PC infecté de Trojan

Fermé
yannaka Messages postés 10 Date d'inscription mercredi 11 juin 2008 Statut Membre Dernière intervention 19 décembre 2008 - 11 juin 2008 à 14:35
yannaka Messages postés 10 Date d'inscription mercredi 11 juin 2008 Statut Membre Dernière intervention 19 décembre 2008 - 17 juin 2008 à 07:23
Bonjour,

Le PC de mon boulot est infecté de Trojan, du coup, problème de connexion, d'affichage, et Antivir passe son temps à les détecter, mais sans résoudre les problèmes.

Quelqu'un pourrait-il m'aider ?

Merci par avance...
A voir également:

7 réponses

Bijen Messages postés 3 Date d'inscription mercredi 11 juin 2008 Statut Membre Dernière intervention 11 juin 2008
11 juin 2008 à 14:36
Installez l'anti-virus NOD32 si vous avez l'ADSL. C'est le meilleur contre ça !
Bonne Chance
0
yannaka Messages postés 10 Date d'inscription mercredi 11 juin 2008 Statut Membre Dernière intervention 19 décembre 2008
11 juin 2008 à 14:38
J'ai fait un scan avec Antivir, dont voici le rapport :

Avira AntiVir Personal
Report file date: mardi 10 juin 2008 12:11

Scanning for 1320652 virus strains and unwanted programs.

Licensed to: Avira AntiVir PersonalEdition Classic
Serial number: 0000149996-ADJIE-0001
Platform: Windows XP
Windows version: (Service Pack 2) [5.1.2600]
Boot mode: Normally booted
Username: SYSTEM
Computer name: CLASSE12-1

Version information:
BUILD.DAT : 8.1.00.295 16479 Bytes 09/04/2008 16:24:00
AVSCAN.EXE : 8.1.2.12 311553 Bytes 18/03/2008 09:02:56
AVSCAN.DLL : 8.1.1.0 53505 Bytes 07/02/2008 08:43:37
LUKE.DLL : 8.1.2.9 151809 Bytes 28/02/2008 08:41:23
LUKERES.DLL : 8.1.2.1 12033 Bytes 21/02/2008 08:28:40
ANTIVIR0.VDF : 6.40.0.0 11030528 Bytes 18/07/2007 10:33:34
ANTIVIR1.VDF : 7.0.3.2 5447168 Bytes 07/03/2008 13:08:58
ANTIVIR2.VDF : 7.0.4.120 2206720 Bytes 01/06/2008 08:21:43
ANTIVIR3.VDF : 7.0.4.168 243712 Bytes 10/06/2008 08:21:44
Engineversion : 8.1.0.55
AEVDF.DLL : 8.1.0.5 102772 Bytes 25/02/2008 09:58:21
AESCRIPT.DLL : 8.1.0.40 266618 Bytes 10/06/2008 08:21:58
AESCN.DLL : 8.1.0.21 119156 Bytes 10/06/2008 08:21:57
AERDL.DLL : 8.1.0.20 418165 Bytes 10/06/2008 08:21:56
AEPACK.DLL : 8.1.1.5 364918 Bytes 10/06/2008 08:21:54
AEOFFICE.DLL : 8.1.0.18 192890 Bytes 10/06/2008 08:21:53
AEHEUR.DLL : 8.1.0.30 1253750 Bytes 10/06/2008 08:21:51
AEHELP.DLL : 8.1.0.15 115063 Bytes 10/06/2008 08:21:48
AEGEN.DLL : 8.1.0.28 307572 Bytes 10/06/2008 08:21:47
AEEMU.DLL : 8.1.0.6 430451 Bytes 10/06/2008 08:21:46
AECORE.DLL : 8.1.0.31 168310 Bytes 10/06/2008 08:21:45
AVWINLL.DLL : 1.0.0.7 14593 Bytes 23/01/2008 17:07:53
AVPREF.DLL : 8.0.0.1 25857 Bytes 18/02/2008 10:37:50
AVREP.DLL : 7.0.0.1 155688 Bytes 16/04/2007 13:26:47
AVREG.DLL : 8.0.0.0 30977 Bytes 23/01/2008 17:07:49
AVARKT.DLL : 1.0.0.23 307457 Bytes 12/02/2008 08:29:23
AVEVTLOG.DLL : 8.0.0.11 114945 Bytes 28/02/2008 08:31:31
SQLITE3.DLL : 3.3.17.1 339968 Bytes 22/01/2008 17:28:02
SMTPLIB.DLL : 1.2.0.19 28929 Bytes 23/01/2008 17:08:39
NETNT.DLL : 8.0.0.1 7937 Bytes 25/01/2008 12:05:10
RCIMAGE.DLL : 8.0.0.35 2371841 Bytes 10/03/2008 14:37:25
RCTEXT.DLL : 8.0.32.0 86273 Bytes 06/03/2008 12:02:11

Configuration settings for the scan:
Jobname..........................: Complete system scan
Configuration file...............: c:\program files\avira\antivir personaledition classic\sysscan.avp
Logging..........................: low
Primary action...................: interactive
Secondary action.................: ignore
Scan master boot sector..........: on
Scan boot sector.................: on
Boot sectors.....................: C:,
Scan memory......................: on
Process scan.....................: on
Scan registry....................: on
Search for rootkits..............: off
Scan all files...................: Intelligent file selection
Scan archives....................: on
Recursion depth..................: 20
Smart extensions.................: on
Macro heuristic..................: on
File heuristic...................: medium

Start of the scan: mardi 10 juin 2008 12:11

The scan of running processes will be started
Scan process 'avscan.exe' - '1' Module(s) have been scanned
Scan process 'avcenter.exe' - '1' Module(s) have been scanned
Scan process 'iexplore.exe' - '1' Module(s) have been scanned
Scan process 'DSAgnt.exe' - '1' Module(s) have been scanned
Scan process 'ctfmon.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'avgnt.exe' - '1' Module(s) have been scanned
Scan process 'yiuemii.exe' - '1' Module(s) have been scanned
Scan process 'HPWNTBX.exe' - '1' Module(s) have been scanned
Scan process 'pmxmiced.exe' - '1' Module(s) have been scanned
Scan process 'PDVDDXSrv.exe' - '1' Module(s) have been scanned
Scan process 'ico.exe' - '1' Module(s) have been scanned
Scan process 'stsystra.exe' - '1' Module(s) have been scanned
Scan process 'jusched.exe' - '1' Module(s) have been scanned
Scan process 'rundll32.exe' - '1' Module(s) have been scanned
Scan process 'alg.exe' - '1' Module(s) have been scanned
Scan process 'winvnc4.exe' - '1' Module(s) have been scanned
Scan process 'nvsvc32.exe' - '1' Module(s) have been scanned
Scan process 'AsfIpMon.exe' - '1' Module(s) have been scanned
Scan process 'avguard.exe' - '1' Module(s) have been scanned
Scan process 'a2service.exe' - '1' Module(s) have been scanned
Scan process 'sched.exe' - '1' Module(s) have been scanned
Scan process 'spoolsv.exe' - '1' Module(s) have been scanned
Scan process 'aawservice.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'explorer.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'svchost.exe' - '1' Module(s) have been scanned
Scan process 'lsass.exe' - '1' Module(s) have been scanned
Scan process 'services.exe' - '1' Module(s) have been scanned
Scan process 'winlogon.exe' - '1' Module(s) have been scanned
Scan process 'csrss.exe' - '1' Module(s) have been scanned
Scan process 'smss.exe' - '1' Module(s) have been scanned
37 processes with 37 modules were scanned

Starting master boot sector scan:
Master boot sector HD0
[INFO] No virus was found!

Start scanning boot sectors:
Boot sector 'C:\'
[INFO] No virus was found!

Starting to scan the registry.
C:\WINDOWS\system32\vtUnnnoN.dll
[DETECTION] Is the Trojan horse TR/Monder.30208.2
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING]

The registry was scanned ( '30' files ).


Starting the file scan:

Begin scan in 'C:\'
C:\hiberfil.sys
[WARNING] The file could not be opened!
C:\pagefile.sys
[WARNING] The file could not be opened!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP147\A0012081.exe
[DETECTION] Is the Trojan horse TR/Dldr.Swizzor.Gen
[NOTE] The file was moved to '487e584b.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP172\A0014773.exe
[DETECTION] Contains suspicious code HEUR/Malware
[NOTE] The fund was classified as suspicious.
[NOTE] The file was moved to '487e586f.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP173\A0014789.exe
[DETECTION] Contains suspicious code HEUR/Malware
[NOTE] The fund was classified as suspicious.
[NOTE] The file was moved to '487e5875.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP173\A0014790.exe
[DETECTION] Is the Trojan horse TR/Dldr.Small.iwh
[NOTE] The file was moved to '487e5879.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP173\A0014799.sys
[DETECTION] Is the Trojan horse TR/Rootkit.Gen
[NOTE] The file was moved to '487e587c.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP173\A0014882.exe
[DETECTION] Is the Trojan horse TR/Dropper.Gen
[NOTE] The file was moved to '487e5882.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP173\A0014883.exe
[DETECTION] Is the Trojan horse TR/Dropper.Gen
[NOTE] The file was moved to '487e588b.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP174\A0014920.dll
[DETECTION] Is the Trojan horse TR/Downloader.Gen
[NOTE] The file was moved to '487e5890.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP174\A0014922.exe
[DETECTION] Is the Trojan horse TR/Agent.DYH
[NOTE] The file was moved to '487e5893.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP174\A0014924.exe
[DETECTION] Contains suspicious code HEUR/Malware
[NOTE] The fund was classified as suspicious.
[NOTE] The file was moved to '487e5895.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015094.exe
[DETECTION] Contains detection pattern of the dropper DR/Delphi.Gen
[NOTE] The file was moved to '487e58a0.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015096.dll
[DETECTION] Is the Trojan horse TR/Monder.82944
[NOTE] The file was moved to '487e58a6.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015104.dll
[DETECTION] Is the Trojan horse TR/Monder.82944
[NOTE] The file was moved to '487e58a8.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015105.dll
[DETECTION] Is the Trojan horse TR/Crypt.PEC2X.Gen
[NOTE] The file was moved to '487e58aa.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015120.exe
[DETECTION] Is the Trojan horse TR/MailSkinner.C.1
[NOTE] The file was moved to '487e58ac.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015124.exe
[DETECTION] Contains detection pattern of the rootkit RKIT/Agent.aqa
[NOTE] The file was moved to '487e58ae.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015125.exe
[DETECTION] Contains detection pattern of the dropper DR/Delphi.Gen
[NOTE] The file was moved to '487e58b0.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015126.exe
[DETECTION] Is the Trojan horse TR/Dropper.Gen
[NOTE] The file was moved to '487e58b2.qua'!
C:\System Volume Information\_restore{340C3340-2EBB-4324-859A-C37E85627171}\RP175\A0015135.dll
[DETECTION] Is the Trojan horse TR/Click.Agen.32256
[NOTE] The file was moved to '487e58b4.qua'!
C:\WINDOWS\mrofinu1535.exe
[DETECTION] Is the Trojan horse TR/Crypt.ULPM.Gen
[NOTE] The file was moved to '48bd5915.qua'!
C:\WINDOWS\system32\svchost.exe:ext.exe
[DETECTION] Is the Trojan horse TR/Hijack.Explor.4860
[NOTE] The file was moved to '48b15a56.qua'!
C:\WINDOWS\system32\vtUnnnoN.dll
[DETECTION] Is the Trojan horse TR/Monder.30208.2
[WARNING] An error has occurred and the file was not deleted. ErrorID: 26003
[WARNING]
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\IJ2L4N67\update[1].upd
[DETECTION] Contains detection pattern of the rootkit RKIT/Clbd.BJ
[NOTE] The file was moved to '48b25a74.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\IJ2L4N67\update[2].upd
[DETECTION] Contains detection pattern of the rootkit RKIT/Clbd.BJ
[NOTE] The file was moved to '48b25a76.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\IJ2L4N67\update[3].upd
[DETECTION] Contains detection pattern of the rootkit RKIT/Clbd.BJ
[NOTE] The file was moved to '48b25a78.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\IJ2L4N67\update[4].upd
[DETECTION] Contains detection pattern of the rootkit RKIT/Clbd.BJ
[NOTE] The file was moved to '48b25a7e.qua'!
C:\WINDOWS\system32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\IJ2L4N67\update[5].upd
[DETECTION] Contains detection pattern of the rootkit RKIT/Clbd.BJ
[NOTE] The file was moved to '48b25a82.qua'!
C:\WINDOWS\Temp\NSIS_Install_WMP.exe
[DETECTION] Contains detection pattern of the dropper DR/NaviPromo.BU.35
[NOTE] The file was moved to '48975abc.qua'!


End of the scan: mardi 10 juin 2008 12:41
Used time: 30:43 min

The scan has been done completely.

5518 Scanning directories
257318 Files were scanned
26 viruses and/or unwanted programs were found
3 Files were classified as suspicious:
0 files were deleted
0 files were repaired
27 files were moved to quarantine
0 files were renamed
2 Files cannot be scanned
257292 Files not concerned
3484 Archives were scanned
4 Warnings
27 Notes
0
yannaka Messages postés 10 Date d'inscription mercredi 11 juin 2008 Statut Membre Dernière intervention 19 décembre 2008
11 juin 2008 à 14:42
OK, je vais essayer NOD32. Merci.
0
Regis59 Messages postés 21143 Date d'inscription mardi 27 juin 2006 Statut Contributeur sécurité Dernière intervention 22 juin 2016 1 320
11 juin 2008 à 15:24
Salut

Tu as changé d'antivirus?

A+
0

Vous n’avez pas trouvé la réponse que vous recherchez ?

Posez votre question
yannaka Messages postés 10 Date d'inscription mercredi 11 juin 2008 Statut Membre Dernière intervention 19 décembre 2008
11 juin 2008 à 17:49
Le PC est au boulot, et je n'y suis pas aujourd'hui, donc je vais essayé NOD32 demain. J'ai essayé a2 et adaware, qui n'ont pas résolu le problème...
0
Regis59 Messages postés 21143 Date d'inscription mardi 27 juin 2006 Statut Contributeur sécurité Dernière intervention 22 juin 2016 1 320
11 juin 2008 à 20:50
Ok.
A mon avis le changement d'antivirus ne changera en aucuns cas l'issue du problème.

Si demain tu as le temps au boulot:

télécharge HijackThis ici:
http://telechargement.zebulon.fr/138-hijackthis-1991.html

Dézippe le dans un dossier prévu à cet effet.
Par exemple C:\hijackthis < Enregistre le bien dans c : !
Démo : (Merci a Balltrap34 pour cette réalisation)
http://pageperso.aol.fr/balltrap34/Hijenr.gif

Lance le puis:
clique sur "do a system scan and save logfile" (cf démo)
faire un copier coller du log entier sur le forum

Démo : (Merci a Balltrap34 pour cette réalisation)
http://pageperso.aol.fr/balltrap34/demohijack.htm

et:
Désactive les logiciels de protection (Antivirus, Antispywares) puis :

Télécharge Combofix sUBs : http://download.bleepingcomputer.com/sUBs/ComboFix.exe
et sauvegarde le sur ton bureau et pas ailleurs!

Double-clic sur combofix, Il va te poser une question, réponds par la touche 1 et entrée pour valider.
Attends que combofix ait terminé, un rapport sera créé. Poste le rapport.

Bon courage

A+
0
yannaka Messages postés 10 Date d'inscription mercredi 11 juin 2008 Statut Membre Dernière intervention 19 décembre 2008
17 juin 2008 à 07:23
Le PC ayant complètement planté, un technicien est venu me le chercher pour essayer de résoudre le problème. Merci beaucoup à ceux qui ont essayé de m'aider !
0