Juste pour prévenir que c'est désormais corrigé.
Désolé pour la gêne occasionnée,
Juste pour prévenir que c'est désormais corrigé.
Désolé pour la gêne occasionnée,
Bonjour,
Merci ! Ça sera corrigé dans la journée.
Cordialement,
bonjour,
juste pour vous signaler un faux positif dans la détection du registre
Clé trouvée: HKU\S-1-5-21-1809650161-3470081474-3047720606-1124\Software\Classes\DWGTrueViewToolCatalog Clé trouvée: HKCU\Software\Classes\DWGTrueViewToolCatalog
DWG True View est une visionneuse de plan DWG très utilisé dans le monde du dessin :
http://www.autodesk.fr/products/dwg/viewers
merci :)
Fortunately, I kept backups of CCleaner's registry deletions, some of which are clearly nothing to do with this adware:
MBAM later found StartGo123, which had been hijacking Chrome.
I imagine the malware writers reading our conversation and learning too, but HTH.
It's not really clear, but IOBit is usually considered as PUP, so you can remove them, especially if you do not have installed the software yourself.
Have now run CCleaner to clean Registry and remove many, but not all, references to BrowserAir.
Windows: Settings: System: Default apps: Choose default applications by file type: .htm no longer shows BrowserAir.
Ah, minor problems remain.
Opera now works again as my default browser. However, Opera could not see that it was the default browser until I used Windows: Control Panel: Default Programs to set it as the default.
Even then:
Ok thanks so much for the quick response
So they aren't malicious in any way?
Hello,
These keys are IOBit related.
Best regards,
***** [ Registry ] *****
Key Found: [x64] HKLM\SOFTWARE\Classes\CLSID\{10921475-03CE-4E04-90CE-E2E7EF20C814}
Key Found: [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{10921475-03CE-4E04-90CE-E2E7EF20C814}
Key Found: HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{10921475-03CE-4E04-90CE-E2E7EF20C814}