The report was already there... http://forums.malwarebytes.org/lofiversion...php/t10468.html But nobody notice that the answer was SnEngine.exe and SnAgos.exe. Credits to internet security researchers from Brazil - www.linhadefensiva.org They found out the answer. Thanks to fix it!
Hi fellows, I've seen many people having problem on explorer.exe loading at windows startup after proceeding with these changes: HKEY_CLASSES_ROOT\TypeLib\{d3073845-c655-42e7-b723-191ccfc41f0a} (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\SnAgOS.EXE (Trojan.Agent) -> Delete on reboot. C:\WINDOWS\system32\SnEngine.EXE (Trojan.Agent) -> Delete on reboot. They had no problems in userinit or shell explorer registry keys. The problem was solved restoring these files. VT is 0/42 for both of them. Why do you continue detecting these files? Thanks in advance SnAgOS.rar SnEngine.rar
Hi fellows, I go the same problem. After removing the infected files and restarting the computer, the explorer.exe does not load automatically. I tried to reset the old system configuration with windows tools, but it caused more problems so that I gave up about this. This happened in 2 different computers, in a Windows XP profession SP2 interface. Take a look to the log (it is in portuguese, but I translated what was necessary): Malwarebytes' Anti-Malware 1.44 Vers
This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.