-
Avast:
Propre -
Avira:
Propre -
Kaspersky:
Propre -
McAfee:
Propre -
NOD32:
Propre
Journaux détaillés
Approach_0-5-2_x86.exe|>$PLUGINSDIR\PageFinish.ini OK
Approach_0-5-2_x86.exe|>$PLUGINSDIR\PageRunning.ini OK
Approach_0-5-2_x86.exe|>$PLUGINSDIR\InstallOptions.dll OK
Approach_0-5-2_x86.exe|>$PLUGINSDIR\ApproachNsis.dll OK
Approach_0-5-2_x86.exe|>$PLUGINSDIR\modern-header.bmp OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.exe OK
Approach_0-5-2_x86.exe|>$INSTDIR\ApproachIpc.dll OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#IDXHDR OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#STRINGS OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#SYSTEM OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#TOCIDX OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#TOPICS OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#URLSTR OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#URLTBL OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>#WINDOWS OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>$OBJINST OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>$WWKeywordLinks\BTree OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>$WWKeywordLinks\Data OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>$WWKeywordLinks\Map OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>$WWKeywordLinks\Property OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>Approach.hhc OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>Approach.hhk OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\approach_items.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\approach_items_options.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\clipboardassistant_plugin.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\faq.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\files_installed.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\folder_menus.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\functions.js OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\installation.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\instanttxt_plugin.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\instantwave_plugin.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\issues.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\keyboard_navigation.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\manual_removal.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\overview.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\quick_start.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\running_installer.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\running_uninstaller.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\scope_plugin.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\styles.css OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\system_requirements.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\tab_about.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\tab_contents.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\tab_features.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\tab_maintenance.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\tab_menusscrolling.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\tab_registration.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\technical_support.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\titlebar_menus.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\tray_menu.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\uninstall.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\user_interface.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\using_approach.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>content\version_history.html OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\approach_items_settings.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\approach_items_simple.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\approach_items_target.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_A.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_contextual.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_down_arrow.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_end.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_enter.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_esc.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_home.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_left_arrow.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_page_down.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_page_up.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_right_arrow.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_up_arrow.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\button_Z.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\contextual_menu.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\folder_menus.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\header_logo.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\icon_app_large.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\icon_app_small.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\icon_installer.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\icon_uninstaller.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\install_components.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\install_finish.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\install_license.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\install_location.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\install_running.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\link_external.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\note.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\plugin_clipboardassistant.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\plugin_instanttxt.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\plugin_instantwave.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\plugin_scope.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\process_menu.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\quick_start_checkboxes.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\quick_start_foldermenus_0.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\quick_start_foldermenus_1.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\quick_start_foldermenus_2.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\run_menu.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\scrolling.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tab_about.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tab_contents.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tab_features.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tab_maintenance.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tab_menusscrolling.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tab_registration_reg.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tab_registration_unreg.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\titlebar_menus.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\tray_menu.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\uninstall_finish.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\uninstall_items.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\uninstall_location.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\uninstall_running.png OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm|>images\warning.gif OK
Approach_0-5-2_x86.exe|>$INSTDIR\Approach.chm OK
Approach_0-5-2_x86.exe|>$INSTDIR\License.txt OK
Approach_0-5-2_x86.exe|>$INSTDIR\Plugins\Scope.dll OK
Approach_0-5-2_x86.exe|>$INSTDIR\Plugins\readme_scope.txt OK
Approach_0-5-2_x86.exe|>$INSTDIR\Plugins\InstantWave.dll OK
Approach_0-5-2_x86.exe|>$INSTDIR\Plugins\InstantTxt.dll OK
Approach_0-5-2_x86.exe|>$INSTDIR\Plugins\ClipboardAssistant.dll OK
Approach_0-5-2_x86.exe OK
#
# Number of scanned files: 119
# Number of scanned folders: 0
# Number of infected files: 0
# Total size of scanned files: 2715431
# Virus database: 240219-2, 2/19/24
# Total scan time: 0:0:1
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.3.56.16
VDF Version: 7.20.18.184
Scan start time: 2/19/2024 11:18:21 PM
Command line: g:\scancl.exe --nombr --showall --verboselog /a /z /s --log=output.tmp Approach_0-5-2_x86.exe
configuration file: g:\scancl.conf
Approach_0-5-2_x86.exe
Date: 19.02.2024 Time: 23:18:03 Size: 812525
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 122
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "Approach_0-5-2_x86.exe" Enable = Yes Recursive = No
; ------------------
2024-02-19 23:18:12 Scan_Objects$431432 starting 1%
2024-02-19 23:18:12 Scan_Objects$431432 running 1%
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe archive NSIS
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//data0001 ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//$PLUGINSDIR\PageFinish.ini ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//$PLUGINSDIR\PageRunning.ini ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//$PLUGINSDIR\InstallOptions.dll ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//$PLUGINSDIR\ApproachNsis.dll ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//$PLUGINSDIR\modern-header.bmp ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.exe ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//ApproachIpc.dll ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm archive CHM
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//Approach.hhc ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//Approach.hhk ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/approach_items.html ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/approach_items_options.html ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/clipboardassistant_plugin.html ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/faq.html ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/files_installed.html ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/folder_menus.html ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/functions.js ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm//content/installation.html ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Approach.chm ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//License.txt ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//Scope.dll ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//readme_scope.txt ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//InstantWave.dll ok
2024-02-19 23:18:13 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//InstantTxt.dll ok
2024-02-19 23:18:14 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//ClipboardAssistant.dll ok
2024-02-19 23:18:14 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//data0016 ok
2024-02-19 23:18:14 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//data0017 ok
2024-02-19 23:18:14 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//# ok
2024-02-19 23:18:14 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//# ok
2024-02-19 23:18:14 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe//# ok
2024-02-19 23:18:14 \\host\shared\files\kaspersky\Approach_0-5-2_x86.exe ok
2024-02-19 23:18:14 Scan_Objects$431432 completed
; --- Statistics ---
; Time Start: 2024-02-19 23:18:12
; Time Finish: 2024-02-19 23:18:14
; Processed objects: 31
; Total OK: 31
; Total detected: 0
; Suspicions: 0
; Total skipped: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; ------------------
Copyright (C) 2018 McAfee, Inc.
AV Engine version: 6000.8403 for Win32.
Dat set version: 10989 created Feb 19 2024
Scanning for 596816 viruses, trojans and variants.
2024-Feb-19 23:18:07
Options:
Approach_0-5-2_x86.exe /secure /loud /noboot /nomem /norecall /norename /rptall /rptcor /rpterr /report=output.tmp
Approach_0-5-2_x86.exe\1.nsis ... is OK.
Approach_0-5-2_x86.exe\2.nsis ... is OK.
Approach_0-5-2_x86.exe\3.nsis ... is OK.
Approach_0-5-2_x86.exe\4.nsis ... is OK.
Approach_0-5-2_x86.exe\5.nsis ... is OK.
Approach_0-5-2_x86.exe\6.nsis ... is OK.
Approach_0-5-2_x86.exe\7.nsis ... is OK.
Approach_0-5-2_x86.exe\8.nsis ... is OK.
Approach_0-5-2_x86.exe\9.nsis ... is OK.
Approach_0-5-2_x86.exe\10.nsis ... is OK.
Approach_0-5-2_x86.exe\11.nsis ... is OK.
Approach_0-5-2_x86.exe\12.nsis ... is OK.
Approach_0-5-2_x86.exe\13.nsis ... is OK.
Approach_0-5-2_x86.exe\14.nsis ... is OK.
Approach_0-5-2_x86.exe\15.nsis ... is OK.
Approach_0-5-2_x86.exe\16.nsis ... is OK.
Approach_0-5-2_x86.exe\17.nsis ... is OK.
Approach_0-5-2_x86.exe ... is OK.
Summary Report on Approach_0-5-2_x86.exe
File(s)
Total files:................... 1
Clean:......................... 1
Not Scanned:................... 0
Possibly Infected:............. 0
Time: 00:00.01
ECLS Command-line scanner, version 13.0.24.0, (C) 1992-2019 ESET, spol. s r.o.
Module loader, version 1018.1 (20190709), build 1054
Module perseus, version 1559.1 (20200123), build 2102
Module scanner, version 20755 (20200129), build 44273
Module archiver, version 1297 (20200116), build 1413
Module advheur, version 1197 (20200116), build 1183
Module cleaner, version 1207 (20200128), build 1317
Module augur, version 1048 (20200122), build 1049
Command line: /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=output.tmp Approach_0-5-2_x86.exe
Scan started at: Mon Feb 19 23:18:07 2024
name="Approach_0-5-2_x86.exe", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Entries.bin", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Strings.txt", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Script.nsi", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - ApproachNsis.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - PageRunning.ini", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - InstallOptions.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - PageFinish.ini", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - modern-header.bmp", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.exe", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - ApproachIpc.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#ITBITS", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - ::DataSpace/NameList", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - ::DataSpace/Storage/MSCompressed/Transform/List", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - ::DataSpace/Storage/MSCompressed/SpanInfo", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - ::DataSpace/Storage/MSCompressed/ControlData", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - ::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#SYSTEM", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - ::DataSpace/Storage/MSCompressed/Content", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /$FIftiMain", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/functions.js", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/styles.css", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/header_logo.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/warning.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/note.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/link_external.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/overview.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /Approach.hhc", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /Approach.hhk", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/quick_start.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/installation.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/system_requirements.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/running_installer.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/files_installed.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/user_interface.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/tab_features.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/tab_menusscrolling.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/tab_contents.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/tab_maintenance.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/tab_registration.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/tab_about.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/tray_menu.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/approach_items_options.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/using_approach.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/folder_menus.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/approach_items.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/titlebar_menus.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/keyboard_navigation.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/scope_plugin.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/instantwave_plugin.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/instanttxt_plugin.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/clipboardassistant_plugin.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/uninstall.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/running_uninstaller.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/manual_removal.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/technical_support.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/issues.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/faq.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /content/version_history.html", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/icon_app_large.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/icon_app_small.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/quick_start_checkboxes.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/quick_start_foldermenus_0.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/quick_start_foldermenus_1.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/quick_start_foldermenus_2.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/approach_items_simple.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/titlebar_menus.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/icon_installer.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/install_license.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/install_components.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/install_location.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/install_running.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/install_finish.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tab_features.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tab_menusscrolling.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tab_contents.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tab_maintenance.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tab_registration_reg.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tab_registration_unreg.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tab_about.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/tray_menu.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/approach_items_settings.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/scrolling.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/contextual_menu.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/folder_menus.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/approach_items_target.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/run_menu.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/process_menu.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_down_arrow.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_up_arrow.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_right_arrow.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_left_arrow.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_esc.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_enter.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_page_up.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_page_down.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_end.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_home.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_A.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_Z.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/button_contextual.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/plugin_scope.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/plugin_instantwave.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/plugin_instanttxt.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/plugin_clipboardassistant.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/icon_uninstaller.gif", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/uninstall_location.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/uninstall_items.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/uninstall_running.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /images/uninstall_finish.png", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#WINDOWS", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /$WWKeywordLinks/BTree", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /$WWKeywordLinks/Data", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /$WWKeywordLinks/Map", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /$WWKeywordLinks/Property", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /$WWAssociativeLinks/Property", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /$OBJINST", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#IDXHDR", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#TOCIDX", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#TOPICS", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#URLTBL", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#URLSTR", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Approach.chm - CHM - /#STRINGS", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - License.txt", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - Entries.bin", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - Strings.txt", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - Script.nsi", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - ApproachNsis.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - PageRunning.ini", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - InstallOptions.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - PageUnItems.ini", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Uninstall.exe - NSIS - modern-header.bmp", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - Scope.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - readme_scope.txt", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - InstantWave.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - InstantTxt.dll", result="is OK", action="", info=""
name="Approach_0-5-2_x86.exe - NSIS - ClipboardAssistant.dll", result="is OK", action="", info=""
Scan completed at: Mon Feb 19 23:18:08 2024
Scan time: 1 sec (0:00:01)
Total: files - 1, objects 139
Detected: files - 0, objects 0
Cleaned: files - 0, objects 0
Recommandations de sécurité Download3k
1. Installez un logiciel antivirus
Pour protéger votre ordinateur contre les programmes malveillants, nous vous conseillons d’installer un logiciel antivirus, surtout lorsque vous téléchargez et installez de nouveaux programmes du Web, et d’exécuter son programme de mise à jour de la base de données au moins une fois par jour. Ainsi, votre logiciel antivirus reste à jour des dernières menaces malveillantes et protège mieux vos données.
Si votre ordinateur n’est pas encore protégé par une solution antivirus puissante, vous pouvez examiner une de nos recommandations: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Choisissez un navigateur Web sécurisé
Un aspect important à garder à l'esprit est quel navigateur Web vous utilisez. La plupart des attaques de navigateur et des virus ciblent Internet Explorer. Il vaut donc mieux que vous envisagiez une alternative. Les navigateurs web les plus sûrs disponibles aujourd'hui sont considérés comme Mozilla Firefox et Google Chrome. En plus d'être gratuits, ils sont à la fois rapides, bloqués, avec navigation par onglets, avec des fonctions de confidentialité et de sécurité. Essayez-les: Télécharger Mozilla Firefox ou Télécharger Google Chrome.
3. En savoir plus sur la sécurisation de votre PC
Ces articles devraient vous aider davantage (Anglais):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenir le code HTML pour ce rapport
Lien de graphique
Lien texte
- Example:KO Approach Rapport antivirus fait par Download3k.fr.
- HTML:
- Code de forum: