Bonjour,
Voilà les résultats des analyses :
Rapport OTL :
"All processes killed
========== OTL ==========
HKEY_USERS\S-1-5-21-513818485-1392997395-394909140-1000\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
Registry key HKEY_USERS\S-1-5-21-513818485-1392997395-394909140-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0ECDF796-C2DC-4d79-A620-CCE0C0A66CC9}\ not found.
Registry key HKEY_USERS\S-1-5-21-513818485-1392997395-394909140-1000\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E}\ not found.
C:\Program Files (x86)\Mozilla Firefox\searchplugins\babylon.xml moved successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3CA2F312-6F6E-4B53-A66E-4E65E497C8C0}\ not found.
64bit-Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{32099AAC-C132-4136-9E9A-4E364A424E17} deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{32099AAC-C132-4136-9E9A-4E364A424E17}\ not found.
Registry value HKEY_USERS\S-1-5-21-513818485-1392997395-394909140-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{2318C2B1-4965-11D4-9B18-009027A5CD4F} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2318C2B1-4965-11D4-9B18-009027A5CD4F}\ not found.
Registry value HKEY_USERS\S-1-5-21-513818485-1392997395-394909140-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{32099AAC-C132-4136-9E9A-4E364A424E17} deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{32099AAC-C132-4136-9E9A-4E364A424E17}\ not found.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully.
C:\Users\Maël\AppData\Local\Babylon\Setup\HtmlScreens folder moved successfully.
C:\Users\Maël\AppData\Local\Babylon\Setup folder moved successfully.
C:\Users\Maël\AppData\Local\Babylon folder moved successfully.
C:\Users\Maël\AppData\Roaming\Babylon folder moved successfully.
C:\ProgramData\Babylon folder moved successfully.
C:\Windows\SurCode.INI moved successfully.
ADS C:\ProgramData\Microsoft:07ZnyjissOs513LHHvhcx41jEuVy deleted successfully.
ADS C:\ProgramData\Temp:E6E3D650 deleted successfully.
ADS C:\ProgramData\Temp:8927A071 deleted successfully.
ADS C:\ProgramData\Temp:8A73166A deleted successfully.
ADS C:\ProgramData\Temp:CB0AACC9 deleted successfully.
ADS C:\ProgramData\Microsoft:ZnJASAC17ZNkdw6YU9ybV deleted successfully.
========== COMMANDS ==========
[EMPTYTEMP]
User: Administrateur
->Temp folder emptied: 894524 bytes
->Temporary Internet Files folder emptied: 35648 bytes
->Java cache emptied: 9236111 bytes
User: All Users
User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes
->Flash cache emptied: 56466 bytes
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
User: Invité
->Temp folder emptied: 1174258 bytes
->Temporary Internet Files folder emptied: 465849 bytes
->FireFox cache emptied: 53205172 bytes
->Flash cache emptied: 57605 bytes
User: Maël
->Temp folder emptied: 16124647 bytes
->Temporary Internet Files folder emptied: 7932538 bytes
->Java cache emptied: 23399059 bytes
->FireFox cache emptied: 972037557 bytes
->Flash cache emptied: 79864 bytes
User: Public
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 132 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 1821405830 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 61845 bytes
%systemroot%\sysnative\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 751 bytes
RecycleBin emptied: 0 bytes
Total Files Cleaned = 2.772,00 mb
Restore point Set: OTL Restore Point
OTL by OldTimer - Version 3.2.42.2 log created on 05062012_122309
Files\Folders moved on Reboot...
C:\Users\Maël\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
File move failed. C:\Windows\temp\_avast_\Webshlock.txt scheduled to be moved on reboot.
Registry entries deleted on Reboot..."
Rapport Malware Bytes :
"Malwarebytes Anti-Malware (Essai) 1.61.0.1400
http://www.malwarebytes.org
Version de la base de données: v2012.05.06.03
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Maël :: PC-MAEL [administrateur]
Protection: Désactivé
06/05/2012 12:36:25
mbam-log-2012-05-06 (12-36-25).txt
Type d'examen: Examen complet
Options d'examen activées: Mémoire | Démarrage | Registre | Système de fichiers | Heuristique/Extra | Heuristique/Shuriken | PUP | PUM
Options d'examen désactivées: P2P
Elément(s) analysé(s): 460273
Temps écoulé: 1 heure(s), 23 minute(s), 9 seconde(s)
Processus mémoire détecté(s): 0
(Aucun élément nuisible détecté)
Module(s) mémoire détecté(s): 0
(Aucun élément nuisible détecté)
Clé(s) du Registre détectée(s): 0
(Aucun élément nuisible détecté)
Valeur(s) du Registre détectée(s): 0
(Aucun élément nuisible détecté)
Elément(s) de données du Registre détecté(s): 0
(Aucun élément nuisible détecté)
Dossier(s) détecté(s): 0
(Aucun élément nuisible détecté)
Fichier(s) détecté(s): 5
C:\Windows\assembly\tmp\U\000000cf.@ (Trojan.Agent) -> Mis en quarantaine et supprimé avec succès.
C:\Windows\assembly\tmp\U\800000c0.@ (Trojan.Agent) -> Mis en quarantaine et supprimé avec succès.
C:\Windows\System32\KYXWKV\AKV.exe (Spyware.Ardamax.PGen1) -> Mis en quarantaine et supprimé avec succès.
C:\Windows\System32\KYXWKV\XNP.001 (Trojan.Ardamax) -> Mis en quarantaine et supprimé avec succès.
C:\Windows\System32\KYXWKV\XNP.002 (PUP.Keylogger.Ardamax) -> Mis en quarantaine et supprimé avec succès.
(fin)"
@+