Infected with the geyek*.* files

Hewlett-packard / Ps453aa-aba a818n
August 16, 2009 at 18:28:06
Specs: Microsoft Windows XP Home Edition, 2.933 GHz / 1015 MB
I have downloaded and ran Malwarebytes.. it finds 2 files with geyek in the name but it doesn't make it go away.
What do I do to make it go away, I don't know how to find where it is hiding.

See More: Infected with the geyek*.* files

Report •


#1
August 16, 2009 at 18:35:04
Download and run Kaspersky AVP tool in safe mode: http://devbuilds.kaspersky-labs.com...
Once you download and start the tool in safe mode:
# Check below options:

    * Select all the objects/places to be scanned. 
    * Settings > Customize > Heuristic analyzer > Enable deep rootkit search

# Click Scan
# Fix what it detects
# Zip/Rar Scan log/Summary and upload it to rapidshare.com. Post download link in your next message.

Illustrated tutorial: http://img32.imageshack.us/img32/76...

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#2
August 16, 2009 at 18:39:26
I hope you mean... download the program then run it in safe mode... if that isn't what you meant then I don't know how to access the program while in safe mode.

Report •

#3
August 16, 2009 at 19:14:04
Save it to your desktop open it in safe mode.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

Related Solutions

#4
August 16, 2009 at 20:12:10
Ok, TY will do that and get back soon, Thank you.

Report •

#5
August 16, 2009 at 20:36:06
That file didn't have a settings tab and it failed in safe mode.

Report •

#6
August 16, 2009 at 20:46:11
failed? Post a screen shot if you can't describe every problem in detail.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#7
August 16, 2009 at 21:25:08
How do I take a screen shot in safe mode and bring it into this message area?

Report •

#8
August 16, 2009 at 21:48:44
Note: I can help you remove malware manually. Please avoid installing/uninstalling or updating any programs and attempting any unsupervised fixes or scans. This can make helping you impossible. First Track this topic. Then follow:

1) Can you please post your AVZ log:
Note: Run AVZ in windows normal mode and make sure you are connected to internet. If avz.exe doesn't start, then try to rename the file avz.exe to game.pif and try to run it again. Pause/Stop your antivirus, firewall software (if any), close games, text editors and all other programs; leave Internet Explorer/Firefox running, before following the steps below.

i) To create the log file, download AVZ by clicking HERE. Please save this file to your desktop or "My Documents" folder.

ii) Next, unpack the file to a new folder using the Compressed (zipped) folders wizard built into Windows XP/Vista, or a zip utility of your choice.

iii) Once you have unpacked the contents of the zip archive, please launch the file AVZ.exe by double clicking on it or right clicking and selecting Open.
Note: If you are running Windows vista launch AVZ.exe by right clicking and selecting Run as Administrator.

You should now see the main window of the AVZ utility.

--> Please navigate to "File" => "Custom Scripts". Copy the script below by using the keyboard shortcut CTRL+C or the corresponding option via right click.

begin
ExecuteAVUpdate;
end.


Paste the script into the execution window by using CTRL+V keyboard shortcut, or the "paste" option via the right click menu. Click on Run to run the script.

--> Choose from the menu "File" => "Standard scripts" and mark the "Healing/Quarantine and Advanced System Analysis" check box. Click on the "Execute selected scripts" button.
Automatic scanning, healing and system check will be executed. A logfile (avz_sysinfo.htm) will be created and saved in the LOG folder in the AVZ directory as virusinfo_syscure.zip. Upload virusinfo_syscure.zip to rapidshare.com and paste the link here.
* It is necessary now to reboot your machine, because AVZ might disturb some program operations (like antiviruses and firewall) during the system scan. All applications will work properly after the system restart.

Image Tutorial

2) Download and Run DDS which will create a Pseudo HJT Report as part of its log: DDS Tool Download Link. When done, DDS will open two (2) logs

   1. DDS.txt
   2. Attach.txt

Upload the logs to rapidshare.com and paste download link in your next reply.
Note: Disable any script-blocking programs and then double-click on the DDS.scr icon to start the program. If you did not disable a script-blocker that may be part of your antimalware program, you may receive a warning from your antimalware product asking if you would like DDS.scr to run. Please allow it to do so.

In your next reply, please include download links to the following:
[*] virusinfo_syscure.zip
[*] DDS Logs

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#9
August 16, 2009 at 22:35:04
http://rapidshare.com/files/2682548...
MD5: EA7CE80ADD6AE5A6EE2040421DAB6791


http://rapidshare.com/files/2682552...
MD5: 64177C427762D5EEB46A0EBB48565A23

http://rapidshare.com/files/2682553...
MD5: 28FDAD4233A8452F7DC919F4E5A6F923


There are the files you asked for... Thank you so much for all that you are doing to help me get rid of this!!!


Report •

#10
August 17, 2009 at 05:22:54
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 StopService('is-RJ99Fdrv');
 DeleteService('is-RJ99Fdrv');
 QuarantineFile('C:\WINDOWS\Downloaded Program Files\popcaploader.dll','');
 QuarantineFile('is-RJ99Fdrv.sys','');
 QuarantineFile('%systemroot%\system32\geyekrogqjwmeq.dll','');
 DeleteFile('%systemroot%\system32\geyekrogqjwmeq.dll');
 DeleteFile('is-RJ99Fdrv.sys');
 DeleteFile('C:\WINDOWS\Downloaded Program Files\popcaploader.dll');
BC_Importall;
ExecuteSysClean;
BC_Activate;
SetAVZPMStatus(true);
RebootWindows(true);
end.

2) After reboot execute following script in AVZ:

begin
CreateQurantineArchive('C:\quarantine1.zip');    
end.


A file called quarantine1.zip should be created in C:\. Upload that file to rapidshare.com and Private message me download link.

3) Start AVZ*. Choose from the menu "File" => "Standard scripts" and mark the "Advanced System Analysis" check box. Click on the "Execute selected scripts" button.
A system check will be executed. A logfile (avz_sysinfo.htm) will be created and saved in the LOG folder in the AVZ directory as virusinfo_syscheck.zip. Upload virusinfo_syscheck.zip to rapidshare.com and paste the link here.
* It is necessary now to reboot your machine, because AVZ might disturb some program operations (like antiviruses and firewall) during the system scan. All applications will work properly after the system restart.

In your next reply, please include download links to the following:
[*] virusinfo_syscheck.zip

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#11
August 17, 2009 at 06:48:16
http://rapidshare.com/files/2683757...
MD5: 1C92B80DA2B1985FC4E0A8F8A23198D2

Report •

#12
August 17, 2009 at 06:59:36
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Run this script in AVZ like before, your computer will reboot:

begin
SetAVZGuardStatus(True);
SearchRootkit(true, true);
 QuarantineFile('%systemroot%\system32\drivers\geyekrtirsnkxy.sys','');
 DeleteFile('%systemroot%\system32\drivers\geyekrtirsnkxy.sys');
BC_ImportDeletedList;
ExecuteSysClean;
BC_Activate;
RebootWindows(true);
end.

2) Install, update database and run full scan with Malwarebytes' Anti-Malware. Attach malwarebyte full scan log, fix anything detected.

3) Run full Scan with SuperAntispyware : http://www.superantispyware.com/dow... . Fix what it detects and post summary scan log.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#13
August 17, 2009 at 08:15:45
Malwarebytes' Anti-Malware 1.40
Database version: 2640
Windows 5.1.2600 Service Pack 3

8/17/2009 11:15:09 AM
mbam-log-2009-08-17 (11-15-09).txt

Scan type: Full Scan (C:\|)
Objects scanned: 195867
Time elapsed: 39 minute(s), 0 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 0
Registry Data Items Infected: 0
Folders Infected: 0
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{494e6cec-7483-a4ee-0938-895519a84bc7} (Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
(No malicious items detected)

Registry Data Items Infected:
(No malicious items detected)

Folders Infected:
(No malicious items detected)

Files Infected:
C:\Craft stuff\BCED\14451.exe (Rogue.Installer) -> Quarantined and deleted successfully.
C:\Documents and Settings\HP\Desktop\avz4\Quarantine\2009-08-17\avz00001.dta (Rootkit.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{CC834F36-F541-4207-A484-1357100A9CA1}\RP477\A0047404.dll (Trojan.TDSS) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\geyekrmeycvbvs.dll (Trojan.Agent) -> Quarantined and deleted successfully.


Report •

#14
August 17, 2009 at 09:28:28
SUPERAntiSpyware Scan Log
http://www.superantispyware.com

Generated 08/17/2009 at 11:50 AM

Application Version : 4.27.1002

Core Rules Database Version : 4058
Trace Rules Database Version: 1998

Scan type : Complete Scan
Total Scan Time : 00:26:14

Memory items scanned : 464
Memory threats detected : 0
Registry items scanned : 5995
Registry threats detected : 0
File items scanned : 20862
File threats detected : 89

Adware.Tracking Cookie
C:\Documents and Settings\HP\Cookies\hp@atdmt[1].txt
C:\Documents and Settings\HP\Cookies\hp@e-2dj6wflowod5cko.stats.esomniture[1].txt
C:\Documents and Settings\HP\Cookies\hp@pro-market[1].txt
C:\Documents and Settings\HP\Cookies\hp@kaspersky.122.2o7[1].txt
C:\Documents and Settings\HP\Cookies\hp@smartadserver[1].txt
C:\Documents and Settings\HP\Cookies\hp@serving-sys[2].txt
C:\Documents and Settings\HP\Cookies\hp@www3.smartadserver[2].txt
C:\Documents and Settings\HP\Cookies\hp@cooking.adbureau[1].txt
C:\Documents and Settings\HP\Cookies\hp@ads.bridgetrack[1].txt
C:\Documents and Settings\HP\Cookies\hp@statcounter[1].txt
C:\Documents and Settings\HP\Cookies\hp@specificmedia[1].txt
C:\Documents and Settings\HP\Cookies\hp@richmedia.yahoo[2].txt
C:\Documents and Settings\HP\Cookies\hp@e-2dj6wjkosiazsfo.stats.esomniture[2].txt
C:\Documents and Settings\HP\Cookies\hp@invitemedia[2].txt
C:\Documents and Settings\HP\Cookies\hp@interclick[2].txt
C:\Documents and Settings\HP\Cookies\hp@oasn04.247realmedia[1].txt
C:\Documents and Settings\HP\Cookies\hp@nextag[1].txt
C:\Documents and Settings\HP\Cookies\hp@intermundomedia[2].txt
C:\Documents and Settings\HP\Cookies\hp@collective-media[1].txt
C:\Documents and Settings\HP\Cookies\hp@mediaplex[1].txt
C:\Documents and Settings\HP\Cookies\hp@questionmarket[2].txt
C:\Documents and Settings\HP\Cookies\hp@azjmp[1].txt
C:\Documents and Settings\HP\Cookies\hp@insightexpressai[2].txt
C:\Documents and Settings\HP\Cookies\hp@adbrite[2].txt
C:\Documents and Settings\HP\Cookies\hp@media6degrees[2].txt
C:\Documents and Settings\HP\Cookies\hp@imrworldwide[2].txt
C:\Documents and Settings\HP\Cookies\hp@bluestreak[2].txt
C:\Documents and Settings\HP\Cookies\hp@e-2dj6wfloskdzigp.stats.esomniture[1].txt
C:\Documents and Settings\HP\Cookies\hp@at.atwola[2].txt
C:\Documents and Settings\HP\Cookies\hp@apartmentfinder[2].txt
C:\Documents and Settings\HP\Cookies\hp@apmebf[2].txt
C:\Documents and Settings\HP\Cookies\hp@cookingcom.112.2o7[1].txt
C:\Documents and Settings\HP\Cookies\hp@www.apartmentfinder[1].txt
C:\Documents and Settings\HP\Cookies\hp@adserver.adtechus[1].txt
C:\Documents and Settings\HP\Cookies\hp@bravenet[1].txt
C:\Documents and Settings\HP\Cookies\hp@ad.yieldmanager[1].txt
C:\Documents and Settings\HP\Cookies\hp@burstnet[1].txt
C:\Documents and Settings\HP\Cookies\hp@trafficmp[2].txt
C:\Documents and Settings\HP\Cookies\hp@ads.pointroll[1].txt
C:\Documents and Settings\HP\Cookies\hp@ads.lycos[2].txt
C:\Documents and Settings\HP\Cookies\hp@revsci[1].txt
C:\Documents and Settings\HP\Cookies\hp@adrevolver[2].txt
C:\Documents and Settings\HP\Cookies\hp@zedo[1].txt
C:\Documents and Settings\HP\Cookies\hp@casalemedia[2].txt
C:\Documents and Settings\HP\Cookies\hp@ads.addynamix[1].txt
C:\Documents and Settings\HP\Cookies\hp@adinterax[2].txt
C:\Documents and Settings\HP\Cookies\hp@realmedia[2].txt
C:\Documents and Settings\HP\Cookies\hp@bridge1.admarketplace[1].txt
C:\Documents and Settings\HP\Cookies\hp@bs.serving-sys[1].txt
C:\Documents and Settings\HP\Cookies\hp@server.iad.liveperson[2].txt
C:\Documents and Settings\HP\Cookies\hp@ads.lucidmedia[1].txt
C:\Documents and Settings\HP\Cookies\hp@specificclick[2].txt
C:\Documents and Settings\HP\Cookies\hp@ads.undertone[1].txt
C:\Documents and Settings\HP\Cookies\hp@electronicarts.112.2o7[1].txt
C:\Documents and Settings\HP\Cookies\hp@media.adrevolver[1].txt
C:\Documents and Settings\HP\Cookies\hp@doubleclick[1].txt
C:\Documents and Settings\HP\Cookies\hp@socialmedia[2].txt
C:\Documents and Settings\HP\Cookies\hp@adserving.autotrader[1].txt
C:\Documents and Settings\HP\Cookies\hp@lulu.112.2o7[1].txt
C:\Documents and Settings\HP\Cookies\hp@journalregistercompany.122.2o7[1].txt
C:\Documents and Settings\HP\Cookies\hp@t.lynxtrack[2].txt
C:\Documents and Settings\HP\Cookies\hp@precisionclick[1].txt
C:\Documents and Settings\HP\Cookies\hp@www.googleadservices[1].txt
C:\Documents and Settings\HP\Cookies\hp@tacoda[2].txt
C:\Documents and Settings\HP\Cookies\hp@ads.drgnetwork[2].txt
C:\Documents and Settings\HP\Cookies\hp@e-2dj6wjkyskaziao.stats.esomniture[2].txt
C:\Documents and Settings\HP\Cookies\hp@adlegend[2].txt
C:\Documents and Settings\HP\Cookies\hp@247realmedia[1].txt
C:\Documents and Settings\HP\Cookies\hp@xiti[1].txt
C:\Documents and Settings\HP\Cookies\hp@eas.apm.emediate[2].txt
C:\Documents and Settings\HP\Cookies\hp@advertising[1].txt
C:\Documents and Settings\HP\Cookies\hp@a1.interclick[1].txt
C:\Documents and Settings\HP\Cookies\hp@e-2dj6wjny-1pc5ck.stats.esomniture[1].txt
C:\Documents and Settings\HP\Cookies\hp@popcapgames.122.2o7[1].txt
C:\Documents and Settings\HP\Cookies\hp@lfstmedia[2].txt
C:\Documents and Settings\HP\Cookies\hp@burstbeacon[1].txt
C:\Documents and Settings\HP\Cookies\hp@zillow.adbureau[2].txt
C:\Documents and Settings\HP\Cookies\hp@fastclick[1].txt
C:\Documents and Settings\HP\Cookies\hp@admarketplace[1].txt
C:\Documents and Settings\HP\Cookies\hp@e-2dj6wjmyqkdjkep.stats.esomniture[2].txt
C:\Documents and Settings\HP\Cookies\hp@yieldmanager[2].txt
C:\Documents and Settings\HP\Cookies\hp@tribalfusion[1].txt
C:\Documents and Settings\HP\Cookies\hp@waterfrontmedia.112.2o7[1].txt
C:\Documents and Settings\HP\Cookies\hp@www.burstbeacon[1].txt
C:\Documents and Settings\HP\Cookies\hp@stats.paypal[2].txt
C:\Documents and Settings\HP\Cookies\hp@www.myaccount.chase[2].txt
C:\Documents and Settings\HP\Cookies\hp@tracking.waterfrontmedia[1].txt
C:\Documents and Settings\HP\Cookies\hp@yadro[1].txt

Trojan.Agent/Gen-Cryptor
C:\WINDOWS\SYSTEM32\GEYEKROGQJWMEQ.DLL


Report •

#15
August 17, 2009 at 09:29:58
How is your machine running? I suggest you get a antivirus. Try free avira http://www.free-av.com/ . Follow:

Follow these steps in order numbered:

1) Download GMER: http://gmer.net/download.php
[This version will download a randomly named file (Recommended).]

2) Disconnect from the Internet and close all running programs.

3) Temporarily disable any real-time active protection so your security programs will not conflict with gmer's driver.

4) Double-click on the randomly named GMER file (i.e. n7gmo46c.exe) and allow the gmer.sys driver to load if asked.

5) GMER will open to the Rootkit/Malware tab and perform an automatic quick scan when first run. (do not use the computer while the scan is in progress)

6) If you receive a WARNING!!! about rootkit activity and are asked to fully scan your system...click NO.

7) Now click the Scan button. If you see a rootkit warning window, click OK.

8) When the scan is finished, click the Save... button to save the scan results to your Desktop. Save the file as gmer.log and upload it rapidshare.com. Post the download link to the uploaded file in your post.

9) Exit GMER and re-enable all active protection when done.

Note: Please give me the exact name of the file you downloaded in step 1 + post your log from step 8 in your next post.


Report •

#16
August 17, 2009 at 09:52:52
The file name is Deb81709.log.html

http://rapidshare.com/files/2684294...
MD5: 5D99BC21937BC3F31FE43765D011FB94


Report •

#17
August 17, 2009 at 10:13:47
Follow these Steps in order numbered. Don't proceed to next step unless you have successfully completed previous step:

1) Attach a Combofix log, please review and follow these instructions carefully.

Download it here -> http://download.bleepingcomputer.co...

Before Saving it to Desktop, please rename it to something like 123.exe to stop malware from disabling it.

Now, please make sure no other programs are running, close all other windows and pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) until after the scanning and removal process has taken place.

Please double click on the file you downloaded. Follow the onscreen prompts to start the scan. Once the scanning process has started please DO NOT click on the Combofix window or attempt to use your computer as this can cause the scanning process to stall. It may take a while to complete scanning and this is normal.

You will be disconnected from the internet and your desktop icons/toolbars will disappear during scanning, do not worry, this is normal and it will be restored after scanning has completed.

Combofix will create a logfile and display it after your computer has rebooted. Usually located in c:\combofix.txt, please upload that file to rapidshare.com and paste the link here.

2) Please zip up C:\qoobox\quarantine and upload it, to a filehost such as http://rapidshare.com/ Then, Private Message me the Download links to the uploaded files.

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#18
August 17, 2009 at 10:44:21
http://rapidshare.com/files/2684450...
MD5: 75F64A4957F82B84B0556B728DA4D1F0


Report •

#19
August 17, 2009 at 11:46:50
Uninstall Combofix by: pause Antivirus/Sypware programs (http://www.bleepingcomputer.com/forums/topic114351.html Programs to disable) > Start > run > type combofix /u > ok.

Problem fixed or still experiencing problems?

If I'm helping you and I don't reply within 24 hours send me a PM.


Report •

#20
August 17, 2009 at 13:14:37
Thank you so much for your help... your answers were quick and clear and you didn't stop until the problem was fixed.
Thank you again.

Report •


Ask Question