Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


SOS! About to lauch the PC from the window!!

  • This topic is locked This topic is locked
2 replies to this topic

#1 Matt Jaq

Matt Jaq

  • Members
  • 1 posts
  • Local time:05:13 AM

Posted 05 August 2010 - 11:35 PM

Firstly, thank you for your time! I know this really isn't the general idea of an enjoyable Friday spent, but I really do appreciate any kind of help or instruction as to solving this corrupt registry 'virus' (?) that has really worn me down.

I'm not perhaps the most computer-literate person in human history, but let me tell you as much about the issue as I can see.

It started with an "AVE.exe" virus that managed to bypass all my security measures (McAfee, Malwarebytes, AVG, Hijackthis, Spybot). The usual, fake "your computer is infected! Buy 'Superviruskiller' now! p.s. give me all your credit card details" popups started, web browsers started redirecting me to sites trying to rebirth the AVE.exe virus, and soon all of my computer's command processing speed was totally burried by counter-commands employed by the virus to disallow me access to programs. A friend of mine helped me do a bit of research into the problem, and found out that it was very sophisticated as it had many devices in which to revive itself after being removed, such as accessing sites in the background of a program to invade again, and it also tried downloading a few things on its own which actually worries me a lot. A website told me that the easiest way to reset the registry was with a command typed in Notepad, made into a desktop icon, and then 'opened' to add/delete the corrupt logs:
Windows Registry Editor Version 5.00


@=”\”%1\” %*”

“Content Type”=”application/x-msdownload”

This seemed to work wonders as I haven't seen a popup since, programs open without a challenge, and the redirection of internet browsers has dropped a bit (Still very much an issue though, and still very frustrating.)

The only issues I really can only notice now include:
- On restarting, or booting my PC, the virus has corrupted a few registry files that affect the Windows Services (disables my internet connection, audio, video drivers, user preferrances, themes and Firewall). After I've logged in as my user, the desktop wallpaper is plain black, and I lose all but about 5 icons as well as the toolbar and start menu all appear as if I was using Windows 98 (currently using Vista if that helps at all). I have to manually start the automatic services in the Administrative Tools window, despite most of the services not responding, or telling me that a particular service has failed to start as the file is missing or could not be located.
- Internet Explorer AND Firefox both will sometimes redirect me to a random website i.e. www.canadianflowers.org, and then will redirect me to, what I assume, is one of the AVE.exe rebirth sites and Spybot will always tell me that something has tried to invade. This only happens when clicking a result link after searching on Google.
- My computer is running extremely slowly, taking a few seconds to process any actions that I make
- I've lately been getting a "Host Process for Windows Services has stopped working" message popping up, asking me to check online for a solution, or close. In View problem details, this is all it tells me:
"Problem signature:
Problem Event Name: APPCRASH
Application Name: svchost.exe
Application Version: 6.0.6001.18000
Application Timestamp: 47918b89
Fault Module Name: ntdll.dll
Fault Module Version: 6.0.6001.18000
Fault Module Timestamp: 4791a7a6
Exception Code: c000071b
Exception Offset: 00088ed9
OS Version: 6.0.6001.
Locale ID: 3081
Additional Information 1: 0e02
Additional Information 2: b21b56b606e7544720668ce364087082
Additional Information 3: 0e02
Additional Information 4: b21b56b606e7544720668ce364087082

Read our privacy statement:

I've read a lot about people who have similar issues with corrupt registry files and a lot of the solutions to their problems have involved manually deleting and editting the reg. files with the registry editor (which I'm actually willing to try as I'm getting pretty desperate, however I haven't a clue as to where to begin, or what to look for)

Here's the log to my last Hijackthis scan. These 21 files are always the same ones to A: need manual starting in the Services window, and B: don't ever correct themselves after a Hijackthis 'Fix'

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 2:33:21 PM, on 6/08/2010
Platform: Windows Vista SP1 (WinNT 6.00.1905)
MSIE: Internet Explorer v8.00 (8.00.6001.18904)
Boot mode: Normal

Running processes:
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\HiJackThis\HiJackThis.exe

O4 - .DEFAULT User Startup: vyzi.exe (User 'Default user')
O23 - Service: Ati External Event Utility - ATI Technologies Inc. - C:\Windows\system32\Ati2evxx.exe
O23 - Service: AVG Free E-mail Scanner (avg9emc) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgemc.exe
O23 - Service: AVG Free WatchDog (avg9wd) - AVG Technologies CZ, s.r.o. - C:\Program Files\AVG\AVG9\avgwdsvc.exe
O23 - Service: Microsoft .NET Framework NGEN v2.0.50727_X86 clr_optimization_v2.0.50727_32Fax (clr_optimization_v2.0.50727_32Fax) - Unknown owner - C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0b.exe (file missing)
O23 - Service: Diagnostic Policy Service DPSRasAuto (DPSRasAuto) - Unknown owner - C:\Windows\system32\acwizardk.exe (file missing)
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Human Interface Device Access hidservMSDTC (hidservMSDTC) - Unknown owner - C:\Windows\system32\AdapterTroubleshootern.exe (file missing)
O23 - Service: McAfee Security Scan Component Host Service (McComponentHostService) - McAfee, Inc. - C:\Program Files\McAfee Security Scan\2.0.181\McCHSvc.exe
O23 - Service: Windows Firewall MpsSvcTrkWks (MpsSvcTrkWks) - Unknown owner - C:\Windows\system32\adsmsextl.exe (file missing)
O23 - Service: Distributed Transaction Coordinator MSDTCUI0Detect (MSDTCUI0Detect) - Unknown owner - C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1i.exe (file missing)
O23 - Service: Net.Tcp Port Sharing Service NetTcpPortSharingDhcp (NetTcpPortSharingDhcp) - Unknown owner - C:\Windows\system32\aaclienta.exe (file missing)
O23 - Service: nProtect GameGuard Service (npggsvc) - Unknown owner - C:\Windows\system32\GameMon.des.exe (file missing)
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: Quality Windows Audio Video Experience QWAVEwscsvc (QWAVEwscsvc) - Unknown owner - C:\Windows\system32\apirclt.exe (file missing)
O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
O23 - Service: SSDP Discovery SSDPSRVALG (SSDPSRVALG) - Unknown owner - C:\Windows\system32\activedsn.exe
O23 - Service: Themes ThemesSstpSvc (ThemesSstpSvc) - Unknown owner - C:\Windows\system32\12520437f.exe (file missing)
O23 - Service: Windows Update wuauservFontCache3.0.0.0 (wuauservFontCache3.0.0.0) - Unknown owner - C:\Windows\system32\acwizardd.exe (file missing)

End of file - 3446 bytes

Anyway, I think I've covered about everything now but if there's ANYTHING else you need to know, please just ask! This issue seems like it could be quite an easy fix if it really only involves editting a few reg. files, but any sort of (SIMPLE! tongue.gif) reply or feedback would be so greatly appreciated. Thanks again, guys (:

BC AdBot (Login to Remove)


#2 mpascal


    Math Nerd

  • Members
  • 1,653 posts
  • Gender:Male
  • Location:Canada
  • Local time:02:13 PM

Posted 14 August 2010 - 01:53 AM

Hi Matt Jaq,

Welcome to Bleeping Computer!

My name is mpascal, and I will be helping you fix your problem.

Before we begin, I would like give a few guidelines so that we can fix your problem as quickly and efficiently as possible:
  • Be sure to follow all my instructions carefully! If there is anything you don't understand, don't hesitate to ask.
  • Please do not do anything or perform other steps unless I have asked you to do so.
  • Please make sure you post all logs I ask you to, and make sure that the entire log gets posted.
  • Don't attach any logs unless asked. Posting them in the forums will make them easier to analyze.
  • If you are unsure of how to reply, or need help with anything regarding the website, please look here.

STEP 1 - Preparation Guide

Please follow the instructions in the Preparation Guide until you have reached step 6. You may stop once you have finished step 6 and continue with the instructions here.


Note: In the event that you already have MBAM installed, you do not need to reinstall it. Simply Updating it and doing a Quickscan is sufficient.

Please download Malwarebytes Anti-Malware (v1.44) and save it to your desktop.MBAM may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.
  • Make sure you are connected to the Internet.
  • Double-click on mbam-setup.exe to install the application.
    For instructions with screenshots, please refer to the How to use Malwarebytes' Anti-Malware Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings.
  • When installation has finished, make sure you leave both of these checked:
    • Update Malwarebytes' Anti-Malware
    • Launch Malwarebytes' Anti-Malware
  • Then click Finish.
MBAM will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button to close that box and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
On the Scanner tab:
  • Make sure the "Perform Quick Scan" option is selected.
  • Then click on the Scan button.
  • If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button.
  • The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.
  • When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box and continue with the removal process.
Back at the main Scanner screen:
  • Click on the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked, and click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab in MBAM.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows MBAM's database version and your operating system.
  • Exit MBAM when done.
Note: If MBAM encounters a file that is difficult to remove, you will be asked to reboot your computer so MBAM can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally (not into safe mode) will prevent MBAM from removing all the malware.


Please download GMER from one of the following locations and save it to your desktop:
  • Main Mirror
    This version will download a randomly named file (Recommended)
  • Zipped Mirror
    This version will download a zip file you will need to extract first. If you use this mirror, please extract the zip file to your desktop.
  • Disconnect from the Internet and close all running programs.
  • Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.
  • Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.
  • Note: If you downloaded the zipped version, extract the file to its own folder such as C:\gmer and then double-click on gmer.exe.

  • GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)
  • If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.
  • Now click the Scan button. If you see a rootkit warning window, click OK.
  • When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log.
  • Click the Copy button and paste the results into your next reply.
  • Exit GMER and be sure to re-enable your anti-virus, Firewall and any other security programs you had disabled.
-- If you encounter any problems, try running GMER in safe mode.
-- If GMER crashes or keeps resulting in a BSODs, uncheck Devices on the right side before scanning


Download OTL to your desktop.
  • Double click on the icon to run it. Make sure all other windows are closed and to let it run uninterrupted.
  • When the window appears, underneath Output at the top change it to Minimal Output.
  • In the Custom Scans box, copy and paste the following:
    %systemroot%\*. /mp /s
    %PROGRAMFILES%\bak. /s
    %systemroot%\system32\bak. /s
    %ALLUSERSPROFILE%\Start Menu\*.lnk /x
    %systemroot%\system32\config\systemprofile\*.dat /x
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update\Results\Install|LastSuccessTime /rs
  • Click the Run Scan button. Do not change any settings unless otherwise told to do so. The scan wont take long.
    • When the scan completes, it will open two notepad windows. OTListIt.Txt and Extras.txt. These are saved in the same location as OTL.
    • Please copy (Edit->Select All, Edit->Copy) the contents of the files, and post it with your next reply.
STEP 5 - Reply

Please reply with the following logs:
  • MBAM Log
  • GMER Log
  • OTL Log

Posted Image

Stay with your topic! Topics that go 4 days without a reply will be closed. PM me to reopen.

Please don't PM asking for support. Post on the forums instead.

My help is free, but if you wish to donate and help continue my fight against malware, click here: Posted Image

#3 mpascal


    Math Nerd

  • Members
  • 1,653 posts
  • Gender:Male
  • Location:Canada
  • Local time:02:13 PM

Posted 25 August 2010 - 05:28 PM

Due to lack of feedback, this topic has been closed.

If you need this topic reopened, please contact a staff member. This applies only to the original topic starter. Everyone else please begin a New Topic.

Posted Image

Stay with your topic! Topics that go 4 days without a reply will be closed. PM me to reopen.

Please don't PM asking for support. Post on the forums instead.

My help is free, but if you wish to donate and help continue my fight against malware, click here: Posted Image

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users