-
Avast:
Limpio -
Avira:
Limpio -
Bitdefender:
Limpio -
Kaspersky:
Limpio -
NOD32:
Limpio
Los registros detallados
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet10 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet6 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\dir OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet5 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet8 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet7 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet9 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_2 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet16 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet12 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet11 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet14 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet13 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet15 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet18 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet17 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_0 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Sheet26 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_1 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_8 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_4 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_3 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_6 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_5 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_7 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\Module121 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\__SRP_9 OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\ThisWorkbook OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\VBA\_VBA_PROJECT OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_VBA_PROJECT_CUR\PROJECTwm OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>Workbook OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_1_CompObj OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_5_SummaryInformation OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls|>_5_DocumentSummaryInformation OK
DC-5-25.zip|>DC-5-25 Ver 4.16.xls OK
DC-5-25.zip|>Note About Excel Macros.txt OK
DC-5-25.zip OK
#
# Number of scanned files: 44
# Number of scanned folders: 0
# Number of infected files: 0
# Total size of scanned files: 19543045
# Virus database: 130502-1, 05/02/13
# Total scan time: 0:0:4
Copyright (c) 1992 - 2012 AVG Technologies
Program version 2013.0.3349, engine 2013.0.3204
Virus Database: Version 3204/6494 2013-07-15
------------------------------------------------------------
Test started: 16.7.2013 13:51:18
Duration of test: 1 second(s)
------------------------------------------------------------
Objects scanned : 3
Found infections : 0
Found rootkit : 0
Found high severity : 0
Found med severity : 0
Found info severity : 0
Fixed rootkit : 0
Fixed high severity : 0
Fixed med severity : 0
Fixed info severity : 0
------------------------------------------------------------
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.12.78
VDF Version: 7.11.90.186
Scan start time: 7/16/2013 4:51:17 PM
Command line: g:\scancl.exe --nombr --showall --verboselog /a /z /s --log=d:\scanner\output.tmp d:\scanner\downloads\142954\DC-5-25.zip
configuration file: g:\scancl.conf
d:\scanner\downloads\142954\DC-5-25.zip
Date: 16.07.2013 Time: 16:51:01 Size: 1523842
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 3
Infected.............. : 0
Warnings.............. : 0
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Aug 26 06:32:23 o+00
// Command line: /arc /list /nohed /log=d:\scanner\output.tmp DC-5-25.zip
// Core: AVCORE v2.1 Windows/x86_64 11.0.1.6 (Mar 26, 2013)
// Engines: scan: 14, unpack: 10, archive: 50, mail: 8
// Total signatures: 9212798
//
DC-5-25.zip ok
DC-5-25.zip=>DC-5-25 Ver 4.16.xls ok
DC-5-25.zip=>Note About Excel Macros.txt ok
Results:
Folders :0
Files :3
Packed :0
Archives :1
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "DC-5-25.zip" Enable = Yes Recursive = No
; ------------------
2013-07-16 16:51:18 DC-5-25.zip archive ZIP
2013-07-16 16:51:18 Scan_Objects$35680 running 50%
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls archive Embedded
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module1 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module3 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module121 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls//Module2 ok
2013-07-16 16:51:18 DC-5-25.zip//DC-5-25 Ver 4.16.xls ok
2013-07-16 16:51:18 DC-5-25.zip//Note About Excel Macros.txt ok
2013-07-16 16:51:18 DC-5-25.zip ok
2013-07-16 16:51:18 Scan_Objects$35680 completed
; --- Statistics ---
; Time Start: 2013-07-16 16:51:18
; Time Finish: 2013-07-16 16:51:18
; Completion: 100%
; Processed objects: 7
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 2
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 6.0.316.0, (C) 1992-2013 ESET, spol. s r.o.
Module loader, version 1042 (20130123), build 1050
Module perseus, version 1401 (20130712), build 1532
Module scanner, version 8573 (20130716), build 14413
Module archiver, version 1172 (20130624), build 1140
Module advheur, version 1142 (20130712), build 1107
Module cleaner, version 1073 (20130617), build 1085
Command line: --base-dir=d:\av\eset /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=d:\scanner\output.tmp DC-5-25.zip
Scan started at: 07/16/13 16:51:06
name="DC-5-25.zip", threat="is OK", action="", info=""
name="DC-5-25.zip - ZIP - DC-5-25 Ver 4.16.xls", threat="is OK", action="", info=""
name="DC-5-25.zip - ZIP - Note About Excel Macros.txt", threat="is OK", action="", info=""
Scan completed at: 07/16/13 16:51:06
Scan time: 0 sec (0:00:00)
Total: files - 1, objects 2
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Download3k's recomendaciones de seguridad
1. Instale un antivirus
Con el fin de mantener tu ordenador libre de malware, le recomendamos que siempre tenga instalado un programa antivirus, sobre todo para descarga e instalación de nuevos programas de la web. Por lo menos una vez al día, siga su programa de actualización de bases de datos. Esto permitirá que su antivirus sea al día con las últimas amenazas de software maligno y proteja mejor sus datos informáticos.
Si aun no tiene una potente solución antivirus para proteger su ordenador, usted puede tomar en cuenta una de nuestras recomendaciones: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Elija un navegador web seguro
Una cosa importante a tener en cuenta es el navegador web que utilice. La mayoría de los vulnerabilidades de seguridad y virus atacan Internet Explorer por lo que es mejor que usted considere otra alternativa. Los navegadores web más seguros disponibles Hoy en día se consideran Mozilla Firefox et Google Chrome. Además de ser gratis, ambos son rápidos, tienen bloqueo de ventanas emergentes, pestañas de navegación, con privacidad y características de seguridad. Probarlos: Descarga Mozilla Firefox ou Descarga Google Chrome.
3. Obtenga más información sobre cómo proteger su PC
Estos artículos deben ayudarle más (Inglés):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenga el código HTML para el presente informe
Enlace Gráfico
Texto del Enlace
- Ejemplo:Doctors Calls for a Year with Excel Antivirus informe realizado por Download3k.es.
- HTML:
- Code de forum: