K5 40==K5#Protects your identity from hackersExp315LearnMorez59B@0;87C5B 2@54>=>A=>5 , :>B>@>5 70<54;O5B @01>BC A8AB5<K!Stops malware that slows you downExp315LearnMore %1 2 ?@>F5AA5...%1 in progress...Exp8336ScanPageProgressB<5=0CancelExp8336ScanPageProgress1=0@C65=8O
DetectionsExp8336ScanPageProgress$@>25@5=> >1J5:B>2
Items scannedExp8336ScanPageProgress
0C70PauseExp8336ScanPageProgress@>4>;68BLResumeExp8336ScanPageProgress@5<O ?@>25@:8	Scan timeExp8336ScanPageProgress*!<>B@5BL ?;0=K 70I8BKSee protection plansExp8336ScanPageProgress (03 %1 87 %2: %3Step %1 of %2: %3Exp8336ScanPageProgressC?8BLBuy nowExp8555DashboardNotification!@>: 459AB28O 20H59 >7=0:><8B5;L=>9 premium-25@A88 8AB5:05B G5@57 %1 4=O(59). C?8B5 premium-25@A8N 8 GC2AB2C9B5 A51O A?>:>9=> 8 C25@5==>.PYour Premium Trial expires in %1 days. Keep Premium and keep your peace of mind.Exp8555DashboardNotification0:@KBLCloseExpiredNotification4!@>: 459AB28O 25@A88 8AB5:Expired VersionExpiredNotification:!@>: 459AB28O MB>9 25@A88 ?@>3@0<<K Malwarebytes Anti-Ransomware 8AB5:, ?>MB><C 70I8B0 >B ?@>3@0<<-2K<>30B5;59 =5 459AB2C5B.<br><p>>60;C9AB0, ?>A5B8B5 251-A09B <a href='http://www.malwarebytes.com'>www.malwarebytes.com</a>, GB>1K ?>;CG8BL A2545=8O >1 >1=>2;5==>< ?@>3@0<<=>< ?@>4C:B5.This version of Malwarebytes Anti-Ransomware is expired and not protecting you from ransomware.<br><p>Please visit <a href='http://www.malwarebytes.com'>www.malwarebytes.com</a> to check for updated product information.ExpiredNotification&#7=09B5, :0: 70I8B0 2 @50;L=>< 2@5<5=8 >3@06405B 0H8 CAB@>9AB20 >B C3@>7 8 1;>:8@C5B 2@54>=>A=>5  4> B>3>, :0: >=> <>65B AB0BL ?@8G8=>9 ?@>1;5<.wLearn how Real-Time Protection keeps an eye on your devices, blocking malware before it has a chance to cause problems.ExtendedTrialMessage10#7=0BL 1>;LH5
Learn moreExtendedTrialMessage10H'B> B0:>5 70I8B0 2 @50;L=>< 2@5<5=8?What is Real-Time ProtectionExtendedTrialMessage10#1548B5AL A0<8Check it outExtendedTrialMessage11R0G8=09B5 A2>9 45=L 2 ?>;=>9 157>?0A=>AB8Start your day securelyExtendedTrialMessage11f> 2@5<O @01>BK A 8=B5@=5B-10=:8=3>< 8 ?@8 ?@>A<>B@5 A>F80;L=KE A5B59   Malwarebytes Privacy 2A5340 AB>8B =0 AB@065 0H8E 40==KE 8 =5 405B ?>AB>@>==8< >BA;56820BL 0HC 0:B82=>ABL.{Whether you're banking online or browsing social media, Malwarebytes Privacy prevents others from monitoring your activity.ExtendedTrialMessage11N@>25@O9B5 =C6=K5 >1J5:BK 2 ;N1>5 2@5<O!Scan what you want, when you wantExtendedTrialMessage124040BL @0A?8A0=85 ?@>25@>:Schedule a scanExtendedTrialMessage12\K <>65B5 ?;0=8@>20BL ?@>25@:8 =0 ;N1>5 2@5<O 8 2K18@0BL >1J5:BK 4;O 0=0;870. @>3@0<<0 <>65B C40;OBL C3@>7K 02B><0B8G5A:8 8;8 A>>1I0BL 0< > 2KO2;5==KE 2@54>=>A=KE >1J5:B0E.}You can schedule scans to run anytime and choose what you want to inspect. We can remove threats automatically or notify you.ExtendedTrialMessage12&20 <8;;8>=>2 2 45=L20 million per dayExtendedTrialMessage6C?8BLBuy nowExtendedTrialMessage6*<5==> AB>;L:> C3@>7 Malwarebytes >1=0@C68205B 8;8 1;>:8@C5B 5654=52=>. 1=>28B5 ?@>3@0<<C 4> premium-25@A88, GB>1K A>E@0=8BL 70I8BC A2>8E CAB@>9AB2.~That's the number of threats detected or blocked every day by Malwarebytes. Upgrade to Premium to keep your devices protected.ExtendedTrialMessage6#1548B5AL A0<8Check it outExtendedTrialMessage8d7=0:><LB5AL A> AB0B8AB8:>9 2 >1;0AB8 157>?0A=>AB8Check out our security statsExtendedTrialMessage8&#7=09B5, :0: Malwarebytes 70I8I05B CAB@>9AB20 ?>;L7>20B5;59 2> 2A5E C3>;:0E <8@0. @8 >1=0@C65=88 C3@>7 2 A8AB5<5 ?@>3@0<<0 B0:65 35=5@8@C5B >BG5B.See how Malwarebytes is protecting devices around the globe. We'll also provide a report if any threats were found on your device.ExtendedTrialMessage84040209B5 ?0@0<5B@K 70I8BKCustomize your experienceExtendedTrialMessage9"B:@KBL ?0@0<5B@KExplore settingsExtendedTrialMessage9K <>65B5 >?@545;OBL =0AB@>9:8, =0 >A=>25 :>B>@KE Malwarebytes 1C45B 70I8I0BL 0H5 CAB@>9AB2>. #7=09B5, :0: @53C;8@>20BL G0AB>BC ?@>25@>:, 2K18@0BL 20@80=BK >1=0@C65=8O 8 >G8AB:8 C3@>7, 0 B0:65 <=>3>5 4@C3>5.You can configure how Malwarebytes protects your device. See how you can adjust your scan frequency, threat detection and cleanup options, and more.ExtendedTrialMessage90:@KBLCloseFailStateDialogA;8 20< =C6=0 4>?>;=8B5;L=0O ?><>IL, ?>60;C9AB0, ?>A5B8B5 <a href="https://links.malwarebytes.com/mb4pcgethelp">251-A09B =0H59 A;C61K ?>445@6:8</a> 8;8 <a href="https://ark.mwbsys.com/mbst/latest">703@C78B5 Malwarebytes Support Tool</a>.If you need more help, visit our <a href="https://links.malwarebytes.com/mb4pcgethelp">support site</a>.or <a href="https://ark.mwbsys.com/mbst/latest">download the Malwarebytes Support Tool</a>.FailStateDialog,9! >7=8:;0 ?@>1;5<0.Oops! Something went wrong.FailStateDialogp>60;C9AB0, ?5@5703@C78B5 :><?LNB5@ 8 ?>2B>@8B5 ?>?KB:C.+Please restart your computer and try again.FailStateDialog.5@5703@C78BL :><?LNB5@Restart ComputerFailStateDialog:%1 (A5B52K5 48A:8 =54>ABC?=K) %1  (Network drives unavailable)FileSystemModel
0704BackForgotPasswordNoEmailPage@>4>;68BLContinueForgotPasswordNoEmailPageE-mailEmailForgotPasswordNoEmailPage2548B5 04@5A M;5:B@>==>9 ?>GBK, A2O70==K9 A 0H59 CG5B=>9 70?8ALN Malwarebytes.:Enter the email associated with your Malwarebytes account.ForgotPasswordNoEmailPage01K;8 ?0@>;LForgot passwordForgotPasswordNoEmailPaget>60;C9AB0, 22548B5 459AB28B5;L=K9 04@5A M;5:B@>==>9 ?>GBKPlease enter a valid emailForgotPasswordNoEmailPage!>45@68<>5 ?>;59 <b>>2K9 ?0@>;L</b> 8 <b>>4B25@645=85 ?0@>;O</b> 4>;6=> A>2?040BL:<b>New password</b> and <b>Confirm password</b> must matchForgotPasswordPage
0704BackForgotPasswordPage(>4B25@645=85 ?0@>;OConfirm passwordForgotPasswordPage01K;8 ?0@>;LForgot passwordForgotPasswordPageA;8 A 0H8< 04@5A>< M;5:B@>==>9 ?>GBK A2O70=0 CG5B=0O 70?8AL Malwarebytes, <K >B?@028< 0< :>4 ?>4B25@645=8O. 2548B5 :>4 2 ?>;5 =865.If there's a Malwarebytes account associated with your email address, we'll send you a verification code. Enter the code below.ForgotPasswordPage(>;65= A>45@60BL :0: <8=8<C< 8 A8<2>;>2, 1 A8<2>; 2 25@E=5< @538AB@5, 1 A8<2>; 2 =86=5< @538AB@5, 1 F8D@C 8 1 A?5F80;L=K9 A8<2>; (=0?@8<5@: !@#$%^).mMust contain at least 8 characters, 1 uppercase, 1 lowercase, 1 number, and 1 special character (e.g. !@#$%^)ForgotPasswordPage>2K9 ?0@>;LNew passwordForgotPasswordPage!>E@0=8BLSaveForgotPasswordPage">4 ?>4B25@645=8OVerification codeForgotPasswordPageC?8BLBuy nowFreeMonthlyScanNotificationR5A?;0B=0O 565<5AOG=0O ?@>25@:0 7025@H5=0Free monthly scan completeFreeScanCompleteNotificationH1=0@C65=0 >4=0 8;8 =5A:>;L:> C3@>7."One or more threats were detected.FreeScanCompleteNotification$@>A<>B@5BL C3@>7KSee ThreatsFreeScanCompleteNotificationF>1028BL ?@8;>65=85 83@>2>3> @568<0Add Play Mode ApplicationGameModeAppsModelA5 D09;K (*)
All files (*)GameModeAppsModel$@8;>65=8O (*.exe)Applications (*.exe)GameModeAppsModelK 459AB28B5;L=> E>B8B5 C40;8BL 2A5 MB8 ?@8;>65=8O 83@>2>3> @568<0?@Are you sure you want to clear all these Game Mode applications?GameModeAppsModel5BNoGameModeAppsModel4@8;>65=85 83@>2>3> @568<0Play Mode ApplicationGameModeAppsModel:-B> ?@8;>65=85 C65 4>102;5=>.%This application is already included.GameModeAppsModel58725AB=>UnknownGameModeAppsModel=8<0=85!WarningGameModeAppsModel0YesGameModeAppsModel&3=>@8@>20BL 2A5340
Always IgnoreGeneralBlockNotification*3=>@8@>20BL >48= @07Ignore OnceGeneralBlockNotification8@54>=>A=>5  701;>:8@>20=>Malware blockedGeneralBlockNotification<O:Name:GeneralBlockNotification
CBL:Path:GeneralBlockNotificationp>B5=F80;L=> =565;0B5;L=>5 87<5=5=85 (PUM) 701;>:8@>20=>-Potential Unwanted Modification (PUM) blockedGeneralBlockNotificationp>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0 (PUP) 701;>:8@>20=0(Potential Unwanted Program (PUP) blockedGeneralBlockNotification0@0=B8=
QuarantineGeneralBlockNotification"8?:Type:GeneralBlockNotificationLK <>65B5 ?><5AB8BL ?>B5=F80;L=> =565;0B5;L=>5 87<5=5=85 2 :0@0=B8= (@5:><5=4C5BAO) 8;8 ?@>83=>@8@>20BL 53>. A;8 K 2K15@5B5 ?C=:B 3=>@8@>20BL 2A5340, B> ?>B5=F80;L=> =565;0B5;L=>5 87<5=5=85 (PUM) 1C45B 4>102;5=> 2 <a style='color:%1;text-decoration:none;' href='exclusions'>8A:;NG5=8O</a>.You can quarantine the PUM (recommended) or ignore it. If you select Always ignore, the PUM will be added to <a style='color:%1;text-decoration:none;' href='exclusions'>Exclusions</a>.GeneralBlockNotificationJK <>65B5 ?><5AB8BL ?>B5=F80;L=> =565;0B5;L=CN ?@>3@0<<C 2 :0@0=B8= (@5:><5=4C5BAO) 8;8 ?@>83=>@8@>20BL 55. A;8 K 2K15@5B5 ?C=:B 3=>@8@>20BL 2A5340, B> ?>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0 (PUP) 1C45B 4>102;5=0 2 <a style='color:%1;text-decoration:none;' href='exclusions'>8A:;NG5=8O</a>.You can quarantine the PUP (recommended) or ignore it. If you select Always ignore, the PUP will be added to <a style='color:%1;text-decoration:none;' href='exclusions'>Exclusions</a>.GeneralBlockNotification@K <>65B5 ?><5AB8BL 2@54>=>A=>5  2 :0@0=B8= (@5:><5=4C5BAO) 8;8 ?@>83=>@8@>20BL 53>. A;8 K 2K15@5B5 ?C=:B 3=>@8@>20BL 2A5340, B> 2@54>=>A=>5  1C45B 4>102;5=> 2 <a style='color:%1;text-decoration:none;' href='exclusions'>8A:;NG5=8O</a> 8 1>;LH5 =5 1C45B 2>A?@8=8<0BLAO :0: C3@>70.You can quarantine the malware (recommended) or ignore it. If you select Always ignore, the malware will be added to <a style='color:%1;text-decoration:none;' href='exclusions'>Exclusions</a> and will no longer be identified as a threat.GeneralBlockNotification@8 >ACI5AB2;5=88 ?;0B560 70 ?@>4;5=85 ?>4?8A:8 =0 ?@>3@0<<C Malwarebytes 2>7=8:;0 >H81:0. >60;C9AB0, >1=>28B5 A2>8 ?;0B56=K5 40==K5, GB>1K =5 ?>B5@OBL 70I8BC >B 2@54>=>A=>3> , ?@>3@0<<-2K<>30B5;59, >?0A=KE 251-A09B>2 8 4@C38E C3@>7.There was an error completing your Malwarebytes renewal payment. Please update your payment information to avoid losing your protection against malware, ransomware, bad websites, and other threats.GracePeriodNotification21=>28BL ?;0B56=K5 40==K5Update Payment InformationGracePeriodNotificationJ0< =5 C405BAO ?@>4;8BL 0HC ?>4?8A:C'We're unable to renew your subscriptionGracePeriodNotification@>4;8BL A59G0A	Renew NowGracePeriodOverNotificationJ0< =5 C405BAO ?@>4;8BL 0HC ?>4?8A:C'We're unable to renew your subscriptionGracePeriodOverNotification!@>: 459AB28O 0H59 ?>4?8A:8 =0 premium-25@A8N 8AB5:, ?>MB><C K 25@=C;8AL : 15A?;0B=>9 25@A88 Malwarebytes A >3@0=8G5==>9 DC=:F8>=0;L=>ABLN. 1=>28B5 ?;0B56=K5 40==K5, GB>1K 2>AAB0=>28BL 70I8BC 2 @50;L=>< 2@5<5=8 >B 2@54>=>A=>3> , >?0A=KE 251-A09B>2 8 4@C38E C3@>7.Your Premium subscription expired and was downgraded to a limited, free version. Upgrade now to restore real-time protection against malware, bad websites, and other threats.GracePeriodOverNotificationb0E>48BL ?@>1;5<K  8 02B><0B8G5A:8 CAB@0=OBL 8E*Find and fix software issues automaticallyHelpCenterPageB09B8 >B25BK 8 CAB@0=8BL ?@>1;5<K$Find answers and troubleshoot issuesHelpCenterPage0'0AB> 7040205<K5 2>?@>AKFrequently asked questionsHelpCenterPage!?@02:0HelpHelpCenterPage@0: 0:B828@>20BL ?>4?8A:C =0 %1?%How do I activate my %1 subscription?HelpCenterPage0: ?@8>1@5AB8 4>?>;=8B5;L=K5 ;8F5=788, GB>1K 70I8B8BL 2A5 8A?>;L7C5<K5 CAB@>9AB20?;How do I buy additional licenses to protect all my devices?HelpCenterPageF0: =09B8 ;8F5=78>==K9 :;NG 4;O %1? How do I find my %1 license key?HelpCenterPageb0: C?@02;OBL ?>4?8A:>9 =0 %1 4;O 2A5E CAB@>9AB2?3How do I manage my %1 subscription for all devices?HelpCenterPage0: A45;0BL B0:, GB>1K ?@>3@0<<0 Malwarebytes =5 >?>25I0;0 > =0456=KE >1J5:B0E?:How do I stop Malwarebytes from alerting on trusted items?HelpCenterPageh#7=020BL ?>A;54=85 =>2>AB8 2 AD5@5 :815@157>?0A=>AB8'Learn about the latest in cybersecurityHelpCenterPage"Malwarebytes LabsMalwarebytes LabsHelpCenterPage:!;C610 ?>445@6:8 MalwarebytesMalwarebytes SupportHelpCenterPageJ C:>2>4AB2> ?>;L7>20B5;O MalwarebytesMalwarebytes User GuideHelpCenterPage:'8B0BL >D8F80;L=CN 8=AB@C:F8N$Read the official instruction manualHelpCenterPage20O2:8 2 A;C61C ?>445@6:8Support ticketsHelpCenterPage$!@54AB2> ?>445@6:8Support toolHelpCenterPageT>:070BL 1>;LH5 G0AB> 7040205<KE 2>?@>A>2 &'View more frequently asked questions…HelpCenterPageJ@>A<>B@5BL 70O2:8 2 A;C61C ?>445@6:8View your support ticketsHelpCenterPage|> 2@5<O 703@C7:8 A@54AB20 ?>445@6:8 2>7=8:;0 D09;>20O >H81:0!9A file error occured trying to download the Support Tool!HelpCenterPageModelhK C25@5=K, GB> E>B8B5 703@C78BL A@54AB2> ?>445@6:8?3Are you sure you want to download the Support Tool?HelpCenterPageModel0:@KBLCloseHelpCenterPageModel803@C78B5 A@54AB2> ?>445@6:8Download Support ToolHelpCenterPageModel5BNoHelpCenterPageModelOKOkHelpCenterPageModel@8 703@C7:5 Support Tool 2>7=8:;0 ?@>1;5<0. >60;C9AB0, ?@>25@LB5 ?>4:;NG5=85 : =B5@=5BC 8 ?>2B>@8B5 ?>?KB:C.fThere was a problem downloading the Support Tool. Please check your Internet connection and try again.HelpCenterPageModel0YesHelpCenterPageModel2 5:;0<0/@5:;0<=K5 B@5:5@KAds/TrackersHistoryAndProtectionPage>ABC?=>	AvailableHistoryAndProtectionPageBrowser Guard
Browser GuardHistoryAndProtectionPagep9! 0H B5:CI89 1@0C75@ =5A>2<5AB8< A =0H8< ?@8;>65=85<.4Dang! Your current default browser isn't compatible.HistoryAndProtectionPage-:A?;>9BKExploitsHistoryAndProtectionPage-:A?;>9BK O2;ONBAO @57C;LB0B>< <5=55 :@50B82=>3> B@C40 :815@?@5ABC?=8:>2. =8 =5 >B;8G0NBAO 87>I@5==>ABLN, 0 ?@>AB> =0F5;820NBAO =0 C65 8725AB=K5 CO728<>AB8 2 ?@>3@0<<0E, GB>1K ?5@5E20B8BL :>=B@>;L =04 DC=:F8O<8 CAB@>9AB20.Exploits are the lazier, less creative type of threat. They don't flex their muscle, they simply use already known vulnerabilities in your software and abuse them to take control of your device.HistoryAndProtectionPage(5A?;0B=0O CAB0=>2:0Free installHistoryAndProtectionPage;>10;L=>GlobalHistoryAndProtectionPage#AB0=>2:0	InstalledHistoryAndProtectionPage\-;5<5=BK, 701;>:8@>20==K5 70 ?>A;54=85 30 4=59Items stopped in last 30 daysHistoryAndProtectionPageR ?>4E>4OI8E 1@0C75@0E <>6=> C7=0BL 745AL(Learn more about available browsers hereHistoryAndProtectionPage*@54>=>A=K5 251-A09BKMalicious sitesHistoryAndProtectionPage@54>=>A=>5 MalwareHistoryAndProtectionPagej@54>=>A=>5  8 ?>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<KMalware and PUPsHistoryAndProtectionPage@54>=>A=>5  <>65B 8<5BL @07;8G=CN D>@<C   >B 28@CA>2, H?8>=A:8E ?@>3@0<< 8 ?@>3@0<<-2K<>30B5;59 4> B@>O=A:8E ?@>3@0<< 8 B. ?. >B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K >1KG=> 4>A0640NB 2A?;K20NI8<8 >:=0<8, =5=C6=K<8 ?0=5;O<8 8=AB@C<5=B>2 8;8 @5:;0<>9.  07C<55BAO, =8 2@54>=>A=>5 , =8 ?>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K =5 AB0=CB 65;0==K<8 3>ABO<8 =0 0H5< CAB@>9AB25.DMalware is short for malicious software, and it can take many forms from viruses, spyware, ransomware, trojan horses, and more. PUPs is short for Potentially Unwanted Programs, and they are usually things like pop-ups, unnecessary toolbars, or advertising. In short, you don't want Malware or PUPs anywhere near your device.HistoryAndProtectionPage>9 :><?LNB5@My ComputerHistoryAndProtectionPage54>ABC?=>
Not availableHistoryAndProtectionPage5 CAB0=>2;5=>
Not installedHistoryAndProtectionPage(@>3@0<<K-2K<>30B5;8
RansomwareHistoryAndProtectionPage>@>3@0<<K-2K<>30B5;8   MB> 28@CAK, ?@8 2845 :>B>@KE 2A5 =0G8=0NB 4@>60BL >B AB@0E0. =8 70H8D@>2K20NB 0H8 D09;K 8 B@51CNB 70?;0B8BL 2K:C? 70 2>AAB0=>2;5=85 4>ABC?0. >MB><C, 5A;8 B>;L:> K =5 8A?KBK205B5 6064C >?0A=KE ?@8:;NG5=89, =5 ?>72>;O9B5 MB8< >1J5:B0< ?>?0ABL =0 0H5 CAB@>9AB2>.Ransomware is a virus that makes all others tremble in fear. It encrypts your files and demands payment for their release. So unless you're thirsty for danger - don't get taken for a ride.HistoryAndProtectionPage20I8B0 2 @50;L=>< 2@5<5=8Real-Time ProtectionHistoryAndProtectionPageJ-B> 2>7<>6=>ABL A?>:>9=> @01>B0BL :064K9 45=L. '5BK@5EC@>2=520O 70I8B0 Malwarebytes 2 @50;L=>< 2@5<5=8 >157>?0A8B 0H5 CAB@>9AB2> >B =5?@>H5=KE 3>AB59 2 @568<5 24/7.Say hello to uninterrupted peace of mind. Malwarebytes Real-Time Protection adds the power of four layers of advanced security to guard your device 24/7.HistoryAndProtectionPage>H5==8:8ScamsHistoryAndProtectionPage@>A<0B@8209B5 A09BK, 83@09B5, 2K?>;=O9B5 4@C385 459AB28O >=;09=. ! MB8< 15A?;0B=K< @0AH8@5=85< 1@0C75@0 K A<>65B5 1;>:8@>20BL 2@54>=>A=CN @5:;0<C, 0B0:8 <>H5==8:>2, @5:;0<=K5 B@5:5@K 8 4@C385 >1J5:BK.Surf, play, or binge on whatever you want online. With this free browser extension you can block malicious ads, scams, trackers and more.HistoryAndProtectionPage>B >A=>2=K5 ?@>4C:BK 7;>C<KH;5==8:>2. @54>=>A=K5 251-A09BK <0A:8@CNBAO ?>4 =0AB>OI85, AB@5<OAL ?>E8B8BL 0H8 40==K5.These are nasty little devils. Malicious sites masquerade as legit websites, but under that facade, they're designed to steal your data.HistoryAndProtectionPage
A53>TotalHistoryAndProtectionPage1=>28BLUpgradeHistoryAndProtectionPage0'B> B0:>5 Browser Guard?What is Browser Guard?HistoryAndProtectionPageH'B> B0:>5 70I8B0 2 @50;L=>< 2@5<5=8?What is Real-Time Protection?HistoryAndProtectionPage&1=0@C65= %n >1J5:B*1=0@C65=> %n >1J5:B0,1=0@C65=> %n >1J5:B>2%n item(s) detectedIdentifiedThreatsDialog0:@KBLCloseIdentifiedThreatsDialog&1=0@C65==K9 >1J5:B(1=0@C65==K5 >1J5:BK(1=0@C65==K5 >1J5:BKItem(s) detectedIdentifiedThreatsDialog5AB>?>;>65=85LocationIdentifiedThreatsDialog<ONameIdentifiedThreatsDialog"8? >1J5:B0Object TypeIdentifiedThreatsDialog"8?TypeIdentifiedThreatsDialog6:B820F8O CA?5H=> 7025@H5=0Activation SuccessfulInAppUpgradeBrowserOKOkInAppUpgradeBrowser2>:C?:0 CA?5H=> 7025@H5=0Purchase SuccessfulInAppUpgradeBrowser
;03>40@8< 0A 70 ?>:C?:C!

K >B?@028;8 0< 8=D>@<0F8N > ?>4B25@645=88 70:070. >60;C9AB0, ?@>25@LB5 A2>9 M;5:B@>==K9 ?>GB>2K9 OI8:.UThank you for your purchase!

Please check your email for order confirmation details.InAppUpgradeBrowser;03>40@8< 0A 70 ?>:C?:C!

0H0 ;8F5=78O =0 Malwarebytes Premium CA?5H=> 0:B828@>20=0.

K >B?@028;8 0< 8=D>@<0F8N > ?>4B25@645=88 70:070. >60;C9AB0, ?@>25@LB5 A2>9 M;5:B@>==K9 ?>GB>2K9 OI8:.Thank you for your purchase!

Your Malwarebytes Premium license has been successfully activated.

Please check your email for order confirmation details.InAppUpgradeBrowser#7=0BL 1>;LH5
Learn moreInstalledProductCard.>1028BL 251-8A:;NG5=85Add web exclusion
JumpListModel6@>25@:0 =0;8G8O >1=>2;5=89Check for Updates
JumpListModel40?CAB8BL 1KAB@CN ?@>25@:CStart a Quick Scan
JumpListModel20?CAB8BL ?>;=CN ?@>25@:CStart a Threat Scan
JumpListModel040G8Tasks
JumpListModelf;O 40==>3> ?@>4C:B0 ;8F5=78>==K5 ?@020 =5 =0945=K.'Entitlement not found for this product.KeystoneErrorPage4">:5= CAB0=>2:8 =5 =0945=.Installation token not found.KeystoneErrorPage525@=K9 D>@<0B :;NG0. >60;C9AB0, C1548B5AL, GB> K 225;8 ;8F5=78>==K9 :;NG ?@028;L=>.LInvalid key format. Please make sure you entered your license key correctly.KeystoneErrorPage#7=0BL 1>;LH5
Learn moreKeystoneErrorPage4H81:0 ;8F5=78>==>3> :;NG0License key errorKeystoneErrorPage@H81:0 ?@>25@:8 A5@B8D8:0B>2 SSLSSL validation errorKeystoneErrorPageH"5:CI85 ;8F5=78>==K5 ?@020 >B<5=5=K.2The current license entitlement has been disabled.KeystoneErrorPage@8 ?@>25@:5 A5@B8D8:0B>2 SSL 2>7=8:;0 ?@>1;5<0. >60;C9AB0, 70?CAB8B5 Internet Explorer, 0 70B5< ?>2B>@8B5 >?5@0F8N.wThere was a problem validating SSL certificates. Please launch Internet Explorer once and then try the operation again.KeystoneErrorPage>7=8:;0 ?@>1;5<0 A 0H8< ;8F5=78>==K< :;NG><. >60;C9AB0, >1@0B8B5AL 2 A;C61C ?>445@6:8.?There's an issue with your license key. Please contact Support.KeystoneErrorPage-B>B ;8F5=78>==K9 :;NG =5 A>>B25BAB2C5B =0H8< 40==K<. >60;C9AB0, C1548B5AL, GB> K 225;8 53> ?@028;L=>.WThis license key does not match our records. Please make sure you entered it correctly.KeystoneErrorPage-B>B ;8F5=78>==K9 :;NG =5 A>>B25BAB2C5B ?@>4C:BC, :>B>@K9 K ?KB05B5AL 0:B828@>20BL.GThis license key does not match the product you are trying to activate.KeystoneErrorPageJ-B>B ;8F5=78>==K9 :;NG 1K; 2>72@0I5=.#This license key has been refunded.KeystoneErrorPage^!@>: 459AB28O 0H53> ;8F5=78>==>3> :;NG0 8AB5:.Your license key has expired.KeystoneErrorPage, >4@>1=55, More InfoLabelWithInfoButton@>4;8BL A59G0A	Renew NowLicenseExpiredNotification# 0A 15A?;0B=0O 25@A8O Malwarebytes A >3@0=8G5==>9 DC=:F8>=0;L=>ABLN. 1=>28B5 4> premium-25@A88, GB>1K ?>;CG8BL 70I8BC 2 @50;L=>< 2@5<5=8.You are now running a free, limited version of Malwarebytes. Upgrade to Premium to restore real-time protection and your peace of mind.LicenseExpiredNotificationh!@>: 459AB28O 0H59 ?>4?8A:8 =0 premium-25@A8N 8AB5:%Your Premium subscription has expiredLicenseExpiredNotification^;>:8@C5B <>H5==8G5A:85 8 2@54>=>A=K5 251-A09BK"Blocks fake and malicious websitesLicenseExpiringDialog0:@KBLCloseLicenseExpiringDialog5 B5@O9B5 70I8BC 2 @50;L=>< 2@5<5=8. @>4;8B5 ?>4?8A:C, ?>:0 A@>: 55 459AB28O =5 8AB5:.RDon’t lose your Real-Time Protection. Renew your subscription before it expires.LicenseExpiringDialog80I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7LicenseExpiringDialog@>4;8BL A59G0A	Renew nowLicenseExpiringDialog@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyLicenseExpiringDialogAB0;>AL A>2A5< =5<=>3> 2@5<5=8. @>4;8B5 ?>4?8A:C, GB>1K A>E@0=8BL 70I8BC 2 @50;L=>< 2@5<5=8.OTime is running out. Renew your subscription to keep your Real-Time Protection.LicenseExpiringDialogh!@>: 459AB28O 0H59 ?>4?8A:8 8AB5:05B G5@57 %n 45=L!f!@>: 459AB28O 0H59 ?>4?8A:8 8AB5:05B G5@57 %n 4=O!h!@>: 459AB28O 0H59 ?>4?8A:8 8AB5:05B G5@57 %n 4=59!$Your subscription ends in %n day(s)!LicenseExpiringDialogf!@>: 459AB28O 0H59 ?>4?8A:8 8AB5:05B G5@57 %n G0A!h!@>: 459AB28O 0H59 ?>4?8A:8 8AB5:05B G5@57 %n G0A0!j!@>: 459AB28O 0H59 ?>4?8A:8 8AB5:05B G5@57 %n G0A>2!%Your subscription ends in %n hour(s)!LicenseExpiringDialogT!@>: 459AB28O 0H59 ?>4?8A:8 A:>@> 8AB5G5BYour subscription expires soonLicenseExpiringDialog\!@>: 459AB28O 0H59 ?>4?8A:8 A:>@> 70:>=G8BAO!"Your subscription is about to end!LicenseExpiringDialogP!@>: 459AB28O 0H59 ?>4?8A:8 ?>GB8 8AB5: Your subscription is almost overLicenseExpiringDialogv=8<0=85! >4?8A:0 =0 premium-25@A8N 8AB5:05B G5@57 %n 45=Lt=8<0=85! >4?8A:0 =0 premium-25@A8N 8AB5:05B G5@57 %n 4=Ov=8<0=85! >4?8A:0 =0 premium-25@A8N 8AB5:05B G5@57 %n 4=595Heads up! Your Premium subscription expires in %n dayLicenseExpiringNotificationv=8<0=85! >4?8A:0 =0 premium-25@A8N 8AB5:05B G5@57 %n 45=Lt=8<0=85! >4?8A:0 =0 premium-25@A8N 8AB5:05B G5@57 %n 4=Ov=8<0=85! >4?8A:0 =0 premium-25@A8N 8AB5:05B G5@57 %n 4=596Heads up! Your Premium subscription expires in %n daysLicenseExpiringNotification!>E@0=8B5 70I8BC, GB>1K GC2AB2>20BL A51O C25@5==>. @>4;8B5 A53>4=O.9Keep your protection and your peace of mind. Renew today.LicenseExpiringNotification@>4;8BL A59G0A	Renew NowLicenseExpiringNotification@5<O ;5B8B =570<5B=>, :>340 K ?>4 70I8B>9. @>4;8B5 ?>4?8A:C A53>4=O 8 ?>;CG8B5 5I5 3>4 A?>:>9AB28O.]Time really flies when you're secure. Renew today for another year of stress-free protection.LicenseExpiringNotification~!@>: 459AB28O 0H59 ?>4?8A:8 =0 Premium-25@A8N 8AB5:05B A53>4=O'Your Premium subscription expires todayLicenseExpiringNotification0B0DateLogInformationReport0==K5 6C@=0;0Log detailsLogInformationReport$09; 6C@=0;0Log fileLogInformationReport.0I8B0 >B 1@CBD>@A-0B0:Brute force protectionMWACBlockedNotification0:@KBLCloseMWACBlockedNotification><5=:Domain:MWACBlockedNotification
$09;:File:MWACBlockedNotificationIP-04@5A:IP Address:MWACBlockedNotification>;CG8B5 8=D>@<0F8N >B=>A8B5;L=> <a style='color:%1;text-decoration:none;' href='category'>%2</a>. A;8 K =5 E>B8B5 1;>:8@>20BL MB>B 251-A09B, K <>65B5 8A:;NG8BL 53> 87 A8AB5<K 70I8BK 2 A5B8 =B5@=5B: 4;O MB>3> ?5@5948B5 2 <5=N A:;NG5=8O.Learn about <a style='color:%1;text-decoration:none;' href='category'>%2</a>. If you don't want to block this website, you can exclude it from website protection by accessing Exclusions.MWACBlockedNotification`@>3@0<<0 Malwarebytes 2@5<5==> 701;>:8@>20;0 :><?LNB5@, C :>B>@>3>, 2>7<>6=>, =5B ?@02 4>ABC?0 : 0H5<C CAB@>9AB2C. 0 MB>B @07 0H8 459AB28O =5 B@51CNBAO. ;O ?>;CG5=8O 4>?>;=8B5;L=>9 8=D>@<0F88, ?>60;C9AB0, ?5@5948B5 : <a style='color:%1;text-decoration:none;' href='category'>8AB>@88 >1=0@C65=89</a>.Malwarebytes temporarily blocked a computer that might not be authorized to access your device. You don’t need to take any action at this time. Check your <a style='color:%1;text-decoration:none;' href='category'>Detection History</a> to learn more.MWACBlockedNotification.#?@02;5=85 8A:;NG5=8O<8Manage ExclusionsMWACBlockedNotificationH>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0PUPMWACBlockedNotification
>@B:Port:MWACBlockedNotificationF#40;5==>5 ?>4:;NG5=85 701;>:8@>20=>Remote connection blockedMWACBlockedNotification0 40==>< 251-A09B5 >1=0@C65=0 2@54>=>A=0O 0:B82=>ABL. A;8 K =5 E>B8B5 1;>:8@>20BL MB>B 251-A09B, K <>65B5 8A:;NG8BL 53> 87 A8AB5<K 70I8BK 2 A5B8 =B5@=5B: 4;O MB>3> ?5@5948B5 2 <5=N A:;NG5=8O.Site detected as malicious. If you don't want to block this website, you can exclude it from website protection by accessing Exclusions.MWACBlockedNotification$B@>O=A:8E ?@>3@0<<TrojanMWACBlockedNotification"8?:Type:MWACBlockedNotification*51-A09B 701;>:8@>20=Website blockedMWACBlockedNotification<51-A09B 701;>:8@>20= 87-70 %1Website blocked due to %1MWACBlockedNotification@5:;0<=>3> adwareMWACBlockedNotification4A:><?@><5B8@>20==KE 40==KEcompromisedMWACBlockedNotificationM:A?;>9B>2exploitMWACBlockedNotification$:815@<>H5==8G5AB20fraudMWACBlockedNotification ?5@5E20B0 40==KEhijackMWACBlockedNotification&2@54>=>A=>9 @5:;0<KmalvertisingMWACBlockedNotification2@54>=>A=>3> malwareMWACBlockedNotificationJ<>H5==8G5A:8E D0@<0F52B8G5A:8E 40==KEpharmaMWACBlockedNotificationD8H8=30phishingMWACBlockedNotification(?@>3@0<<-2K<>30B5;59
ransomwareMWACBlockedNotification:?>B5=F80;L=> >?0A=KE ?@>3@0<<riskwareMWACBlockedNotification
A?0<0spamMWACBlockedNotification$H?8>=A:8E ?@>3@0<<spywareMWACBlockedNotificationG5@259wormMWACBlockedNotification(@54>=>A=K9 251-A09BMalicious WebsiteMWACExclusionController5 C405BAO >B:;NG8BL 0??0@0B=>5 CA:>@5=85: "@51C5<K9 ?0@>;L >BACBAB2C5B.FCannot disable Hardware Accelerator: The required password is missing.Main5 C405BAO >B:;NG8BL 0??0@0B=>5 CA:>@5=85: 2545= =525@=K9 ?0@>;L.HCannot disable Hardware Accelerator: The supplied password is incorrect.MainH81:0ErrorMain=8<0=85!WarningMain A>60;5=8N, A;C610 Malwarebytes ?@5:@0B8;0 @01>BC. @>3@0<<0 1C45B ?5@570?CI5=0.XWe're sorry, but the Malwarebytes service stopped working. The program will now restart.Main(%n =>2>5 C254><;5=85(%n =>2KE C254><;5=8O(%n =>2KE C254><;5=89%n new notifications
MainHeader*:B828@>20BL ?>4?8A:CActivate subscription
MainHeaderC?8BLBuy now
MainHeader"5A?;0B=0O 25@A8OFree
MainHeader!?@02:0Help
MainHeader$>O CG5B=0O 70?8AL
My account
MainHeader20I8B8BL 1>;LH5 CAB@>9AB2Protect more devices
MainHeader@>4;8BLRenew
MainHeader0@0<5B@KSettings
MainHeader,7=0:><8B5;L=0O 25@A8OTrial
MainHeader>20O 25@A8O Malwarebytes 3>B>20 : CAB0=>2:5. > 2@5<O CAB0=>2:8 >1=>2;5=8O <>65B ?>=04>18BLAO ?5@5703@C7:0 :><?LNB5@0.

#AB0=>28BL A59G0A?uA new version of Malwarebytes is ready to be installed. Your computer might restart during this update.

Install now?
MainWindow*=D>@<0F8>==0O ?0=5;L	Dashboard
MainWindowA:;NG5=8O
Exclusions
MainWindow"5A?;0B=0O 25@A8OFree
MainWindowMalwarebytesMalwarebytes
MainWindow0@0=B8=
Quarantine
MainWindow,7=0:><8B5;L=0O 25@A8OTrial
MainWindowA5 D09;K (*)
All files (*)MaliciousSitesReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK >BG5B0?3Are you sure you want to delete these report items?MaliciousSitesReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB>B >1J5:B >BG5B0?1Are you sure you want to delete this report item?MaliciousSitesReportsPage
0704BackMaliciousSitesReportsPage"8? A>548=5=8OConnection typeMaliciousSitesReportsPage0B0DateMaliciousSitesReportsPage*#40;8BL >1J5:B >BG5B0Delete Report ItemMaliciousSitesReportsPage,#40;8BL >1J5:BK >BG5B0Delete Report ItemsMaliciousSitesReportsPage$09;FileMaliciousSitesReportsPageIPIPMaliciousSitesReportsPage">A;54=85 30 4=59Last 30 daysMaliciousSitesReportsPageJ01;>:8@>20==K5 2@54>=>A=K5 251-A09BKMalicious sites blockedMaliciousSitesReportsPage>@BPortMaliciousSitesReportsPage!>E@0=8BL D09;	Save fileMaliciousSitesReportsPage."5:AB>2K5 D09;K (*.txt)Text files (*.txt)MaliciousSitesReportsPageURL-04@5AURLMaliciousSitesReportsPage0-B0 A2>4:0 1K;0 ?>;57=0:I found this summary useful:MonthlySummary*!?0A81> 70 0H >B7K2!Thank you for the feedback!MonthlySummary5B
Thumb DownMonthlySummary0Thumb UpMonthlySummary!2>4:0 70 <5AOFYour Monthly SummaryMonthlySummary<html><style type="text/css"></style><span style="color: %1"><br>!"/ 14-4=52=0O 25@A8O</br></span><br></br>Malwarebytes for Teams</html><html><style type="text/css"></style><span style="color: %1"><br>FREE 14-days</br></span><br></br>of Malwarebytes for Teams</html>NewTrialDialog<html><style type="text/css"></style><span style="color: %1"><br>14 4=59 premium-25@A88 </br></span><br></br>!"!</html>z<html><style type="text/css"></style><span style="color: %1"><br>FREE 14-days</br></span><br></br>of Premium on us!</html>NewTrialDialogp;>:8@C5B >?0A=K5 251-A09BK 8 459AB28O >=;09=-<>H5==8:>2$Blocks bad websites and online scamsNewTrialDialogf!"/ 14-4=52=0O 25@A8O Malwarebytes for Teams&FREE 14-days of Malwarebytes for TeamsNewTrialDialogb14 4=59 premium-25@A88   !" 8 70 =0H AG5B!FREE 14-days of Premium on us!NewTrialDialog(@8ABC?09B5 : @01>B5Get startedNewTrialDialog,$C=:F88 premium-25@A88Premium featuresNewTrialDialogd05B 0< 2>7<>6=>ABL @5H0BL, :>340 8 GB> ?@>25@OBL1Puts you in control of when and what gets scannedNewTrialDialog20I8B0 2 @50;L=>< 2@5<5=8Real-Time ProtectionNewTrialDialog00?;0=8@>20==K5 ?@>25@:8Scheduled scansNewTrialDialog59B@0;87C5B C3@>7K 5I5 4> B>3>, :0: 8< C405BAO ?@>=8:=CBL 2 A8AB5<C Stops threats before they infectNewTrialDialog&1=>2;5==K5 DC=:F88Upgraded featuresNewTrialDialog,0I8B0 2 A5B8 =B5@=5BWeb ProtectionNewTrialDialog4!@>: 459AB28O 25@A88 8AB5:Expired VersionNewVersionExpiredNotification#AB0=>28BLInstallNewVersionExpiredNotification!@>: 459AB28O MB>9 25@A88 ?@>3@0<<K Malwarebytes Anti-Ransomware 8AB5:, ?>MB><C 70I8B0 >B ?@>3@0<<-2K<>30B5;59 =5 459AB2C5B._This version of Malwarebytes Anti-Ransomware is expired and not protecting you from ransomware.NewVersionExpiredNotification#AB0=>28BLInstallNewVersionNotification*>ABC?=0 =>20O 25@A8ONew Version AvailableNewVersionNotificationG8AB8BL 2A5	Clear allNotificationCenterJB<5B8BL 2A5 M;5<5=BK :0: ?@>G8B0==K5
Mark all readNotificationCenter5=NMenuNotificationCenter#254><;5=8O
NotificationsNotificationCenter("5?5@L K 7=05B5 2A5You're all caught upNotificationCenter.-:A?;>9B >1=0@C65= 8 701;>:8@>20=. -B>B >1J5:B 1>;LH5 =5 ?@54AB02;O5B >?0A=>AB8. 5@59B8 =0 AB@0=8FC :0@0=B8=0 4;O ?>;CG5=8O 4>?>;=8B5;L=>9 8=D>@<0F88.^Exploit attempt detected and blocked. It is no longer a threat. Open quarantine to learn more.NotificationCenterModel*-:A?;>9B 701;>:8@>20=Exploit blockedNotificationCenterModel~@54>=>A=>5  701;>:8@>20=> A8AB5<>9 70I8BK 2 @50;L=>< 2@5<5=8'Malware blocked by Real-Time ProtectionNotificationCenterModel@54>=>A=>5  >1=0@C65=> 8 701;>:8@>20=>. B:@>9B5 AB@0=8FC 8AB>@88, GB>1K ?>;CG8BL 4>?>;=8B5;L=CN 8=D>@<0F8N > 2@54>=>A=>< .TMalware detected and blocked. Open the history page to learn more about the malware.NotificationCenterModel$@54>=>A=>5  >1=0@C65=> 8 ?><5I5=> 2 :0@0=B8=. 5@59B8 =0 AB@0=8FC :0@0=B8=0 4;O ?>;CG5=8O 4>?>;=8B5;L=>9 8=D>@<0F88 8;8 C40;8BL 2@54>=>A=>5 ._Malware detected and quarantined. Open the quarantine page to learn more or delete the malware.NotificationCenterModel@>3@0<<0 Malwarebytes 2@5<5==> 701;>:8@>20;0 :><?LNB5@, C :>B>@>3>, 2>7<>6=>, =5B ?@02 4>ABC?0 : 0H8< CAB@>9AB20<.`Malwarebytes temporarily blocked a computer that might not be authorized to access your devices.NotificationCenterModel$C@=0; C254><;5=89Notification LogNotificationCenterModelD>B5=F80;L=0O C3@>70 701;>:8@>20=0Potential threat blockedNotificationCenterModel@1J5:B 2>AAB0=>2;5= 87 :0@0=B8=0Quarantined item restoredNotificationCenterModelD@>3@0<<0-2K<>30B5;L 701;>:8@>20=0Ransomware blockedNotificationCenterModel@>3@0<<0-2K<>30B5;L >1=0@C65=0 8 ?><5I5=0 2 :0@0=B8=. -B>B >1J5:B 1>;LH5 =5 ?@54AB02;O5B >?0A=>AB8.BRansomware was detected and quarantined. It is no longer a threat.NotificationCenterModelF#40;5==>5 ?>4:;NG5=85 701;>:8@>20=>Remote connection blockedNotificationCenterModel1J5:B, @0=55 ?><5I5==K9 2 :0@0=B8=, 2>AAB0=>2;5= 87-70 ;>6=>3> A@010BK20=8O 70I8BK.IRestored a previously quarantined item due to a false positive detection.NotificationCenterModelJ-B>B 251-A09B :065BAO 2@54>=>A=K<:
%1+The following website appears malicious:
%1NotificationCenterModel!53>4=OTodayNotificationCenterModel
G5@0	YesterdayNotificationCenterModel<<5AB> >B>1@065=8O C254><;5=8O:notification shown on:NotificationCenterModelA A>>1I5=85<with message ofNotificationCenterModel
0704BackOnboardingActivateOrSignIn:B820F8O %1Activate %1OnboardingActivation*:B828@>20BL ?>4?8A:CActivate subscriptionOnboardingActivation
0704BackOnboardingActivationT>;CG8BL ?>4@>1=K5 8=AB@C:F88 ?> 0:B820F88$Get detailed activation instructionsOnboardingActivationA;8 K C65 ?@8>1@5;8 %1, 22548B5 ;8F5=78>==K9 :;NG 2 ?>;5 =865.?If you’ve already purchased %1, enter your License Key below.OnboardingActivationID ;8F5=788
License IDOnboardingActivation"8F5=78>==K9 :;NGLicense KeyOnboardingActivation6>B5@O;8 ;8F5=78>==K9 :;NG?Lost license key?OnboardingActivation</ ?>;CG8; ;8F5=78N 2<5AB5 A ID!My license came with a License IDOnboardingActivation\>60;C9AB0, 22548B5 459AB28B5;L=K9 ID ;8F5=788Please enter a valid license IDOnboardingActivationh>60;C9AB0, 22548B5 459AB28B5;L=K9 ;8F5=78>==K9 :;NG Please enter a valid license keyOnboardingActivation*:B828@>20BL ?>4?8A:CActivate subscriptionOnboardingAskScan60?CAB8B5
 ?5@2CN ?@>25@:C.(Get started by running
 your first scan.OnboardingAskScan0?CAB8B5 ?>;=CN ?@>25@:C, GB>1K >1=0@C68BL 8 C40;8BL 2A5 C3@>7K, :>B>@K5 <>3CB A:@K20BLAO 2 A8AB5<5 0H53> :><?LNB5@0. bRun a comprehensive scan to detect and clean up any threats that may be lurking on your computer. OnboardingAskScan@>25@:0ScanOnboardingAskScan@>?CAB8BLSkipOnboardingAskScan<html><style type="text/css"></style>Malwarebytes <span style="color: #0d3ecc">Premium</span></html>e<html><style type="text/css"></style>Malwarebytes  <span style="color: #0d3ecc">Premium</span></html>OnboardingBuyPremium<html><style type="text/css"></style>Malwarebytes for <span style="color: #0d3ecc">Teams</span></html>g<html><style type="text/css"></style>Malwarebytes for  <span style="color: #0d3ecc">Teams</span></html>OnboardingBuyPremium*:B828@>20BL ?>4?8A:CActivate subscriptionOnboardingBuyPremium>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesOnboardingBuyPremiumC?8BLBuy nowOnboardingBuyPremium5 A59G0AMaybe laterOnboardingBuyPremium80I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7OnboardingBuyPremium`#40;O5B 2@54>=>A=K5 >1J5:BK, ?@>=8:H85 2 A8AB5<CRemoves existing infectionsOnboardingBuyPremium@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyOnboardingBuyPremium;>:8@C5B 2@54>=>A=K5 >1J5:BK 4> B>3>, :0: >=8 A<>3CB =02@548BL 0<.$Stops infections before they happen.OnboardingBuyPremiumT > 1;>:8@>20=88 2A5E 2@54>=>A=KE >1J5:B>2.% now to block all kinds of bad stuff.OnboardingBuyPremiumELXR-171R>;55 225 <8;;8>=>2 ?@>25@>: :064K9 <5AOF225M+ scans every monthOnboardingBuyPremiumELXR-171>>;55 60 BKAOG CAB0=>2>: 2 45=L60K+ installations per dayOnboardingBuyPremiumELXR-171h>;55 95 <8;;8>=>2 701;>:8@>20==KE C3@>7 :064K9 45=L95M+ threats blocked every dayOnboardingBuyPremiumELXR-171*:B828@>20BL ?>4?8A:CActivate subscriptionOnboardingBuyPremiumELXR-171>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesOnboardingBuyPremiumELXR-171C?8BLBuy nowOnboardingBuyPremiumELXR-171P>;55 1 <8;;8>=0 =>2KE C3@>7 :064K9 45=LFind 1M+ more threats per dayOnboardingBuyPremiumELXR-171>A?>;L7C9B5AL Get OnboardingBuyPremiumELXR-171(Malwarebytes PremiumMalwarebytes PremiumOnboardingBuyPremiumELXR-171.Malwarebytes 2 F8D@0E: Malwarebytes by the numbers: OnboardingBuyPremiumELXR-1715 A59G0AMaybe laterOnboardingBuyPremiumELXR-171f>O28;>AL 5I5 1>;LH5 ?@8G8=, GB>1K ?@8=OBL @5H5=85 More reasons to choose OnboardingBuyPremiumELXR-17180I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7OnboardingBuyPremiumELXR-171@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyOnboardingBuyPremiumELXR-171;>:8@C5B 2@54>=>A=K5 >1J5:BK 4> B>3>, :0: >=8 A<>3CB =02@548BL 0<#Stops infections before they happenOnboardingBuyPremiumELXR-171n ?@O<> A59G0A, GB>1K ?@54>B2@0B8BL 70@065=85 2 1C4CI5<." now to prevent future infections.OnboardingBuyPremiumPostScan
0704BackOnboardingBuyPremiumPostScan>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesOnboardingBuyPremiumPostScanC?8BLBuy nowOnboardingBuyPremiumPostScan>A?>;L7C9B5AL Get OnboardingBuyPremiumPostScanNB;8G=K5 =>2>AB8: C3@>7K =5 >1=0@C65=K! Great news, no threats detected.OnboardingBuyPremiumPostScanMalwarebytes %1   MB> 70;>3 A?>:>9=>9 @01>BK 8 ;CGH89 A?>A>1 ?@54>B2@0B8BL 70@065=85 A2>8E CAB@>9AB2 2 1C4CI5<.^Malwarebytes %1 is the best way to keep your good luck going, by preventing future infections.OnboardingBuyPremiumPostScan(Malwarebytes PremiumMalwarebytes PremiumOnboardingBuyPremiumPostScan"5 3>B>2K :C?8BL?Not ready to buy?OnboardingBuyPremiumPostScanB@54>B2@0I05B 70@065=85 2 1C4CI5<Prevents future infectionsOnboardingBuyPremiumPostScan,0I8I05B >B C3@>7 24/7Protects against threats 24/7OnboardingBuyPremiumPostScan@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyOnboardingBuyPremiumPostScan>B>2>! 	Success! OnboardingBuyPremiumPostScan
0704BackOnboardingDeviceLimit.#?@02;5=85 CAB@>9AB20<8Manage devicesOnboardingDeviceLimit'B>1K 0:B828@>20BL premium-25@A8N =0 MB>< :><?LNB5@5, 450:B828@C9B5 premium-25@A8N =0 4@C3>< CAB@>9AB25.KTo activate Premium on this computer, deactivate Premium on another device.OnboardingDeviceLimit^K 4>AB83;8 >3@0=8G5=8O =0 :>;8G5AB2> CAB@>9AB2You’ve hit your device limitOnboardingDeviceLimit
0704BackOnboardingForgotPassword
0704BackOnboardingForgotPasswordNoEmail6>102LB5 A2>9 e-mail 2 =0H A?8A>: @0AAK;:8, 8 K 1C45B5 ?>;CG0BL =>2>AB8 > :815@157>?0A=>AB8, A>25BK ?> 70I8B5 CAB@>9AB2, 0 B0:65 M:A:;N782=K5 ?@54;>65=8O.`Add your email to our mailing list to get cybersecurity news, safety tips, and exclusive offers.OnboardingFreeEmail
0704BackOnboardingFreeEmail@54>AB02;OO A2>9 04@5A M;5:B@>==>9 ?>GBK, K A>3;0H05B5AL ?>;CG0BL @5:;0<=K5 A>>1I5=8O 8 A2545=8O > =>2KE ?@>4C:B0E. K <>65B5 87<5=8BL =0AB@>9:8 ?>;CG5=8O 8=D>@<0F8>==KE A>>1I5=89 2 A2>59 CG5B=>9 70?8A8 Malwarebytes.By providing your email, you agree to receive product and marketing emails. You can manage your communication preferences in your Malwarebytes Account.OnboardingFreeEmailE-mail (>?F8O)Email (optional)OnboardingFreeEmailh#7=020BL ?>A;54=85 =>2>AB8 2 AD5@5 :815@157>?0A=>AB8 Hear the latest in cybersecurityOnboardingFreeEmailLB:@KBL 15A?;0B=CN 25@A8N MalwarebytesOpen Malwarebytes FreeOnboardingFreeEmailt>60;C9AB0, 22548B5 459AB28B5;L=K9 04@5A M;5:B@>==>9 ?>GBKPlease enter a valid emailOnboardingFreeEmail* 0AH8@5==0O =0AB@>9:0Advanced setupOnboardingIntro(@8ABC?09B5 : @01>B5Get startedOnboardingIntro>65B5 ;8 K ?@54AB028BL A515 <8@ 157 2@54>=>A=KE ?@>3@0<<? K <>65<.'Imagine a world without malware. We do.OnboardingIntro^">;L:> 4;O >?KB=KE ?>;L7>20B5;59 8 A?5F80;8AB>26Recommended only for experienced users and techniciansOnboardingIntro>>1@> ?>60;>20BL 2 MalwarebytesWelcome to MalwarebytesOnboardingIntro<html><style type="text/css"></style>Malwarebytes <span style="color: #0d3ecc">Premium</span></html>e<html><style type="text/css"></style>Malwarebytes  <span style="color: #0d3ecc">Premium</span></html>OnboardingOptions<html><style type="text/css"></style><span style="color: #0d3ecc">5A?;0B=0O 25@A8O</span> Malwarebytes</html>a<html><style type="text/css"></style>Malwarebytes <span style="color: #0d3ecc">Free</span></html>OnboardingOptions*:B828@>20BL ?>4?8A:CActivate subscriptionOnboardingOptions
0704BackOnboardingOptions>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesOnboardingOptionsj>;CG8BL 15A?;0B=CN >7=0:><8B5;L=CN 25@A8N =0 14 4=59Claim free 14-day trialOnboardingOptions80I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7OnboardingOptions*C?8BL premium-25@A8NPurchase PremiumOnboardingOptions`#40;O5B 2@54>=>A=K5 >1J5:BK, ?@>=8:H85 2 A8AB5<CRemoves existing infectionsOnboardingOptions@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyOnboardingOptionsK?>;=O5B ?>8A: 2@54>=>A=KE >1J5:B>2 8 ?>72>;O5B 2@CG=CN C40;OBL 8E.<Scans for infections and allows you to manually remove them.OnboardingOptions;>:8@C5B 2@54>=>A=K5 >1J5:BK 4> B>3>, :0: >=8 A<>3CB =02@548BL 0<.$Stops infections before they happen.OnboardingOptionsVA?>;L7>20BL 15A?;0B=CN 25@A8N MalwarebytesUse Malwarebytes FreeOnboardingOptions<html><style type="text/css"></style>%1<span style="color: %2"><br>5A?;0B=0O 14-4=52=0O ?@>1=0O 25@A8O</span></html>b<html><style type="text/css"></style>%1<span style="color: %2"><br>Free 14-day trial</span></html>OnboardingPremiumTrial<html><style type="text/css"></style>>1@> ?>60;>20BL 2<span style="color: %1"><br>15A?;0B=CN 14-4=52=CN ?@>1=CN 25@A8N %2</span></html>r<html><style type="text/css"></style>Welcome to your<span style="color: %1"><br>free 14-day %2 trial</span></html>OnboardingPremiumTrialA5340 2:;NG5=>Always includedOnboardingPremiumTrial
0704BackOnboardingPremiumTrial>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesOnboardingPremiumTrialR@54>AB02;OO A2>9 e-mail, K A>3;0H05B5AL ?>;CG0BL @5:;0<=K5 A>>1I5=8O 8 A2545=8O > =>2KE ?@>4C:B0E. -B> B0:65 87<5=8B 0H8 =0AB@>9:8 ?>;CG5=8O 8=D>@<0F8>==KE A>>1I5=89.By providing your email, you agree to receive product and marketing emails. This will also change your existing communication preferences.OnboardingPremiumTrialE-mail (>?F8O)Email (optional)OnboardingPremiumTrial(@8ABC?09B5 : @01>B5Get startedOnboardingPremiumTrialt>60;C9AB0, 22548B5 459AB28B5;L=K9 04@5A M;5:B@>==>9 ?>GBKPlease enter a valid emailOnboardingPremiumTrial,$C=:F88 premium-25@A88Premium featuresOnboardingPremiumTrial80I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7OnboardingPremiumTrial`#40;O5B 2@54>=>A=K5 >1J5:BK, ?@>=8:H85 2 A8AB5<CRemoves existing infectionsOnboardingPremiumTrial@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyOnboardingPremiumTrial6@58<CI5AB20 ?@>1=>9 25@A88Trial benefitsOnboardingPremiumTrialt5>3@0=8G5==>5 :>;8G5AB2> @CG=KE ?@>25@>: 8 C40;5=89 C3@>7)Unlimited manual scans and threat removalOnboardingPremiumTrial 0AB@>8BL A59G0A
Adjust now OptimizePerformanceDrawerPEXPT350AB@>9B5 ?@8>@8B5B @CG=KE ?@>25@>:, GB>1K >?B8<878@>20BL ?@>872>48B5;L=>ABL :><?LNB5@0.NAdjust the priority of manual scans to optimize your computer’s performance. OptimizePerformanceDrawerPEXPT35V?B8<878@C9B5 ?@>872>48B5;L=>ABL :><?LNB5@0Optimize performance OptimizePerformanceDrawerPEXPT352K15@8B5 G0AB>BC ?@>25@>:Choose your scan frequencyOptimizeScheduledScanDialog>74@02;O5<! !53>4=O ?@>3@0<<0 Malwarebytes =5 >1=0@C68;0 2@54>=>A=KE >1J5:B>2.;Congratulations! Malwarebytes has not found anything today.OptimizeScheduledScanDialog654=52=>DailyOptimizeScheduledScanDialogLMalwarebytes >1=0@C68205B C3@>7K, :>B>@K5 =5 <>65B =09B8 4@C3>9 0=B828@CA. 0AB@>9B5 @53C;O@=K5 ?@>25@:8, GB>1K 0H :><?LNB5@ 8 0H8 40==K5 >AB020;8AL 2 157>?0A=>AB8.gMalwarebytes detects threats that others miss. Setup routine scans to keep your computer and data safe.OptimizeScheduledScanDialog@>3@0<<0 Malwarebytes >1=0@C68;0 C3@>7K 8 C40;8;0 8E A 0H53> :><?LNB5@0.:Malwarebytes found and removed threats from your computer.OptimizeScheduledScanDialog65<5AOG=>MonthlyOptimizeScheduledScanDialog!>E@0=8BLSaveOptimizeScheduledScanDialog '0AB>B0 ?@>25@:8Scan frequencyOptimizeScheduledScanDialog|15A?5GLB5 A2>N 157>?0A=>ABL: 70409B5 2@5<O 1;8609H59 ?@>25@:8"Stay safe, schedule your next scanOptimizeScheduledScanDialog665=545;L=> (@5:><5=4C5BAO)Weekly (recommended)OptimizeScheduledScanDialog:0 0H5< CAB@>9AB25 =5B C3@>7Your device is cleanOptimizeScheduledScanDialog5 2A5 ?@>1;5<K >1CA;>2;5=K 28@CA0<8. !>7409B5 =>2CN B5<C =0 D>@C<5 Malwarebytes 8 =0948B5 @5H5=85 ?@>1;5<, 2>7=8:H8E =0 :><?LNB5@5.Not all problems are caused by infections. Consider starting a new topic on the Malwarebytes forum and find solutions to your PC problems.PEXPT31NoThreatsFoundLoading!;54C9B5 MB8< @5:><5=40F8O<, GB>1K A45;0BL A2>N @01>BC 2 =B5@=5B5 5I5 1>;55 157>?0A=>9.>Try these suggestions to improve your web browsing experience.PEXPT31NoThreatsFoundLoading!B0=40@B=K5 ?@>25@:8 >1KG=> ?>72>;ONB 2KO28BL 2A5 2@54>=>A=K5 >1J5:BK, >4=0:> K B0:65 <>65B5 2K1@0BL 4@C3>9 B8? ?@>25@:8, GB>1K C:@5?8BL A2>5 A?>:>9AB285 8 C25@5==>ABL 2 157>?0A=>AB8 A8AB5<K.While normal scans would generally find any threats on your system, you may want to try a different kind of scan for peace of mind.PEXPT31NoThreatsFoundLoadingB?@028BLSubmitPEXPT31NoThreatsFoundOptionsK ?@54>AB028< 0< @5AC@AK 4;O @5H5=8O =081>;55 @0A?@>AB@0=5==KE ?@>1;5<.>We’ll provide you with resources to resolve common problems.PEXPT31NoThreatsFoundOptionsX0:0O ?@>1;5<0 2>7=8:;0 =0 0H5< CAB@>9AB25?!What issue is your device having?PEXPT31NoThreatsFoundOptionsB;8G=0O @01>B0! 0 CAB@>9AB25 =5B 2@54>=>A=KE >1J5:B>2! 0< C40;>AL CA:>;L7=CBL >B ?>GB8 =5?@5@K2=>3> ?>B>:0 :815@0B0: E0:5@>2 8 <>H5==8:>2, ?>4AB5@530NI8E 0A 2 =B5@=5B5. =>38< 2575B 3>@074> <5=LH5!Great job staying out of trouble! You have managed to elude the near constant barrage of cyberattacks from hackers and scammers lurking all over the internet. Many aren’t so lucky!!PEXPT31NoThreatsFoundScanComplete6C6=0 ?><>IL A 4803=>AB8:>9Help me diagnose!PEXPT31NoThreatsFoundScanComplete/ =5 4C<0;, GB> ?@>3@0<<0 >1=0@C68B 2@54>=>A=K5 >1J5:BK, 8 ?@>AB> 70?CAB8; ?@>25@:C 4;O 1>;LH59 C25@5==>AB8.CI didn’t expect to find anything, but ran a scan just to be sure.!PEXPT31NoThreatsFoundScanCompleteA5 2 ?>@O4:5
I’m all set!PEXPT31NoThreatsFoundScanCompleteJ@>25@:0 7025@H5=0: C3@>7K =5 =0945=KScan complete: No threats found!PEXPT31NoThreatsFoundScanComplete=5 :065BAO, GB> =0 CAB@>9AB25 2A5 5I5 >AB0NBAO 2@54>=>A=K5 >1J5:BK.5Still concerned there may be an issue with my device.!PEXPT31NoThreatsFoundScanComplete 0AA:068B5 =0< > B><, GB> K >6840;8 >1=0@C68BL 2 E>45 ?5@2>9 ?@>25@:8.BTell us more about what you expected to find with your first scan.!PEXPT31NoThreatsFoundScanCompleteB<5=0CancelPasswordDialog0:@KBLClosePasswordDialog2548B5EnterPasswordDialog22548B5 ;8F5=78>==K9 :;NGEnter License KeyPasswordDialog2548B5 ?0@>;LEnter PasswordPasswordDialog62548B5 ?0@>;L 70I8BK >B =5A0=:F8>=8@>20==KE 87<5=5=89. >A;5 ?@>25@:8 845=B8D8:0F8>==KE 40==KE K A<>65B5 87<5=OBL ?0@0<5B@K 2 B5G5=85 1;8609H8E 30 <8=CB.Enter your Tamper Protection password. After verifying your identity, you'll be able to make changes to your settings for the next 30 minutes.PasswordDialog22548B5 ;8F5=78>==K9 :;NGEnter your license keyPasswordDialog01K;8 ?0@>;L? K <>65B5 ?5@5CAB0=>28BL Malwarebytes 8;8 2K?>;=8BL A1@>A ?0@>;O A ?><>ILN ;8F5=78>==>3> :;NG0aForgot your password? You can reinstall Malwarebytes or reset the password using your license keyPasswordDialogA;8 K 701C45B5 ?0@>;L, 0< ?@845BAO ?5@5CAB0=>28BL Malwarebytes.EIf you forget your password, you will need to reinstall Malwarebytes.PasswordDialogh>60;C9AB0, 22548B5 459AB28B5;L=K9 ;8F5=78>==K9 :;NG Please enter a valid license keyPasswordDialog>60;C9AB0, 22548B5 ?0@>;L 70I8BK >B =5A0=:F8>=8@>20==KE 87<5=5=89.-Please enter your Tamper Protection password.PasswordDialog!1@>A8BL ?0@>;LReset passwordPasswordDialog`0I8B0 >B =5A0=:F8>=8@>20==KE 87<5=5=89 2:;NG5=0Tamper Protection enabledPasswordDialog!1@>A ?0@>;OPassword resetPasswordResetPage65@=CBLAO 8 2>9B8 2 A8AB5<CReturn to sign inPasswordResetPage6K CA?5H=> 87<5=8;8 ?0@>;L.,You have successfully changed your password.PasswordResetPageV 0H 565<5AOG=K9 >BG5B > 157>?0A=>AB8 3>B>2 Your Monthly Summary is readyPeriodicRecapNotification =5< A>45@68BAO 8AB>@8O ?@>25@>:, A2545=8O > =59B@0;87>20==KE C3@>70E 8 4@C30O 206=0O 8=D>@<0F8O.QCheck it out and review your scan history, see what we caught, and other results.PeriodicRecapNotification"@>A<>B@5BL >BG5BView summaryPeriodicRecapNotification0I8B0 >B C3@>7, :>B>@0O >A=>2K205BAO =0 B5E=>;>388 8A:CAAB25==>3> 8=B5;;5:B0, A?>A>1=0 >1572@548BL A:@KBK5 C3@>7K 3;C1>:> 2 =54@0E A8AB5<K.4AI powered threat detection to crush hidden threats.PopoutForPEXPT37\5 409B5 E0:5@0< ?>E8B8BL 0H8 CG5B=K5 40==K5.,Block hackers from stealing your login info.PopoutForPEXPT37C?8BLBuy nowPopoutForPEXPT37=D>@<0F8>==0O ?0=5;L, >B>1@060NI0O A>AB>O=85 :815@70I8BK 2 @50;L=>< 2@5<5=8.>Cyberprotection dashboard with your real-time secuirty status.PopoutForPEXPT375B, A?0A81>	No thanksPopoutForPEXPT37t;0B8B5 70 0=B828@CA, :>B>@K9 =5 <>65B C40;8BL 2A5 C3@>7K?(Paying for security that misses threats?PopoutForPEXPT370I8B0 >B A:8<<5@>2, ?KB0NI8EAO ?>E8B8BL 40==K5 :@548B=KE :0@B 8 CG5B=KE 70?8A59.:Protection from credit card skimmers and credential theft.PopoutForPEXPT37F>25@LB5AL Malwarebytes 8 701C4LB5 > ?@>1;5<0E   <K ?@54>AB028< 0< A0<>5 =0456=>5 A@54AB2> 2KO2;5=8O C3@>7. >A?>;L7C9B5AL premium-25@A859, GB>1K C2845BL @07=8FC.tTrade in headaches for peace of mind with Malwarebytes reliable threat detection. Get Premium to see the difference.PopoutForPEXPT37h'B>1K 30@0=B8@>20BL >?B8<0;L=CN ?@>872>48B5;L=>ABL A8AB5<K, 70409B5 @0A?8A0=85 ?@>25@>: B0:8< >1@07><, GB>1K >=8 ?@>2>48;8AL, :>340 :><?LNB5@ 2:;NG5= 8 =0E>48BAO 2 @568<5 >6840=8O.PFor optimal performance, schedule scans for a time your computer is on and idle.ProTipSlideoutPEXPT34*?B8<878@>20BL A59G0AOptimize nowProTipSlideoutPEXPT34V?B8<878@C9B5 ?@>872>48B5;L=>ABL :><?LNB5@0Optimize performanceProTipSlideoutPEXPT34H# 0A C65 5ABL ;8F5=78O? <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://www.malwarebytes.com/'>:B828@C9B5 55 A59G0A</a>Already have a license? <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://www.malwarebytes.com/'>Activate now</a>ProductNotAuthorizedDialog^# 0A C65 5ABL ;8F5=78O? :B828@C9B5 55 A59G0A.%Already have a license? Activate now.ProductNotAuthorizedDialog4=0:> C =0A 5ABL @5H5=85 4;O 187=5A0, A?>A>1=>5 C4>2;5B2>@8BL 0H8 ?>B@51=>AB8. >?@>A8B5 :><0=4C A2>53> IT->B45;0 A2O70BLAO A =0<8, GB>1K ?>;CG8BL 4>?>;=8B5;L=CN 8=D>@<0F8N, 8;8 2K?>;=8B5 >1=>2;5=85 4> Malwarebytes for Teams, GB>1K @5H8BL ?@>1;5<C ?@O<> A59G0A.But we do have a business solution to fit your needs. Please ask your IT team to contact us to learn more or upgrade to Malwarebytes for Teams to solve your issue now.ProductNotAuthorizedDialog:C?8BL Malwarebytes for TeamsBuy Malwarebytes for TeamsProductNotAuthorizedDialog0:@KBLCloseProductNotAuthorizedDialog#7=0BL 1>;LH5
Learn moreProductNotAuthorizedDialogT@>4C:B =5 ;8F5=78@>20= 4;O C40;5=8O C3@>7*Product is not licensed for threat removalProductNotAuthorizedDialog214-4=52=0O ?@>1=0O 25@A8O14-day trialPromoteProductsDialog$ 0AH8@5=85 4;O 1@0C75@0, :>B>@>5 1;>:8@C5B =02O7G82CN @5:;0<C 8 H?8>=OI85 70 0<8 A@54AB20 >BA;56820=8O, 0 B0:65 >B@0605B 0B0:8 >=;09=-<>H5==8:>2.dA browser extension that filters out annoying ads and scams while blocking trackers that spy on you.PromoteProductsDialogbVPN-A5@28A =>2>3> ?>:>;5=8O, :>B>@K9 30@0=B8@C5B ?@820B=>ABL 2 =B5@=5B5, 70I8I05B Wi-Fi-A>548=5=85 8 >15A?5G8205B 1>;55 2KA>:CN A:>@>ABL ?>4:;NG5=8O, G5< 4@C385 VPN-?@8;>65=8O.fA next-gen VPN that helps protect your privacy and secures your WiFi at speeds faster than older VPNs.PromoteProductsDialogR 01>B09B5 2 =B5@=5B5 A?>:>9=> 8 C25@5==>$Experience peace of mind when onlinePromoteProductsDialog"5A?;0B=0O 25@A8OFreePromoteProductsDialog$>;CG8BL 15A?;0B=>Get it freePromoteProductsDialog<0G0BL 15A?;0B=>5 >7=0:><;5=85Start free trialPromoteProductsDialog59B@0;87C5B :815@C3@>7K, :>B>@K5 =5 70<5G0NB >1KG=K5 0=B828@CA=K5 ?@>3@0<<K, 0 B0:65 70I8I05B ;8G=K5 CAB@>9AB20 8 ?5@A>=0;L=K5 40==K5.iStops cyberthreats that traditional antivirus programs miss, keeping your personal devices and data safe.PromoteProductsDialog>1028BLAddProtectedAppsDialog&>1028BL ?@8;>65=85Add an applicationProtectedAppsDialogA5 D09;K (*)
All files (*)ProtectedAppsDialog@8;>65=85ApplicationProtectedAppsDialog$09; ?@8;>65=8OApplication fileProtectedAppsDialog<O ?@8;>65=8OApplication nameProtectedAppsDialog$@8;>65=8O (*.exe)Applications (*.exe)ProtectedAppsDialog
17>@BrowseProtectedAppsDialog@0C75@KBrowsersProtectedAppsDialogB<5=0CancelProtectedAppsDialog2@0C75@K =0 >A=>25 ChromeChrome-based BrowsersProtectedAppsDialog >;L7>20B5;LA:85CustomProtectedAppsDialog> C<>;G0=8NDefaultProtectedAppsDialog>B>2>DoneProtectedAppsDialog0 540:B8@>20BL ?@8;>65=85Edit applicationProtectedAppsDialog(@8<5@: Explorer.exeExample: Explorer.exeProtectedAppsDialog<O D09;0	File nameProtectedAppsDialog2@>83@K20B5;8 <C;LB8<5480
Media PlayersProtectedAppsDialog@C3>5OtherProtectedAppsDialogL@>3@0<<K 4;O ?@>A<>B@0 PDF-4>:C<5=B>2PDF ReadersProtectedAppsDialog"8? ?@>3@0<<KProgram typeProtectedAppsDialog*0I8I5==K5 ?@8;>65=8OProtected applicationsProtectedAppsDialog0I8B0
ProtectionProtectedAppsDialog#40;8BL 2A5
Remove allProtectedAppsDialog!>E@0=8BLSaveProtectedAppsDialogK <>65B5 4>102;OBL 8 @540:B8@>20BL ?>;L7>20B5;LA:85 M;5<5=BK, 2:;NG0BL 8 2K:;NG0BL 8E 70I8BC, 0 B0:65 C40;OBL >B45;L=K5 ?@8;>65=8O 87 A?8A:0 70I8BK (40==>5 459AB285 =5 @5:><5=4C5BAO). <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4-mpa'><u>#7=0BL 1>;LH5</u></a>You can add and edit custom items, turn on and off, and delete (not recommended) individual applications to protect. <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4-mpa'><u>Tell me more</u></a>ProtectedAppsDialogK <>65B5 4>102;OBL 8 @540:B8@>20BL ?>;L7>20B5;LA:85 M;5<5=BK, 2:;NG0BL 8 2K:;NG0BL 8E 70I8BC, 0 B0:65 C40;OBL >B45;L=K5 ?@8;>65=8O 87 A?8A:0 70I8BK (40==>5 459AB285 =5 @5:><5=4C5BAO). <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4-mpa'>#7=0BL 1>;LH5</a>You can add and edit custom items, turn on and off, and delete (not recommended) individual applications to protect. <a style="color:%1;font-family:'Nunito Sans SemiBold';text-decoration:none;" href='https://links.malwarebytes.com/mb4-mpa'>Tell me more</a>ProtectedAppsDialogB<5=0CancelProtectedAppsDialogModelK:;NG5=>DisabledProtectedAppsDialogModel:;NG5=>EnabledProtectedAppsDialogModel*0I8I5==K5 ?@8;>65=8OProtected applicationsProtectedAppsDialogModel#40;8BL 2A5
Remove allProtectedAppsDialogModelP#40;8BL 2A5 ?>;L7>20B5;LA:85 ?@8;>65=8O?Remove all custom applications?ProtectedAppsDialogModelx-B8 ?@8;>65=8O 1>;LH5 =5 1C4CB >B>1@060BLAO 2 40==>< A?8A:5.6These applications will no longer appear on this list.ProtectedAppsDialogModel8-B> ?@8;>65=85 C65 70I8I5=>.,This application is already being protected.ProtectedAppsDialogModel59AB285ActionProtectionAEReport@8;>65=85ApplicationProtectionAEReport@>F5AA>@CPUProtectionAEReport25@A8O ?0:5B0 :><?>=5=B>2Component package versionProtectionAEReport0B0DateProtectionAEReport-:A?;>9BExploitProtectionAEReport*!2545=8O >1 M:A?;>9B5Exploit detailsProtectionAEReport("8? D09;>2>9 A8AB5<KFile System TypeProtectionAEReport"5A?;0B=0O 25@A8OFreeProtectionAEReport" ;L3>B=K9 ?5@8>4In Grace PeriodProtectionAEReport#@>25=LLayerProtectionAEReport8F5=78OLicenseProtectionAEReport8!@>: 459AB28O ;8F5=788 8AB5:License-ExpiredProtectionAEReport5AB>?>;>65=85LocationProtectionAEReport0==K5 6C@=0;0Log detailsProtectionAEReport$09; 6C@=0;0Log fileProtectionAEReport(?5@0F8>==0O A8AB5<0Operating systemProtectionAEReportPremium-25@A8OPremiumProtectionAEReport=D>@<0F8O > Software informationProtectionAEReport(=D>@<0F8O > A8AB5<5System informationProtectionAEReport"5E=>;>38O	TechniqueProtectionAEReport#3@>70ThreatProtectionAEReport,7=0:><8B5;L=0O 25@A8OTrialProtectionAEReportT!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:
Trial-ExpiredProtectionAEReport58725AB=>UnknownProtectionAEReport05@A8O ?0:5B0 >1=>2;5=8OUpdate package versionProtectionAEReport>;L7>20B5;LUserProtectionAEReport5@A8OVersionProtectionAEReport59AB285ActionProtectionARWReport@>F5AA>@CPUProtectionARWReport25@A8O ?0:5B0 :><?>=5=B>2Component package versionProtectionARWReport0B0DateProtectionARWReport$09;FileProtectionARWReport("8? D09;>2>9 A8AB5<KFile System TypeProtectionARWReport"5A?;0B=0O 25@A8OFreeProtectionARWReport" ;L3>B=K9 ?5@8>4In Grace PeriodProtectionARWReport8F5=78OLicenseProtectionARWReport8!@>: 459AB28O ;8F5=788 8AB5:License-ExpiredProtectionARWReport5AB>?>;>65=85LocationProtectionARWReport0==K5 6C@=0;0Log detailsProtectionARWReport$09; 6C@=0;0Log fileProtectionARWReport(?5@0F8>==0O A8AB5<0Operating systemProtectionARWReportPremium-25@A8OPremiumProtectionARWReport>!2545=8O > ?@>3@0<<5-2K<>30B5;5Ransomware detailsProtectionARWReport=D>@<0F8O > Software informationProtectionARWReport(=D>@<0F8O > A8AB5<5System informationProtectionARWReport#3@>70ThreatProtectionARWReport,7=0:><8B5;L=0O 25@A8OTrialProtectionARWReportT!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:
Trial-ExpiredProtectionARWReport"8?TypeProtectionARWReport58725AB=>UnknownProtectionARWReport05@A8O ?0:5B0 >1=>2;5=8OUpdate package versionProtectionARWReport>;L7>20B5;LUserProtectionARWReport5@A8OVersionProtectionARWReport#7=0BL 1>;LH5
Learn moreProtectionDisabledNotification^48= 8;8 =5A:>;L:> C@>2=59 70I8BK 2 @50;L=>< 2@5<5=8 >B:;NG5=K. :;NG8B5 2A5 C@>2=8, GB>1K ?>;CG8BL ?>;=CN 70I8BC >B C3@>7. 0AB@08209B5 C@>2=8 70I8BK 2 8=D>@<0F8>==>9 ?0=5;8.One or more Real-Time Protection layers are turned off. Turn on all layers for full protection against threats. Manage protection layers from the dashboard.ProtectionDisabledNotificationH0I8B0 2 @50;L=>< 2@5<5=8 >B:;NG5=0  Real-Time Protection turned off ProtectionDisabledNotification:;NG8BLTurn OnProtectionDisabledNotificationT80;>3>2>5 >:=> 5654=52=>3> 6C@=0;0 70I8BKDaily Protection DialogProtectionLogDialog0654=52=K9 6C@=0; 70I8BKDaily Protection LogProtectionLogDialog-:A?>@BExportProtectionLogDialogOKOKProtectionLogDialogR45AL K <>65B5 ?@>A<>B@5BL 2A5 A>1KB8O 70I8BK 8 A>1KB8O ?@>3@0<<K, :>B>@K5 ?@>87>H;8 70 MB>B 45=L. 06<8B5 :=>?:C -:A?>@B, GB>1K A>E@0=8BL 6C@=0; 2 2K1@0==>< D>@<0B5.Review all protection and application events that occurred for the given day. Click the Export button to output the log to the format of your choice.ProtectionLogDialog<01;>:8@>20==K5 1@CBD>@A-0B0:8Blocked brute force activityProtectionMWACReportH!2545=8O > 701;>:8@>20==>< 251-A09B5Blocked website detailsProtectionMWACReport@>F5AA>@CPUProtectionMWACReport0B53>@8OCategoryProtectionMWACReport25@A8O ?0:5B0 :><?>=5=B>2Component package versionProtectionMWACReport"8? A>548=5=8OConnection TypeProtectionMWACReport0B0DateProtectionMWACReport
><5=DomainProtectionMWACReport$09;FileProtectionMWACReport("8? D09;>2>9 A8AB5<KFile System TypeProtectionMWACReport"5A?;0B=0O 25@A8OFreeProtectionMWACReportIP-04@5A
IP AddressProtectionMWACReport" ;L3>B=K9 ?5@8>4In Grace PeriodProtectionMWACReport8F5=78OLicenseProtectionMWACReport8!@>: 459AB28O ;8F5=788 8AB5:License-ExpiredProtectionMWACReport0==K5 6C@=0;0Log detailsProtectionMWACReport$09; 6C@=0;0Log fileProtectionMWACReport(?5@0F8>==0O A8AB5<0Operating systemProtectionMWACReport>@BPortProtectionMWACReportPremium-25@A8OPremiumProtectionMWACReport=D>@<0F8O > Software informationProtectionMWACReport(=D>@<0F8O > A8AB5<5System informationProtectionMWACReport,7=0:><8B5;L=0O 25@A8OTrialProtectionMWACReportT!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:
Trial-ExpiredProtectionMWACReport"8?TypeProtectionMWACReport58725AB=>UnknownProtectionMWACReport05@A8O ?0:5B0 >1=>2;5=8OUpdate package versionProtectionMWACReport>;L7>20B5;LUserProtectionMWACReport5@A8OVersionProtectionMWACReportE>4OI89 B@0D8:InboundProtectionNotificationsModel@54>=>A=>5 MalwareProtectionNotificationsModel6Malware Heuristic WebThreatMalware Heuristic WebThreatProtectionNotificationsModel AE>4OI89 B@0D8:OutboundProtectionNotificationsModelT>B5=F80;L=> =565;0B5;L=>5 87<5=5=85 (PUM)'Potentially Unwanted Modification (PUM)ProtectionNotificationsModelT>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0 (PUP)"Potentially Unwanted Program (PUP)ProtectionNotificationsModelP@>4>;68BL A 15A?;0B=>9 ?@>1=>9 25@A859 Continue free trial ProtectionPlansDialog2>;CG8B5 70I8BC 2 @50;L=>< 2@5<5=8 8 ?>;L7C9B5AL @0AH8@5==K<8 DC=:F8O<8 G5BK@5EC@>2=52>9 70I8BK, GB>1K 1;>:8@>20BL C3@>7K, ?>AB>O==> CA:>;L70NI85 >B >1KG=KE 0=B828@CA=KE A@54AB2. F5=8B5 ?@58<CI5AB20 MB>3> ?@>4C:B0 2 B5G5=85 14-4=52=>3> ?@>1=>3> ?5@8>40 8;8 :C?8B5 ?>4?8A:C ?@O<> A59G0A, >15A?5G82 4;O A51O =0456=CN 70I8BC =0 F5;K9 3>4.Get Real-Time Protection and get the power of four layers of advanced security to block the threats traditional antiviruses miss. Enjoy this during your 14-day trial or upgrade now for a full year of security.ProtectionPlansDialog2*!<>B@5BL ?;0=K 70I8BKSee protection plansProtectionPlansDialog2.AB0209B5AL 70I8I5==K<8Stay protectedProtectionPlansDialog259AB285ActionProtectionRTPReport@>F5AA>@CPUProtectionRTPReport25@A8O ?0:5B0 :><?>=5=B>2Component package versionProtectionRTPReport0B0DateProtectionRTPReport("8? D09;>2>9 A8AB5<KFile System TypeProtectionRTPReport"5A?;0B=0O 25@A8OFreeProtectionRTPReportIDIDProtectionRTPReport" ;L3>B=K9 ?5@8>4In Grace PeriodProtectionRTPReport8F5=78OLicenseProtectionRTPReport8!@>: 459AB28O ;8F5=788 8AB5:License-ExpiredProtectionRTPReport5AB>?>;>65=85LocationProtectionRTPReport0==K5 6C@=0;0Log detailsProtectionRTPReport$09; 6C@=0;0Log fileProtectionRTPReport@54>=>A=>5 MalwareProtectionRTPReport2!2545=8O > 2@54>=>A=>< Malware detailsProtectionRTPReport(?5@0F8>==0O A8AB5<0Operating systemProtectionRTPReportPremium-25@A8OPremiumProtectionRTPReport=D>@<0F8O > Software informationProtectionRTPReport(=D>@<0F8O > A8AB5<5System informationProtectionRTPReport#3@>70ThreatProtectionRTPReport,7=0:><8B5;L=0O 25@A8OTrialProtectionRTPReportT!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:
Trial-ExpiredProtectionRTPReport"8?TypeProtectionRTPReport58725AB=>UnknownProtectionRTPReport05@A8O ?0:5B0 >1=>2;5=8OUpdate package versionProtectionRTPReport>;L7>20B5;LUserProtectionRTPReport5@A8OVersionProtectionRTPReport" 0AH8@5==K5 >?F88AdvancedProtectionReportDialog0:@KBLCloseProtectionReportDialog2>?8@>20BL 2 1CD5@ >1<5=0Copy to clipboardProtectionReportDialog-:A?>@BExportProtectionReportDialog(-:A?>@B8@>20BL 2 TXT
Export to TXTProtectionReportDialog>BG5B: 01;>:8@>20==K9 251-A09BReport: Blocked websiteProtectionReportDialog<BG5B: 0I8B0 >B 1@CBD>@A-0B0:Report: Brute force protectionProtectionReportDialog8BG5B: -:A?;>9B 701;>:8@>20=Report: Exploit blockedProtectionReportDialogFBG5B: @54>=>A=>5  701;>:8@>20=>Report: Malware blockedProtectionReportDialogRBG5B: @>3@0<<0-2K<>30B5;L 701;>:8@>20=0Report: Ransomware blockedProtectionReportDialog@BG5B: >AAB0=>28BL 87 :0@0=B8=0Report: UnquarantineProtectionReportDialog!2>4:0SummaryProtectionReportDialog 5:;0<=>5 AdwareProtectionReportDialogModelA5 D09;K (*)
All files (*)ProtectionReportDialogModel01;>:8@>20=>BlockedProtectionReportDialogModel4!:><?@><5B8@>20==K5 40==K5CompromisedProtectionReportDialogModel>B>: 40==KEData StreamProtectionReportDialogModel0#40;8BL ?@8 ?5@5703@C7:5Delete-on-RebootProtectionReportDialogModel-:A?;>9BExploitProtectionReportDialogModel$09;FileProtectionReportDialogModel
0?:0FolderProtectionReportDialogModel$815@<>H5==8G5AB2>FraudProtectionReportDialogModel5@5E20B 40==KEHijackProtectionReportDialogModel(E>4OI55 ?>4:;NG5=85Inbound ConnectionProtectionReportDialogModel(@54>=>A=K9 251-A09BMalicious WebsiteProtectionReportDialogModel&@54>=>A=0O @5:;0<0MalvertisingProtectionReportDialogModel@54>=>A=>5 MalwareProtectionReportDialogModel>4C;LModuleProtectionReportDialogModel/N/AProtectionReportDialogModel:@>83=>@8@>20=> ?>;L7>20B5;5<No Action By UserProtectionReportDialogModel*AE>4OI55 ?>4:;NG5=85Outbound ConnectionProtectionReportDialogModelH>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0PUPProtectionReportDialogModelJ>H5==8G5A:85 D0@<0F52B8G5A:85 40==K5PharmaProtectionReportDialogModel$8H8=3PhishingProtectionReportDialogModel"$878G5A:89 A5:B>@Physical SectorProtectionReportDialogModel@>F5AAProcessProtectionReportDialogModel&><5I5=> 2 :0@0=B8=QuarantinedProtectionReportDialogModel(@>3@0<<K-2K<>30B5;8
RansomwareProtectionReportDialogModel0==K5 @55AB@0
Registry DataProtectionReportDialogModel 0745; @55AB@0Registry KeyProtectionReportDialogModel =0G5=85 @55AB@0Registry ValueProtectionReportDialogModelN>4:;NG5=85 : C40;5==><C @01>G5<C AB>;CRemote desktop connectionProtectionReportDialogModel&#40;5=85 =5 C40;>ALRemoval FailedProtectionReportDialogModel:5@570?8A0BL ?@8 ?5@5703@C7:5Replace-on-RebootProtectionReportDialogModel5@570?8A0=>ReplacedProtectionReportDialogModel<>B5=F80;L=> >?0A=K5 ?@>3@0<<KRiskWareProtectionReportDialogModel!>E@0=8BL D09;	Save fileProtectionReportDialogModel!?0<SpamProtectionReportDialogModel&(?8>=A:85 ?@>3@0<<KSpywareProtectionReportDialogModel."5:AB>2K5 D09;K (*.txt)Text files (*.txt)ProtectionReportDialogModel&"@>O=A:85 ?@>3@0<<KTrojanProtectionReportDialogModel4>AAB0=>2;5=> 87 :0@0=B8=0
UnquarantinedProtectionReportDialogModel5 C:070=>UnspecifiedProtectionReportDialogModel
'5@28WormProtectionReportDialogModel8A:DriveQFileDialog 5:;0<=>5 AdwareQObject0> 2@5<O @568<0 >6840=8OAt idle timeQObject01;>:8@>20=>BlockedQObject@CBD>@A-0B0:0Brute force attackQObjectB<5=0CancelQObject4!:><?@><5B8@>20==K5 40==K5CompromisedQObject>B>: 40==KEData StreamQObject0#40;8BL ?@8 ?5@5703@C7:5Delete-on-RebootQObject-:A?;>9BExploitQObject$09;FileQObject$09; A>E@0=5=
File SavedQObject
0?:0FolderQObject$815@<>H5==8G5AB2>FraudQObject5@5E20B 40==KEHijackQObjectE>4OI89 B@0D8:InboundQObject&@54>=>A=0O @5:;0<0MalvertisingQObject@54>=>A=>5 MalwareQObject~> 2@5<O ?@>25@:8 ?@>3@0<<0 Malwarebytes AB>;:=C;0AL A >H81:>9.7Malwarebytes encountered an error while running a Scan.QObject:@>83=>@8@>20=> ?>;L7>20B5;5<No Action By UserQObjectOKOkQObjectB:@KBLOpenQObject AE>4OI89 B@0D8:OutboundQObjectH>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0PUPQObjectJ>H5==8G5A:85 D0@<0F52B8G5A:85 40==K5PharmaQObject$8H8=3PhishingQObject"$878G5A:89 A5:B>@Physical SectorQObjectPremium-25@A8OPremiumQObject@>F5AAProcessQObject>4C;L ?@>F5AA0Process ModuleQObject&><5I5=> 2 :0@0=B8=QuarantinedQObject@1J5:B 2>AAB0=>2;5= 87 :0@0=B8=0Quarantined item restoredQObject(@>3@0<<K-2K<>30B5;8
RansomwareQObject0==K5 @55AB@0
Registry DataQObject 0745; @55AB@0Registry KeyQObject =0G5=85 @55AB@0Registry ValueQObject&#40;5=85 =5 C40;>ALRemoval FailedQObject:5@570?8A0BL ?@8 ?5@5703@C7:5Replace-on-RebootQObject5@570?8A0=>ReplacedQObject<>B5=F80;L=> >?0A=K5 ?@>3@0<<KRiskWareQObject!?0<SpamQObject&(?8>=A:85 ?@>3@0<<KSpywareQObject&"@>O=A:0O ?@>3@0<<0TrojanQObject">2B>@8B5 ?>?KB:C	Try AgainQObject(58725AB=>5 459AB285Unknown ActionQObject4>AAB0=>2;5=> 87 :0@0=B8=0
UnquarantinedQObject5 C:070=>UnspecifiedQObject5 C:070=>MBMWACControllerEnumsUnspecifiedQObjectN=AB@C<5=B0@89 C?@02;5=8O Windows (WMI)WMIQObject
'5@28WormQObjectF0H D09; 1K; CA?5H=> M:A?>@B8@>20=.)Your file has been successfully exported.QObject,%n >1J5:B 2>AAB0=>2;5=>%n 87 %1 >1J5:B>2 2>AAB0=>2;5=K>%n 87 %1 >1J5:B>2 2>AAB0=>2;5=K%n of %1 item(s) restoredQuarantinePageXK 459AB28B5;L=> E>B8B5 C40;8BL MB>B >1J5:B?XK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK?XK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK?.Are you sure you want to delete these item(s)?QuarantinePagebK 459AB28B5;L=> E>B8B5 2>AAB0=>28BL MB>B >1J5:B?bK 459AB28B5;L=> E>B8B5 2>AAB0=>28BL MB8 >1J5:BK?bK 459AB28B5;L=> E>B8B5 2>AAB0=>28BL MB8 >1J5:BK?/Are you sure you want to restore these item(s)?QuarantinePage0B0DateQuarantinePage#40;8BLDeleteQuarantinePage#40;8BL 2A5
Delete AllQuarantinePageL#40;8BL >1J5:BK, ?><5I5==K5 2 :0@0=B8=Delete Quarantined ItemsQuarantinePageA;8 K >1=0@C68;8 =0456=K9 D09;, 2>A?>;L7C9B5AL :=>?:>9 >AAB0=>28BL, GB>1K 25@=CBL 53>.DIf you recognize a trusted file, use “Restore” to bring it back.QuarantinePage1J5:BK, ?><5I5==K5 2 :0@0=B8=, 1>;LH5 =5 ?@54AB02;ONB >?0A=>AB8.,Items in Quarantine no longer pose a threat.QuarantinePage5AB>?>;>65=85LocationQuarantinePage<ONameQuarantinePage0@0=B8=
QuarantineQuarantinePage>AAB0=>28BLRestoreQuarantinePageB>AAB0=>28BL >1J5:BK 87 :0@0=B8=0Restore Quarantined ItemsQuarantinePage@>3@0<<0 Malwarebytes Anti-Ransomware ?><5AB8;0 MB8 C3@>7K 2 :0@0=B8=. =8 1>;LH5 =5 ?@54AB02;ONB >?0A=>AB8. K <>65B5 2>AAB0=>28BL 8;8 C40;8BL 8E. #40;5==K5 87 :0@0=B8=0 C3@>7K 1C4CB C=8GB>65=K =02A5340.These threats have been quarantined by your Malwarebytes Anti-Ransomware. They do not pose a threat when quarantined. You may restore or delete these threats. Threats deleted from quarantine will be permanently removed from your computer.QuarantinePage<O C3@>7KThreat NameQuarantinePage"8?TypeQuarantinePagenK1@0==K9 M;5<5=B ?><5G5= 4;O C40;5=8O ?@8 ?5@5703@C7:5!A selected item is marked for DORQuarantinePageModelH81:0ErrorQuarantinePageModel$09;FileQuarantinePageModel
0?:0FolderQuarantinePageModel>4C;LModuleQuarantinePageModel"$878G5A:89 A5:B>@Physical SectorQuarantinePageModel@>F5AAProcessQuarantinePageModel 0745; @55AB@0Registry KeyQuarantinePageModel =0G5=85 @55AB@0Registry ValueQuarantinePageModel5;L7O >ACI5AB28BL >?5@0F8N 2>AAB0=>2;5=8O, ?>:0 =5 1C45B 2K?>;=5=0 70?;0=8@>20==0O ?5@5703@C7:0.VThe Restore operation cannot be performed until the pending reboot has been completed.QuarantinePageModel!8AB5<5 =5 C40;>AL 2>AAB0=>28BL C:070==K5 >1J5:BK! >60;C9AB0, >1@0B8B5AL : 6C@=0;C A;C61K.SThe system was unable to restore the specified items! Please check the service log.QuarantinePageModel5 C405BAO 2>AAB0=>28BL >48= 8;8 =5A:>;L:> >1J5:B>2, ?><5I5==KE 2 :0@0=B8=.0Unable to restore one or more quarantined items.QuarantinePageModel5 C405BAO 2>AAB0=>28BL >48= 8;8 =5A:>;L:> M;5<5=B>2, ?><5I5==KE 2 :0@0=B8=: %13Unable to restore one or more quarantined items: %1QuarantinePageModelN=AB@C<5=B0@89 C?@02;5=8O Windows (WMI)WMIQuarantinePageModel1=0@C65=> 8 701;>:8@>20=> 70I8B>9 2 @50;L=>< 2@5<5=8: %1. -B>B >1J5:B 1>;LH5 =5 ?@54AB02;O5B >?0A=>AB8I%1 detected and blocked by Real-Time Protection. It is no longer a threat"RTPBlockedNoQuarantineNotification0:@KBLClose"RTPBlockedNoQuarantineNotification@54>=>A=>5 Malware"RTPBlockedNoQuarantineNotification8@54>=>A=>5  701;>:8@>20=>Malware blocked"RTPBlockedNoQuarantineNotification<O:Name:"RTPBlockedNoQuarantineNotificationd>B5=F80;L=> =565;0B5;L=>5 87<5=5=85 701;>:8@>20=>PUM blocked"RTPBlockedNoQuarantineNotificationd>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0 701;>:8@>20=0PUP blocked"RTPBlockedNoQuarantineNotification
CBL:Path:"RTPBlockedNoQuarantineNotificationH>B5=F80;L=> =565;0B5;L=>5 87<5=5=85!Potentially Unwanted Modification"RTPBlockedNoQuarantineNotificationH>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0Potentially Unwanted Program"RTPBlockedNoQuarantineNotification"8?:Type:"RTPBlockedNoQuarantineNotification0:@KBLCloseRTPBlockedNotification8@54>=>A=>5  701;>:8@>20=>Malware blockedRTPBlockedNotification<O:Name:RTPBlockedNotification B:@KBL :0@0=B8=Open QuarantineRTPBlockedNotificationd>B5=F80;L=> =565;0B5;L=>5 87<5=5=85 701;>:8@>20=>PUM blockedRTPBlockedNotificationd>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0 701;>:8@>20=0PUP blockedRTPBlockedNotification
CBL:Path:RTPBlockedNotification\0I8B0 2 @50;L=>< 2@5<5=8 >1=0@C68;0 8 02B><0B8G5A:8 ?><5AB8;0 2 :0@0=B8= ?>B5=F80;L=> =565;0B5;L=>5 87<5=5=85. 'B>1K 2>AAB0=>28BL 8;8 C40;8BL MB>B >1J5:B, >B:@>9B5 :0@0=B8=.Real-Time Protection detected and automatically quarantined a Potentially Unwanted Modification. To restore or delete the item, open the Quarantine.RTPBlockedNotification`0I8B0 2 @50;L=>< 2@5<5=8 >1=0@C68;0 8 02B><0B8G5A:8 ?><5AB8;0 2 :0@0=B8= ?>B5=F80;L=> =565;0B5;L=CN ?@>3@0<<C. 'B>1K 2>AAB0=>28BL 8;8 C40;8BL MBC ?@>3@0<<C, >B:@>9B5 :0@0=B8=.Real-Time Protection detected and automatically quarantined a Potentially Unwanted Program. To restore or delete the program, open the Quarantine.RTPBlockedNotification40I8B0 2 @50;L=>< 2@5<5=8 >1=0@C68;0 8 02B><0B8G5A:8 ?><5AB8;0 2 :0@0=B8= 2@54>=>A=K9 D09;. 'B>1K ?>;=>ABLN C40;8BL MB> 2@54>=>A=>5 , >B:@>9B5 :0@0=B8=.Real-Time Protection detected and automatically quarantined a malicious file. To delete the malware entirely, open the Quarantine.RTPBlockedNotification"8?:Type:RTPBlockedNotification>ABC?=>	AvailableRTPCard815@C3@>7K :>20@=K. C4LB5 =0 H03 2?5@548 C3@>7 8 70I8B8B5 A2>5 CAB@>9AB2> 2 @50;L=>< 2@5<5=8.aCyberthreats are sneaky. Stay ahead of them and shield your device with our Real-Time Protection.RTPCard-:A?;>9BKExploitsRTPCard-:A?;>9BK O2;ONBAO @57C;LB0B>< <5=55 :@50B82=>3> B@C40 :815@?@5ABC?=8:>2. =8 =5 >B;8G0NBAO 87>I@5==>ABLN, 0 ?@>AB> =0F5;820NBAO =0 C65 8725AB=K5 CO728<>AB8 2 ?@>3@0<<0E, GB>1K ?5@5E20B8BL :>=B@>;L =04 DC=:F8O<8 CAB@>9AB20.Exploits are the lazier, less creative type of threat. They don't flex their muscle, they simply use already known vulnerabilities in your software and abuse them to take control of your device.RTPCard*@54>=>A=K5 251-A09BKMalicious sitesRTPCardj@54>=>A=>5  8 ?>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<KMalware and PUPsRTPCard@54>=>A=>5  <>65B 8<5BL @07;8G=CN D>@<C   >B 28@CA>2, H?8>=A:8E ?@>3@0<< 8 ?@>3@0<<-2K<>30B5;59 4> B@>O=A:8E ?@>3@0<< 8 B. ?. >B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K >1KG=> 4>A0640NB 2A?;K20NI8<8 >:=0<8, =5=C6=K<8 ?0=5;O<8 8=AB@C<5=B>2 8;8 @5:;0<>9.  07C<55BAO, =8 2@54>=>A=>5 , =8 ?>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K =5 AB0=CB 65;0==K<8 3>ABO<8 =0 0H5< CAB@>9AB25.DMalware is short for malicious software, and it can take many forms from viruses, spyware, ransomware, trojan horses, and more. PUPs is short for Potentially Unwanted Programs, and they are usually things like pop-ups, unnecessary toolbars, or advertising. In short, you don't want Malware or PUPs anywhere near your device.RTPCard>74@02;O5<! # 2@54>=>A=>3> , H?8>=A:8E ?@>3@0<< 8 ?@>3@0<<-2K<>30B5;59 =5B =8 548=>3> H0=A0.FNice work! Malware, spyware, ransomware and more don't stand a chance.RTPCard54>ABC?=>
Not availableRTPCard.">;L:> 2 premium-25@A88Premium onlyRTPCard(@>3@0<<K-2K<>30B5;8
RansomwareRTPCard>@>3@0<<K-2K<>30B5;8   MB> 28@CAK, ?@8 2845 :>B>@KE 2A5 =0G8=0NB 4@>60BL >B AB@0E0. =8 70H8D@>2K20NB 0H8 D09;K 8 B@51CNB 70?;0B8BL 2K:C? 70 2>AAB0=>2;5=85 4>ABC?0. >MB><C, 5A;8 B>;L:> K =5 8A?KBK205B5 6064C >?0A=KE ?@8:;NG5=89, =5 ?>72>;O9B5 MB8< >1J5:B0< ?>?0ABL =0 0H5 CAB@>9AB2>.Ransomware is a virus that makes all others tremble in fear. It encrypts your files and demands payment for their release. So unless you're thirsty for danger - don't get taken for a ride.RTPCard20I8B0 2 @50;L=>< 2@5<5=8Real-Time ProtectionRTPCard>B >A=>2=K5 ?@>4C:BK 7;>C<KH;5==8:>2. @54>=>A=K5 251-A09BK <0A:8@CNBAO ?>4 =0AB>OI85, AB@5<OAL ?>E8B8BL 0H8 40==K5.These are nasty little devils. Malicious sites masquerade as legit websites, but under that facade, they're designed to steal your data.RTPCard1=>28BLUpgradeRTPCard0:@KBLCloseRTPErrorNotification803@C78B5 A@54AB2> ?>445@6:8Download Support ToolRTPErrorNotification48= 8;8 =5A:>;L:> C@>2=59 70I8BK =5 >B25G0NB.
;O ?>;CG5=8O 4>?>;=8B5;L=>9 ?>445@6:8, ?>60;C9AB0, 703@C78B5 Malwarebytes Support Tool.xOne or more protection layers are not responding.
For further assistance, please download the Malwarebytes Support Tool.RTPErrorNotificationR>7=8:;0 >H81:0 70I8BK 2 @50;L=>< 2@5<5=8#Real-Time Protection error occurredRTPErrorNotification@54>=>A=>5 MalwareRTPExclusionController59AB285ActionRansomwareReportsPageA5 D09;K (*)
All files (*)RansomwareReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK >BG5B0?3Are you sure you want to delete these report items?RansomwareReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB>B >1J5:B >BG5B0?1Are you sure you want to delete this report item?RansomwareReportsPage
0704BackRansomwareReportsPage0B0DateRansomwareReportsPage*#40;8BL >1J5:B >BG5B0Delete Report ItemRansomwareReportsPage,#40;8BL >1J5:BK >BG5B0Delete Report ItemsRansomwareReportsPage">A;54=85 30 4=59Last 30 daysRansomwareReportsPage5AB>?>;>65=85LocationRansomwareReportsPageH01;>:8@>20==K5 ?@>3@0<<K-2K<>30B5;8Ransomware blockedRansomwareReportsPage!>E@0=8BL D09;	Save fileRansomwareReportsPage."5:AB>2K5 D09;K (*.txt)Text files (*.txt)RansomwareReportsPage#3@>70ThreatRansomwareReportsPage"8?TypeRansomwareReportsPage(0I8B0 >B M:A?;>9B>2Exploit ProtectionRealTimeProtectionCard<0I8B0 >B 2@54>=>A=KE ?@>3@0<<Malware ProtectionRealTimeProtectionCard.">;L:> 2 premium-25@A88Premium onlyRealTimeProtectionCard<0I8B0 >B ?@>3@0<<-2K<>30B5;59Ransomware ProtectionRealTimeProtectionCard20I8B0 2 @50;L=>< 2@5<5=8Real-Time ProtectionRealTimeProtectionCard@>4;8BL A59G0A	Renew nowRealTimeProtectionCard1=>28B5 ?>4?8A:C, GB>1K >1572@56820BL 2@54>=>A=>5  4> B>3>, :0: >=> A<>65B =02@548BL A8AB5<5=Renew your subscription to stop infections before they happenRealTimeProtectionCard*>?@>1>20BL 15A?;0B=>Try now for freeRealTimeProtectionCard 071;>:8@C9B5 DC=:F8N 70I8BK 2 @50;L=>< 2@5<5=8, GB>1K >1572@56820BL 2@54>=>A=>5  4> B>3>, :0: >=> A<>65B =02@548BL A8AB5<5AUnlock Real-Time Protection to stop infections before they happenRealTimeProtectionCard1=>28B5 ?@>3@0<<C, GB>1K 1;>:8@>20BL 28@CAK 4> B>3>, :0: >=8 A<>3CB =02@548BL 0<-Upgrade to stop infections before they happenRealTimeProtectionCard,0I8B0 2 A5B8 =B5@=5BWeb ProtectionRealTimeProtectionCard20I8B0 2 @50;L=>< 2@5<5=8Real-Time ProtectionRealTimeProtectionPage59AB285ActionRealTimeProtectionReportsPageA5 D09;K (*)
All files (*)RealTimeProtectionReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK >BG5B0?3Are you sure you want to delete these report items?RealTimeProtectionReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB>B >1J5:B >BG5B0?1Are you sure you want to delete this report item?RealTimeProtectionReportsPage
0704BackRealTimeProtectionReportsPage0B0DateRealTimeProtectionReportsPage*#40;8BL >1J5:B >BG5B0Delete Report ItemRealTimeProtectionReportsPage,#40;8BL >1J5:BK >BG5B0Delete Report ItemsRealTimeProtectionReportsPage">A;54=85 30 4=59Last 30 daysRealTimeProtectionReportsPage5AB>?>;>65=85LocationRealTimeProtectionReportsPage|01;>:8@>20==K5 >?0A=K5 8 ?>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<KMalware and PUPs blockedRealTimeProtectionReportsPage!>E@0=8BL D09;	Save fileRealTimeProtectionReportsPage."5:AB>2K5 D09;K (*.txt)Text files (*.txt)RealTimeProtectionReportsPage#3@>70ThreatRealTimeProtectionReportsPage"8?TypeRealTimeProtectionReportsPage%n 45=L%n 45=L%n 45=L%n dayRebootRequiredNotification%n G0A%n G0A%n G0A%n hourRebootRequiredNotification%n <8=CB%n <8=CB%n <8=CB
%n minutesRebootRequiredNotification0?><=8BL G5@57Remind me inRebootRequiredNotification.5@5703@C78BL :><?LNB5@Restart computerRebootRequiredNotification("@51C5BAO ?5@570?CA:Restart requiredRebootRequiredNotification'B>1K 7025@H8BL CAB0=>2:C ?>A;54=53> >1=>2;5=8O, =C6=> ?5@5703@C78BL :><?LNB5@.ETo finish installing a recent update, your computer needs to restart.RebootRequiredNotification$%1 G, %2 <8=, %3 A%1 hr, %2 min, %3 secReportExporter%1 <8=, %2 A%1 min, %2 secReportExporterJ(@54>=>A=K5 ?@>3@0<<K =5 >1=0@C65=K)(No malicious items detected)ReportExporter*0B@>=CB>5 ?@8;>65=85Affected ApplicationReportExporter@E82KArchivesReportExporter01;>:8@>20=>BlockedReportExporterR!2545=8O > 701;>:8@>20==>< 2@54>=>A=>< Blocked Malware DetailsReportExporterH!2545=8O > 701;>:8@>20==>< 251-A09B5Blocked Website DetailsReportExporter<01;>:8@>20==K5 1@CBD>@A-0B0:8Blocked brute force activityReportExporter@>F5AA>@CPUReportExporterB<5=5=>	CancelledReportExporter0B53>@8OCategoryReportExporter025@H5=>	CompletedReportExporter$5@A8O :><?>=5=B>2Components VersionReportExporter&K1>@>G=0O ?@>25@:0Custom ScanReportExporter>B>: 40==KEData StreamReportExporter0#40;8BL ?@8 ?5@5703@C7:5Delete-on-RebootReportExporter1=0@C65=85DetectReportExporterK:;NG5=>DisabledReportExporter
><5=DomainReportExporter:;NG5=>EnabledReportExporterH81:0ErrorReportExporterAB5:H0O 25@A8OExpiredReportExporter-:A?;>9BExploitReportExporter.=D>@<0F8O >1 M:A?;>9B5Exploit DataReportExporter*!2545=8O >1 M:A?;>9B5Exploit DetailsReportExporter5 C40;>ALFailedReportExporter$09;FileReportExporter<O D09;0	File NameReportExporter$09; A>E@0=5=
File SavedReportExporter $09;>20O A8AB5<0File SystemReportExporter $09;>20O A8AB5<0
FilesystemReportExporter
0?:0FolderReportExporter"5A?;0B=0O 25@A8OFreeReportExporter-2@8AB8:0
HeuristicsReportExporterIP-04@5A
IP AddressReportExporter3=>@8@>20BLIgnoreReportExporterE>4OI89 B@0D8:InboundReportExporter8F5=78OLicenseReportExporter0==K5 6C@=0;0Log DetailsReportExporter$09; 6C@=0;0Log FileReportExporter(@54>=>A=K9 251-A09BMalicious WebsiteReportExporter@CG=CNManualReportExporter0<OBLMemoryReportExporter>4C;LModuleReportExporter:@>83=>@8@>20=> ?>;L7>20B5;5<No Action By UserReportExporter!OSReportExporter$@>25@5=> >1J5:B>2Objects ScannedReportExporterOKOkReportExporterB:@KBLOpenReportExporter AE>4OI89 B@0D8:OutboundReportExporterT>B5=F80;L=> =565;0B5;L=>5 87<5=5=85 (PUM)PUMReportExporterH>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0PUPReportExporter"$878G5A:89 A5:B>@Physical SectorReportExporter>@BPortReportExporterPremium-25@A8OPremiumReportExporter@Premium-25@A8O 2 ;L3>B=K9 ?5@8>4Premium in Grace PeriodReportExporter@>F5AAProcessReportExporter&0B0 A>1KB8O 70I8BKProtection Event DateReportExporter(@5<O A>1KB8O 70I8BKProtection Event TimeReportExporter#@>25=L 70I8BKProtection LayerReportExporter5B>4 70I8BKProtection TechniqueReportExporter&><5I5=> 2 :0@0=B8=QuarantinedReportExporter KAB@0O ?@>25@:0
Quick ScanReportExporter>!2545=8O > ?@>3@0<<5-2K<>30B5;5Ransomware DetailsReportExporter0==K5 @55AB@0
Registry DataReportExporter 0745; @55AB@0Registry KeyReportExporter =0G5=85 @55AB@0Registry ValueReportExporter&#40;5=85 =5 C40;>ALRemoval FailedReportExporter:5@570?8A0BL ?@8 ?5@5703@C7:5Replace-on-RebootReportExporter5@570?8A0=>ReplacedReportExporter 57C;LB0BResultReportExporter CB:8BKRootkitsReportExporter0B0 ?@>25@:8	Scan DateReportExporter0==K5 ?@>25@:8Scan DetailsReportExporter.!?>A>1 70?CA:0 ?@>25@:8Scan Initiated ByReportExporter$0AB@>9:8 ?@>25@:8Scan OptionsReportExporter BG5B > ?@>25@:5Scan SummaryReportExporter@5<O ?@>25@:8	Scan TimeReportExporter"8? ?@>25@:8	Scan TypeReportExporter;0=8@>2I8:	SchedulerReportExporter=D>@<0F8O > Software InformationReportExporter2B>703@C7:0StartupReportExporter(=D>@<0F8O > A8AB5<5System InformationReportExporter>;=0O ?@>25@:0Threat ScanReportExporter 1=0@C65=> C3@>7Threats DetectedReportExporter&><5I5=> 2 :0@0=B8=Threats QuarantinedReportExporter"0B@0G5==>5 2@5<OTime ElapsedReportExporter,7=0:><8B5;L=0O 25@A8OTrialReportExporterT!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:
Trial ExpiredReportExporter"8?TypeReportExporterURL-04@5AURLReportExporter58725AB=>UnknownReportExporter58725AB=K9 B8?Unknown typeReportExporter2>AAB0=>28BL 87 :0@0=B8=0UnquarantineReportExporter05@A8O ?0:5B0 >1=>2;5=8OUpdate Package VersionReportExporter>;L7>20B5;LUserReportExporter5@A8OVersionReportExporterN=AB@C<5=B0@89 C?@02;5=8O Windows (WMI)WMIReportExporter@54C?@548BLWarnReportExporter,=D>@<0F8O > 251-A09B5Website DataReportExporterF0H D09; 1K; CA?5H=> M:A?>@B8@>20=.)Your file has been successfully exported.ReportExporter59AB285ActionReportsPageA5 D09;K (*)
All files (*)ReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK >BG5B0?3Are you sure you want to delete these report items?ReportsPagefK 459AB28B5;L=> E>B8B5 C40;8BL MB>B >1J5:B >BG5B0?1Are you sure you want to delete this report item?ReportsPage0B0 8 2@5<O
Date and TimeReportsPage*#40;8BL >1J5:B >BG5B0Delete Report ItemReportsPage,#40;8BL >1J5:BK >BG5B0Delete Report ItemsReportsPage#40;8BL 2A5
Delete allReportsPage!>1KB85EventReportsPage$!2545=8O > A>1KB88
Event detailsReportsPage5AB>?>;>65=85LocationReportsPage!>E@0=8BL D09;	Save fileReportsPage."5:AB>2K5 D09;K (*.txt)Text files (*.txt)ReportsPaged01;>:8@>20==K9 ?@>B>:>; C40;5==>3> @01>G53> AB>;0Blocked RDPReportsPageModel001;>:8@>20==K9 251-A09BBlocked websiteReportsPageModel60B0 8 2@5<O A>1KB8O 70I8BKDate and Time		Protection EventReportsPageModel*-:A?;>9B 701;>:8@>20=Exploit blockedReportsPageModel8@54>=>A=>5  701;>:8@>20=>Malware blockedReportsPageModel@CG=CNManualReportsPageModel5BNoneReportsPageModelL1=0@C65=85 2 @568<5 @50;L=>3> 2@5<5=8
RTP detectionReportsPageModelD@>3@0<<0-2K<>30B5;L 701;>:8@>20=0Ransomware blockedReportsPageModel>AAB0=>28BLRestoreReportsPageModel BG5B > ?@>25@:5Scan ReportReportsPageModel61=0@C65=85 2 E>45 ?@>25@:8Scan detectionReportsPageModel> @0A?8A0=8N	ScheduledReportsPageModel*51-A09B 701;>:8@>20=Website blockedReportsPageModel@0=4<0CM@ 70I8I05B >B A5B52KE 0B0:, ?><>305B 701;>:8@>20BL ?>?KB:8 =5A0=:F8>=8@>20==>3> 4>ABC?0 8 C?@02;O5B >B?@02:>9 40==KE 70 ?@545;K CAB@>9AB20.  F5;OE 157>?0A=>AB8 206=> =5 >B:;NG0BL 1@0=4<0CM@.A firewall protects against network-based attacks, helps block unauthorized access, and manages how data is shared outside of your device. For your security, it's important to keep your firewall turned on.SAB>?>;=8B5;L=K9 0=B828@CA >B:;NG5=-Additional antivirus protection is turned offSA@>?>;=8B5;L=K9 0=B828@CA 2:;NG5=,Additional antivirus protection is turned onSA-:A?;>9B   MB> G0ABL ?@>3@0<<=>3> :>40 8;8 F5;0O ?@>3@0<<0, A ?><>ILN :>B>@>9 7;>C<KH;5==8:8 =0E>4OB >H81:8 2 70I8B5 ?@8;>65=8O 8;8 A8AB5<K, 0 70B5< 8A?>;L7CNB 8E 2 A2>8E ?@5ABC?=KE F5;OE. 'B>1K >157>?0A8BL A2>5 CAB@>9AB2> >B M:A?;>9B>2, ?@>0:B82=> 2KO2;OBL 8 1;>:8@>20BL 2@54>=>A=>5 , =5 4020O 5<C 8A?>;L7>20BL CO728<>AB8 A8AB5<K, 2:;NG8B5 70I8BC >B M:A?;>9B>2.CAn exploit is a program or piece of code that finds and takes advantage of a security flaw in an application or system so that cybercriminals can use it for their benefit. To protect against exploits, turn on Exploit Protection to proactively recognize and block malicious software from taking advantage of vulnerabilities.SA`2B><0B8G5A:>5 >1=>2;5=85 Malwarebytes >B:;NG5=>,Auto updates for Malwarebytes are turned offSA^2B><0B8G5A:>5 >1=>2;5=85 Malwarebytes 2:;NG5=>+Auto updates for Malwarebytes are turned onSAV2B><0B8G5A:>5 >1=>2;5=85 Windows >B:;NG5=>'Auto updates for Windows are turned offSAT2B><0B8G5A:>5 >1=>2;5=85 Windows 2:;NG5=>&Auto updates for Windows are turned onSA(CGH5, G5< C <=>38E!Better than most!SAB0I8B0 >B 1@CBD>@A-0B0: >B:;NG5=0$Brute force protection is turned offSA@0I8B0 >B 1@CBD>@A-0B0: 2:;NG5=0#Brute force protection is turned onSAK?>;=8B5 ?@>25@:C =0 =0;8G85 ?@>3@0<<, :>B>@K5 <>3CB 2;8OBL =0 @01>BC 0H53> CAB@>9AB20BCheck for apps that may impact your device startup and performanceSA2Chrome >68405B >1=>2;5=8OChrome has an update pendingSA.5@A8O Chrome 0:BC0;L=0Chrome is up to dateSACGH0O 70I8B0!Crushing it!SAB;8G=0O	ExcellentSA>@<0;L=0OFairSA&@0=4<0CM@ >B:;NG5=Firewall is turned offSA$@0=4<0CM@ 2:;NG5=Firewall is turned onSAKA>:0OGoodSA#AB0=>28BLInstallSA0>A;54=55 A:0=8@>20=85: Last scan: SA#7=0BL 1>;LH5
Learn moreSA.0209B5 C;CGH8< 70I8BC!Let's increase your score!SA*@54>=>A=>5 , ?>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K 8 28@CAK <>3CB ?@>=8:0BL =0 CAB@>9AB20, ?>2@5640BL 8 4065 2K2>48BL 8E AB@>O, G0AB> ?5@5E20BK20O ?@8 MB>< :>=B@>;L =04 =5:>B>@K<8 ?@>F5AA0<8. -B8 2@54>=>A=K5 >1J5:BK B0:65 <>3CB ?>E8I0BL, H8D@>20BL 8;8 C40;OBL 0H8 40==K5, 87<5=OBL DC=:F88 :><?LNB5@0 8;8 C?@02;OBL 8<8 ?> A2>5<C CA<>B@5=8N. @><5 B>3>, >=8 <>3CB 157 0H53> 254><0 A;548BL 70 0:B82=>ABLN :><?LNB5@0. ;O >15A?5G5=8O 70I8BK 2 @50;L=>< 2@5<5=8 2:;NG8B5 70I8BC >B 2@54>=>A=>3>  8 ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<<.YMalicious software, PUP (Potentially Unwanted Program), viruses might invade, damage, or disable devices, often by taking partial control over a device's operations. It can steal, encrypt, or delete your data, alter or hijack core computer functions, and spy on your computer activity. For real-time protection, turn on Malware & PUP Protection.SAb 0AH8@5=85 Malwarebytes Browser Guard CAB0=>2;5=>'Malwarebytes Browser Guard is installedSAh 0AH8@5=85 Malwarebytes Browser Guard =5 CAB0=>2;5=>+Malwarebytes Browser Guard is not installedSAMalwarebytes Browser Guard C40;O5B =07>9;82CN @5:;0<C, 70I8I05B ?@820B=>ABL 2 =B5@=5B5, 0 B0:65 1;>:8@C5B C3>=I8:8 8 1;>:8@>2I8:8 1@0C75@0. 'B>1K 30@0=B8@>20BL A2>N ?@820B=>ABL 8 157>?0A=>ABL, 2:;NG8B5 Malwarebytes Browser Guard.Malwarebytes Browser Guard when enabled removes annoying ads, protects online privacy, identifies and stops browser lockers and browser hijackers. For your privacy and security, enable Malwarebytes Browser Guard.SA<0I8B0 >B M:A?;>9B>2 >B:;NG5=0-Malwarebytes Exploit Protection is turned offSA:0I8B0 >B M:A?;>9B>2 2:;NG5=0,Malwarebytes Exploit Protection is turned onSA0I8B0 >B 2@54>=>A=>3>  8 ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<< >B:;NG5=03Malwarebytes Malware & PUP Protection is turned offSA0I8B0 >B 2@54>=>A=>3>  8 ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<< 2:;NG5=02Malwarebytes Malware & PUP Protection is turned onSA@>3@0<<0 Malwarebytes Privacy VPN CAB0=>2;5=0. @>3@0<<0 Privacy VPN 70I8I05B ?>4:;NG5=85 B>;L:> 2 B>< A;CG05, :>340 >=0 2:;NG5=0\Malwarebytes Privacy VPN is installed. Privacy VPN protects your connection only if it is onSAb@>3@0<<0 Malwarebytes Privacy VPN =5 CAB0=>2;5=0)Malwarebytes Privacy VPN is not installedSAMalwarebytes Privacy VPN >15A?5G8205B ?@820B=>ABL 2 =B5@=5B5 8 70I8I05B 0H8 40==K5 4065 2 >1I5AB25==>9 15A?@>2>4=>9 A5B8. 'B>1K 30@0=B8@>20BL A2>N 157>?0A=>ABL 8 ?@820B=>ABL, 8A?>;L7C9B5 Privacy VPN 8 ?>4:;NG09B5AL B>;L:> : =0456=K< 15A?@>2>4=K< A5BO<. @>3@0<<0 Privacy VPN 70I8I05B ?>4:;NG5=85 B>;L:> 2 B>< A;CG05, :>340 >=0 2:;NG5=0.Malwarebytes Privacy VPN keeps your browsing private and shields your data even on public WiFi. For your security and privacy, use Privacy VPN and prefer only trusted WiFi connections. Privacy VPN is protecting your connection only if it is turned on.SAP0I8B0 >B ?@>3@0<<-2K<>30B5;59 >B:;NG5=00Malwarebytes Ransomware Protection is turned offSAN0I8B0 >B ?@>3@0<<-2K<>30B5;59 2:;NG5=0/Malwarebytes Ransomware Protection is turned onSAA;8 70I8B0 Malwarebytes >B =5A0=:F8>=8@>20==KE 87<5=5=89 2:;NG5=0, >=0 ?><>305B 1;>:8@>20BL 4>ABC? : A8AB5<5 4;O 4@C38E ?>;L7>20B5;59, 0 B0:65 =5 ?>72>;O5B 8< 2=>A8BL 87<5=5=8O 2 =0AB@>9:8 70I8BK Malwarebytes. 'B>1K >15A?5G8BL 157>?0A=>ABL CAB@>9AB20, =0 :>B>@>< @01>B05B =5A:>;L:> ?>;L7>20B5;59, 70I8B0 Malwarebytes >B =5A0=:F8>=8@>20==KE 87<5=5=89 4>;6=0 1KBL 2:;NG5=0.Malwarebytes Tamper Protection when enabled helps to block other users from accessing or making changes to Malwarebytes security settings. To keep your device secure when it is shared by more than one user, Malwarebytes Tamper Protection has to be turned on.SA@0I8B0 2 A5B8 =B5@=5B >B:;NG5=0)Malwarebytes Web Protection is turned offSA>0I8B0 2 A5B8 =B5@=5B 2:;NG5=0(Malwarebytes Web Protection is turned onSAf B5G5=85 ?>A;54=8E 30 4=59 ?@>25@:8 =5 2K?>;=O;8ALNo scans in the last 30 daysSA85B 70?;0=8@>20==KE ?@>25@>: No scans scheduled in the futureSA B5G5=85 ?>A;54=8E 30 4=59 >1=>2;5=8O =5 CAB0=02;820;8AL. 06<8B5 @>A<>B@ ?0@0<5B@>2 8 ?@>25@LB5 =0;8G85 >1=>2;5=89.TNo updates installed in the last 30 days. Click View settings and check for updates.SA4=0 8;8 =5A:>;L:> CAB0=>2;5==KE ?@>3@0<< <>3CB 2;8OBL =0 2@5<O 70?CA:0 Windows 8 A=860BL ?@>872>48B5;L=>ABL 0H53> :><?LNB5@0. Malwarebytes @5:><5=4C5B 0< ?@>A<>B@5BL A?8A>: ?@>3@0<<, :>B>@K5 70?CA:0NBAO ?@8 2:;NG5=88 :><?LNB5@0. #1548B5AL, GB> K =5 >B:;NG8;8 206=K5 ?@>3@0<<K (=0?@8<5@, ?@8;>65=8O 4;O @01>BK <KH8, :;0280BC@K 8 4@.).IOne or more installed programs may be impacting the time it takes to start Windows and slowing down your computer's performance. Malwarebytes recommends you review the list of programs that start when you turn on your computer. Make sure you don't turn off any essential programs (e.g. apps for your mouse, keyboard, and others).SAR0?;0=8@>20=0 >4=0 8;8 =5A:>;L:> ?@>25@>:One or more scans are scheduledSAB:@KBLOpenSA,B:@KBL >:=> CAB0=>2:8
Open setupSA87:0OPoorSA@>3@0<<K-2K<>30B5;8   MB> 2@54>=>A=>5 , :>B>@>5 H8D@C5B D09;K =0 CAB@>9AB25 ?>;L7>20B5;O, 0 70B5< B@51C5B A>25@H8BL 0=>=8<=K9 >=;09=-?;0B56 4;O 2>AAB0=>2;5=8O 4>ABC?0. 'B>1K >157>?0A8BL A51O >B ?@>3@0<<-2K<>30B5;59, A2>52@5<5==> 2KO2;OBL 2@54>=>A=>5  8 =5 40BL 5<C 701;>:8@>20BL 0HC A8AB5<C, 2:;NG8B5 70I8BC >B ?@>3@0<<-2K<>30B5;59.Ransomware is a form of malware that locks the user out of their files or their device, then demands an anonymous online payment to restore access. To protect against ransomware, turn on Ransomware Protection to detect and prevent malicious software from locking you out of your system.SAn0 0H5< CAB@>9AB25 @07@5H5=> ?>4:;NG5=85 : C40;5==><C @01>G5<C AB>;C, GB> 45;05B 53> CO728<K< 4;O 0B0: 8 405B 2>7<>6=>ABL E0:5@0< ?@>=8:0BL =0 =53> G5@57 =B5@=5B A ?><>ILN ?@>B>:>;0 C40;5==>3> @01>G53> AB>;0 (RDP). 'B>1K >157>?0A8BL CAB@>9AB2> >B ?>4>1=KE 8=F845=B>2, Malwarebytes @5:><5=4C5B 70459AB2>20BL 70I8BC >B 1@CBD>@A-0B0: 8;8 70?@5B8BL ?>4:;NG5=85 : C40;5==><C @01>G5<C AB>;C (2 <5=N =0AB@>5: C40;5==>3> @01>G53> AB>;0 Windows).XRemote desktop connections are enabled on your device which can make it vulnerable to hackers accessing your computer over the Internet using Remote Desktop Protocol (RDP). To protect your device from these attacks, Malwarebytes recommends Brute Force Protection or disabling remote desktop connections (in Remote Desktop settings for Windows).SA5@5703@C7:0 ?><>305B >15A?5G8BL 15A?5@51>9=CN @01>BC CAB@>9AB20 8 30@0=B8@C5B =04;560ICN CAB0=>2:C 2A5E >1=>2;5=89. Malwarebytes @5:><5=4C5B ?5@8>48G5A:8 ?>;=>ABLN 2K:;NG0BL, 0 70B5< A=>20 2:;NG0BL CAB@>9AB2> (=5 ?@>AB> ?5@52>48BL 53> 2 A?OI89 8;8 64CI89 @568<). -B> 1C45B A?>A>1AB2>20BL 53> MDD5:B82=>9 8 =0456=>9 @01>B5.Restarting keeps your device healthy and ensures that all updates are properly installed. Malwarebytes recommends you completely turn off and restart your device from time to time (not just shut it down). It will help to keep the device running efficiently and securely.SA @>25@8BL A59G0AScan nowSA4040BL @0A?8A0=85 ?@>25@>:Schedule a scanSA"!<>B@5BL A2545=8OSee detailsSA*!<>B@5BL @5:><5=40F88See recommendationsSA#AB0=>28B5 70I8BC >B =5A0=:F8>=8@>20==KE 87<5=5=89, GB>1K ?@54>B2@0B8BL =502B>@87>20==K9 4>ABC? 2 A8AB5<C CAB@>9AB207Setup Tamper protection to prevent unauthorized changesSA0I8B0 >B =5A0=:F8>=8@>20==KE 87<5=5=89 >15A?5G8205B 157>?0A=>ABL 0H53> CAB@>9AB20+Tamper Protection is protecting your deviceSA>7=8:;0 ?@>1;5<0 A >1=>2;5=85< Windows. 06<8B5 @>A<>B@ ?0@0<5B@>2 8 ?@>25@LB5 =0;8G85 >1=>2;5=89.RThere is a problem with Windows Update. Click View settings and check for updates.SA!53>4=OTodaySA:;NG8BLTurn onSAG5=L 2KA>:0O	Very goodSA&@>A<>B@ ?0@0<5B@>2
View settingsSA,>5-GB> =C6=> A45;0BL!We've got some work to do!SA =B5@=5B5 @07;8G=K5 C3@>7K <>3CB ?@54AB02;OBL >?0A=>ABL 4;O 0H53> CAB@>9AB20.  01>B0 157 4>;6=>9 70I8BK <>65B ?@825AB8 : :@065 0H8E ?5@A>=0;L=KE 40==KE 8 =5A0=:F8>=8@>20==><C 4>ABC?C : 0H5<C CAB@>9AB2C 8;8 A5@28A0<. 'B>1K >AB020BLAO 2 157>?0A=>AB8, 2:;NG8B5 70I8BC, :>B>@0O 1C45B 1;>:8@>20BL 0B0:8 >=;09=-<>H5==8:>2, D8H8=3>2K5 251-A09BK 8 251-A09BK A ?@>3@0<<0<8-2K<>30B5;O<8.LWeb-based threats can make devices vulnerable when connected to the internet. Unprotected browsing of sites could expose your private data, create unauthorized access to your computer or even network services. To stay safe online, simply turn on Web Protection to block online scams, phishing sites, and sites containing ransomware.SA#AB0@52H85 25@A88 1@0C75@>2 <>3CB A>45@60BL CO728<>AB8, 87-70 :>B>@KE 0H0 A8AB5<0 <>65B ?>425@30BLAO >?0A=>AB8, :>340 K @01>B05B5 2 =B5@=5B5. Malwarebytes @5:><5=4C5B ?>445@6820BL 1@0C75@ 2 0:BC0;L=>< A>AB>O=88, GB>1K 30@0=B8@>20BL 4;O A51O <0:A8<0;L=CN 157>?0A=>ABL >=;09=.  1>;LH8=AB25 A;CG052 ?>A;54=85 >1=>2;5=8O CAB0=02;820NBAO ?>A;5 ?5@570?CA:0 Chrome. A;8 0< =C6=0 4>?>;=8B5;L=0O 8=D>@<0F8O, ?>60;C9AB0, >B:@>9B5 Chrome, ?5@5948B5 2 <5=N 0AB@>9:8, 0 70B5< 2K15@8B5  1@0C75@5 Chrome.}When your browser is not up to date, it may contain vulnerabilities that compromise your security when browsing the Internet. Malwarebytes recommends keeping your browser up to date so that you have the safest online experience possible. In most cases, restarting Chrome will apply the latest updates. If you need additional help, open Chrome and go to Settings, then About Chrome.SAV>4:;NG5=85 : 15A?@>2>4=>9 A5B8 =5 70I8I5=>Wi-Fi connection is not secureSAP>4:;NG5=85 : 15A?@>2>4=>9 A5B8 70I8I5=>Wi-Fi connection is secureSA~'B>1K 7025@H8BL ?@>F5AA >1=>2;5=8O, =C6=> ?5@5703@C78BL Windows+Windows needs to restart to finish updatingSA
G5@0	YesterdaySA K ?>GB8 C F5;8!You're almost there!SAV5@5703@C7:0 CAB@>9AB20 =5402=> 2K?>;=O;0AL'Your device has recently been restartedSA5@5703@C7:0 CAB@>9AB20 2K?>;=O;0AL 1>;55 60 4=59 =0704.  5:><5=4C5< ?5@5703@C78BL Windows, GB>1K A8AB5<0 @01>B0;0 =0456=> 8 157>?0A=>kYour device uptime is more than 60 days. Consider restarting Windows to keep it running smoothly and safelySA0H0 ?>4?8A:0 2:;NG05B 2 A51O Malwarebytes Privacy VPN, :>B>@0O >15A?5G8205B ?@820B=>ABL 2 =B5@=5B5 8 70I8I05B 0H8 40==K5 4065 2 >1I5AB25==>9 15A?@>2>4=>9 A5B8. 'B>1K 30@0=B8@>20BL 157>?0A=>ABL 8 ?@820B=>ABL, CAB0=>28B5 0:BC0;L=CN 25@A8N MB>9 ?@>3@0<<K.Your subscription includes Malwarebytes Privacy VPN which keeps your browsing private and shields your data even on public WiFi. For your security and privacy, install the latest version now.SA"17>@ >1=0@C65=89Review detectionsScanCompleteNotification$@>25@:0 7025@H5=0
Scan completeScanCompleteNotification>@>A<>B@5BL @57C;LB0BK ?@>25@:8View Scan ResultsScanCompleteNotification1 45=L1 dayScanDownloadsNotification
1 G0A1 hourScanDownloadsNotification>E>65, K 703@C78;8 =5A:>;L:> =>2KE D09;>2.  5:><5=4C5< 2K?>;=8BL 1KAB@CN ?@>25@:C, GB>1K C1548BLAO 2 >BACBAB288 2 =8E C3@>7.Looks like you've downloaded some new files. We recommend a quick scan to make sure they don't contain any threats and avoid infection.ScanDownloadsNotification21=0@C65=K =>2K5 703@C7:8New downloads detectedScanDownloadsNotification*0AB@>9:0 C254><;5=89Notification settingsScanDownloadsNotification0?><=8BL G5@57Remind me inScanDownloadsNotification0G0BL ?@>25@:C
Start ScanScanDownloadsNotification@>25@:8ScansScanExclusionController=05B5 ;8 K, GB> G5BK@5 C@>2=O 70I8BK Malwarebytes Premium 87102;ONB 0A >B =5>1E>48<>AB8 ?@>25@OBL 703@C65==K5 D09;K 2@CG=CN.Did you know, Malwarebytes Premium boosts your security with four advanced protection layers that eliminate the need to manually scan your downloads.ScanNewDownloadsUpsellDialog4AB028BL 15A?;0B=CN 25@A8N	Keep FreeScanNewDownloadsUpsellDialogN@>25@O9B5 A C<><.  157 ;8H=8E CA8;89.Scan smarter. Not harder.ScanNewDownloadsUpsellDialog1=>28BL A59G0AUpgrade NowScanNewDownloadsUpsellDialogD5;8:>;5?=>! #3@>7K =5 >1=0@C65=K."Awesome! No threats were detected.ScanNotificationsModel>5;8:>;5?=>! K 2 157>?0A=>AB8.Awesome! You're clean.ScanNotificationsModelj@>A<>B@8B5 @57C;LB0BK 8 70?;0=8@C9B5 =>2CN ?@>25@:C.,Check out results and set up your next scan.ScanNotificationsModel`>74@02;O5<! 0H0 A8AB5<0 B5?5@L 2 157>?0A=>AB8.*Congratulations! Your system is now clean.ScanNotificationsModelMalwarebytes Premium 70I8I05B 0HC A8AB5<C, 1;>:8@CO C3@>7K 4> B>3>, :0: >=8 A<>3CB ?>?0ABL =0 0H :><?LNB5@.}Malwarebytes Premium protection always keeps your system clean by blocking threats before they can even infect your computer.ScanNotificationsModelZ#3@>7K =5 >1=0@C65=K! @>A<>B@5BL @57C;LB0BK.3No threats were detected! View results for details.ScanNotificationsModel4=0 8;8 =5A:>;L:> ?>B5=F80;L=KE C3@>7 02B><0B8G5A:8 ?><5I5=K 2 :0@0=B8=.=One or more potential threats were automatically quarantined.ScanNotificationsModelv4=0 8;8 =5A:>;L:> C3@>7 02B><0B8G5A:8 ?><5I5=K 2 :0@0=B8=.3One or more threats were automatically quarantined.ScanNotificationsModel0I8B8B5 A51O >B 2@54>=>A=>3> , ?@>3@0<<-2K<>30B5;59, >?0A=KE 251-A09B>2 8 4@C38E C3@>7.NProtect yourself against malware, ransomware, bad websites, and other threats.ScanNotificationsModell@>A<>B@8B5 >1=0@C65=8O 8 C40;8B5 =565;0B5;L=K5 D09;K.,Review detections and remove unwanted files.ScanNotificationsModel0G5< B@0B8BL 2@5<O =0 CAB@0=5=85 ?>A;54AB289 0B0:8 :064>9 >1=0@C65==>9 C3@>7K? @54>B2@0B8B5 0B0:8   >1=>28B5 ?@>3@0<<C 4> premium-25@A88.iWhy waste time cleaning up after each detected threat? Proactively protect yourself - upgrade to Premium.ScanNotificationsModel
@E82ArchiveScanOptionsInformationReport1=0@C65=85DetectScanOptionsInformationReportB:;NG5=>DisabledScanOptionsInformationReport:;NG5=>EnabledScanOptionsInformationReport $09;>20O A8AB5<0File systemScanOptionsInformationReport-2@8AB8:0
HeuristicsScanOptionsInformationReport3=>@8@>20BLIgnoreScanOptionsInformationReport0<OBLMemoryScanOptionsInformationReportT>B5=F80;L=> =565;0B5;L=K5 87<5=5=8O (PUM)PUMsScanOptionsInformationReportT>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K (PUP)PUPsScanOptionsInformationReport CB:8BKRootkitsScanOptionsInformationReport$0AB@>9:8 ?@>25@:8Scan optionsScanOptionsInformationReport2B>703@C7:0StartupScanOptionsInformationReport@54C?@548BLWarnScanOptionsInformationReport %1 2 ?@>F5AA5...%1 in progress...ScanPageProgressB<5=0CancelScanPageProgress1=0@C65=8O
DetectionsScanPageProgress$@>25@5=> >1J5:B>2
Items scannedScanPageProgress
0C70PauseScanPageProgress@>4>;68BLResumeScanPageProgress*;8B5;L=>ABL ?@>25@:8
Scan durationScanPageProgress%1 G %2 < %3 A%1h %2m %3sScanPageProgressModel%1 < %2 A%1m %2sScanPageProgressModel%1c%1sScanPageProgressModel,@>25@:0 >1=>2;5=89...Checking for updates...ScanPageProgressModel&K1>@>G=0O ?@>25@:0Custom ScanScanPageProgressModel$09;FileScanPageProgressModel $09;>20O A8AB5<0File SystemScanPageProgressModel
0?:0FolderScanPageProgressModel(-2@8AB8G5A:89 0=0;87Heuristics AnalysisScanPageProgressModel@54>=>A=>5 MalwareScanPageProgressModelJ;02=K9 703@C7>G=K9 A5:B>@ 2 B><5 !%1 Master Boot Sector on volume #%1ScanPageProgressModel1J5:BK ?0<OB8Memory ObjectsScanPageProgressModel"$878G5A:89 A5:B>@Physical SectorScanPageProgressModelH>B5=F80;L=> =565;0B5;L=>5 87<5=5=85!Potentially Unwanted ModificationScanPageProgressModelH>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0Potentially Unwanted ProgramScanPageProgressModel*>43>B>2:0 : ?@>25@:5Pre-Scan OperationsScanPageProgressModel@>F5AAProcessScanPageProgressModel>4C;L ?@>F5AA0Process ModuleScanPageProgressModel KAB@0O ?@>25@:0
Quick ScanScanPageProgressModel 0745; @55AB@0Registry KeyScanPageProgressModel =0G5=85 @55AB@0Registry ValueScanPageProgressModel8@>25@:0 =0 =0;8G85 @CB:8B>2Scanning for RootkitsScanPageProgressModel&1J5:BK 02B>70?CA:0Startup ObjectsScanPageProgressModel>;=0O ?@>25@:0Threat ScanScanPageProgressModel5 C:070=>UnspecifiedScanPageProgressModelN=AB@C<5=B0@89 C?@02;5=8O Windows (WMI)WMIScanPageProgressModel 55AB@ WindowsWindows RegistryScanPageProgressModelG0AhourScanPageProgressModelG0AKhoursScanPageProgressModel<5=55 <8=CBKless than a minuteScanPageProgressModel<8=CB0minuteScanPageProgressModel<8=CBKminutesScanPageProgressModel %1 2 ?@>F5AA5...%1 in progress...ScanPageProgressOnboardingB<5=0CancelScanPageProgressOnboarding1=0@C65=8O
DetectionsScanPageProgressOnboarding$@>25@5=> >1J5:B>2
Items scannedScanPageProgressOnboarding>A;5 7025@H5=8O ?@>25@:8 ?@>3@0<<0 ?@54;0305B 20@80=BK >G8AB:8 >1=0@C65==KE C3@>7.Once your scan is complete, we’ll show you how to clean up any threats that were found, so they can no longer cause harm to your computer.ScanPageProgressOnboarding
0C70PauseScanPageProgressOnboarding@>4>;68BLResumeScanPageProgressOnboarding*;8B5;L=>ABL ?@>25@:8
Scan durationScanPageProgressOnboarding"4QB A:0=8@>20=85Scan in progressScanPageProgressOnboarding%1 G %2 < %3 A%1h %2m %3sScanPageResultsModel%1 < %2 A%1m %2sScanPageResultsModel%1c%1sScanPageResultsModel&K1>@>G=0O ?@>25@:0Custom ScanScanPageResultsModel$09;FileScanPageResultsModel
0?:0FolderScanPageResultsModel@54>=>A=>5 MalwareScanPageResultsModelJ;02=K9 703@C7>G=K9 A5:B>@ 2 B><5 !%1 Master Boot Sector on volume #%1ScanPageResultsModel"$878G5A:89 A5:B>@Physical SectorScanPageResultsModelH>B5=F80;L=> =565;0B5;L=>5 87<5=5=85!Potentially Unwanted ModificationScanPageResultsModelH>B5=F80;L=> =565;0B5;L=0O ?@>3@0<<0Potentially Unwanted ProgramScanPageResultsModel@>F5AAProcessScanPageResultsModel>4C;L ?@>F5AA0Process ModuleScanPageResultsModel KAB@0O ?@>25@:0
Quick ScanScanPageResultsModel 0745; @55AB@0Registry KeyScanPageResultsModel =0G5=85 @55AB@0Registry ValueScanPageResultsModel>;=0O ?@>25@:0Threat ScanScanPageResultsModel5 C:070=>UnspecifiedScanPageResultsModelN=AB@C<5=B0@89 C?@02;5=8O Windows (WMI)WMIScanPageResultsModel&K1>@>G=0O ?@>25@:0Custom ScanScanPageSchedulerModelK:;NG5=>DisabledScanPageSchedulerModel:;NG5=>EnabledScanPageSchedulerModel5 ?@8<5=8<>Not applicableScanPageSchedulerModel KAB@0O ?@>25@:0
Quick ScanScanPageSchedulerModel.>2B>@O5BAO :064K9 45=LRepeats every dayScanPageSchedulerModel,>2B>@O5BAO :064K9 G0ARepeats every hourScanPageSchedulerModel,>2B>@OBL :064K9 <5AOFRepeats every monthScanPageSchedulerModel2>2B>@O5BAO :064CN =545;NRepeats every weekScanPageSchedulerModel:K?>;=OBL ?@8 70?CA:5 A8AB5<KRuns on system startScanPageSchedulerModel2K?>;=8BL B>;L:> >48= @07Runs only one timeScanPageSchedulerModelD@>25@:0 ?@8 A;54CNI59 2>7<>6=>AB8Scan at next opportunityScanPageSchedulerModelhK?>;=8BL ?@>25@:C 2 A;54CNI55 70?;0=8@>20==>5 2@5<OScan at next scheduled timeScanPageSchedulerModelB0?;0=8@>20==0O ?@>25@:0 >B<5=5=0Scheduled scan is skippedScanPageSchedulerModel>;=0O ?@>25@:0Threat ScanScanPageSchedulerModel: 0AH8@5==K5 A@54AB20 ?@>25@:8Advanced scannersScanPageStartMenu
0704BackScanPageStartMenu$0AB@>8BL ?@>25@:CConfigure scanScanPageStartMenu&K1>@>G=0O ?@>25@:0Custom ScanScanPageStartMenuJ@>83=>@8@>20=> >1=0@C65==KE >1J5:B>2Detections ignoredScanPageStartMenuR><5I5=> 2 :0@0=B8= >1=0@C65==KE >1J5:B>2Detections quarantinedScanPageStartMenu$@>25@5=> >1J5:B>2
Items scannedScanPageStartMenu$>A;54=OO ?@>25@:0	Last scanScanPageStartMenu,AB>@8O ?@>25@>: ?CAB0No scan historyScanPageStartMenu^1=0@C65=> ?>B5=F80;L=> =565;0B5;L=KE 87<5=5=89
PUMs detectedScanPageStartMenu\1=0@C65=> ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<<
PUPs detectedScanPageStartMenu.">;L:> 2 Premium-25@A88Premium onlyScanPageStartMenu KAB@0O ?@>25@:0
Quick ScanScanPageStartMenu@>25@:0ScanScanPageStartMenu@5<O ?@>25@:8	Scan timeScanPageStartMenu@>25@O5B ?0<OBL 8 02B><0B8G5A:8 70?CA:05<K5 >1J5:BK =0 =0;8G85 0:B82=KE C3@>7:Scan your memory and startup objects for active infectionsScanPageStartMenu&>72>;O5B 7040BL >1J5:BK 4;O ?@>25@:8 8 459AB28O 2 >B=>H5=88 ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<< (PUP) 8 ?>B5=F80;L=> =565;0B5;L=KE 87<5=5=89 (PUM)bSet what to scan and how to handle potentially unwanted programs and modifications (PUPs and PUMs)ScanPageStartMenu 1=0@C65=> C3@>7Threats detectedScanPageStartMenu"@>A<>B@5BL >BG5BView reportScanPageStartMenu%1 G %2 < %3 A%1h %2m %3sScanPageStartMenuModel%1 < %2 A%1m %2sScanPageStartMenuModel%1c%1sScanPageStartMenuModel%1 A2>4:0
%1 summaryScanPageSummaryj>74@02;O5<!
 0 0H5< CAB@>9AB25 =5B =8 >4=>9 C3@>7K'Congrats!
 Your device is squeaky cleanScanPageSummaryJ@>83=>@8@>20=> >1=0@C65==KE >1J5:B>2Detections ignoredScanPageSummaryR><5I5=> 2 :0@0=B8= >1=0@C65==KE >1J5:B>2Detections quarantinedScanPageSummary>B>2>DoneScanPageSummary$@>25@5=> >1J5:B>2
Items scannedScanPageSummaryL0209B5 ?>701>B8<AO > B><, GB>1K B0: 1K;> 8 2 40;L=59H5<. !59G0A <K @0AA:065<, :0: A;54C5B 8A?>;L7>20BL Malwarebytes, GB>1K >15A?5G8BL 157>?0A=>ABL 0H53> CAB@>9AB20.kLet us help you keep it that way. Next, we’ll guide you on using Malwarebytes to keep your device secure.ScanPageSummary
0;55NextScanPageSummary!;54CNI89 H03	Next stepScanPageSummary^1=0@C65=> ?>B5=F80;L=> =565;0B5;L=KE 87<5=5=89
PUMs detectedScanPageSummary\1=0@C65=> ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<<
PUPs detectedScanPageSummary@5<O ?@>25@:8	Scan timeScanPageSummary 1=0@C65=> C3@>7Threats detectedScanPageSummary"@>A<>B@5BL >BG5BView reportScanPageSummary%1c {1:%2:%3?}%1:%2:%3ScanPageSummaryModel%1 G %2 < %3 A%1h %2m %3sScanPageSummaryModel%1 < %2 A%1m %2sScanPageSummaryModel%1c%1sScanPageSummaryModel&K1>@>G=0O ?@>25@:0Custom ScanScanPageSummaryModel KAB@0O ?@>25@:0
Quick ScanScanPageSummaryModel>;=0O ?@>25@:0Threat ScanScanPageSummaryModel&@>25@:0 >1=>2;5=89Checking for updatesScanProgressListModel(-2@8AB8G5A:89 0=0;87Heuristics analysisScanProgressListModel*>43>B>2:0 : ?@>25@:5Pre-Scan operationsScanProgressListModel2@>25@:0 D09;>2>9 A8AB5<KScanning file systemScanProgressListModel8@>25@:0 =0 =0;8G85 @CB:8B>2Scanning for rootkitsScanProgressListModel@>25@:0 ?0<OB8Scanning memoryScanProgressListModel @>25@:0 @55AB@0Scanning registryScanProgressListModelV@>25@:0 02B><0B8G5A:8 70?CA:05<KE >1J5:B>2Scanning startup itemsScanProgressListModel5 >?@545;5=>UnidentifiedScanProgressListModel1 45=L1 dayScanReminderNotification
1 G0A1 hourScanReminderNotificationB:@KBLOpenScanReminderNotification 5:><5=4C5BAO ?5@8>48G5A:8 70?CA:0BL ?@>25@:8, GB>1K >15A?5G8BL 157>?0A=>ABL CAB@>9AB20. B:@KBL Malwarebytes, GB>1K 70?CAB8BL ?@>25@:C A59G0A?qPeriodic scans are recommended to keep your device secure. Would you like to open Malwarebytes to run a scan now?ScanReminderNotification0?><=8BL G5@57Remind me inScanReminderNotification,0?><8=0=85 > ?@>25@:5
Scan reminderScanReminderNotification.@>?CAB8BL MBC ?@>25@:CSkip this scanScanReminderNotification" 0AH8@5==K5 >?F88AdvancedScanReportDialog0:@KBLCloseScanReportDialog2>?8@>20BL 2 1CD5@ >1<5=0Copy to clipboardScanReportDialog-:A?>@BExportScanReportDialog(-:A?>@B8@>20BL 2 TXT
Export to TXTScanReportDialog BG5B > ?@>25@:5Scan reportScanReportDialog!2>4:0SummaryScanReportDialogA5 D09;K (*)
All files (*)ScanReportDialogModelB<5=5=>	CancelledScanReportDialogModel025@H5=>	CompletedScanReportDialogModel5 C40;>ALFailedScanReportDialogModel!>E@0=8BL D09;	Save fileScanReportDialogModel."5:AB>2K5 D09;K (*.txt)Text files (*.txt)ScanReportDialogModel5BNoneScanReportsProxyModelt1=0@C65= %n ?>B5=F80;L=> 2@54=K9 8;8 =565;0B5;L=K9 >1J5:Bx1=0@C65=> %n ?>B5=F80;L=> 2@54=KE 8;8 =565;0B5;L=KE >1J5:B0z1=0@C65=> %n ?>B5=F80;L=> 2@54=KE 8;8 =565;0B5;L=KE >1J5:B>23%n potentially harmful or unwanted item(s) detectedScanResultsCancelDialog\K 459AB28B5;L=> E>B8B5 >B<5=8BL MBC ?@>25@:C?*Are you sure you want to cancel this scan?ScanResultsCancelDialog$B<5=8BL ?@>25@:C?Cancel scan?ScanResultsCancelDialog5BNoScanResultsCancelDialog0YesScanResultsCancelDialogt1=0@C65= %n ?>B5=F80;L=> 2@54=K9 8;8 =565;0B5;L=K9 >1J5:Bx1=0@C65=> %n ?>B5=F80;L=> 2@54=KE 8;8 =565;0B5;L=KE >1J5:B0z1=0@C65=> %n ?>B5=F80;L=> 2@54=KE 8;8 =565;0B5;L=KE >1J5:B>23%n potentially harmful or unwanted item(s) detectedScanResultsCloseDialogB<5=0CancelScanResultsCloseDialog$0:@KBL @57C;LB0BK
Close resultsScanResultsCloseDialog80:@KBL @57C;LB0BK ?@>25@:8?Close scan results?ScanResultsCloseDialogA;8 70:@KBL @57C;LB0BK ?@>25@:8, MB>B >1J5:B >AB0=5BAO =0 :><?LNB5@5 8 1C45B >1=0@C65= ?@8 ?>A;54CNI8E ?@>25@:0E.A;8 70:@KBL @57C;LB0BK ?@>25@:8, MB8 >1J5:BK >AB0=CBAO =0 :><?LNB5@5 8 1C4CB >1=0@C65=K ?@8 ?>A;54CNI8E ?@>25@:0E.A;8 70:@KBL @57C;LB0BK ?@>25@:8, MB8 >1J5:BK >AB0=CBAO =0 :><?LNB5@5 8 1C4CB >1=0@C65=K ?@8 ?>A;54CNI8E ?@>25@:0E.dIf you close your scan results, these item(s) will stay on your computer and appear in future scans.ScanResultsCloseDialogD1=0@C65= %n ?>4>7@8B5;L=K9 >1J5:BH1=0@C65=> %n ?>4>7@8B5;L=KE >1J5:B0J1=0@C65=> %n ?>4>7@8B5;L=KE >1J5:B>2%n suspicious item(s) detectedScanResultsIgnoreDialog&3=>@8@>20BL 2A5340
Always ignoreScanResultsIgnoreDialogB<5=0CancelScanResultsIgnoreDialogA;8 ?@>83=>@8@>20BL MB8 >1J5:BK, >=8 >AB0=CBAO =0 0H5< :><?LNB5@5.:If you ignore these items they will stay on your computer.ScanResultsIgnoreDialog(3=>@8@>20BL >1J5:B?*3=>@8@>20BL >1J5:BK?*3=>@8@>20BL >1J5:BK?Ignore item(s)?ScanResultsIgnoreDialog&3=>@8@>20BL A59G0AIgnore onceScanResultsIgnoreDialog >=B5:AB=>5 <5=NContext MenuScanSummaryInformationReportK1>@>G=0OCustomScanSummaryInformationReport#3@>7K 2 D09;0EFile threatsScanSummaryInformationReport#3@>7K 2 ?0?:0EFolder threatsScanSummaryInformationReportKAB@0OHyperScanSummaryInformationReport&1=0@C65=> >1J5:B>2Items detectedScanSummaryInformationReport2@>83=>@8@>20==K5 >1J5:BK
Items ignoredScanSummaryInformationReport<1J5:BK, ?><5I5==K5 2 :0@0=B8=Items quarantinedScanSummaryInformationReport$@>25@5=> >1J5:B>2
Items scannedScanSummaryInformationReport@CG=CNManualScanSummaryInformationReport #3@>7K 2 <>4C;OEModule threatsScanSummaryInformationReport8#3@>7K 2 D878G5A:8E A5:B>@0EPhysical sector threatsScanSummaryInformationReport$#3@>7K 2 ?@>F5AA0EProcess ThreatsScanSummaryInformationReport.#3@>7K 2 40==KE @55AB@0Registry data threatsScanSummaryInformationReport2#3@>7K 2 @0745;0E @55AB@0Registry key threatsScanSummaryInformationReport4#3@>7K 2 7=0G5=8OE @55AB@0Registry value threatsScanSummaryInformationReport.!?>A>1 70?CA:0 ?@>25@:8Scan initiated byScanSummaryInformationReport$!>AB>O=85 ?@>25@:8
Scan stateScanSummaryInformationReport BG5B > ?@>25@:5Scan summaryScanSummaryInformationReport@5<O ?@>25@:8	Scan timeScanSummaryInformationReport"8? ?@>25@:8	Scan typeScanSummaryInformationReport;0=8@>2I8:	SchedulerScanSummaryInformationReport#3@>70ThreatScanSummaryInformationReport( >1J5:B>2 >1=0@C65=> items detectedScanSummaryReport2 >1J5:B>2 ?@>83=>@8@>20=> items ignoredScanSummaryReport: >1J5:B>2 ?><5I5=> 2 :0@0=B8= items quarantinedScanSummaryReport59AB285ActionScanSummaryReport0B0DateScanSummaryReport&1=0@C65=> >1J5:B>2Detected itemsScanSummaryReport5AB>?>;>65=85LocationScanSummaryReport<ONameScanSummaryReport*1J5:BK =5 >1=0@C65=KNo items detectedScanSummaryReport>B5=F80;L=> =565;0B5;L=K5 87<5=5=8O (PUM): <font color='%1'>%2</font> PUMs: <font color='%1'>%2</font>ScanSummaryReport>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K (PUP): <font color='%1'>%2</font> PUPs: <font color='%1'>%2</font>ScanSummaryReport& 57C;LB0BK ?@>25@:8Scan resultScanSummaryReport BG5B > ?@>25@:5Scan summaryScanSummaryReportD#3@>7K: <font color='%1'>%2</font>#Threats: <font color='%1'>%2</font>ScanSummaryReport"8?TypeScanSummaryReport 2 ?@>F5AA5... in progress...ScannerCard@5:@0A=0O @01>B0! 0?;0=8@>20==K5 ?@>25@:8 70I8I0NB 0H8 CAB@>9AB20 8 2A5 40==K5 =0 =8E.VAwesome job! Your scheduled scans are keeping your devices clean and your data secure.ScannerCardK 70?CA:0;8 ?@>25@:C 1>;55 30 4=59 =0704. 'B>1K 70I8B8BLAO >B C3@>7, 70?CA:09B5 @CG=CN ?@>25@:C E>BO 1K @07 2 <5AOF.It seems you haven't run a scan in the last 30 days. Make sure you run manual scans at least once a month to keep threats away.ScannerCard'B>1K 70I8B8BLAO >B C3@>7, 70?CA:09B5 @CG=CN ?@>25@:C. 0?;0=8@>20==K5 ?@>25@:8 A8;L=55 C:@5?;ONB 70I8BC. =8 2KO2;ONB C3@>7K 02B><0B8G5A:8.Make sure you run manual scans to keep threats away. For better protection get scheduled scans. They help automatically detect future threats.ScannerCard@CG=CNManualScannerCard0 CG=0O 8 70?;0=8@>20==0OManual and scheduledScannerCard">;L:> @CG=0OManual onlyScannerCard CG=K5 ?@>25@:8Manual scansScannerCard5BNoneScannerCard$>A;5 ?5@5703@C7:8	On RebootScannerCardPremium-25@A8OPremiumScannerCard.">;L:> 2 premium-25@A88Premium onlyScannerCard@>25@:0ScanScannerCard @>25@8BL A59G0AScan nowScannerCard"!@54AB2> ?@>25@:8ScannerScannerCard@>25@:0ScanningScannerCard> @0A?8A0=8N	ScheduledScannerCard00?;0=8@>20==0O ?@>25@:0Scheduled scanScannerCard00?;0=8@>20==K5 ?@>25@:8Scheduled scansScannerCardP1=0@C65=> C3@>7 2 02B><0B8G5A:>< @568<5Threats detected automaticallyScannerCard@1=0@C65=> C3@>7 2 @CG=>< @568<5Threats detected manuallyScannerCard!53>4=OTodayScannerCard02B@0TomorrowScannerCard1=>28BLUpgradeScannerCard 2> 2@5<O ?@>AB>Oduring idle timeScannerCardBG5BKReportsScannerPage(;0=8@>2I8: ?@>25@>:Scan SchedulerScannerPage"!@54AB2> ?@>25@:8ScannerScannerPage'B>1K 2K?>;=8BL ?>8A: @CB:8B>2, =5>1E>48<> 2K1@0BL 4;O ?@>25@:8 25AL A8AB5<=K9 48A:. >60;C9AB0, >1=>28B5 >1;0AB8 A8AB5<K, :>B>@K5 K E>B8B5 ?@>25@8BL: 2K15@8B5 4;O ?@>25@:8 25AL A8AB5<=K9 48A: 8;8 >B:;NG8B5 ?>8A: @CB:8B>2 2 40==>9 ?@>25@:5.A rootkit scan requires the entire system drive to be selected for scanning. Please update the areas of the system you want to scan to include the entire system drive or disable rootkit scanning for this scan.ScannerPageCustom
0704BackScannerPageCustom:0AB@>8BL 2K1>@>G=CN ?@>25@:CConfigure Custom ScanScannerPageCustom:0AB@>9:0 2K1>@>G=>9 ?@>25@:8Custom Scan OptionsScannerPageCustom03=>@8@>20BL >1=0@C65=8OIgnore detectionsScannerPageCustom<ONameScannerPageCustomT>B5=F80;L=> =565;0B5;L=K5 87<5=5=8O (PUM))Potentially Unwanted Modifications (PUMs)ScannerPageCustomT>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K (PUP)$Potentially Unwanted Programs (PUPs)ScannerPageCustom@>25@:0ScanScannerPageCustom8@>25@:0 =0 =0;8G85 @CB:8B>2Scan for rootkitsScannerPageCustom4@>25@OBL >1J5:BK 2 ?0<OB8Scan memory objectsScannerPageCustomh@>25@OBL @55AB@ 8 02B><0B8G5A:8 70?CA:05<K5 >1J5:BKScan registry and startup itemsScannerPageCustom @>25@OBL 0@E82KScan within archivesScannerPageCustomN 0AA<0B@820BL :0: 2@54>=>A=K5 ?@>3@0<<KTreat detections as malwareScannerPageCustomT@54C?@5640BL ?>;L7>20B5;O >1 >1=0@C65=8OEWarn user about detectionsScannerPageCustom"!@54AB2> ?@>25@:8ScannerScannerPageOnboarding&(>A;54=85 30 4=59)(Last 30 days)ScannerPageReportsA5 D09;K (*)
All files (*)ScannerPageReportsfK 459AB28B5;L=> E>B8B5 C40;8BL MB8 >1J5:BK >BG5B0?3Are you sure you want to delete these report items?ScannerPageReportsfK 459AB28B5;L=> E>B8B5 C40;8BL MB>B >1J5:B >BG5B0?1Are you sure you want to delete this report item?ScannerPageReports0B0DateScannerPageReports*#40;8BL >1J5:B >BG5B0Delete Report ItemScannerPageReports,#40;8BL >1J5:BK >BG5B0Delete Report ItemsScannerPageReports#40;8BL 2A5
Delete allScannerPageReports1=0@C65=8O
DetectionsScannerPageReportsN!:@KBL >BG5BK 157 >1=0@C65==KE >1J5:B>2Hide reports with no detectionsScannerPageReports*5B 4>ABC?=KE >BG5B>2No reports availableScannerPageReportsR@8 B5:CI5< D8;LB@5 @57C;LB0BK =5 =0945=K'No results found for the current filterScannerPageReports!>E@0=8BL D09;	Save fileScannerPageReports$BG5BK > ?@>25@:0EScan reportsScannerPageReports."5:AB>2K5 D09;K (*.txt)Text files (*.txt)ScannerPageReports"8?TypeScannerPageReportsP%1 87 %n >1J5:B0(->2) ?><5I5= 2 :0@0=B8=R%1 87 %n >1J5:B0(->2) ?><5I5=> 2 :0@0=B8=R%1 87 %n >1J5:B0(->2) ?><5I5=> 2 :0@0=B8=%1 of %n threat(s) quarantinedScannerPageResults 57C;LB0BK: %1
%1 resultsScannerPageResultsA5 D09;K (*)
All files (*)ScannerPageResultsG8AB8BL C3@>7KClean up threatsScannerPageResults0:@KBLCloseScannerPageResults2>?8@>20BL 2 1CD5@ >1<5=0Copy to clipboardScannerPageResults(-:A?>@B8@>20BL 2 TXT
Export to TXTScannerPageResults&1=0@C65=> >1J5:B>2Items detectedScannerPageResults$@>25@5=> >1J5:B>2
Items scannedScannerPageResults5AB>?>;>65=85LocationScannerPageResults<ONameScannerPageResults
0;55NextScannerPageResults"8? >1J5:B0Object typeScannerPageResults0@0=B8=
QuarantineScannerPageResults#40;8BL C3@>7KRemove threatsScannerPageResults!>E@0=8BL D09;	Save fileScannerPageResults(!>E@0=8BL @57C;LB0BKSave resultsScannerPageResults@5<O ?@>25@:8	Scan timeScannerPageResults."5:AB>2K5 D09;K (*.txt)Text files (*.txt)ScannerPageResults"8?TypeScannerPageResultsX%1 87 %n >1J5:B0(->2) ?><5I5=(-K) 2 :0@0=B8=X%1 87 %n >1J5:B0(->2) ?><5I5=(-K) 2 :0@0=B8=X%1 87 %n >1J5:B0(->2) ?><5I5=(-K) 2 :0@0=B8=%1 of %n threat(s) quarantinedScannerPageResultsOnboarding 57C;LB0BK: %1
%1 resultsScannerPageResultsOnboarding&1=0@C65=> >1J5:B>2Items detectedScannerPageResultsOnboarding$@>25@5=> >1J5:B>2
Items scannedScannerPageResultsOnboarding5AB>?>;>65=85LocationScannerPageResultsOnboarding<ONameScannerPageResultsOnboarding
0;55NextScannerPageResultsOnboarding06<8B5 :=>?:C 0@0=B8=, GB>1K >G8AB8BL >1=0@C65==K5 C3@>7K 8 ?5@59B8 : ?>A;54=5<C H03C.gNext, click the “Quarantine” button to clean up the threats detected and continue to the last step.ScannerPageResultsOnboarding"8? >1J5:B0Object typeScannerPageResultsOnboarding0@0=B8=
QuarantineScannerPageResultsOnboarding@5<O ?@>25@:8	Scan timeScannerPageResultsOnboarding"8?TypeScannerPageResultsOnboardingC?8BLBuy nowScannerPageScheduler5@8>48G=>ABL	FrequencyScannerPageScheduler" A;CG05 ?@>?CA:0	If missedScannerPageScheduler#:068B5, :>340 8 :0: 4>;6=K 70?CA:0BLAO 2 A8AB5<5 70?;0=8@>20==K5 ?@>25@:8.7Manage when and how scheduled scans run on your system.ScannerPageSchedulert0?;0=8@C9B5 ?@>25@:C, GB>1K ?>2KA8BL MDD5:B82=>ABL 70I8BK4Schedule a scan to increase your level of protectionScannerPageScheduler& 0A?8A0=85 ?@>25@>:
Schedule scanScannerPageScheduler!<0@B-?@>25@:0
Smart scanScannerPageScheduler0G0;>Starting onScannerPageScheduler"8?TypeScannerPageScheduler1=>28B5 ?@>3@0<<C, GB>1K @071;>:8@>20BL DC=:F8N ?;0=8@>20=8O ?@>25@>:!Upgrade to unlock scheduled scansScannerPageScheduler654=52=>DailyScheduledScanDialogAutomate1>0209B5 02B><0B878@C5< ?@>25@:8Let's automate your scansScheduledScanDialogAutomate165<5AOG=>MonthlyScheduledScanDialogAutomate1!;54CNI89 H03	Next stepScheduledScanDialogAutomate10409B5 @0A?8A0=85 ?@>25@>:, GB>1K ?@>3@0<<0 02B><0B8G5A:8 2KO2;O;0 C3@>7K 2> 2@5<O ?@>AB>O A8AB5<K.RSchedule your scans and let us detect threats automatically during your down time.ScheduledScanDialogAutomate1BK15@8B5 2@5<O A;54CNI59 ?@>25@:8!Select the time of your next scanScheduledScanDialogAutomate1665=545;L=> (@5:><5=4C5BAO)Weekly (recommended)ScheduledScanDialogAutomate1'B>1K 2K?>;=8BL ?>8A: @CB:8B>2, =5>1E>48<> 2K1@0BL 4;O ?@>25@:8 25AL 48A:. >60;C9AB0, >1=>28B5 >1;0AB8 A8AB5<K, :>B>@K5 K E>B8B5 ?@>25@8BL: 2K15@8B5 4;O ?@>25@:8 25AL 48A: 8;8 >B:;NG8B5 ?>8A: @CB:8B>2 2 40==>9 ?@>25@:5.A rootkit scan requires an entire drive to be selected for scanning. Please update the areas of the system you want to scan to include an entire drive or disable rootkit scanning for this scan.ScheduledTaskCustomPage
0704BackScheduledTaskCustomPageB<5=0CancelScheduledTaskCustomPage:0AB@>8BL 2K1>@>G=CN ?@>25@:CConfigure Custom ScanScheduledTaskCustomPage03=>@8@>20BL >1=0@C65=8OIgnore detectionsScheduledTaskCustomPage
0;55NextScheduledTaskCustomPageT>B5=F80;L=> =565;0B5;L=K5 87<5=5=8O (PUM))Potentially Unwanted Modifications (PUMs)ScheduledTaskCustomPageT>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K (PUP)$Potentially Unwanted Programs (PUPs)ScheduledTaskCustomPageX2B><0B8G5A:8 ?><5I0BL 2A5 C3@>7K 2 :0@0=B8=$Quarantine all threats automaticallyScheduledTaskCustomPage~5@5703@C78BL :><?LNB5@, 5A;8 MB> =5>1E>48<> 4;O C40;5=8O C3@>7,Restart computer if needed to remove threatsScheduledTaskCustomPage8@>25@:0 =0 =0;8G85 @CB:8B>2Scan for rootkitsScheduledTaskCustomPage4@>25@OBL >1J5:BK 2 ?0<OB8Scan memory objectsScheduledTaskCustomPageh@>25@OBL @55AB@ 8 02B><0B8G5A:8 70?CA:05<K5 >1J5:BKScan registry and startup itemsScheduledTaskCustomPage @>25@OBL 0@E82KScan within archivesScheduledTaskCustomPage(0@0<5B@K @0A?8A0=8OSchedule OptionsScheduledTaskCustomPage2K15@8B5 >1;0ABL ?@>25@:8Select what to scanScheduledTaskCustomPageN 0AA<0B@820BL :0: 2@54>=>A=K5 ?@>3@0<<KTreat detections as malwareScheduledTaskCustomPageT@54C?@5640BL ?>;L7>20B5;O >1 >1=0@C65=8OEWarn user about detectionsScheduledTaskCustomPage" 0AH8@5==K5 >?F88AdvancedScheduledTaskOptionsPage* 0AH8@5==K5 =0AB@>9:8Advanced optionsScheduledTaskOptionsPage@E82KArchivesScheduledTaskOptionsPage0> 2@5<O @568<0 >6840=8OAt idle timeScheduledTaskOptionsPage
0704BackScheduledTaskOptionsPageC?8BLBuy nowScheduledTaskOptionsPageB<5=0CancelScheduledTaskOptionsPage:0AB@>8BL 2K1>@>G=CN ?@>25@:CConfigure Custom ScanScheduledTaskOptionsPage654=52=>DailyScheduledTaskOptionsPage8!:@KBL @0AH8@5==K5 =0AB@>9:8Hide advanced optionsScheduledTaskOptionsPage65G0A=>HourlyScheduledTaskOptionsPage| A;CG05 ?@>?CA:0 2K?>;=8BL ?@>25@:C ?@8 A;54CNI59 2>7<>6=>AB8#If missed, scan at next opportunityScheduledTaskOptionsPage<525@=>5 2@5<O 8;8 40B0 =0G0;0Invalid starting date or timeScheduledTaskOptionsPage1J5:BK ?0<OB8Memory objectsScheduledTaskOptionsPage65<5AOG=>MonthlyScheduledTaskOptionsPage$>A;5 ?5@5703@C7:8	On RebootScheduledTaskOptionsPage48= @07OnceScheduledTaskOptionsPage>60;C9AB0, C1548B5AL, GB> 40B0 =0G0;0 7040=0 2 D>@<0B5 %1, 0 2@5<O =0G0;0   2 D>@<0B5 %2, ?>A;5 G53> ?>2B>@8B5 ?>?KB:C.mPlease make sure that the starting date has format %1 and the starting time has format %2 and then try again.ScheduledTaskOptionsPage.">;L:> 2 Premium-25@A88Premium onlyScheduledTaskOptionsPageX2B><0B8G5A:8 ?><5I0BL 2A5 C3@>7K 2 :0@0=B8=$Quarantine all threats automaticallyScheduledTaskOptionsPage KAB@0O ?@>25@:0
Quick scanScheduledTaskOptionsPageT 55AB@ 8 02B><0B8G5A:8 70?CA:05<K5 >1J5:BKRegistry and startup itemsScheduledTaskOptionsPage>2B>@RepeatScheduledTaskOptionsPaget5@5703@C78BL :><?LNB5@, 5A;8 MB> =C6=> 4;O C40;5=8O C3@>7-Restart computer if needed for threat removalScheduledTaskOptionsPage CB:8BKRootkitsScheduledTaskOptionsPage!>E@0=8BLSaveScheduledTaskOptionsPage@>25@:0ScanScheduledTaskOptionsPage`@>25@O5B 2A5 <5AB0, 345 <>3CB A:@K20BLAO C3@>7K,Scan everywhere infections are known to hideScheduledTaskOptionsPage8@>25@:0 =0 =0;8G85 @CB:8B>2Scan for rootkitsScheduledTaskOptionsPage,@>25@8BL @0A?>;>65=85
Scan locationScheduledTaskOptionsPage @>25@OBL 0@E82KScan within archivesScheduledTaskOptionsPage@>25@O5B ?0<OBL 8 02B><0B8G5A:8 70?CA:05<K5 >1J5:BK =0 =0;8G85 0:B82=KE C3@>7:Scan your memory and startup objects for active infectionsScheduledTaskOptionsPage 0A?8A0=85ScheduleScheduledTaskOptionsPage0?;0=8@>20==0O A<0@B-?@>25@:0 70?CA:05BAO B>;L:> B>340, :>340 CAB@>9AB2> =0E>48BAO 2 @568<5 >6840=8O.9Smart scheduled scan starts only when the device is idle.ScheduledTaskOptionsPage0B0 =0G0;0
Start dateScheduledTaskOptionsPage@5<O =0G0;0
Start timeScheduledTaskOptionsPage>;=0O ?@>25@:0Threat ScanScheduledTaskOptionsPage6A?>;L7>20BL A<0@B-?@>25@:CUse smart scanScheduledTaskOptionsPage65=545;L=>WeeklyScheduledTaskOptionsPageZ 5:><5=4C5BAO 2K?>;=OBL 565=545;L=K5 ?@>25@:8Weekly scans are recommendedScheduledTaskOptionsPage( 5:><5=4C5BAO)
(Recommended)ScheduledTaskTypePage&K1>@>G=0O ?@>25@:0Custom ScanScheduledTaskTypePage KAB@0O ?@>25@:0
Quick ScanScheduledTaskTypePage`@>25@O5B 2A5 <5AB0, 345 <>3CB A:@K20BLAO C3@>7K,Scan everywhere infections are known to hideScheduledTaskTypePage@>25@O5B ?0<OBL 8 02B><0B8G5A:8 70?CA:05<K5 >1J5:BK =0 =0;8G85 0:B82=KE C3@>7:Scan your memory and startup objects for active infectionsScheduledTaskTypePage&>72>;O5B 7040BL >1J5:BK 4;O ?@>25@:8 8 459AB28O 2 >B=>H5=88 ?>B5=F80;L=> =565;0B5;L=KE ?@>3@0<< (PUP) 8 ?>B5=F80;L=> =565;0B5;L=KE 87<5=5=89 (PUM)bSet what to scan and how to handle potentially unwanted programs and modifications (PUPs and PUMs)ScheduledTaskTypePage>;=0O ?@>25@:0Threat ScanScheduledTaskTypePageA5 >B;8G=>!Everything looks great!SecurityAdvisor.!:@KBL 70:@KBK5 >1J5:BKHide dismissed itemsSecurityAdvisor@#7=09B5 1>;LH5 > Trusted Advisor Learn more about Trusted AdvisorSecurityAdvisorb0209B5 ?@82545< 2 ?>@O4>: ?0@0<5B@K 157>?0A=>AB8Let's tidy up your securitySecurityAdvisorH 15A?;0B=>9 25@A88 70I8B0 =50:B82=0,Protection is inactive with our free versionSecurityAdvisor2>:070BL 70:@KBK5 >1J5:BKShow dismissed itemsSecurityAdvisor;O ?>2KH5=8O 157>?0A=>AB8 @5:><5=4C5< >ACI5AB28BL A;54CNI85 87<5=5=8O.=To improve your security, we recommend the following changes.SecurityAdvisorTrusted AdvisorTrusted AdvisorSecurityAdvisor1=>28B5 ?@>3@0<<C 4> premium-25@A88, GB>1K 0:B828@>20BL ?5@2>:;0AA=CN 70I8BC 8 =5>3@0=8G5==K5 DC=:F88 <>=8B>@8=30.QUpgrade to activate our world-class protection and unlimited monitoring services.SecurityAdvisorr0AB@>9:8 157>?0A=>AB8 >?B8<0;L=K.  5:><5=40F89 ?>:0 =5B.BYour security settings are great. No recommendations at this time.SecurityAdvisor!25@=CBLCollapseSecurityAdvisorCard025@H8BLCompleteSecurityAdvisorCard 0725@=CBLExpandSecurityAdvisorCard(!>AB>O=85 CAB@>9AB20
Device healthSecurityAdvisorDeviceHealthCard&@>25@:8 CAB@>9AB20Device scansSecurityAdvisorDeviceScansCard 0:@KBK5 >1J5:BKDismissed items!SecurityAdvisorDismissedItemsCard>AAB0=>28BLRestore!SecurityAdvisorDismissedItemsCard'B>1K 2>AAB0=>28BL <>=8B>@8=3 8A:;NG5==>3> M;5<5=B0, =06<8B5 >AAB0=>28BL.GTo restore monitoring on a dismissed item, click on the Restore button.!SecurityAdvisorDismissedItemsCard$A=>2=K5 ?0@0<5B@KGeneral settings"SecurityAdvisorGeneralSettingsCard!1@>A8BLDismissSecurityAdvisorItem6840=85PendingSecurityAdvisorItem#A?5H=>!Successful!SecurityAdvisorItem0@>25@:0 Trusted AdvisorCheck Trusted AdvisorSecurityAdvisorNotification(>;LH5 =5 =0?><8=0BLDon't remind me againSecurityAdvisorNotification# Trusted Advisor 5ABL =5A:>;L:> @5:><5=40F89, :>B>@K5 ?>72>;OB C;CGH8BL 70I8BC.KTrusted Advisor has a recommendation or two that can boost your protection.SecurityAdvisorNotification\0H ?>:070B5;L MDD5:B82=>AB8 70I8BK 87<5=8;AO!"Your protection score has changed!SecurityAdvisorNotification6@820B=>ABL 2 A5B8 =B5@=5BOnline privacy SecurityAdvisorOnlinePrivacyCard:B82=0O 70I8B0Active protectionSecurityAdvisorRTPCardF1=>2;5=8O ?@>3@0<<=>3> >15A?5G5=8OSoftware updatesSecurityAdvisorUpdatesCard@8;>65=85ApplicationSelectPreviousExploitListModel%MHHashSelectPreviousExploitListModel ?@>3@0<<5AboutSettingsPage#G5B=0O 70?8ALAccountSettingsPage"!?8A>: @07@5H5=89
Allow ListSettingsPageB>1@065=85DisplaySettingsPage
1I55GeneralSettingsPage#254><;5=8O
NotificationsSettingsPage57>?0A=>ABLSecuritySettingsPage0@0<5B@KSettingsSettingsPage6@>25@:0 =0;8G8O >1=>2;5=89Check for updatesSettingsPageAbout25@A8O ?0:5B0 :><?>=5=B>2Component package versionSettingsPageAbout`8F5=78>==>5 A>3;0H5=85 A :>=5G=K< ?>;L7>20B5;5<!End User License Agreement (EULA)SettingsPageAbout,>A;54=55 >1=>2;5=85: Last updated: SettingsPageAbout&5@A8O MalwarebytesMalwarebytes versionSettingsPageAbout6#254><;5=85 B@5BL59 AB>@>=KThird-party noticesSettingsPageAbout05@A8O ?0:5B0 >1=>2;5=8OUpdate package versionSettingsPageAbout&=D>@<0F8O > 25@A88Version InformationSettingsPageAboutF Malwarebytes. A5 ?@020 70I8I5=K.%© Malwarebytes. All rights reserved.SettingsPageAbout$>=
BackgroundSettingsPageDisplayn7<5=5=8O 2ABC?OB 2 A8;C ?>A;5 ?5@570?CA:0 Malwarebytes;Changes take effect the next time Malwarebytes is restartedSettingsPageDisplay $>= OA=>5 =51>	Clean SkySettingsPageDisplay"5<=0ODarkSettingsPageDisplay0CB8=0 40==KEData webSettingsPageDisplayExosphere	ExosphereSettingsPageDisplay(??0@0B=>5 CA:>@5=85Hardware accelerationSettingsPageDisplay!25B;0OLightSettingsPageDisplay"5<0ThemeSettingsPageDisplayjA?>;L7>20BL 0??0@0B=>5 CA:>@5=85, :>340 >=> 4>ABC?=>(Use hardware acceleration when availableSettingsPageDisplayZA?>;L7>20BL A8AB5<=K5 ?0@0<5B@K ?> C<>;G0=8NUse system defaultSettingsPageDisplayR   >AAB0=>28BL ?0@0<5B@K ?> C<>;G0=8N      Restore default settings   SettingsPageGeneral( #?@02;5=85 70I8B>9  Manage protection SettingsPageGeneral^>1028BL >?F8N Malwarebytes 2 ?@>2>4=8: Windows,Add Malwarebytes options to Windows ExplorerSettingsPageGeneral
4@5AAddressSettingsPageGeneral*1=>2;5=8O ?@8;>65=8OApplication updatesSettingsPageGenerald2B><0B8G5A:8 703@C60BL 8 CAB0=02;820BL >1=>2;5=8O*Automatically download and install updatesSettingsPageGeneralBeta->1=>2;5=8OBeta updatesSettingsPageGeneral6@>25@:0 =0;8G8O >1=>2;5=89Check for updatesSettingsPageGeneral!>18@0BL @0AH8@5==K5 40==K5 6C@=0;0 A>1KB89 4;O A;C61K ?>445@6:8 (=5 @5:><5=4C5BAO)=Collect enhanced event log data for support (not recommended)SettingsPageGeneral0AB@>8BL Malwarebytes 4;O ?>4:;NG5=8O : =B5@=5BC G5@57 ?@>:A8-A5@25@FConfigure Malwarebytes to connect to the Internet using a proxy serverSettingsPageGeneral42548B5 8<O ?@>:A8-A5@25@0Enter Proxy Server NameSettingsPageGeneral2548B5 ?0@>;LEnter the PasswordSettingsPageGeneral02548B5 8<O ?>;L7>20B5;OEnter the User NameSettingsPageGeneral,0==K5 6C@=0;0 A>1KB89Event log dataSettingsPageGeneral|>;CG8BL @0==89 4>ABC? : ?>A;54=8< DC=:F8O< ?@>3@0<<K 8 70I8BK=Get early access to the latest software and security featuresSettingsPageGeneral@54>AB02;OBL AB0B8AB8G5A:85 A2545=8O >1 8A?>;L7>20=88 ?@>3@0<<K 8 >1=0@C65=88 C3@>7, GB>1K ?><>GL 1>@>BLAO A 2@54>=>A=K< ;Help fight Malware by providing usage and threat statisticsSettingsPageGeneral/7K:LanguageSettingsPageGeneral3@0=8G8BL :>;8G5AB2> ?>;L7>20B5;59, :>B>@K5 <>3CB <5=OBL =0AB@>9:8 157>?0A=>AB8 Malwarebytes.9Limit who can change your Malwarebytes security settings.SettingsPageGeneralZ;8O=85 @CG=>9 ?@>25@:8 =0 ?@>872>48B5;L=>ABLManual scan performance impactSettingsPageGeneral CG=K5 ?@>25@:8 8<5NB <5=LH89 ?@8>@8B5B (<5=LH5 2;8ONB =0 ?@>872>48B5;L=>ABL)9Manual scans take less priority (less performance impact)SettingsPageGeneralp CG=K5 ?@>25@:8 8<5NB ?@8>@8B5B =04 4@C38<8 ?@8;>65=8O<82Manual scans take priority over other applicationsSettingsPageGeneral<#254><;OBL <5=O > =>2>9 25@A88.Notify me when a new version becomes availableSettingsPageGeneral0@>;L:	Password:SettingsPageGeneral^>60;C9AB0, 22548B5 =><5@ ?>@B0 <564C 1 8 65535%Please enter a port between 1 - 65535SettingsPageGeneral>@BPortSettingsPageGeneral.">;L:> 2 Premium-25@A88Premium onlySettingsPageGeneral@>:A8-A5@25@Proxy serverSettingsPageGeneral845=B8D8:0F8O ?@>:A8-A5@25@0Proxy server authenticationSettingsPageGeneralN0I8B0 >B =5A0=:F8>=8@>20==KE 87<5=5=89Tamper ProtectionSettingsPageGeneralX!B0B8AB8:0 8A?>;L7>20=8O 8 >1=0@C65=8O C3@>7Usage and threat statisticsSettingsPageGeneral <O ?>;L7>20B5;OUsernameSettingsPageGeneralN@>A<>B@5BL ?>;8B8:C :>=D845=F80;L=>AB8View privacy policySettingsPageGeneralC6=> 1>;LH5 381:>AB8? K15@8B5 2B>@CN >?F8N 4;O >?B8<870F88 ?@>872>48B5;L=>AB8 A8AB5<K ?@8 @01>B5 A 4@C38<8 ?@8;>65=8O<8.mWant more flexibility? Select the 2nd option to optimize system performance while running other applications.SettingsPageGeneral80@0<5B@K ?@>2>4=8:0 WindowsWindows Explorer settingsSettingsPageGeneral^A;8 >B:;NG8BL MB>B ?0@0<5B@, B> =0 @01>G5< AB>;5 =5 1C4CB >B>1@060BLAO C254><;5=8O >
                                       =0;8G88 4>ABC?=KE >1=>2;5=89. #254><;5=8O > :@8B8G5A:8E >1=>2;5=8OE, 0 B0:65 C254><;5=8O 2=CB@8 ?@>3@0<<K
                                       1C4CB >B>1@060BLAO 157 87<5=5=89.With this setting turned off, you will no longer receive desktop notifications when
                                       an update is available. Notifications for critical updates and notifications inside the
                                       product will still display.SettingsPageGeneral@>872>48B5;8 ?@>3@0<<=>3> >15A?5G5=8O 8=>340 >ACI5AB2;ONB ?@5420@8B5;L=K9 2K?CA: beta-25@A89 A2>8E ?@>4C:B>2. #AB0=02;820O 8E, ?>;L7>20B5;8 =5 B>;L:> ?><>30NB ?@>872>48B5;O< >?5@0B82=> 8A?@028BL >H81:8 2 ?@>3@0<<0E, => 8 ?>;CG0NB 4>ABC? : @07;8G=K< =>2K< DC=:F8O<.
><?0=8O Malwarebytes =5 B5AB8@C5B beta-25@A88 A2>8E ?@>3@0<< 2 ?>;=>9 <5@5, ?>MB><C >=8 <>3CB A>45@60BL ACI5AB25==K5 >H81:8.
Malwarebytes =0AB>OB5;L=> @5:><5=4C5B A>740BL @575@2=CN :>?8N 2A5E A2>8E 40==KE, ?@5645 G5< ?@8ABC?0BL : 8A?>;L7>20=8N beta-25@A88 B>9 8;8 8=>9 ?@>3@0<<K,   =57028A8<> >B B>3>, 87 :0:>3> 8AB>G=8:0 >=0 ?>;CG5=0.
Beta-25@A88 ?@>3@0<< ?@54;030NBAO =0 CA;>28OE  !", 8 =5 ?>4@07C<520NB ?@54>AB02;5=8O :0:8E-;81> 30@0=B89 8;8 CA;C3 B5E=8G5A:>9 ?>445@6:8.Beta software is sometimes provided by software providers as preview releases for quick bug fixes and access to new features.
Beta software is not fully tested by Malwarebytes and may include significant issues.
Malwarebytes strongly recommends that you back up all of your data prior to using Beta software from any source.
Beta software is offered "AS-IS" and does not carry any warranties or support services.SettingsPageGeneralModelB<5=0CancelSettingsPageGeneralModelF:;NG8BL beta->1=>2;5=8O ?@8;>65=8OEnable Beta Application UpdatesSettingsPageGeneralModelV%>B8B5 ;8 K 70459AB2>20BL beta->1=>2;5=8O?2Would you like to enable Beta Application Updates?SettingsPageGeneralModel AB05BAO %n 45=LAB05BAO %n 4=O AB05BAO %n 4=59%n day(s) remainingSettingsPageMyAccount4!2545=8O >1 CG5B=>9 70?8A8Account DetailsSettingsPageMyAccount*:B828@>20BL ?>4?8A:CActivate subscriptionSettingsPageMyAccountf>4?8A:0 1C45B 02B><0B8G5A:8 ?@>4;5=0 G5@57 %n 45=Ld>4?8A:0 1C45B 02B><0B8G5A:8 ?@>4;5=0 G5@57 %n 4=Of>4?8A:0 1C45B 02B><0B8G5A:8 ?@>4;5=0 G5@57 %n 4=59!Automatically renews in %n day(s)SettingsPageMyAccountZ>4?8A:0 1C45B 02B><0B8G5A:8 ?@>4;5=0 A53>4=OAutomatically renews todaySettingsPageMyAccountC?8BLBuy nowSettingsPageMyAccount7<5=8BLChangeSettingsPageMyAccount50:B828@>20BL
DeactivateSettingsPageMyAccount<O CAB@>9AB20Device nameSettingsPageMyAccountK:;NG5=>DisabledSettingsPageMyAccount5@A8OEditionSettingsPageMyAccount:;NG5=>EnabledSettingsPageMyAccount AB5:05B A53>4=O
Ends TodaySettingsPageMyAccountL!@>: 459AB28O 8AB5:   2@5<5==> ?@>4;5=Expired - temporarily extendedSettingsPageMyAccountH!@>: 459AB28O 8AB5:05B G5@57 %n 45=LF!@>: 459AB28O 8AB5:05B G5@57 %n 4=OH!@>: 459AB28O 8AB5:05B G5@57 %n 4=59Expires in %n day(s)SettingsPageMyAccount<!@>: 459AB28O 8AB5:05B A53>4=O
Expires todaySettingsPageMyAccount\?5@0F8O =5 C40;0AL. 1=>28B5 ?;0B56=K5 40==K5#Failed - Update payment informationSettingsPageMyAccount"5A?;0B=0O 25@A8OFreeSettingsPageMyAccountID ;8F5=788
License IDSettingsPageMyAccount"8F5=78>==K9 :;NGLicense keySettingsPageMyAccount.#?@02;5=85 CAB@>9AB20<8Manage devicesSettingsPageMyAccount4!@>: 459AB28O =5 >3@0=8G5=
Never expiresSettingsPageMyAccount@>4;8BL A59G0A	Renew NowSettingsPageMyAccount!>AB>O=85StatusSettingsPageMyAccount'B>1K <b>4>1028BL</b> 8;8 <b>C40;8BL</b> CAB@>9AB20, 70:@5?;5==K5 70 ?>4?8A:>9, ?>60;C9AB0, >B:@>9B5 A2>N CG5B=CN 70?8AL. STo <b>add</b> or <b>remove</b> devices from your subscription, visit your account. SettingsPageMyAccount,7=0:><8B5;L=0O 25@A8OTrialSettingsPageMyAccount!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:. 1=>28B5 ?@>3@0<<C, GB>1K 2>AAB0=>28BL 70I8BC 2 @50;L=>< 2@5<5=8;Trial Expired - Upgrade now to restore Real-Time ProtectionSettingsPageMyAccountB:;NG8BL 02B><0B8G5A:>5 ?@>4;5=85Turn on auto-renewalSettingsPageMyAccount21=>28BL ?;0B56=K5 40==K5Update Payment InformationSettingsPageMyAccount1=>28BL A59G0AUpgrade nowSettingsPageMyAccount,B:@KBL CG5B=CN 70?8AL
Visit accountSettingsPageMyAccountZK C25@5=K, GB> E>B8B5 2K?>;=8BL 450:B820F8N?$Are you sure you want to deactivate?SettingsPageMyAccountModelB<5=0CancelSettingsPageMyAccountModel50:B828@>20BL
DeactivateSettingsPageMyAccountModel0025@H8BL ?@>1=K9 ?5@8>4	End trialSettingsPageMyAccountModel\0 MB>< CAB@>9AB25 ?@>3@0<<0 Malwarebytes 25@=5BAO : 15A?;0B=>9 25@A88. K A<>65B5 70?CA:0BL ?@>25@:8, => ?>B5@O5B5 70I8BC 2 @50;L=>< 2@5<5=8 8 4@C385 DC=:F88 premium-25@A88.Malwarebytes will revert to the free version on this device. You will still be able to run scans, but you will lose Real-Time Protection and all other premium features.SettingsPageMyAccountModel1 45=L1 daySettingsPageNotifications10 A5:C=4
10 secondsSettingsPageNotifications11 A5:C=4
11 secondsSettingsPageNotifications12 A5:C=4
12 secondsSettingsPageNotifications13 A5:C=4
13 secondsSettingsPageNotifications14 4=5914 daysSettingsPageNotifications14 A5:C=4
14 secondsSettingsPageNotifications15 A5:C=4
15 secondsSettingsPageNotifications3 4=593 daysSettingsPageNotifications3 A5:C=4K	3 secondsSettingsPageNotifications30 4=5930 daysSettingsPageNotifications4 A5:C=4K	4 secondsSettingsPageNotifications5 A5:C=4	5 secondsSettingsPageNotifications6 A5:C=4	6 secondsSettingsPageNotifications7 4=597 daysSettingsPageNotifications7 A5:C=4	7 secondsSettingsPageNotifications8 A5:C=4	8 secondsSettingsPageNotifications9 A5:C=4	9 secondsSettingsPageNotifications>1028BLAddSettingsPageNotifications@54C?@5640BL <5=O >1 >B:;NG5=88 <>4C;59 70I8BK 2 @50;L=>< 2@5<5=8;Alert me if any Real-Time Protection modules are turned offSettingsPageNotifications@8;>65=85ApplicationSettingsPageNotificationsG8AB8BL 2A5	Clear allSettingsPageNotificationsT0:@K20BL =5:@8B8G5A:85 C254><;5=8O G5@57 'Close non-critical notifications after SettingsPageNotifications654=52=>DailySettingsPageNotifications2?>25I5=8O >1 CAB@>9AB20E
Device alertsSettingsPageNotifications5 70:@K20BLDo not closeSettingsPageNotifications064K5 2 =545;8
Every 2 weeksSettingsPageNotificationsCBL : D09;C	File pathSettingsPageNotifications>;CG0BL C254><;5=8O, 5A;8 ?@>25@:0 =5 70?CA:0;0AL 2 B5G5=85 >?@545;5==>3> :>;8G5AB20 4=59IGet notified when a scan hasn't been run after a specified number of daysSettingsPageNotificationsH>;CG0BL C254><;5=8O > @5:><5=40F8OE/Get notified when recommendations are availableSettingsPageNotifications>;CG0BL =0?><8=0=8O > 70?CA:5 ?@>25@:8 ?@8 703@C7:5 =>2KE D09;>2 8;8 ?@>3@0<<DGet reminded to run a scan when new files or programs are downloadedSettingsPageNotifications!:@K20BL C254><;5=85, 5A;8 70?;0=8@>20==0O ?@>25@:0 =5 >1=0@C68205B C3@>7IHide notifications when scheduled scans complete without threats detectedSettingsPageNotifications65G0A=>HourlySettingsPageNotifications.#?@02;5=85 >?>25I5=8O<8
Manage alertsSettingsPageNotifications80AB@>9:8 @5:;0<=KE @0AAK;>:Marketing preferencesSettingsPageNotifications#254><;5=8O
NotificationsSettingsPageNotifications#254><;OBL <5=O	Notify meSettingsPageNotifications*#254><;OBL <5=O G5@57Notify me afterSettingsPageNotifications* 568< 2>A?@>872545=8O	Play ModeSettingsPageNotifications.">;L:> 2 Premium-25@A88Premium onlySettingsPageNotifications>;CG0BL ?> M;5:B@>==>9 ?>GB5 C254><;5=8O ?@8 >1=0@C65=88 ?@>1;5< =0 >4=>< 8;8 =5A:>;L:8E CAB@>9AB20EUReceive email notifications when there is an issue with one or more protected devicesSettingsPageNotificationsv 5:><5=4C5BAO 2> 2@5<O 83@, ?@575=B0F89 8 ?@>A<>B@0 D8;L<>2IRecommended when playing games, watching movies, and giving presentationsSettingsPageNotifications,0?><8=0=85 > ?@>25@:5
Scan reminderSettingsPageNotificationsR>:070BL 565<5AOG=K9 >BG5B > 157>?0A=>AB8Show a monthly security summarySettingsPageNotificationsp>:07K20BL 2A5 C254><;5=8O 2 >1;0AB8 C254><;5=89 Windows3Show all notifications in Windows notification areaSettingsPageNotifications`>:07K20BL @5:;0<=K5 C254><;5=8O >B Malwarebytes0Show promotional notifications from MalwarebytesSettingsPageNotifications#254><;5=8O 8 >1=>2;5=8O 1C4CB >B:;NG5=K, :>340 >B:@KBK >?@545;5==K5 ?@8;>65=8O=Suspend notifications and updates when selected apps are openSettingsPageNotifications60?><8=0=85 Trusted AdvisorTrusted Advisor reminderSettingsPageNotifications665=545;L=> (@5:><5=4C5BAO)Weekly (recommended)SettingsPageNotificationsB<5=0CancelSettingsPageProtectionModel'B>1K ?>;CG8BL 4>ABC? : MB8< ?0@0<5B@0<, 2:;NG8B5 70I8BC 2 A5B8 =B5@=5B.1To access these settings, turn on Web Protection.SettingsPageProtectionModel:;NG8BLTurn OnSettingsPageProtectionModelB:;NG8BL 70I8BC >B 1@CBD>@A-0B0:?Turn on Brute Force Protection?SettingsPageProtectionModelR =5C40G=KE ?>?KB>: 2K?>;=O5BAO 2 B5G5=85 ! failed attempts are made within SettingsPageSecurity <8=CB, 
 minutes, SettingsPageSecurity <8=CB.	 minutes.SettingsPageSecurity%n A5:C=40%n A5:C=4K%n A5:C=4%n second(s)SettingsPageSecurity1 251 - 25SettingsPageSecurity1 65535	1 - 65535SettingsPageSecurity105 A5:C=4105 secondsSettingsPageSecurity120 A5:C=4120 secondsSettingsPageSecurity135 A5:C=4135 secondsSettingsPageSecurity15 A5:C=4
15 secondsSettingsPageSecurity150 A5:C=4150 secondsSettingsPageSecurity165 A5:C=4165 secondsSettingsPageSecurity180 A5:C=4180 secondsSettingsPageSecurity30 A5:C=4
30 secondsSettingsPageSecurity45 A5:C=4
45 secondsSettingsPageSecurity60 A5:C=4
60 secondsSettingsPageSecurity75 A5:C=4
75 secondsSettingsPageSecurity90 A5:C=4
90 secondsSettingsPageSecurity" 0AH8@5==K5 >?F88AdvancedSettingsPageSecurity* 0AH8@5==K5 ?0@0<5B@KAdvanced settingsSettingsPageSecurity,A5340 (@5:><5=4C5BAO)Always (recommended)SettingsPageSecurityA5340 @538AB@8@>20BL Malwarebytes 2 &5=B@5 >15A?5G5=8O 157>?0A=>AB8 Windows;Always register Malwarebytes in the Windows Security CenterSettingsPageSecurityB2B><0B8G5A:8 ?><5I0BL 2 :0@0=B8=Automatic quarantineSettingsPageSecurityd2B><0B8G5A:8 ?@>25@OBL >1=>2;5=8O 0=0;8B8:8 C3@>73Automatically check for threat intelligence updatesSettingsPageSecurityz2B><0B8G5A:8 ?><5I0BL 2 :0@0=B8= >1=0@C65==>5 2@54>=>A=>5 /Automatically quarantine malware upon detectionSettingsPageSecurity2B><0B8G5A:8 2>AAB0=02;820BL 87 :0@0=B8=0 ?@8 ;>6=>< A@010BK20=88 70I8BK >B 2@54>=>A=>3> DAutomatically unquarantine when detected malware is a false positiveSettingsPageSecurity;>:8@>20BL ?>B5=F80;L=> 2@54>=>A=K5 2;>65=8O 2 A>>1I5=8OE (B>;L:> 2 :;0AA8G5A:>9 25@A88 Outlook)DBlock potentially malicious email attachments (Outlook desktop only)SettingsPageSecurity;>:8@>20BL 4;O =502B>@87>20==KE ?>;L7>20B5;59 C40;5==K9 4>ABC? : :><?LNB5@C G5@57 =B5@=5BPBlock unauthorized users from accessing your computer remotely over the InternetSettingsPageSecurity.0I8B0 >B 1@CBD>@A-0B0:Brute Force ProtectionSettingsPageSecurityB<5=0CancelSettingsPageSecurity06<8B5 :=>?:C 2>AAB0=>2;5=8O ?0@0<5B@>2 ?> C<>;G0=8N, GB>1K 8A?>;L7>20BL ?>@B, :>B>@K9 ?> C<>;G0=8N =07=0G05BAO A8AB5<>9 Windows.BClick Restore default to use the default port assigned by Windows.SettingsPageSecurity45=L4=O4=59Day(s)SettingsPageSecurity4=59DaysSettingsPageSecurity045@6820BL 70?CA: 70I8BK 2 @50;L=>< 2@5<5=8 ?@8 70?CA:5 Malwarebytes3Delay Real-Time Protection when Malwarebytes startsSettingsPageSecurityn1=0@C6820BL ?>B5=F80;L=> =565;0B5;L=K5 87<5=5=8O (PUM)0Detect Potentially Unwanted Modifications (PUMs)SettingsPageSecurityn1=0@C6820BL ?>B5=F80;L=> =565;0B5;L=K5 ?@>3@0<<K (PUP)+Detect Potentially Unwanted Programs (PUPs)SettingsPageSecurity4:;NG8BL <>4C;L A0<>70I8BKEnable self-protection moduleSettingsPageSecurity\:;NG8BL <>4C;L A0<>70I8BK 4> 703@C7:8 A8AB5<K)Enable self-protection module early startSettingsPageSecurity(0I8B0 >B M:A?;>9B>2Exploit ProtectionSettingsPageSecurity8!:@KBL @0AH8@5==K5 =0AB@>9:8
Hide advancedSettingsPageSecurity8!:@KBL @0AH8@5==K5 =0AB@>9:8Hide advanced optionsSettingsPageSecurityG0AG0A0
G0A>2Hour(s)SettingsPageSecurity
G0A>2HoursSettingsPageSecurityA;8 0H :><?LNB5@ ?>4 C?@02;5=85< Windows ?>4:;NG5= : =B5@=5BC 8 K 2:;NG8;8 ?@>B>:>; C40;5==>3> @01>G53> AB>;0 (RDP), E0:5@K <>3CB ?>?KB0BLAO ?>;CG8BL C40;5==K9 4>ABC? : A8AB5<5, ?>4>1@02 0H5 8<O ?>;L7>20B5;O 8 ?0@>;L. "0:>9 A?>A>1 8725AB5= :0: 1@CBD>@A-0B0:0.If your Windows computer is connected to the Internet and you have Remote Desktop Protocol (RDP) turned on, hackers can try to access it remotely by guessing your username and password. This is called a brute force attack.SettingsPageSecurity03=>@8@>20BL >1=0@C65=8OIgnore DetectionsSettingsPageSecurityv0?CA:0BL Malwarebytes 2 D>=>2>< @568<5 ?@8 70?CA:5 Windows<Launch Malwarebytes in the background when Windows starts upSettingsPageSecurityF#?@02;5=85 70I8I5==K<8 ?@8;>65=8O<8Manage protected applicationsSettingsPageSecurity
<8=CBMinutesSettingsPageSecurity>@BPortSettingsPageSecurityD>B5=F80;L=> =565;0B5;L=K5 >1J5:BKPotentially unwanted itemsSettingsPageSecurity.">;L:> 2 Premium-25@A88Premium onlySettingsPageSecurityD>AAB0=>28BL 7=0G5=8O ?> C<>;G0=8NRestore defaultSettingsPageSecurity!>E@0=8BLSaveSettingsPageSecurity8@>25@:0 =0 =0;8G85 @CB:8B>2Scan for rootkitsSettingsPageSecurity$0AB@>9:8 ?@>25@:8Scan optionsSettingsPageSecurity @>25@OBL 0@E82KScan within archivesSettingsPageSecurity-B8 DC=:F88 >B=>AOBAO : 70I8B5 2 @50;L=>< 2@5<5=8 8 : ?@>25@:0<.>These features pertain to both Real-Time Protection and Scans.SettingsPageSecurity(@028;> A@010BK20=8OTrigger ruleSettingsPageSecurity01=>28BL 0=0;8B8:C C3@>7Update threat intelligenceSettingsPageSecurityA?>;L7>20BL 8A:CAAB25==K9 8=B5;;5:B 4;O 0=0;870 8 >1=0@C65=8O C3@>7-Use artificial intelligence to detect threatsSettingsPageSecurityA?>;L7>20BL 0;3>@8B<K M:A?5@B=KE A8AB5< 4;O 2KO2;5=8O 2@54>=>A=KE D09;>28Use expert system algorithms to identify malicious filesSettingsPageSecurity4@54C?@5640BL ?>;L7>20B5;O	Warn UserSettingsPageSecurity
A;8 When SettingsPageSecurityL&5=B@ >15A?5G5=8O 157>?0A=>AB8 WindowsWindows Security CenterSettingsPageSecurity0?CA: WindowsWindows startupSettingsPageSecurityF701;>:8@>20BL 2E>4OI89 IP-04@5A =0 "block the incoming IP address for SettingsPageSecurity$>4:;NG5=85 : A5B8Network ConnectionSignInModelOKOKSignInModel5 C405BAO A2O70BLAO A A5@25@>< ;8F5=789. @>25@LB5 =0AB@>9:8 ?>4:;NG5=8O : A5B8 8;8 >1@0B8B5AL 70 ?><>ILN : A8AB5<=><C 04<8=8AB@0B>@C.nUnable to contact license server. Check your network connection or contact your system administrator for help.SignInModel<html><style type="text/css"></style> 071;>:8@C9B5 MBC 8 4@C385 DC=:F88 2 ?>;=>9 25@A88 <span style="color: %1">Malwarebytes</span></html><html><style type="text/css"></style>Unlock this feature and more with <span style="color: %1">Malwarebytes</span> full version</html>SliderUpgradeToPremium>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesSliderUpgradeToPremiumC?8BLBuy nowSliderUpgradeToPremium0:@KBLCloseSliderUpgradeToPremiumT1=0@C68205B 8 C40;O5B 2@54>=>A=K5 >1J5:BKDetects and removes infectionsSliderUpgradeToPremium#7=0BL 1>;LH5
Learn moreSliderUpgradeToPremium,0I8I05B >B C3@>7 24/7Protects against threats 24/7SliderUpgradeToPremiumD2B><0B8G5A:8 ?@>25@O5B CAB@>9AB2>Scans your device automaticallySliderUpgradeToPremiumR14-4=52=0O >7=0:><8B5;L=0O Premium-25@A8O14-day Premium TrialSoftwareInformationReport!@>: 459AB28O 14-4=52=>9 >7=0:><8B5;L=>9 Premium-25@A88 8AB5:, ?>MB><C K 25@=C;8AL : 15A?;0B=>9 25@A88 Malwarebytes414-day Premium Trial Downgraded to Malwarebytes FreeSoftwareInformationReport25@A8O ?0:5B0 :><?>=5=B>2Component package versionSoftwareInformationReport8F5=78OLicenseSoftwareInformationReport<5A?;0B=0O 25@A8O MalwarebytesMalwarebytes FreeSoftwareInformationReportPremium-25@A8OPremiumSoftwareInformationReport`K ?5@5H;8 A Premium-25@A88 =0 15A?;0B=CN 25@A8N'Premium Downgraded to Malwarebytes FreeSoftwareInformationReport=D>@<0F8O > Software informationSoftwareInformationReport05@A8O ?0:5B0 >1=>2;5=8OUpdate package versionSoftwareInformationReport5@A8OVersionSoftwareInformationReport&@>4>;68BL =0 A09B5Continue from siteSomethingWentWrongPage65@=CBLAO 8 2>9B8 2 A8AB5<CReturn to sign inSomethingWentWrongPage">7=8:;0 ?@>1;5<0Something went wrongSomethingWentWrongPage5 C40;>AL 2K?>;=8BL 0H 70?@>A.
>60;C9AB0, ?>A5B8B5 =0H 251-A09B, GB>1K A1@>A8BL ?0@>;L.YWe were unable to complete your request.
Please visit our website to reset your password.SomethingWentWrongPage@>F5AA>@CPUSystemInformationReport(?5@0F8>==0O A8AB5<0Operating systemSystemInformationReport("8? D09;>2>9 A8AB5<KSystem file typeSystemInformationReport(=D>@<0F8O > A8AB5<5System informationSystemInformationReport>;L7>20B5;LUserSystemInformationReport
KE>4Exit
SystemTrayJ>:070BL Malwarebytes Anti-Ransomware!Show Malwarebytes Anti-Ransomware
SystemTray:;NG8BL 70I8BCStart Protection
SystemTray B:;NG8BL 70I8BCStop Protection
SystemTray5BNoTableViewStyleK1@0=>:	Selected:TableViewStyle0YesTableViewStyle"01;>:8@>20BL 2A5	Block allTamperProtection 07@5H5=8OPermissionsTamperProtection,<b>7<5=8BL ?0@>;L</b><b>Change password</b>TamperProtectionChangePassword(>4B25@645=85 ?0@>;OConfirm passwordTamperProtectionChangePassword$>4B25@48B5 ?0@>;LConfirm the PasswordTamperProtectionChangePassword"5:CI89 ?0@>;LCurrent PasswordTamperProtectionChangePassword"5:CI89 ?0@>;LCurrent passwordTamperProtectionChangePassword525@=K9 ?0@>;LIncorrect passwordTamperProtectionChangePasswordP0:A8<0;L=0O 4;8=0 ?0@>;O   256 A8<2>;>2&Maximum password length 256 charactersTamperProtectionChangePassword>2K9 ?0@>;LNew passwordTamperProtectionChangePassword&0@>;8 =5 A>2?040NBPasswords do not matchTamperProtectionChangePasswordr#:068B5 ?0@>;L (<0:A8<0;L=0O 4;8=0 ?0@>;O   256 A8<2>;>2);Specify a Password (Maximum password length 256 characters)TamperProtectionChangePassword
0704BackTamperProtectionDialogB<5=0CancelTamperProtectionDialog7<5=8BL ?0@>;LChange passwordTamperProtectionDialogf!>7409B5 ?0@>;L 4;O 4>ABC?0 : =0AB@>9:0< 8 >BG5B0<.0Create a password for your settings and reports.TamperProtectionDialog>B>2>DoneTamperProtectionDialog>2K9 ?0@>;LNew passwordTamperProtectionDialog
0;55NextTamperProtectionDialog0@>;LPasswordTamperProtectionDialog!>E@0=8BLSaveTamperProtectionDialogK15@8B5 >1J5:BK, : :>B>@K< 4@C385 ?>;L7>20B5;8 =5 A<>3CB >ACI5AB2;OBL 4>ABC? 8 :>B>@K5 >=8 =5 A<>3CB 87<5=OBL.SSelect the items you want to block other users from accessing or making changes to.TamperProtectionDialogN0I8B0 >B =5A0=:F8>=8@>20==KE 87<5=5=89Tamper ProtectionTamperProtectionDialog'B>1K C40;8BL Malwarebytes, 0< =C6=> 1C45B 225AB8 ?0@>;L 8;8 ;8F5=78>==K9 :;NG.PYou will need to provide your password or license key to uninstall Malwarebytes.TamperProtectionDialog(>4B25@645=85 ?0@>;OConfirm passwordTamperProtectionPasswordSetup$>4B25@48B5 ?0@>;LConfirm the PasswordTamperProtectionPasswordSetupP0:A8<0;L=0O 4;8=0 ?0@>;O   256 A8<2>;>2&Maximum password length 256 charactersTamperProtectionPasswordSetup0@>;LPasswordTamperProtectionPasswordSetup&0@>;8 =5 A>2?040NBPasswords do not matchTamperProtectionPasswordSetupr#:068B5 ?0@>;L (<0:A8<0;L=0O 4;8=0 ?0@>;O   256 A8<2>;>2);Specify a Password (Maximum password length 256 characters)TamperProtectionPasswordSetup>?8@>20BLCopy	TextFieldK@570BLCut	TextFieldAB028BLPaste	TextField
K:;.OffTheme:;.OnThemeK1@0=>SelectedTheme0?CA:...Starting...ThemeAB0=>2:0...Stopping...Theme54>ABC?=>UnavailableTheme54>ABC?=>. K <>65B5 2>A?>;L7>20BLAO 40==>9 DC=:F859 B>;L:> 2 A8AB5<5 Windows 7 8;8 1>;55 ?>74=59 25@A88CUnavailable - this feature is only available in Windows 7 or higherThemeAMAM
TimePicker>40BL 70O2:CApply
TimePickerPMPM
TimePickerB<5=0Cancel ToggleHardwareAccelerationDialog~;O 87<5=5=8O MB>9 =0AB@>9:8 B@51C5BAO ?5@570?CA: Malwarebytes.2To change this setting, Malwarebytes must restart. ToggleHardwareAccelerationDialog;O 87<5=5=8O MB>9 =0AB@>9:8 B@51C5BAO ?5@570?CA: Malwarebytes. A;8 87<5=8BL MBC =0AB@>9:C, MB> <>65B ?@825AB8 : ?@>1;5<0< A >B>1@065=85<.gTo change this setting, Malwarebytes must restart. Changing this setting may also cause display issues. ToggleHardwareAccelerationDialog2B:;NG8BL 8 ?5@570?CAB8BLTurn off and restart ToggleHardwareAccelerationDialog>B:;NG8BL 0??0@0B=>5 CA:>@5=85?Turn off hardware acceleration? ToggleHardwareAccelerationDialog0:;NG8BL 8 ?5@570?CAB8BLTurn on and restart ToggleHardwareAccelerationDialog<:;NG8BL 0??0@0B=>5 CA:>@5=85?Turn on hardware acceleration? ToggleHardwareAccelerationDialogC6=K @5H5=8O 4;O :@C?=>3> 187=5A0? <html><a style="text-decoration: none; color: %1;" href="%2">!2O70BLAO A >B45;>< ?@>406</a></html>{Looking for large business solutions? <html><a style="text-decoration: none; color: %1;" href="%2">Contact sales</a></html>TollboothEPDialogT@>4C:B =5 ;8F5=78@>20= 4;O C40;5=8O C3@>7'Product not licensed for threat removalTollboothEPDialogH>ABC?=> B>;L:> 2 >1=>2;5==>9 25@A88&Available in the upgraded version only
TooltipButton:, 06<8B5 ESC, GB>1K 70:@KBL., Press escape to close.TooltipPopOverZ@8;>65=85 Malwarebytes 2 >1;0AB8 C254><;5=89Malwarebytes Tray AppTrayDialogServiceOKOKTrayDialogService8@>25@:0 5I5 =5 70?CA:0;0AL.A scan has never been run.TrayMenuView8>1028BL 251-8A:;NG5=85 4;O Add Web Exclusion for TrayMenuView6@>25@:0 =0;8G8O >1=>2;5=89Check for UpdatesTrayMenuView60I8B0 >B M:A?;>9B>2: K:;.Exploit Protection: OffTrayMenuView40I8B0 >B M:A?;>9B>2: :;.Exploit Protection: OnTrayMenuViewZ0I8B0 >B M:A?;>9B>2: ">;L:> 2 Premium-25@A88 Exploit Protection: Premium OnlyTrayMenuView"5A?;0B=0O 25@A8OFreeTrayMenuView&!:@KBL MalwarebytesHide MalwarebytesTrayMenuViewB#7=0BL 1>;LH5 > Premium-25@A88...Learn More about Premium...TrayMenuViewJ0I8B0 >B 2@54>=>A=KE ?@>3@0<<: K:;.Malware Protection: OffTrayMenuViewH0I8B0 >B 2@54>=>A=KE ?@>3@0<<: :;.Malware Protection: OnTrayMenuViewn0I8B0 >B 2@54>=>A=KE ?@>3@0<<: ">;L:> 2 Premium-25@A88 Malware Protection: Premium OnlyTrayMenuViewMalwarebytesMalwarebytesTrayMenuView(B:@KBL MalwarebytesOpen MalwarebytesTrayMenuViewPremium-25@A8OPremiumTrayMenuViewD!@>: 459AB28O Premium-25@A88 8AB5:Premium ExpiredTrayMenuView"0I8B0 >B:;NG5=0.Protection disabled.TrayMenuView*K9B8 87 MalwarebytesQuit MalwarebytesTrayMenuViewJ0I8B0 >B ?@>3@0<<-2K<>30B5;59: K:;.Ransomware Protection: OffTrayMenuViewH0I8B0 >B ?@>3@0<<-2K<>30B5;59: :;.Ransomware Protection: OnTrayMenuViewn0I8B0 >B ?@>3@0<<-2K<>30B5;59: ">;L:> 2 Premium-25@A88#Ransomware Protection: Premium OnlyTrayMenuView40?CA:0BL 2<5AB5 A WindowsStart with WindowsTrayMenuView,7=0:><8B5;L=0O 25@A8OTrialTrayMenuViewT!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:
Trial ExpiredTrayMenuView58725AB=>UnknownTrayMenuView41=>28BL 4> Premium-25@A88Upgrade to PremiumTrayMenuView:0I8B0 2 A5B8 =B5@=5B: K:;.Web Protection: OffTrayMenuView80I8B0 2 A5B8 =B5@=5B: :;.Web Protection: OnTrayMenuView^0I8B0 2 A5B8 =B5@=5B: ">;L:> 2 Premium-25@A88Web Protection: Premium OnlyTrayMenuViewp;>:8@C5B >?0A=K5 251-A09BK 8 459AB28O >=;09=-<>H5==8:>2$Blocks bad websites and online scamsTrialAvailableDialog>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesTrialAvailableDialogF5=8B5 ?@58<CI5AB20 =>2KE 2>7<>6=>AB59, ?>;L7COAL 15A?;0B=>9
14-4=52=>9 ?@>1=>9 25@A8592Enjoy these upgrades during your free
14-day trialTrialAvailableDialogR 01>B09B5 2 =B5@=5B5 A?>:>9=> 8 C25@5==>$Experience peace of mind when onlineTrialAvailableDialog80I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7TrialAvailableDialogd05B 0< 2>7<>6=>ABL @5H0BL, :>340 8 GB> ?@>25@OBL1Puts you in control of when and what gets scannedTrialAvailableDialog@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyTrialAvailableDialog2@>?CAB8BL ?@>1=CN 25@A8NSkip this trialTrialAvailableDialog<0G0BL 15A?;0B=>5 >7=0:><;5=85Start free trialTrialAvailableDialog59B@0;87C5B C3@>7K 5I5 4> B>3>, :0: 8< C405BAO ?@>=8:=CBL 2 A8AB5<C Stops threats before they infectTrialAvailableDialogPK 15A?;0B=> C:@5?;O5< 0HC 157>?0A=>ABL'We’re boosting your security for freeTrialAvailableDialog>;CG8B5 =08;CGHCN 70I8BC >B :815@C3@>7 24/7   15A?;0B=> 2 B5G5=85 14 4=59.[Get 24/7 protection against cyberthreats and try out our latest features, free for 14 days.TrialAvailableNotification(@8ABC?09B5 : @01>B5Get startedTrialAvailableNotificationPK 15A?;0B=> C:@5?;O5< 0HC 157>?0A=>ABL'We’re boosting your security for freeTrialAvailableNotification<html><style type="text/css"></style>>;CG8B5 MBC 8 4@C385 DC=:F88 2 <span style="color: %1">15A?;0B=>9 14-4=52=>9 ?@>1=>9 25@A88</span></html><html><style type="text/css"></style>Unlock this feature and more with your <span style="color: %1">free 14-day trial</span></html>#TrialAvailableSecurityAdvisorDialog>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websites#TrialAvailableSecurityAdvisorDialog0:@KBLClose#TrialAvailableSecurityAdvisorDialogT1=0@C68205B 8 C40;O5B 2@54>=>A=K5 >1J5:BKDetects and removes infections#TrialAvailableSecurityAdvisorDialog5B, A?0A81>	No thanks#TrialAvailableSecurityAdvisorDialog,0I8I05B >B C3@>7 24/7Protects against threats 24/7#TrialAvailableSecurityAdvisorDialogD2B><0B8G5A:8 ?@>25@O5B CAB@>9AB2>Scans your device automatically#TrialAvailableSecurityAdvisorDialog<0G0BL 15A?;0B=>5 >7=0:><;5=85Start free trial#TrialAvailableSecurityAdvisorDialog>;CG8B5 MBC 8 4@C385 DC=:F88 2 15A?;0B=>9 14-4=52=>9 ?@>1=>9 25@A888Unlock this feature and more with your free 14-day trial#TrialAvailableSecurityAdvisorDialog*@54>AB02;OO A2>9 04@5A M;5:B@>==>9 ?>GBK, K A>3;0H05B5AL ?>;CG0BL @5:;0<=K5 A>>1I5=8O 8 A2545=8O > =>2KE ?@>4C:B0E. K <>65B5 87<5=8BL =0AB@>9:8 ?>;CG5=8O 8=D>@<0F8>==KE A>>1I5=89 2 A2>59 CG5B=>9 70?8A8 Malwarebytes.*By providing your email, you agree to receive product and marketing emails. You can manage your communication preferences in your Malwarebytes Account.TrialEmailRequestDialog<html><style type="text/css"></style>>;CG8BL <span style="color: #0d3ecc">15A?;0B=CN >7=0:><8B5;L=CN premium-25@A8N =0 14 4=59.</span></html>u<html><style type="text/css"></style>Claim your <span style="color: #0d3ecc">free 14-day Premium trial.</span></html>TrialEmailRequestDialog<html><style type="text/css"></style>>;CG8B5 <span style="color: #7094ff">15A?;0B=CN ?@>1=CN premium-25@A8N =0 14 4=59.</span></html>u<html><style type="text/css"></style>Claim your <span style="color: #7094ff">free 14-day Premium trial.</span></html>TrialEmailRequestDialog>;>:8@C5B 2@54>=>A=K5 251-A09BKBlocks malicious websitesTrialEmailRequestDialog0:@KBLCloseTrialEmailRequestDialogE-mail (>?F8O)Email (optional)TrialEmailRequestDialogl8:0:8E >1O70B5;LAB2, =8:0:8E 40==KE 10=:>2A:>9 :0@BK*&No commitment or credit card required*TrialEmailRequestDialogt>60;C9AB0, 22548B5 459AB28B5;L=K9 04@5A M;5:B@>==>9 ?>GBKPlease enter a valid emailTrialEmailRequestDialog80I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7TrialEmailRequestDialog`#40;O5B 2@54>=>A=K5 >1J5:BK, ?@>=8:H85 2 A8AB5<CRemoves existing infectionsTrialEmailRequestDialog@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyTrialEmailRequestDialog&0G0BL >7=0:><;5=85Start trialTrialEmailRequestDialogC?8BLBuy nowTrialExpiredNotificationb=8<0=85! 0H 14-4=52=K9 ?@>1=K9 ?5@8>4 7025@H5= $Heads up! Your 14-day trial is over TrialExpiredNotificationB#7=0BL 1>;LH5 > 15A?;0B=>9 25@A88Learn More about FreeTrialExpiredNotification"@5<O ?@>E>48B =570<5B=>, :>340 K =0456=> 70I8I5=K. AB0209B5AL 70I8I5==K<8 >B 28@CA>2, ?@>3@0<<-2K<>30B5;59 8 4@C38E 2@54>=>A=KE >1J5:B>2 A %1.^Time flies when you're ultra-secure. Stay protected from viruses, ransomware and more with %1.TrialExpiredNotification.4,80  |  12 100 >B7K2>24.80  |  12,100 reviewsTrialExpiringDialog^;>:8@C5B <>H5==8G5A:85 8 2@54>=>A=K5 251-A09BK"Blocks fake and malicious websitesTrialExpiringDialogC?8BLBuy nowTrialExpiringDialog0:@KBLCloseTrialExpiringDialog(@>4>;68BL 15A?;0B=>Continue in a free stateTrialExpiringDialog@>4>;609B5 8A?>;L7>20BL %1, GB>1K ?>;CG8BL ?>AB>O==CN 70I8BC >B 28@CA>2, ?@>3@0<<-2K<>30B5;59 8 E0:5@>2.JKeep %1 for always-on protection against viruses, ransomware, and hackers.TrialExpiringDialog#7=0BL 1>;LH5
Learn moreTrialExpiringDialog80I8I05B >B =>2KE C3@>7 24/7!Protects against new threats 24/7TrialExpiringDialog@2B><0B8G5A:8 70?CA:05B ?@>25@:8Runs scans automaticallyTrialExpiringDialog'B>1K 2>AAB0=>28BL 70I8BC 2 @50;L=>< 2@5<5=8, ?>60;C9AB0, >1=>28B5 ?@>3@0<<C 4> premium-25@A88.9To restore your Real-Time Protection, upgrade to Premium.TrialExpiringDialog'B>1K 2>AAB0=>28BL 70I8BC 2 @50;L=>< 2@5<5=8, ?>60;C9AB0, 2K?>;=8B5 >1=>2;5=85 4> ?>;=>9 25@A88 %1.GTo restore your Real-Time Protection, upgrade to the full version of %1TrialExpiringDialog*0< 4>25@ONB M:A?5@BKTrusted by the expertsTrialExpiringDialog~1=>28B5 ?@>3@0<<C, ?>:0 K =5 ?>B5@O;8 DC=:F88 premium-25@A88.2Upgrade now before you lose your premium features.TrialExpiringDialog!@>: 459AB28O 0H59 >7=0:><8B5;L=>9 premium-25@A88 8AB5:05B G5@57 %n 45=L!!@>: 459AB28O 0H59 >7=0:><8B5;L=>9 premium-25@A88 8AB5:05B G5@57 %n 4=O!!@>: 459AB28O 0H59 >7=0:><8B5;L=>9 premium-25@A88 8AB5:05B G5@57 %n 4=59!%Your Premium trial ends in %n day(s)!TrialExpiringDialog!@>: 459AB28O ?@>1=>9 premium-25@A88 8AB5:05B G5@57 %n G0A(-0, ->2)!!@>: 459AB28O ?@>1=>9 premium-25@A88 8AB5:05B G5@57 %n G0A(-0, ->2)!!@>: 459AB28O ?@>1=>9 premium-25@A88 8AB5:05B G5@57 %n G0A(-0, ->2)!&Your Premium trial ends in %n hour(s)!TrialExpiringDialogp!@>: 459AB28O 0H59 >7=0:><8B5;L=>9 premium-25@A88 8AB5:Your Premium trial has expiredTrialExpiringDialog!@>: 459AB28O 0H59 >7=0:><8B5;L=>9 premium-25@A88 A:>@> 70:>=G8BAO!#Your Premium trial is about to end!TrialExpiringDialogD!@>: 459AB28O ?@>1=>9 25@A88 8AB5:Your Trial has expiredTrialExpiringDialog!@>: 459AB28O ?@>1=>9 25@A88 8AB5:05B G5@57 %n 45=L (4=O, 4=59)!!@>: 459AB28O ?@>1=>9 25@A88 8AB5:05B G5@57 %n 45=L (4=O, 4=59)!!@>: 459AB28O ?@>1=>9 25@A88 8AB5:05B G5@57 %n 45=L (4=O, 4=59)!Your trial ends in %n day(s)!TrialExpiringDialogx!@>: 459AB28O ?@>1=>9 25@A88 8AB5:05B G5@57 %n G0A(-0, ->2)!x!@>: 459AB28O ?@>1=>9 25@A88 8AB5:05B G5@57 %n G0A(-0, ->2)!x!@>: 459AB28O ?@>1=>9 25@A88 8AB5:05B G5@57 %n G0A(-0, ->2)!Your trial ends in %n hour(s)!TrialExpiringDialog!@>: 459AB28O >7=0:><8B5;L=>9 25@A88 8AB5:05B <5=55 G5< G5@57 =545;N$Your trial has less than a week leftTrialExpiringDialog\!@>: 459AB28O ?@>1=>9 25@A88 A:>@> 70:>=G8BAO!Your trial is about to end!TrialExpiringDialog3,33 $ 2 <5AOF$3.33 per monthTrialExpiringNotification 11 F5=B>2 2 45=L11¢ per dayTrialExpiringNotification<html><style type="text/css"></style>#AB@>9AB2> 1C45B >AB020BLAO <span style="color: %1">70I8I5==K< 2 B5G5=85 5I5 %n 4=O</span></html><html><style type="text/css"></style>#AB@>9AB2> 1C45B >AB020BLAO <span style="color: %1">70I8I5==K< 2 B5G5=85 5I5 %n 4=59</span></html><html><style type="text/css"></style>#AB@>9AB2> 1C45B >AB020BLAO <span style="color: %1">70I8I5==K< 2 B5G5=85 5I5 %n 4=59</span></html>{<html><style type="text/css"></style>Your device is only <span style="color: %1">protected for %n more day(s)</span></html>TrialExpiringNotification<html><style type="text/css"></style>#AB@>9AB2> 1C45B >AB020BLAO <span style="color: %1">70I8I5==K< 2 B5G5=85 5I5 %n G0A0</span></html><html><style type="text/css"></style>#AB@>9AB2> 1C45B >AB020BLAO <span style="color: %1">70I8I5==K< 2 B5G5=85 5I5 %n G0A>2</span></html><html><style type="text/css"></style>#AB@>9AB2> 1C45B >AB020BLAO <span style="color: %1">70I8I5==K< 2 B5G5=85 5I5 %n G0A>2</span></html>|<html><style type="text/css"></style>Your device is only <span style="color: %1">protected for %n more hour(s)</span></html>TrialExpiringNotificationC?8BLBuy nowTrialExpiringNotification@>4>;609B5 8A?>;L7>20BL %1, GB>1K ?>;CG8BL ?>AB>O==CN 70I8BC >B 28@CA>2, ?@>3@0<<-2K<>30B5;59 8 E0:5@>2.JKeep %1 for always-on protection against viruses, ransomware, and hackers.TrialExpiringNotification5 A59G0AMaybe laterTrialExpiringNotification-B> 2A5, GB> =C6=> 4;O 70I8BK ?5@A>=0;L=KE 40==KE 8 4@C3>9 F5==>9 8=D>@<0F88 >B 2@54>=>A=>3>  24/7. 1=>28B5 ?@>3@0<<C 4> premium-25@A88 ?@O<> A59G0A, GB>1K 30@0=B8@>20BL 4;O A51O 70I8BC 2 @50;L=>< 2@5<5=8.That's all it takes to protect your personal and priceless information from malware, 24/7. Upgrade to Premium now to lock in real-time protection.TrialExpiringNotification(-DD5:B82=>ABL 70I8BKProtection scoreTrustedAdvisorGauge<html> AB0;>AL <span style="color:%1;font-weight:700">%2 CA;>28O(9)</span> 4;O 8450;L=>9 70I8BK</html>]<html> <span style="color:%1;font-weight:700">%2 items</span> left to boost your score</html>TrustedAdvisorMessageArea<html>K?>;=8B5 <span style="color:%1;font-weight:700">%2 CA;>285</span>, GB>1K C;CGH8BL 70I8BC</html>`<html>Complete <span style="color:%1;font-weight:700">%2 item</span> and boost your score</html>TrustedAdvisorMessageArea<html>K?>;=8B5 <span style="color:%1;font-weight:700">%2 CA;>285</span>, GB>1K ?>2KA8BL MDD5:B82=>ABL</html>b<html>Complete <span style="color:%1;font-weight:700">%2 item</span> to increase your score</html>TrustedAdvisorMessageArea<html>K?>;=8B5 <span style="color:%1;font-weight:700">%2 CA;>285</span>, GB>1K C:@5?8BL 157>?0A=>ABL</html>e<html>Complete <span style="color:%1;font-weight:700">%2 item</span> to level up your security</html>TrustedAdvisorMessageArea<html>K?>;=8B5 <span style="color:%1;font-weight:700">%2 CA;>28O(9)</span>, GB>1K C;CGH8BL 70I8BC</html>a<html>Complete <span style="color:%1;font-weight:700">%2 items</span> and boost your score</html>TrustedAdvisorMessageArea<html>K?>;=8B5 <span style="color:%1;font-weight:700">%2 CA;>28O(9)</span>, GB>1K ?>2KA8BL MDD5:B82=>ABL</html>c<html>Complete <span style="color:%1;font-weight:700">%2 items</span> to increase your score</html>TrustedAdvisorMessageArea<html>K?>;=8B5 <span style="color:%1;font-weight:700">%2 CA;>28O(9)</span>, GB>1K C:@5?8BL 157>?0A=>ABL</html>f<html>Complete <span style="color:%1;font-weight:700">%2 items</span> to level up your security</html>TrustedAdvisorMessageArea<html>AB0;>AL <span style="color:%1;font-weight:700">%2 CA;>285</span> 4;O 8450;L=>9 70I8BK</html>`<html>Only <span style="color:%1;font-weight:700">%2 item</span> left to boost your score</html>TrustedAdvisorMessageArea;O 70?CA:0 =06<8B5 :=>?:C @>25@:0
@8 >1=0@C65=88 C3@>7 <K ?><>65< CAB@0=8BL 8E_Click the Scan button below to get started
If any threats are found, we'll help you remove themTrustedAdvisorMessageArea@0209B5 70?CAB8< ?5@2CN ?@>25@:CLet's run your first scanTrustedAdvisorMessageArea1=>28BLUpgradeTrustedAdvisorMessageArea A?8A:5 =5B CA;>289
@>25@O9B5 MB>B A?8A>:, GB>1K 2A5340 8<5BL ;CGHCN 70I8BCXYou have no items on your checklist
But check back often to make sure you stay protectedTrustedAdvisorMessageAreaK A45;0;8 2A5, GB> ?>72>;O5B 15A?;0B=0O 25@A8O
1=>28B5 4> premium-25@A88 8 ?>;CG8B5 <0:A8<0;L=CN 70I8BC\You've done all you can with our Free version
Upgrade to premium for our ultimate protectionTrustedAdvisorMessageAreaK A45;0;8 2A5, GB> ?>72>;O5B 15A?;0B=0O 25@A8O
1=>28B5 ?@>3@0<<C A53>4=O 8 ?>;CG8B5 <0:A8<0;L=CN 70I8BC]You've done all you can with our Free version
Upgrade today to unlock our ultimate protectionTrustedAdvisorMessageArea
0;55NextTutorialTest001
0704PreviousTutorialTest001-B> B5AB>2K9 M;5<5=B >1CG5=8O.
>60;C9AB0, 70:@>9B5 53>, 8 >= =5 ?>15A?>:>8B 0A.OThis is just a test tutorial item,
please close it for now and it will go away.TutorialTest001,K <>65B5 15A?;0B=> ?>;CG8BL =>2CN C;CGH5==CN 25@A8N ?@>3@0<<K Malwarebytes. > 2@5<O CAB0=>2:8 >1=>2;5=8O <>65B ?>=04>18BLAO ?5@5703@C7:0 :><?LNB5@0.uA new and improved version of Malwarebytes is now available for free. Your computer might restart during this update.UpdateAvailableNotification0:@KBLCloseUpdateAvailableNotification"#AB0=>28BL A59G0AInstall NowUpdateAvailableNotification&>ABC?=> >1=>2;5=85Update AvailableUpdateAvailableNotification;O >1=>2;5=8O Malwarebytes =5>1E>48<> CAB0=>28BL =54>AB0NI55 >1=>2;5=85 157>?0A=>AB8 Windows.DA missing Window security update is required to update Malwarebytes.UpdateWindowsDialog0:@KBLCloseUpdateWindowsDialog#7=0BL 1>;LH5
Learn moreUpdateWindowsDialogT1=>28B5 Windows, GB>1K =5 ?>B5@OBL 70I8BC Update Windows to stay protectedUpdateWindowsDialog|0?CA: ?@>25@:8 =52>7<>65=, :>340 2K?>;=O5BAO 4@C30O ?@>25@:0.=Cannot start a Scan while another one is already in progress.	UtilitiesA;8 K =5 ?5@5703@C78B5 :><?LNB5@, ?@>25@:0 =0 =0;8G85 @CB:8B>2 1C45B >B:;NG5=0 4> 7025@H5=8O MB>3> A50=A0.SIf you do not choose to reboot, rootkit scanning will be disabled for this session.	UtilitiesMalwarebytes =5 C405BAO 703@C78BL 0=B8@CB:8B=K9 DDA-4@0925@.

-B0 >H81:0 <>65B 1KBL >1CA;>2;5=0 0:B82=>ABLN @CB:8B>2.  5:><5=4C5< ?5@5703@C78BL :><?LNB5@, GB>1K ?@>3@0<<0 Malwarebytes A<>3;0 CAB0=>28BL 4@0925@.

K?>;=8BL ?5@5703@C7:C A59G0A?Malwarebytes is unable to load the Anti-Rootkit DDA Driver.

This error may be due to rootkit activity. We recommend rebooting so Malwarebytes can attempt to install the driver.

Do you want to reboot now?	Utilities5BNo	Utilities0@>25@:0 C65 2K?>;=O5BAOScan Already in Progress	UtilitiesK1@0BL D09;Select file	UtilitiesK1@0BL ?0?:C
Select folder	Utilities0Yes	Utilitiesx1=0@C68205B C3@>7K, :>B>@K5 =5 <>65B =09B8 4@C3>9 0=B828@CACatches what others miss'WelcomeToFreeLicensingAfterTrialExpired0:@KBLClose'WelcomeToFreeLicensingAfterTrialExpiredP>;57=K5 @5:><5=40F88 >B Trusted Advisor(Expert guidance with our Trusted Advisor'WelcomeToFreeLicensingAfterTrialExpiredF5=8B5 2A5 ?@58<CI5AB20, ?@54;0305<K5 2 15A?;0B=>9 25@A88 Malwarebytes.LExplore all the benefits that the free version of Malwarebytes has to offer.'WelcomeToFreeLicensingAfterTrialExpired5@59B8Let's go'WelcomeToFreeLicensingAfterTrialExpiredT>B@51;O5B <8=8<0;L=>5 :>;8G5AB2> @5AC@A>2Requires minimal resources'WelcomeToFreeLicensingAfterTrialExpired<5>3@0=8G5==K5 @CG=K5 ?@>25@:8Unlimited manual scans'WelcomeToFreeLicensingAfterTrialExpiredX>1@> ?>60;>20BL! -B> 0H0 15A?;0B=0O 25@A8OWelcome to our Free version'WelcomeToFreeLicensingAfterTrialExpired0:@KBLCloseWhatsNewDialog>=OB=>Got itWhatsNewDialogMalwarebytesMalwarebytesWhatsNewDialog'B> =>2>3>?
What's newWhatsNewDialog8@>25@:0 =0;8G8O >1=>2;5=89.Checks for updates.clih0:@KBL 8 A=>20 >B:@KBL 8=B5@D59A ?>;L7>20B5;O MBAM.Close and re-open the MBAM UI.cliH0:@KBL 8=B5@D59A ?>;L7>20B5;O MBAM.Close the MBAM UI.cliv0AB@08205<K9 >1@01>BG8: C=825@A0;L=>3> :>40 @5AC@A0 (URI).Custom URI handler.cliJ50:B828@>20BL B5:CICN ;8F5=78N MBAM.$Deactivate the current MBAM License.cli>B:;NG8BL 70I8BC >B M:A?;>9B>2.Disable Exploit Protection.cli>B:;NG8BL 0??0@0B=>5 CA:>@5=85.Disable Hardware Accelerator.cliVB:;NG8BL 70I8BC >B 2@54>=>A=KE 251-A09B>2.%Disable Malicious Website Protection.cliRB:;NG8BL 70I8BC >B ?@>3@0<<-2K<>30B5;59.Disable Ransomware Protection.cli*B:;NG8BL A0<>70I8BC.Disable Self-Protection.cliVB:;NG8BL 02B><0B8G5A:>5 >1=>2;5=85 ?0:5B0.Disable package auto update.cli<:;NG8BL 70I8BC >B M:A?;>9B>2.Enable Exploit Protection.cli<:;NG8BL 0??0@0B=>5 CA:>@5=85.Enable Hardware Accelerator.cliT:;NG8BL 70I8BC >B 2@54>=>A=KE 251-A09B>2.$Enable Malicious Website Protection.cliP:;NG8BL 70I8BC >B ?@>3@0<<-2K<>30B5;59.Enable Ransomware Protection.cliJ:;NG8BL @0AH8@5==>5 2545=85 6C@=0;0.Enable emhanced logging.cliL025@H8BL B5:CI55 >7=0:><;5=85 A MBAM.End the current MBAM Trial.clibH81:0: 525@=>5 :>;8G5AB2> 0@3C<5=B>2 4;O 'uri'./Error: Incorrect number of arguments for 'uri'.clitH81:0: 525@=>5 :>;8G5AB2> 0@3C<5=B>2 4;O 'uri:activate'.8Error: Incorrect number of arguments for 'uri:activate'.cliH81:0: 525@=>5 :>;8G5AB2> ?0@0<5B@>2. #1548B5AL, GB> ?CB8, A>45@60I85 ?@>15;K, 70:;NG5=K 2 :02KG:8.dError: Incorrect number of parameters. Ensure file paths that contain spaces are enclosed in quotes.clinH81:0: ;O :>=B5:AB=>9 ?@>25@:8 C:070=0 =525@=0O F5;L.1Error: Invalid target specified for context scan.cliDH81:0: 0I8B0 MBARW C65 >B:;NG5=0(Error: MBARW Protection already disabledcliBH81:0: 0I8B0 MBARW C65 2:;NG5=0'Error: MBARW Protection already enabledclijH81:0: MBARW C65 A>45@68B 8A:;NG5=85 4;O MB>3> D09;08Error: MBARW already contains an exclusion for this fileclihH81:0: MBARW C65 A>45@68B 8A:;NG5=85 4;O MB>9 ?0?:8:Error: MBARW already contains an exclusion for this foldercliH81:0: 8 >48= 87 ?><5I5==KE 2 :0@0=B8= >1J5:B>2 =5 A>>B25BAB2C5B C:070==><C 8<5=8 D09;0.=Error: No item in Quarantine matches the specified file name.cli@H81:0: !E5<0 =5 ?>445@68205BAO.Error: Scheme not supported.cliH81:0: 52>7<>6=> >ACI5AB28BL >?5@0F8N 2>AAB0=>2;5=8O, ?>:0 =5 1C45B 2K?>;=5=0 70?;0=8@>20==0O ?5@5703@C7:0\Error: The Restore operation cannot be performed until the pending reboot has been completedcliH81:0: 7-70 >H81:8 =5 C40;>AL 2K?>;=8BL >?5@0F8N 2>AAB0=>2;5=8O.
>60;C9AB0, >1@0B8B5AL 70 ?><>ILN =0 D>@C< ?>445@6:8yError: The Restore operation could not be performed due to an error.
Please visit the support forum to request assistancecli`H81:0: !;54CNI89 F5;52>9 >1J5:B =5 ACI5AB2C5B: ,Error: The following target does not exist: clihH81:0: @52KH5=> 2@5<O >6840=8O 7025@H5=8O >?5@0F880Error: Timeout waiting for operation to completeclilH81:0: 5 C405BAO ?>;CG8BL 4>ABC? : C:070==><C D09;C.'Error: Unable to access specified file.clihH81:0: 5 C405BAO 2K?>;=8BL 0:B820F8N A ?><>ILN %1."Error: Unable to activate with %1.cliH81:0: 5 C405BAO >1@01>B0BL 70?@>A =0 4>102;5=85 2 8A:;NG5=8O.+Error: Unable to process exclusion request.cli~H81:0: 5 C405BAO >1@01>B0BL 70?@>A =0 ?5@5<5I5=85 2 :0@0=B8=.,Error: Unable to process quarantine request.cliBH81:0: #:070==K9 D09; =5 =0945=! Error: specified file not found!cli0?CA:05B ?@>25@:C ;8F5=788 G5@57 10 <8=CB, 0 70B5< :064K9 G0A 2 B5G5=85 24 G0A>2.SForces a license check after 10 minutes, then once an hour for 24 hours after that.cliKAB@0O ?@>25@:0 4>ABC?=0 B>;L:> 2 >7=0:><8B5;L=K9 ?5@8>4 8;8 2 Premium-25@A88.,Hyper Scan allowed only in trial or premium.cli8A:;NG5=85 MBARW 4>102;5=>: MBARW Exclusion added: cli4A:;NG5=85 MBARW C40;5=>: MBARW Exclusion removed: cli@A:;NG5=8O MBARW CA?5H=> >G8I5=K%MBARW Exclusions cleared successfullycliB!>AB>O=85 70I8BK MBARW: K:;NG5=> MBARW Protection state: Disabledcli@!>AB>O=85 70I8BK MBARW: :;NG5=>MBARW Protection state: Enabledcli<!>AB>O=85 70I8BK MBARW: H81:0MBARW Protection state: Errorcli6ID :0@0=B8=0 MBARW C40;5=: MBARW Quarantine ID removed: cli6>@<0;L=>5 2545=85 6C@=0;0.Normal logging.cliFB:@KBL 480;>3>2>5 >:=> 8A:;NG5=89.Open the exclusions dialog.cli1@010BK205B ?>78F8>==K5 0@3C<5=BK 4;O 4>102;5=8O 8 C40;5=8O 8A:;NG5=89 (=0?@8<5@, --x add "C:\File.txt" --x delete-all)mProcesses positional arguments for adding and removing exclusions (e.g. --x add "C:\File.txt" --x delete-all)clit1@010BK205B ?>78F8>==K5 0@3C<5=BK 4;O 2>AAB0=>2;5=8O 8;8 C40;5=8O >1J5:B>2, ?><5I5==KE 2 :0@0=B8= (=0?@8<5@, --q restore "ARWSDK_Indicator_Simulator.exe" --q restore-all --q delete-all)Processes positional arguments for restoring or deleting quarantine items (e.g. --q restore "ARWSDK_Indicator_Simulator.exe" --q restore-all --q delete-all)cli1@010BK205B ?>78F8>==K5 0@3C<5=BK 4;O 2:;NG5=8O 8 >B:;NG5=8O 70I8BK (=0?@8<5@, --p start --p stop)]Processes positional arguments for starting and stopping protection (e.g. --p start --p stop)cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B 480;>3>2>5 >:=> 0:B820F88.,Restores UI and shows the activation dialog.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B AB@0=8FC 8=D>@<0F8>==>9 ?0=5;8.)Restores UI and shows the dashboard page.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B AB@0=8FC 8A:;NG5=89.*Restores UI and shows the exclusions page.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B 4>?>;=8B5;L=K5 7040==K5 ?0@0<5B@K 2 :>@78=5 ?@8;>65=8O.MRestores UI and shows the in in app cart with any extra parameters specified.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B AB@0=8FC =0AB@>5: 70I8BK.3Restores UI and shows the protection settings page.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B AB@0=8FC :0@0=B8=0.*Restores UI and shows the quarantine page.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B AB@0=8FC >BG5B>2.'Restores UI and shows the reports page.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B AB@0=8FC @57C;LB0B>2.'Restores UI and shows the results page.cliRestores UI and shows the scan page after triggering scan downloads.DRestores UI and shows the scan page after triggering scan downloads.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B AB@0=8FC A 8=D>@<0F859 > ?@>25@:5.$Restores UI and shows the scan page.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B A2>4=K5 40==K5 8 >BG5B > ?@>25@:5.<Restores UI and shows the scan summary page and scan report.cli>AAB0=02;8205B 8=B5@D59A ?>;L7>20B5;O 8 >B>1@0605B A2>4=K5 40==K5 157 >BG5B0 > ?@>25@:5.@Restores UI and shows the scan summary page without scan report.cliP>:070BL AB@0=8FC =0AB@>5:    ?@>3@0<<5Show Settings Page - AboutcliV>:070BL AB@0=8FC =0AB@>5:   #G5B=0O 70?8ALShow Settings Page - Accountcli\>:070BL AB@0=8FC =0AB@>5:   !?8A>: @07@5H5=89Show Settings Page - Allow ListcliP>:070BL AB@0=8FC =0AB@>5:   B>1@065=85Show Settings Page - Displaycli^>:070BL AB@0=8FC =0AB@>5:   A=>2=K5 ?0@0<5B@KShow Settings Page - GeneralcliR>:070BL AB@0=8FC =0AB@>5:   57>?0A=>ABLShow Settings Page - SecuritycliN>:07K20BL A2>4=K9 >BG5B ?@>1=>9 25@A88Show Trial Summary Reportclil>:07K20BL 2A?;K20NI55 >:=> Iris 2 >1;0AB8 C254><;5=89+Show an Iris Popup from a Tray NotificationcliH>:070BL :@0B:89 ?5@8>48G5A:89 >BG5BShow periodic recapcliN>:070BL AB@0=8FC =0AB@>9:8 C254><;5=89#Show the notification settings pagecli>:070BL AB@0=8FC 70I8BK 2 @50;L=>< 2@5<5=8 8 >B:@KBL 2:;04:C 3;>10;L=KE ?0@0<5B@>2 157>?0A=>AB8CShow the real time protection page and open the global security tabcliN>:070BL AB@0=8FC ?;0=8@>2I8:0 ?@>25@>:Show the scan scheduler pagecli>:070BL AB@0=8FC ?;0=8@>2I8:0 ?@>25@>: 8 >B:@KBL 480;>3>2>5 >:=> 4>102;5=8O 70?;0=8@>20==>9 ?@>25@:8?Show the scan scheduler page and open add scheduled scan dialogcliD>:070BL AB@0=8FC Security AdvisorShow the security advisor pagecli4>:070BL AB@0=8FC =0AB@>5:Show the settings pagecliB>:070BL 4>ABC?=CN ?@>1=CN 25@A8NShow trial availablecliNShows Scan new downloads upsell dialog.'Shows Scan new downloads upsell dialog.cliB>1@0605B ?@58<CI5AB20 15A?;0B=>9 ;8F5=788 ?>A;5 7025@H5=8O ?@>1=>3> ?5@8>40..Shows free license benefits after trial ended.cli0?CAB8BL :>=B5:AB=CN ?@>25@:C A C:070=85< D09;0, A>45@60I53> ?CB8 4;O 2K?>;=5=8O ?@>25@:8. >102LB5 'save_results [CBL]' ?>A;5 =0AB@>9:8 ?CB8, GB>1K CAB0=>28BL 1;>:8@>2:C 4> 7025@H5=8O 0:B82=>9 ?@>25@:8 8 A>E@0=8BL @57C;LB0BK 2 C:070==K9 2KE>4=>9 D09;. (=0?@8<5@, assistant --contextscan FilePaths.txt save_results Detections.json)Start a context scan by specifying a file containing paths to scan. Append 'save_reults [Path]' after path parameter to block until active scan is complete and save results to the specified output file. (e.g. assistant --contextscan FilePaths.txt save_results Detections.jsoncli60?CAB8BL 1KAB@CN ?@>25@:C.Start a hyper scan.cli\0?CAB8B5 ?>;=CN ?@>25@:C 87 C254><;5=8O Iris.3Start a threat scan from an iris html notification.cli40?CAB8BL ?>;=CN ?@>25@:C.Start a threat scan.clin0G0BL ?@>1=K9 ?5@8>4, 5A;8 B0:0O 2>7<>6=>ABL 4>ABC?=0."Start a trial if one is available.cli<0?CAB8BL >?5@0F8N >1=>2;5=8O.Start an update operation.cli0?CA:0BL ?@8;>65=85 =0 ?0=5;8 7040G, =5 >B>1@060O 8=B5@D59A ?>;L7>20B5;O (=0?@8<5@, --starttray)QStart the application in the tray instead of displaying the UI (e.g. --starttray)cli.AB0=>28BL A;C61C MBAM.Stop the MBAM Service.clib>B>2>! ?5@0F8O 2>AAB0=>2;5=8O CA?5H=> 7025@H5=09Success: The Restore operation has completed successfullycli
),


Anon7 - 2022
AnonSec Team