Mises à jours impossible (anti-virus) Port 80

Fermé
penegal Messages postés 318 Date d'inscription lundi 22 décembre 2008 Statut Membre Dernière intervention 31 janvier 2014 - 26 juil. 2011 à 15:09
 arcor - 26 juil. 2011 à 17:07
Bonjour,
Depuis hier, il m'est strictement impossible de mettre à jour les anti-virus.
Avast : Mise a jour impossible
Eset Smart Security (à l'installation) : Is a proxy configured ?
AVG (à l'installation) : Connection impossible
Malwarebytes : Mise à jour impossible.
Spybot S&D : Mise à jour impossible

De plus, par moment, j'ai tous les sites webs qui me renvoyent l'erreur :
Connection refused ou Connection reset pour le port 80
(en effet, les sites en https, Teamspeak, MSN fonctionnent, mais pas Heroes Of Neweth ou Warcraft III)

Voici ipconfig /all
Windows IP Configuration

        Host Name . . . . . . . . . . . . : welovepenegal
        Primary Dns Suffix  . . . . . . . :
        Node Type . . . . . . . . . . . . : Unknown
        IP Routing Enabled. . . . . . . . : No
        WINS Proxy Enabled. . . . . . . . : No
        DNS Suffix Search List. . . . . . : WorkGroup

Ethernet adapter Local Area Connection 3:

        Connection-specific DNS Suffix  . : WorkGroup
        Description . . . . . . . . . . . : D-Link DFE-500TX PCI Fast Ethernet A
dapter (Rev B/C) #2
        Physical Address. . . . . . . . . : 00-80-C8-46-B0-A8
        Dhcp Enabled. . . . . . . . . . . : Yes
        Autoconfiguration Enabled . . . . : Yes
        IP Address. . . . . . . . . . . . : 192.168.1.140
        Subnet Mask . . . . . . . . . . . : 255.255.255.0
        Default Gateway . . . . . . . . . : 192.168.1.1
        DHCP Server . . . . . . . . . . . : 192.168.1.1
        DNS Servers . . . . . . . . . . . : 195.238.2.22
                                            195.238.2.21
                                            8.8.8.8
                                            8.8.4.4
        Lease Obtained. . . . . . . . . . : mardi 26 juillet 2011 14:13:25
        Lease Expires . . . . . . . . . . : mardi 19 janvier 2038 5:14:07


Netstat -a
Active Connections

  Proto  Local Address          Foreign Address        State
  TCP    welovepenegal:epmap    welovepenegal:0        LISTENING
  TCP    welovepenegal:microsoft-ds  welovepenegal:0        LISTENING
  TCP    welovepenegal:1992     welovepenegal:0        LISTENING
  TCP    welovepenegal:2869     welovepenegal:0        LISTENING
  TCP    welovepenegal:1025     welovepenegal:0        LISTENING
  TCP    welovepenegal:1996     welovepenegal:12080    FIN_WAIT_2
  TCP    welovepenegal:2559     welovepenegal:0        LISTENING
  TCP    welovepenegal:9421     welovepenegal:0        LISTENING
  TCP    welovepenegal:9422     welovepenegal:0        LISTENING
  TCP    welovepenegal:9423     welovepenegal:0        LISTENING
  TCP    welovepenegal:12025    welovepenegal:0        LISTENING
  TCP    welovepenegal:12080    welovepenegal:1996     CLOSE_WAIT
  TCP    welovepenegal:12110    welovepenegal:0        LISTENING
  TCP    welovepenegal:12119    welovepenegal:0        LISTENING
  TCP    welovepenegal:12143    welovepenegal:0        LISTENING
  TCP    welovepenegal:12465    welovepenegal:0        LISTENING
  TCP    welovepenegal:12563    welovepenegal:0        LISTENING
  TCP    welovepenegal:12993    welovepenegal:0        LISTENING
  TCP    welovepenegal:12995    welovepenegal:0        LISTENING
  TCP    welovepenegal:netbios-ssn  welovepenegal:0        LISTENING
  TCP    welovepenegal:1990     213-248-117-239.customer.teliacarrier.com:https
 ESTABLISHED
  TCP    welovepenegal:2171     192.168.1.52:netbios-ssn  ESTABLISHED
  TCP    welovepenegal:2173     bru01m01-in-f125.1e100.net:5222  ESTABLISHED
  TCP    welovepenegal:2399     www-10-02-ash3.facebook.com:http  ESTABLISHED
  TCP    welovepenegal:2413     channel-182-188.01.snc6.tfbnw.net:http  ESTABLI
HED
  TCP    welovepenegal:2554     alfred.commentcamarche.org:http  ESTABLISHED
  UDP    welovepenegal:microsoft-ds  *:*
  UDP    welovepenegal:isakmp   *:*
  UDP    welovepenegal:1991     *:*
  UDP    welovepenegal:1993     *:*
  UDP    welovepenegal:4500     *:*
  UDP    welovepenegal:ntp      *:*
  UDP    welovepenegal:1892     *:*
  UDP    welovepenegal:1893     *:*
  UDP    welovepenegal:1900     *:*
  UDP    welovepenegal:2205     *:*
  UDP    welovepenegal:48000    *:*
  UDP    welovepenegal:48001    *:*
  UDP    welovepenegal:ntp      *:*
  UDP    welovepenegal:netbios-ns  *:*
  UDP    welovepenegal:netbios-dgm  *:*
  UDP    welovepenegal:1900     *:*


HiJackThis
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 14:54:33, on 26/07/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\AVAST Software\Avast\AvastSvc.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\WINDOWS\system32\RunDLL32.exe
C:\Program Files\AVAST Software\Avast\avastUI.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\SuperCopier2\SuperCopier2.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\LOLReplay\LOLRecorder.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\msiexec.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\HiJackThis\Trend Micro\HiJackThis\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = https://www.bing.com/?toHttps=1&redig=5FC791212101479BAFBE1A679848B1AF
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = https://www.google.fr/?gws_rd=ssl
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = local;*.local
O2 - BHO: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Program Files\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: avast! WebRep - {8E5E2654-AD2D-48bf-AC2D-D17F00898D06} - C:\Program Files\AVAST Software\Avast\aswWebRepIE.dll
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RunDLL32.exe NvMCTray.dll,NvTaskbarInit -login
O4 - HKLM\..\Run: [nwiz] C:\Program Files\NVIDIA Corporation\nView\nwiz.exe /installquiet
O4 - HKLM\..\Run: [avast] "C:\Program Files\AVAST Software\Avast\avastUI.exe" /nogui
O4 - HKLM\..\Run: [Malwarebytes' Anti-Malware] "C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [SuperCopier2.exe] C:\Program Files\SuperCopier2\SuperCopier2.exe
O4 - HKCU\..\Run: [msnmsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [A24802D8E0033B87C7A71FBB6D39DEF74469BA10._service_run] "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=service
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOCAL SERVICE')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETWORK SERVICE')
O4 - HKUS\S-1-5-21-1993962763-1343024091-1644491937-1009\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'UpdatusUser')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: LOLRecorder.lnk = C:\Program Files\LOLReplay\LOLRecorder.exe
O8 - Extra context menu item: Scanner le lien avec Dr.Web - http://www.drweb.com/static/online/drweb-online-fr.html
O8 - Extra context menu item: Sothink SWF Catcher - C:\Program Files\Common Files\SourceTec\SWF Catcher\InternetExplorer.htm
O15 - ProtocolDefaults: '@ivt' protocol is in My Computer Zone, should be Intranet Zone
O15 - ProtocolDefaults: 'file' protocol is in My Computer Zone, should be Internet Zone
O15 - ProtocolDefaults: 'ftp' protocol is in My Computer Zone, should be Internet Zone
O15 - ProtocolDefaults: 'http' protocol is in My Computer Zone, should be Internet Zone
O15 - ProtocolDefaults: 'https' protocol is in My Computer Zone, should be Internet Zone
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O17 - HKLM\System\CCS\Services\Tcpip\..\{DCDA6D5E-6450-49BA-BEA3-B3607FBE0ABC}: NameServer = 195.238.2.22,195.238.2.21,8.8.8.8,8.8.4.4
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: avast! Antivirus - AVAST Software - C:\Program Files\AVAST Software\Avast\AvastSvc.exe
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
O23 - Service: NVIDIA Driver Helper Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: NVIDIA Update Service Daemon (nvUpdatusService) - NVIDIA Corporation - C:\Program Files\NVIDIA Corporation\NVIDIA Updatus\daemonu.exe

--
End of file - 6197 bytes



A voir également:

1 réponse

salut ,
tu doit etre bien infecté par un gros virus , specialiste de destruction des antivirus ( bagle ) , va te faire aidé sur " virus securite " plus haut .
0