-
Avira:
Propre -
Bitdefender:
Propre -
Kaspersky:
Propre -
NOD32:
Propre
Journaux détaillés
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.12.10
VDF Version: 7.11.63.130
Scan start time: 3/2/2013 5:48:19 AM
Command line: r:\scancl.exe --nombr --showall --verboselog /a /z /s --log=c:\scanner\output.tmp c:\scanner\downloads\144780\demo_bubblebomb.exe
configuration file: r:\scancl.conf
c:\scanner\downloads\144780\demo_bubblebomb.exe
Date: 02.03.2013 Time: 05:47:40 Size: 1294045
WARNING: [The files in archive are multiple volume] c:\scanner\downloads\144780\demo_bubblebomb.exe --> demo_bubblebomb-1.bin
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 4
Infected.............. : 0
Warnings.............. : 1
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Sat Mar 02 05:47:43 2013
// Command line: /arc /list /nohed /log=c:\scanner\output.tmp demo_bubblebomb.exe
// Core: AVCORE v2.1 Windows/i386 11.0.1.6 (Oct 10, 2012)
// Engines: scan: 14, unpack: 10, archive: 50, mail: 8
// Total signatures: 9217604
//
demo_bubblebomb.exe ok
demo_bubblebomb.exe=>(7z o) ok
demo_bubblebomb.exe=>(7z o)=>setup.0 ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 0) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 1) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 2) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 3) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 4) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 5) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 6) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 7) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 8) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 9) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 10) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 11) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 12) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 13) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 14) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 15) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 16) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 17) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 18) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 19) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 20) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 21) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 22) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 23) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 24) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 25) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 26) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 27) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 28) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 29) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 30) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 31) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 32) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 33) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 34) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 35) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 36) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 37) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 38) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 39) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 40) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 41) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb.exe ok
demo_bubblebomb.exe=>(7z o)=>setup.msg ok
Results:
Folders :0
Files :48
Packed :0
Archives :3
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
Mb/s :3
Files/second :24
Scan time :00:00:02
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Time limit: 180 sec.
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "demo_bubblebomb.exe" Enable=Yes Recursive=No
; ------------------
2013-03-02 05:48:20 Scan_Objects$607717 running 50%
2013-03-02 05:48:20 demo_bubblebomb.exe archive 7-Zip
2013-03-02 05:48:20 demo_bubblebomb.exe//setup.0 ok
2013-03-02 05:48:21 demo_bubblebomb.exe//demo_bubblebomb-1.bin ok
2013-03-02 05:48:21 demo_bubblebomb.exe//demo_bubblebomb.exe//data0046.res ok
2013-03-02 05:48:21 demo_bubblebomb.exe//demo_bubblebomb.exe ok
2013-03-02 05:48:21 demo_bubblebomb.exe//setup.msg ok
2013-03-02 05:48:21 demo_bubblebomb.exe ok
2013-03-02 05:48:21 Scan_Objects$607717 completed
; --- Statistics ---
; Time Start: 2013-03-02 05:48:20
; Time Finish: 2013-03-02 05:48:21
; Completion: 100%
; Processed objects: 6
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 1
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 4.2.71.2, (C) 1992-2010 ESET, spol. s r.o.
Module loader, version 1041 (20120430), build 1049
Module perseus, version 1382 (20130213), build 1507
Module scanner, version 8075 (20130304), build 13294
Module archiver, version 1161 (20130213), build 1128
Module advheur, version 1139 (20130208), build 1104
Command line: --base-dir=c:\Program Files\ESET\ESET NOD32 Antivirus /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=c:\scanner\output.tmp demo_bubblebomb.exe
Scan started at: 03/02/13 05:47:51
name="demo_bubblebomb.exe", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - config.txt", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - setup.0", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - demo_bubblebomb-1.bin", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - demo_bubblebomb.exe", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - setup.msg", threat="is OK", action="", info=""
Scan completed at: 03/02/13 05:47:52
Scan time: 1 sec (0:00:01)
Total: files - 1, objects 5
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Recommandations de sécurité Download3k
1. Installez un logiciel antivirus
Pour protéger votre ordinateur contre les programmes malveillants, nous vous conseillons d’installer un logiciel antivirus, surtout lorsque vous téléchargez et installez de nouveaux programmes du Web, et d’exécuter son programme de mise à jour de la base de données au moins une fois par jour. Ainsi, votre logiciel antivirus reste à jour des dernières menaces malveillantes et protège mieux vos données.
Si votre ordinateur n’est pas encore protégé par une solution antivirus puissante, vous pouvez examiner une de nos recommandations: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Choisissez un navigateur Web sécurisé
Un aspect important à garder à l'esprit est quel navigateur Web vous utilisez. La plupart des attaques de navigateur et des virus ciblent Internet Explorer. Il vaut donc mieux que vous envisagiez une alternative. Les navigateurs web les plus sûrs disponibles aujourd'hui sont considérés comme Mozilla Firefox et Google Chrome. En plus d'être gratuits, ils sont à la fois rapides, bloqués, avec navigation par onglets, avec des fonctions de confidentialité et de sécurité. Essayez-les: Télécharger Mozilla Firefox ou Télécharger Google Chrome.
3. En savoir plus sur la sécurisation de votre PC
Ces articles devraient vous aider davantage (Anglais):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenir le code HTML pour ce rapport
Lien de graphique
Lien texte
- Example:Bubble Bomb Rapport antivirus fait par Download3k.fr.
- HTML:
- Code de forum: