-
Avira:
Propre -
Bitdefender:
Propre -
Kaspersky:
Propre -
NOD32:
Propre
Journaux détaillés
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.10.64
VDF Version: 7.11.30.54
Scan start time: 5/14/2012 4:34:54 PM
Command line: r:\scancl.exe --nombr --showall --verboselog /a /z /s --log=c:\scanner\output.tmp c:\scanner\downloads\194085\dwg2pngauto.exe
configuration file: r:\scancl.conf
c:\scanner\downloads\194085\dwg2pngauto.exe
Date: 14.05.2012 Time: 16:34:18 Size: 5836560
Statistics :
Directories............... : 0
Files..................... : 1
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:02
// BDC scan report
//
// Time: Mon May 14 16:34:21 2012
// Command line: /arc /list /nohed /log=c:\scanner\output.tmp dwg2pngauto.exe
// Core: AVCORE v2.1 Windows/i386 11.0.1.6 (Nov 17, 2011)
// Engines: scan: 15, unpack: 10, archive: 49, mail: 7
// Total signatures: 7059193
//
dwg2pngauto.exe ok
dwg2pngauto.exe=>(IExpress 0) ok
dwg2pngauto.exe=>(IExpress 0)=>Setup.exe ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 0) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 1) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 2) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 2)=>(Embedded EXE o) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 3) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 4) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 5) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 6) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 7) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.cab=>(IShield Module 8) ok
dwg2pngauto.exe=>(IExpress 0)=>data1.hdr ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 0) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 1) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 2) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 3) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 4) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 5) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 6) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 7) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 8) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 9) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 10) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 11) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 12) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 13) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 14) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 15) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 16) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 17) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 18) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 19) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 20) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 21) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 22) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 23) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 24) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 25) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 26) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 27) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 28) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 29) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 30) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 31) ok
dwg2pngauto.exe=>(IExpress 0)=>data2.cab=>(IShield Module 32) ok
dwg2pngauto.exe=>(IExpress 0)=>ikernel.ex_ ok
dwg2pngauto.exe=>(IExpress 0)=>ikernel.ex_=>(MS-Compress 5) ok
dwg2pngauto.exe=>(IExpress 0)=>layout.bin ok
dwg2pngauto.exe=>(IExpress 0)=>Setup.ini ok
dwg2pngauto.exe=>(IExpress 0)=>setup.inx ok
Results:
Folders :0
Files :54
Packed :2
Archives :4
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
Mb/s :2
Files/second :4
Scan time :00:00:12
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Time limit: 180 sec.
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "dwg2pngauto.exe" Enable=Yes Recursive=No
; ------------------
2012-05-14 16:34:59 Scan_Objects$356538 running 50%
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res archive CAB
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//Setup.exe ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//data1.cab archive ISC
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//data1.cab ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//data1.hdr archive ISC
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//data1.hdr ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//data2.cab archive ISC
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//data2.cab ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//ikernel.ex_ archive MSExpand
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//ikernel.ex_//ikernel.ex_ ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//ikernel.ex_ ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//layout.bin ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//Setup.ini ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res//setup.inx ok
2012-05-14 16:35:01 dwg2pngauto.exe//data0016.res ok
2012-05-14 16:35:01 dwg2pngauto.exe ok
2012-05-14 16:35:02 Scan_Objects$356538 completed
; --- Statistics ---
; Time Start: 2012-05-14 16:34:59
; Time Finish: 2012-05-14 16:35:02
; Completion: 100%
; Processed objects: 11
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 5
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 4.2.71.2, (C) 1992-2010 ESET, spol. s r.o.
Module loader, version 1040 (20120313), build 1048
Module perseus, version 1355 (20120430), build 1474
Module scanner, version 7143 (20120516), build 11370
Module archiver, version 1145 (20120416), build 1108
Module advheur, version 1121 (20111208), build 1081
Command line: --base-dir=c:\Program Files\ESET\ESET NOD32 Antivirus /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=c:\scanner\output.tmp dwg2pngauto.exe
Scan started at: 05/14/12 16:34:40
name="dwg2pngauto.exe", threat="is OK", action="", info=""
Scan completed at: 05/14/12 16:34:40
Scan time: 0 sec (0:00:00)
Total: files - 1, objects 1
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Recommandations de sécurité Download3k
1. Installez un logiciel antivirus
Pour protéger votre ordinateur contre les programmes malveillants, nous vous conseillons d’installer un logiciel antivirus, surtout lorsque vous téléchargez et installez de nouveaux programmes du Web, et d’exécuter son programme de mise à jour de la base de données au moins une fois par jour. Ainsi, votre logiciel antivirus reste à jour des dernières menaces malveillantes et protège mieux vos données.
Si votre ordinateur n’est pas encore protégé par une solution antivirus puissante, vous pouvez examiner une de nos recommandations: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Choisissez un navigateur Web sécurisé
Un aspect important à garder à l'esprit est quel navigateur Web vous utilisez. La plupart des attaques de navigateur et des virus ciblent Internet Explorer. Il vaut donc mieux que vous envisagiez une alternative. Les navigateurs web les plus sûrs disponibles aujourd'hui sont considérés comme Mozilla Firefox et Google Chrome. En plus d'être gratuits, ils sont à la fois rapides, bloqués, avec navigation par onglets, avec des fonctions de confidentialité et de sécurité. Essayez-les: Télécharger Mozilla Firefox ou Télécharger Google Chrome.
3. En savoir plus sur la sécurisation de votre PC
Ces articles devraient vous aider davantage (Anglais):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenir le code HTML pour ce rapport
Lien de graphique
Lien texte
- Example:DWG to PNG AutoDWG Rapport antivirus fait par Download3k.fr.
- HTML:
- Code de forum: