• Lances OTL.
• Coches en haut à droite Rapport Minimal.
• Sous Personnalisation, copies & colles ceci:
- Code: Tout sélectionner
:OTL
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\{3C5F0F00-683D-4847-89C8-E7AF64FD1CFB}: C:\Program Files (x86)\RelevantKnowledge => Infection Diverse (Adware.RelevantKnowledge)
O2 - BHO: (Babylon toolbar helper) - {2EECD738-5844-4a99-B4B6-146BF802613B} - C:\Program Files (x86)\BabylonToolbar\BabylonToolbar\1.5.3.17\bh\BabylonToolbar.dll (Babylon BHO) => Infection BT (Toolbar.Babylon)
O3 - HKLM\..\Toolbar: (Babylon Toolbar) - {98889811-442D-49dd-99D7-DC866BE87DBC} - C:\Program Files (x86)\BabylonToolbar\BabylonToolbar\1.5.3.17\BabylonToolbarTlbr.dll (Babylon Ltd.) => Infection BT (Toolbar.Babylon)
[2012/01/02 12:11:34 | 000,151,552 | ---- | C] () -- C:\Windows\KMSEmulator.exe => Infection Diverse (Trojan.Keygen)
IE - HKLM\..\SearchScopes,DefaultScope = {6A1806CD-94D4-4689-BA73-E35EA1EA9990} => Google/Seekeen.com or Web Search
IE - HKLM\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7 => Google/Seekeen.com or Web Search
IE - HKLM\..\SearchScopes,DefaultScope = {6A1806CD-94D4-4689-BA73-E35EA1EA9990} => Google/Seekeen.com or Web Search
IE - HKLM\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7 => Google/Seekeen.com or Web Search
IE - HKCU\..\SearchScopes,DefaultScope = {6A1806CD-94D4-4689-BA73-E35EA1EA9990} => Google/Seekeen.com or Web Search
IE - HKCU\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7&rlz=1I7AURU_frFR499 => Google/Seekeen.com or Web Search
O2 - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files\Common Files\mcafee\systemcore\ScriptSn.20120626215315.dll (McAfee, Inc.) => McAfee ScriptScan or Trojan.FakeAlert
O2 - BHO: (scriptproxy) - {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - C:\Program Files (x86)\Common Files\mcafee\SystemCore\ScriptSn.20120626215315.dll (McAfee, Inc.) => McAfee ScriptScan or Trojan.FakeAlert
O13 - gopher Prefix: missing => Malware sous Windows NT5
O13 - gopher Prefix: missing => Malware sous Windows NT5
O33 - MountPoints2\{a437b8ea-9471-11e1-b4d8-848f69bfc0fa}\Shell\AutoRun\command - "" = F:\INSTALL.EXE
IE - HKLM\..\URLSearchHook: {ba14329e-9550-4989-b3f2-9732e92d17cc} - C:\Program Files (x86)\Vuze_Remote\prxtbVuze.dll (Conduit Ltd.) => Conduit Ltd. - Conduit Toolbar
IE - HKCU\..\URLSearchHook: {00000000-6E41-4FD3-8538-502F5495E5FC} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll (Ask) => Ask.com Toolbar
IE - HKCU\..\URLSearchHook: {ba14329e-9550-4989-b3f2-9732e92d17cc} - C:\Program Files (x86)\Vuze_Remote\prxtbVuze.dll (Conduit Ltd.) => Conduit Ltd. - Conduit Toolbar
IE - HKCU\..\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}: "URL" = http://search.babylon.com/?q={searchTerms}&AF=10820&tt=290312_bexdll&babsrc=SP_ss&mntrId=5e7d164700000000000074e50b75c77d => Toolbar.Babylon
O2 - BHO: (Vuze Remote Toolbar) - {ba14329e-9550-4989-b3f2-9732e92d17cc} - C:\Program Files (x86)\Vuze_Remote\prxtbVuze.dll (Conduit Ltd.) => Conduit Ltd. - Conduit Toolbar
O2 - BHO: (Ask Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll (Ask) => Ask.com Toolbar
O3 - HKLM\..\Toolbar: (Vuze Remote Toolbar) - {ba14329e-9550-4989-b3f2-9732e92d17cc} - C:\Program Files (x86)\Vuze_Remote\prxtbVuze.dll (Conduit Ltd.) => Conduit Ltd. - Conduit Toolbar
O3 - HKLM\..\Toolbar: (Ask Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll (Ask) => Ask.com Toolbar
O3 - HKCU\..\Toolbar\WebBrowser: (Vuze Remote Toolbar) - {BA14329E-9550-4989-B3F2-9732E92D17CC} - C:\Program Files (x86)\Vuze_Remote\prxtbVuze.dll (Conduit Ltd.) => Conduit Ltd. - Conduit Toolbar
O3 - HKCU\..\Toolbar\WebBrowser: (Ask Toolbar) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files (x86)\Ask.com\GenericAskToolbar.dll (Ask) => Ask.com Toolbar
IE - HKLM\..\SearchScopes\{483CD29D-B304-46E6-9265-195EFA388C38}: "URL" = http://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox
IE - HKLM\..\SearchScopes\{483CD29D-B304-46E6-9265-195EFA388C38}: "URL" = http://www.bing.com/search?q={searchTerms}&form=DLCDF8&pc=MDDC&src=IE-SearchBox
IE - HKCU\..\SearchScopes\{A529F1BA-CED0-4CBE-A7F9-55E2269C16A8}: "URL" = http://websearch.ask.com/redirect?client=ie&tb=ORJ&o=100000027&src=kw&q={searchTerms}&locale=fr_FR&apn_ptnrs=U3&apn_dtid=OSJ000YYFR&apn_uid=78F6D29B-D1CE-483F-882D-D47B6D061C3B&apn_
IE - HKCU\..\SearchScopes\{CF713382-2214-4CF1-9D59-29C9F744C56B}: "URL" = http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2504091
:Commands
[emptytemp]
• Cliques sur Correction.
• Patientes le temps de l'analyse.
• OTL va te demander de redemarrer ton ordinateur, Cliques sur Ok.
• Au redémarrage, OTL va ouvrir le rapport dans le bloc-notes (OTL.log).
• Enregistres le rapport sur ton Bureau.
• Héberges le rapport OTL.log sur CJoint.com
• Postes le lien donnés.
/!\ Note : Pour éviter de figer l'analyse OTL, laisses le travailler sans toucher à ton PC ! /!\[/quote]