Trojan.win32.Monder

Fermé
Didiou - 12 avril 2009 à 09:29
 Utilisateur anonyme - 12 avril 2009 à 10:22
Bonjour,

J'ai etait infecté il y a plusieurs jours. je vous passe sur les désagréments posés par ce trojan mais comme en plus l'ordi que j'utilise me sert pour le boulot c'est assez ennuyeux !

J'ai fait un scan avec kaspersky
voila ce que me donne le rapport

detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\Program Files\Zylom Games\Build-a-lot 3 Deluxe\buildalot3.exe
detected: riskware Hidden install Running process: C:\Documents and Settings\user\Local Settings\Temp\nso17C.tmp\FullSetupGamesClient-wildgames.exe
detected: riskware Invader Running process: C:\Program Files\WildGames\Build-a-lot\Buildalot-WT.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar008\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar008\mpcs.exe
detected: riskware Invader Running process: C:\omar008\mpcs.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Hidden install Running process: C:\Documents and Settings\user\Bureau\be-rich_s5_l4_gF2822T1L4_d487037231.exe
detected: riskware Hidden install Running process: C:\Documents and Settings\All Users\Application Data\BigFishGamesCache\Upgrade\Unpack\bfgsetup_s5_l4.exe
detected: riskware Invader Running process: C:\Program Files\Be Rich\nstwxjp.exe
detected: riskware Invader Running process: C:\Program Files\Be Rich\game.exe
detected: riskware Invader Running process: C:\omar08\mpcs.exe
detected: riskware Invader Running process: C:\omar008\mpcs.exe
detected: riskware Hidden install Running process: C:\Documents and Settings\user\Bureau\gourmania_s5_l4_gF2740T1L4_d487243782.exe
detected: riskware Invader Running process: C:\Program Files\Gourmania\mwtllll.exe
detected: riskware Invader Running process: C:\Program Files\Gourmania\gourmania.exe
detected: riskware Hidden install Running process: C:\Documents and Settings\user\Local Settings\Temp\_ir_sf_temp_0\irsetup.exe
detected: riskware Hidden install Running process: C:\Program Files\Build A Lot 3 Passport To Europe\BuildALot3PassportToEuropeSetupx.EXE
detected: riskware Hidden install Running process: C:\Documents and Settings\user\Local Settings\Temp\IXP000.TMP\ICICON~3.EXE
detected: riskware Hidden install Running process: C:\Documents and Settings\user\Local Settings\Temp\IXP002.TMP\ICASHI~1.EXE
deleted: Trojan program Packed.Win32.PolyCrypt.d File: C:\WINDOWS\system32\ftp_non_crp.exe//PE_Patch.Poly//PE_Patch.Poly
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\nano[1]
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\WINDOWS\system32\eqgrwlyv.exe
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.tho File: C:\WINDOWS\system32\bglerwaf.dll
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.tho File: C:\WINDOWS\system32\eiiuos.dll
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.thp File: C:\WINDOWS\system32\gwgjms.dll
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.thp File: C:\WINDOWS\system32\pmsmmuoj.dll
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.tho File: C:\WINDOWS\system32\qaaweihy.dll
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.tho File: C:\WINDOWS\system32\toqmek.dll
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\WINDOWS\system32\wdbipcsm.exe
deleted: Trojan program Trojan.Win32.Monder.byzu File: C:\WINDOWS\system32\cnuepnom.dll
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\01MF05EF\nano[1]
deleted: Trojan program Trojan.Win32.Monder.byzu File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\01MF05EF\qw[1]
deleted: Trojan program Trojan.Win32.Monder.byzu File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\01MF05EF\qw[2]
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\01MF05EF\nano[2]
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\01MF05EF\nano[3]
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.thp File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\index[1]
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.tho File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\index[2]
deleted: adware not-a-virus:AdWare.Win32.SuperJuan.tho File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\index[3]
deleted: Trojan program Trojan.Win32.Monder.byvv File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\qw[1]
deleted: Trojan program Trojan.Win32.Monder.byub File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\qw[2]
deleted: Trojan program Trojan.Win32.Monder.byub File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\qw[3]
deleted: Trojan program Trojan.Win32.Monder.byuj File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\qw[4]
deleted: Trojan program Trojan.Win32.Monder.byuj File: C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.IE5\2O76TNHS\qw[5]
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\WINDOWS\system32\berjfdqn.exe
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\WINDOWS\system32\esfypsip.exe
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\WINDOWS\system32\jnrcwhdq.exe
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\WINDOWS\system32\tyvuyvun.exe
deleted: Trojan program Trojan-Downloader.Win32.FraudLoad.vohb File: C:\WINDOWS\system32\uspkkfba.exe
detected: Trojan program Trojan.Win32.Monder.bzib File: C:\WINDOWS\system32\ssqPgeCv.dll
deleted: Trojan program Trojan.Win32.Monder.bzif File: C:\WINDOWS\system32\sevymlav.dll
deleted: Trojan program Trojan.Win32.Monder.bzif File: C:\WINDOWS\system32\qdascwsm.dll



Ensuite j'ai fais une analyse avec hijackthis :

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 08:23:25, on 12/04/2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Java\jre6\bin\jqs.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Google\Update\GoogleUpdate.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\CyberLink\Shared files\RichVideo.exe
C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\ClocX\ClocX.exe
C:\WINDOWS\ZSSnp211.exe
C:\WINDOWS\Domino.exe
C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
C:\Program Files\Java\jre6\bin\jusched.exe
C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
C:\Documents and Settings\user\Local Settings\Application Data\Google\Update\GoogleUpdate.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HP\Smart Web Printing\hpswp_clipbook.exe
C:\Program Files\Fichiers communs\Microsoft Shared\Windows Live\WLLoginProxy.exe
C:\Documents and Settings\user\Bureau\HiJackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://maghreb.msn.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = https://fr.yahoo.com/
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = https://fr.yahoo.com/
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Liens
R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\PROGRA~1\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: &Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar.dll
O4 - HKLM\..\Run: [ClocX] C:\Program Files\ClocX\ClocX.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [ZSSnp211] C:\WINDOWS\ZSSnp211.exe
O4 - HKLM\..\Run: [Domino] C:\WINDOWS\Domino.exe
O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [AVP] "C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\avp.exe"
O4 - HKLM\..\Run: [ac45e671] rundll32.exe "C:\WINDOWS\system32\qdascwsm.dll",b
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe
O4 - HKCU\..\Run: [Google Update] "C:\Documents and Settings\user\Local Settings\Application Data\Google\Update\GoogleUpdate.exe" /c
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet
O4 - HKCU\..\Run: [DWQueuedReporting] "C:\PROGRA~1\FICHIE~1\MICROS~1\DW\dwtrig20.exe" -t
O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
O4 - Global Startup: Lancement rapide d'Adobe Reader.lnk = C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
O8 - Extra context menu item: E&xporter vers Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Web Anti-Virus statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Program Files\Kaspersky Lab\Kaspersky Anti-Virus 7.0\SCIEPlgn.dll
O9 - Extra button: Livre de reliures HP - {58ECB495-38F0-49cb-A538-10282ABF65E7} - C:\Program Files\HP\Smart Web Printing\hpswp_extensions.dll
O9 - Extra button: Sélection intelligente HP - {700259D7-1666-479a-93B1-3250410481E8} - C:\Program Files\HP\Smart Web Printing\hpswp_extensions.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll
O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/...
O16 - DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - http://download.divx.com/player/DivXBrowserPlugin.cab
O16 - DPF: {74D05D43-3236-11D4-BDCD-00C04F9A3B61} (HouseCall Control) - https://www.trendmicro.com/en_us/forHome/products/housecall.html
O16 - DPF: {BFF1950D-B1B4-4AE8-B842-B2CCF06D9A1B} (Zylom Games Player) - http://game06.zylom.com/activex/zylomgamesplayer.cab
O23 - Service: Service de transfert intelligent en arrière-plan (BITS) - Unknown owner - C:\WINDOWS\
O23 - Service: Boonty Games - BOONTY - C:\Program Files\Fichiers communs\BOONTY Shared\Service\Boonty.exe
O23 - Service: Service Google Update (gupdate1c9a4932221de44) (gupdate1c9a4932221de44) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Program Files\Java\jre6\bin\jqs.exe
O23 - Service: NBService - Nero AG - C:\Program Files\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared files\RichVideo.exe

2 réponses

je viens de lancer malwarebyte's je posterais son report ici ;)
0
Utilisateur anonyme
12 avril 2009 à 10:22
Bonjour

Infecté par vundo.malawaresbytes va certainement te le trouver.A la fin du scan tu le supprime et tu me post le rapport.
Cliques sur le lien pour hijackthis et suis la procédure pour le renommer.

#Fais un scan HijackThis : : http://www.trendsecure.com/portal/en-US/_download/HJTInstall.exe
Avant de lancer HijackThis, renomme-le !
Pour cela, suis le chemin ci-dessous, jusqu' au fichier en gras :

C:\Program files\Trend Micro\HijackThis\HijackThis.exe

Clique droit dessus et choisis "renommer" : tape moulin.exe et valide.
Puis, clique droit sur "moulin.exe" et choisis Envoyer vers -> Bureau (créer un raccourci).
Reviens sur le bureau et clique sur le nouvel icône pour le lancer.
*. Accepte la license en cliquant sur le bouton "I Accept"
*. Choisis l'option "Do a system scan and save a log file"
*. Clique sur "Save log" pour enregistrer le rapport qui s'ouvrira avec le bloc-note
*. Clique sur "Edition -> Sélectionner tout", puis sur "Edition -> Copier" pour copier tout le contenu du rapport
*. Colle le rapport que tu viens de copier sur ce forum
*. Ne fixe encore AUCUNE ligne, cela pourrait empêcher ton PC de fonctionner correctement
Tutoriaux
0