sysprotectionpage.com and prosearching.com

Discussion in 'Malware Help (A Specialist Will Reply)' started by jctraduz, Jun 28, 2006.

  1. jctraduz

    jctraduz Private E-2

    Hello everyone.
    I've followed all steps in the "READ & RUN ME FIRST Before Asking for Support" and was able to clean everything (I think) except the prosearching.com lines which appear in Hijackthis log, even after deleting them.

    In Safe mode, the situation remains calm and I'm able to see no effect of the malware. After entering again in Normal mode everything appears again. The homepage becomes sysprotectionpage.com, even with SpyBot not allowing the change to my home page.

    I'm sure something is missing and I would appreciate some help from someone who understands more than me about all this stuff.

    Here's my Hijackthis log, after the procedure and after deleting the prosearching.com lines. They appear immediately after if I run another scan in Hijackthis. I'm assuming some process is running in the background and I made something wrong.

    Thanks in advance for your help.

    Edit: Removed inline log
     
    Last edited by a moderator: Jun 28, 2006
  2. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    Please do re-read the guide as you didnt follow the procedures for installing and running Hijackthis as HJT was run from J:\ZIP\Download\antiVirus\HijackThis 1.99.1\hijackthis\HijackThis.exe and not the location we advise it to be run from in C:program Files\Hijackthis

    also the other logs in Panda and Bitdefender are missing, was their a problem in running them, if so what?


    Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support

    Make sure you check version numbers and get all updates.


    After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:

    Downloading, Installing, and Running HijackThis


    When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too (these scans are covered in steps 6 & 7 of the READ & RUN ME sticky)
    • Bitdefender
    • Panda Scan
    • HijackThis
    .
     
  3. jctraduz

    jctraduz Private E-2

    I'll redo the entire proccess again. Should I assume the Program files folder is my Programas folder (Portuguese OS) or should I create a Program Files folder?
     
  4. DavidGP

    DavidGP MajorGeeks Forum Administrator - Grand Pooh-Bah Staff Member

    Hi, yes your Program Files folder is that exact one in Portuguese, so install into their :)


    Following the guide exactly is a tried and tested route to removing all the malware as HJT is not the intial step in this process but the last as it does miss a fair amount of things.
     
  5. jctraduz

    jctraduz Private E-2

    The bit defender is now counting 12 h 41 m. The first time, it took 4 hours. That's why I'm taking this long to answer. Sorry for any inconvenience
     
  6. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    If Bitdefender is still running or if you have started Panda and it is still running then abort them now and do the below. If you already ran Bitfender and Panda, attach the logs and also do the below.

    Run this SpywareQuake & SpyFalcon Removal Procedure and attach the smitfiles.txt log to your next message.
     
  7. jctraduz

    jctraduz Private E-2

    Bit Defender has been running for 23 hours 53 minutes. Panda is done a long time ago. I'll let BitDefender finish and do the operations you advise afterwards and send all reports together. At least I hope all this work gets us results.
     
  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    But that is the wrong order. Bitdefender must be done first as indicated in the READ & RUN ME process. Also if you ran them at the same time, that is also not what was requested and it is a very bad thing to do.

    Don't worry about the out of order issue now but hence forth always make sure you follow directions exactly as written. The order in which we request things to be run is very important.
     
  9. jctraduz

    jctraduz Private E-2

    Sorry for all the misunderstandings. I'm Portuguese, and sometimes it's hard to explain myself correctly. I've already done the all proccess three times. When I said Panda was done a long time ago, That was the first time I went through the all proccess.

    Right now, I have Bit Defender counting 38 hours and I'm giving up, since I'm starting to have problems with my professional commitments.

    Until now, What I did (until this session of Bit defender) in this last try was:

    Reboot into safe mode.
    Run CCleaner
    Run Microsoft Windows Malicious Software Removal Tool (no infected files found)
    Run Ad-Aware SE (nothing found)
    Run Spybot (Found NewDotNet and Zlob.Downloader; both corrected)
    Run Microsoft Windows Defender (nothing found)
    Run CWShredder (No CWS present)
    Run Kill2me
    Switch to safe mode with network support.
    Run BitDefender (38 hours and counting; I'm giving up on this one)

    Now, I will:

    Interrupt BitDefender.
    Run Panda ActiveScan (I have a report from a previous scan, but the problem appeared again after I went into normal mode again in the 2nd sequence of scans)
    Run the SpywareQuake & SpyFalcon Removal Procedure
    Produce the Hijackthis report and post everything I have.

    Hope I'm doing this right this time.
     
  10. jctraduz

    jctraduz Private E-2

    I'll let Bit Defender finish, since there are already 39 infected files. I'll post information as soon as I get it. Meanwhile, Thanks for your patience and willing to help.
     
  11. jctraduz

    jctraduz Private E-2

    41 infected files and 33 different viruses identified. Should I assume I'm not well protected by Norton. It didn't identify any of these.

    BitDefender still running
     
  12. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No! That would be a bad assumption!

    Just stop Bitdefender. And then run the SpywareQuake removal steps.

    Then attach your first Panda log, your smitfiles.txt log, and a HijackThis log.
     
  13. jctraduz

    jctraduz Private E-2

    After a 50 hours BitDefender scan, I followed the SpywareQuake & SpyFalcon Removal Procedure and generated a HijackThis report.

    After I rebooted to normal mode, got some messages from SpyBot, asking for permission to change registry entries (mainly deleting prosearching related entries and replacing them by microsoft links)

    I'm now unable to enter any address in Internet Explorer. I can write it, but it doesn't accpet my Enter command.

    Still have a few pop-ups to fake virus reports sites when I enter IE.

    After the reboot, get messages stating:
    can't load bridge.dll
    Can't start BTTray.ese because cfgmgr32.dll not found (only file found in the SpywareQuake & SpyFalcon Removal procedure)
    Can't start hpomau08.exe because cfgmgr32.dll not found
    Can't start hpotdd01.exe because cfgmgr32.dll was not found.

    I'm sending the reports
     
    Last edited: Jul 3, 2006
  14. jctraduz

    jctraduz Private E-2

    HijackThis report

    Hope everything is ok and someone can find a diagnostic, since I already lost almost three days of work with all this. Thanks for all your effort and advice.
     
    Last edited: Jul 3, 2006
  15. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You were not suppose to delete cfgmgr32.dll

    You were supposed to delete cfgmngr32.dll

    You need cfgmgr32.dll. Check to see if it is still in your Recycle Bin so you can restore it. If not in Recycle Bin look in C:\Windows\System\DLLCACHE for a copy.
    Let me know what you find.
     
  16. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Note: Please do not ZIP your logs unless they are to large to upload without compression!

    The reason that Bitdefender was taking so long to scan and more than like the reason for all of your infections is all the CRACKS you have been downloading and using:
    C:\Programas\PHPRunner\crack.exe
    E:\ZIP\Download\Multimedia\DVD\DUPDVD\cracks\pc_dd204.zip
    E:\ZIP\Download\Multimedia\PostNapster\Morpheus\Morph20.exe
    E:\ZIP\Download\Piratas\Piratas software\cracksearcher.zip=>CrackSearcher.exe
    E:\ZIP\Download\Utilitários\Backup\Backup de sistema\Acronis True Image 6.0\crack 6.0.311\Acronis_TrueImage_v6[1].0.311.zip

    And the list goes on for MANY more. You even have loads of them in email files which Bitdefender complained about. You need to cleanup all this stuff manually. And more important, you need to stop downloading and using cracks to use software illegally. I'm not posting this message like a police officier! I'm posting it as a Malware Fighter in an attempt to inform you why you are infected so badly.

    I'm looking thru the rest of your logs now, so I can work up a fix for you. But you need to take care of all the above stuff yourself.

    The READ & RUN ME specifically requests that you do not use Spybot's Teatimer while we are trying to fix malware problems. In addition we do not recommend using it anyway unless it is your only source of protection. Please disable TeaTimer by doing the below:

    Run Spybot and click Mode and select Advanced Mode. Then click Tools and select Resident. Now in the right window pane, uncheck TeaTimer. Also while this is open, in the left column now select IE Tweaks and then in the right pane make sure all the Miscellaneous locks are unchecked. Now quit Spybot!

    Let's get an installed programs list from HijackThis too!
    • Run HijackThis, click Open the Misc Tools section
    • Click Open Uninstall Manager
    • Click Save List (generates uninstall_list.txt)
    • Click Save, to save it to a file where you can find it.
    • Attach the uninstall_list.txt file to your next message.
     
    Last edited: Jul 1, 2006
  17. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Question: What is the below for?

    O4 - HKLM\..\Run: [NetPanel] C:\Programas\Marktest\NetPanel\NOLWizz.exe
     
  18. jctraduz

    jctraduz Private E-2

    Recovered cfgmgr32.dll in DLLCACHE.

    This way, none of the files in the SpywareQuake & SpyFalcon Removal Procedure was found.

    I'm now able to write addresses in IE again.

    Spybot keeps warning the Registry changes when I reboot; from prosearching to microsoft and msn search links. I'm allowing those changes, since the old value was prosearching.com and it is being changed to something that looks normal (microsoft addresses)
     
  19. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Because they were fixed by SmitRem and the Registry patch. The procedure is a generic procedure covering more than 60 forms of the infections. You do not have to find the files mentioned but you do have to check to make sure they don't exist.

    You did not do what I requested yet in my previous message. Shut down Spybot's Teamer! Do this NOW before continuing.

    Also answer my question about the NetPanel line.

    I also need the uninstall programs list from HijackThis!

    Also do the below and post a message when infinished.

    Click on Start, then Run ... type services.msc into the box that opens up, and press 'OK'. On the page that opens, scroll down to NTBOOTMGR ... then right click the entry, select 'Properties' and press 'Stop Service'. When it shows that it is stopped, next please set the 'Start-up Type' to 'Disabled'. Press 'OK' until you get back to Windows.

    Next, run HJT, but instead of scanning, click on the "None of the above, just start the program" button at the bottom of the choices. At the lower right, click on the 'Config" button, and then the Misc tools' button ... select 'Delete an NT Service" ... copy/paste the following into the box that opens, and press "OK":

    NTBOOT

    If you receive any error messages just ignore them and continue.

    Now exit HJT but do not reboot when it tells you it needs to. We will do in my next message after running HJT again to fix some other items.

    .
     
  20. jctraduz

    jctraduz Private E-2

    Shutdown Teamer.

    NetPanel is a program from a marketing Portuguese company I'm colaborating with for several years. It ha sbeen installed at least since 1999.

    Deleted NBOOT, didn't reboot.

    In the HJT uninstall list, there's a button to save list. When I press Save list on the HJT Add/Remove programs Manager, don't know what and where he saves it. Is that what you need?

    Waiting for instructions.
     
  21. jctraduz

    jctraduz Private E-2

    I'm unable to Save list in HJT Add/Remove programs Manager. Nothing happens when I click the button.
     
  22. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Okay, we will worry about that list later if I still need it. For now just run the steps below.

    Make sure viewing of hidden files is enabled (per the tutorial).

    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = prosearching.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,SearchURL = prosearching.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = prosearching.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,SearchURL = prosearching.com
    R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = prosearching.com
    R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = prosearching.com
    R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = prosearching.com
    R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page_bak = prosearching.com
    O4 - HKLM\..\Run: [WinTools] C:\PROGRA~1\FICHEI~1\WinTools\WToolsA.exe
    O4 - HKLM\..\Run: [RunDLL] rundll32.exe "C:\WINDOWS\System32\bridge.dll",Load
    O4 - HKCU\..\Run: [EService] C:\Program Files\Common Files\System\EService\svchost.exe
    O16 - DPF: {AB29A544-D6B4-4E36-A1F8-D3E34FC7B00A} - http://install.wildtangent.com/bgn/partners/nike/nikefz4/install.cab
    O20 - AppInit_DLLs: C:\WINDOWS\system32\arpa.dll

    You will get an error from HijackThis like below when trying to fix the arpa.dll line. Just ignore it, click Ok and continue.
    After clicking Fix, exit HJT.
    Boot into safe mode and use Windows Explorer to delete:
    C:\Program Files\FICHEI~1\WinTools <--- the whole folder
    C:\Program Files\Common Files\System\EService <--- the whole folder
    C:\WINDOWS\SYSTEM\DRIVER\ntuser.exe
    C:\WINDOWS\system32\arpa.dll
    c:\windows\system32\ot.ico
    c:\windows\inf\biini.inf

    Additional step to delete files in the Downloaded Program Files folder :
    - Click Start, Run, and enter cmd in the box and click OK. This opens a command prompt windows.
    - Enter the following command lines each followed by the enter key
    cd C:\WINDOWS\Downloaded Program Files\
    attrib -r -h -s UERSZ_0001_N69M0703NetInstaller.exe
    del UERSZ_0001_N69M0703NetInstaller.exe
    exit

    If you get an error when deleting a file. Right click on the file and check to see if the read only attribute is checked. If it is, uncheck it and try again. Other wise open Task Manager and kill the process if running then delete the file.

    Now if running Win XP goto c:\windows\Prefetch and delete all files in this folder.
    Now run Ccleaner (installed while running the READ ME FIRST).

    Now we need to Reset Web Settings:
    1. If you have an Internet Explorer icon on your Desktop, goto step 2. If not, skip to step 3.
    2. Now right click on your desktop Internet Explorer icon and select Properties. Then click the Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK. Then skip step 3.
    3. If you do not have an Internet Explorer icon on your Desktop, click Start, Control Panel (for some systems it may be Start, Settings, Control Panel), Internet Options, Programs tab and then click "Reset Web Settings". Now go back to the General tab and set your home page address to something useful like www.majorgeeks.com. Click Apply. Click Delete Cookies, Click Delete Files and select Delete all Offline content too, Click OK. When it finishes Click OK.
    Now reboot in normal mode and post a new HJT log.

    Make sure you tell me how things are working now.

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  23. jctraduz

    jctraduz Private E-2

    Did all of it and here is the HJT log.

    2 times, when I entered Safe Mode, explorer.exe was closing and a process called MSMPENG.EXE was running. I tried to close that process and run explorer.exe. Explorer opened and closed imediately and msmpeng.exe appeared again.

    This happened twice and I had to reboot and try again.

    I'm going to try rebooting in safe Mode now to see if it happens again.
     
    Last edited: Jul 3, 2006
  24. jctraduz

    jctraduz Private E-2

    Good news. I'm able to reboot in Safe Mode.

    Bad news. First thing that appeared when I opened the browser was the "Sysprotection" pop-up, same as before.

    I'm attaching a new HJT report, from last reboot.

    PS - While I was writing this, a pop-up from http://winantivirus.com came out.
     
    Last edited: Jul 3, 2006
  25. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Were you able to find and delete the below in message nuumber 22
    It is related to Winantivirus!

    Please download ProcessExplorer
    • Unzip it to its own folder somewhere you can locate it.
    • Now run procexp.exe by double clicking on it.
    • Let's configure some options first:
      • Click View and select Show Lower Pane. And where it says "Lower Pane View" make sure DLL's is checked.
      • Now click on iexplore.exe.
      • Now also under the View menu choose "Select columns" and put a check mark on "Image Path".
    • Now click on File and then Save As. And save the process list.
    • Post it back here as an attachment.
    Now run the below procedure and attach the runkeys.txt log.
    Now run the below procedure and attach the newfiles.txt log.
     
    Last edited: Jul 6, 2006
  26. jctraduz

    jctraduz Private E-2

    Yes. I was able to do everything you asked, unless stated.

    I'm now going to run the procedures you're asking for:

    ProcessExplorer
    GetRunKey
    ShowNew
     
  27. jctraduz

    jctraduz Private E-2

    Here are the reports
     
    Last edited: Jul 3, 2006
  28. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    First run this: Virtumonde aka Trojan Vundo Removal

    And attach the VundFix log.

    Now download one more tool we will need (along with Process Explorer which you already have)

    - Pocket KillBox

    Extract it to its own folder somewhere that you will be able to locate it later.

    IMPORTANT: You should print or save the below locally, so you can refer to them while offline. You must exit all browsers before running the below steps and it would be best if you actually physically unplug your cable to the internet, reboot, and do not run anything but what I give you to do. Also it would be good to exit all processes and items in your System tray.

    Do the above before continuing! Okay unplug your cable now.

    Make sure you have rebooted in Normal Mode (do not open any other processes)

    - Run Process Explorer

    In the top section of the Process Explorer screen double click on winlogon.exe to bring up the winlogon.exe properties screen. Click on the Threads tab at the top.

    Once you see this screen click on each instance of winrge32.dll once and then click the kill button. After you have killed all of the winrge32.dll under winlogon click ok. (If you do not find the dll, just continue on.)

    Next double click on explorer.exe and again click once on each instance of winrge32.dll and kill it. (If you do not find the dll, just continue on.)

    Now just exit Process Explorer.

    Now copy the bold text below to notepad. Save it as fixme.reg to your desktop.
    Be sure the "Save as" type is set to "all files"
    Once you have saved it double click it and allow it to merge with the registry.
    Now click Start, Run, and enter cmd and click OK! This will open a command prompt window. In the command prompt window enter the below commands each followed by the Enter key.
    cd c:\windows\temp
    Now make sure the prompt (what you see at the beginning of each line in the command prompt window) shows that you are in the C:\windows\temp folder. Then continue.
    del win*.*
    exit

    The exit command will close the command prompt window.

    Now run Pocket Killbox:
    Choose Tools > Delete Temp Files and click OK.

    Run Killbox.exe. Paste the below filenames into KILL BOX one at a time. Check mark the box that says "Delete on Reboot" and checkmark the box "Unregister DLL" (If available) Click the RED X and it will ask you to confirm the file for deletion…say YES and when the next box opens prompting you to reboot now...click NO...and proceed with the next file. Once you get to the last one click YES and it will reboot. Note some of the files listed below may not exist but we need to check for them anyway.
    C:\WINDOWS\SYSTEM32\winrge32.dll
    C:\WINDOWS\SYSTEM32\fcccddd.dll
    C:\WINDOWS\SYSTEM32\pmnlk.dll

    If Killbox does not reboot or you get a Pending Operations type error message just reboot your PC yourself.

    Now attach new logs from the below:
    ShowNew
    GetRunKey


    Also tell me how the steps went and make sure you tell me how things are working now!
     
  29. jctraduz

    jctraduz Private E-2

    Ran Virtumonde.

    Report attached.

    Process Explorer: under winlogon.exe, winrge32.dll!StartMain+0x3b found and killed. Under explore.exe nothing found.

    fixme.reg done

    cmd for del win*.* in c:\windows\temp\ done

    Pocket Killbox done

    Attaching reports of ShowNew and GetRunKey.

    No pop-up until now, but I only opened the browser to write this message.
     

    Attached Files:

  30. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    YOU MUST NOT GO BACK AND EDIT OLD POSTS!!!!!!!! You removed logs that I need to go back and refer to sometimes. There is no reason that logs must be removed to post new ones. If you are having a problem attaching logs it is typically a matter of clearing your IE cache and then refreshing the page). If that is not the problem, then your log is exactly the same log as the last one (not a new log). The forum is not even suppose to allow you to do this after 5 minutes, but there are bugs in the vB code that allow you to edit post almost indefinitely (sometimes).

    I need to see a new HijackThis log since you delete old logs!


    Sounding better. It looks like the fixme.reg patch did not add in to the registry. Did you get a success message for it. It could also be the resident protection from your antivirus or antispyware programs blocked the change.

    You have a few other relatively new files I want to get more info on"
    C:\WINDOWS\winsys16.dll
    C:\WINDOWS\SYSTEM32\sintf16.dll
    C:\WINDOWS\SYSTEM32\sintf32.dll
    C:\WINDOWS\SYSTEM32\sintfnt.dll

    For each of the above files, do the below and report back to me.
    • Locate the file using Windows Explorer
    • Right click on it and select Properties.
    • Now see if there is a Version tab in the window.
    • If so, select the Version tab and on the next window select each of the listed Item names (one at a time) to get more info about the file. The most important Item is the company name.
    • If there is no Version tab, tell me that too.
    Is everything still working OK. It looks like we removed all your real active malware.
     
    Last edited: Jul 3, 2006
  31. jctraduz

    jctraduz Private E-2

    I deleted the old logs because I was getting a message stating I had already uploaded the files with identical names. To allow me to upload files with the same name, I deleted the old files. Sorry if it was a mistake. If it happens again, I'll ask how to do it.

    I'll go through these last procedures now.

    Be back in a moment.

    EDIT - I did get a success message from fixme.reg insertion
     
  32. jctraduz

    jctraduz Private E-2

    Attaching HJT log
     

    Attached Files:

  33. jctraduz

    jctraduz Private E-2

    If everything is ok, I'll read and follow the "How to Protect yourself from malware!" thread carefuly.

    I've always used IE as my browser and Norton as my AV/Firewall solution. Should I change to something else in terms of AV/Firewall?

    I already understood I should change to Mozzilla FireFox...:)

    One other thing. Your help as been inestimable. How can I help you in return?
     
  34. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You can always rename the files (like runkeys1.txt, runkeys2.txt) but that is not normally required if the files change. But your runkeys.log did not change this time because the registry patch did not work).

    You did not give me the properties info on those 4 files.
     
  35. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    You have some more to fix.
    Please exit any active protection software like Symantec and the SafeNet Sentinel stuff you are running.
    Also Disable Windows Defender's realtime protection:

    Disable Windows Defender:
    • Open Windows Defender
    • Click Tools
    • Click General Settings
    • Scroll down to Real Time Protection Options
    • Uncheck Turn on Real Time Protection (recommended)
    • Close Windows Defender
    Once your log is clean you can re-enable Windows Defender Real Time Protection.

    Now add the fixme.reg patch to your registry.

    Make sure viewing of hidden files is enabled (per the tutorial).
    Run HijackThis and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:
    O2 - BHO: (no name) - {44B99AE5-63F5-4EB9-80C2-FE176EB1616B} - (no file)
    O2 - BHO: (no name) - {4F933DD7-AB90-4F75-A1E6-DC2F211E19E0} - C:\WINDOWS\system32\pmnlk.dll (file missing)
    O2 - BHO: (no name) - {5f4c3d09-b3b9-4f88-aa82-31332fee1c08} - (no file)
    O20 - Winlogon Notify: winrge32 - winrge32.dll (file missing)

    After clicking Fix, exit HJT.:
    Now reboot in normal mode and post a new HJT log.

    Make sure you tell me how things are working now.

    Reminder Note: Once we have determined you are malware free you will need to disable System Restore, reboot, and re-enable system restore per step 1 of the READ & RUN ME. This only applies to if using WinXP or WinMe.
     
  36. jctraduz

    jctraduz Private E-2

    Done. No pop-ups.

    fixme.reg confirmed success of insertion

    Report attached
     

    Attached Files:

  37. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your log is clean. I'm assuming you have not already done the below but you may have!

    If you are not having any other malware problems, it is time to go back to step 1 of the READ & RUN ME to Disable System Restore which will flush your Restore Points. Then reboot and enable System Restore to create a new clean Restore Point.

    After that, you should work thru the below link:

    How to Protect yourself from malware!

    ~
     
  38. jctraduz

    jctraduz Private E-2

    I will. Thankl you very much for all this trouble.

    You haven't answered my question about my help. How can I help you?

    I'm a professional technical translator.
     
  39. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Well actually I don't require any translations at this time! ;) Are you referring to some other form of help?
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds