-
Avira:
Limpio -
Bitdefender:
Limpio -
Kaspersky:
Limpio -
NOD32:
Limpio
Los registros detallados
Copyright (c) 2010 by Avira GmbH
All rights reserved.
engine set: 8.2.12.10
VDF Version: 7.11.63.130
Scan start time: 3/2/2013 5:48:19 AM
Command line: r:\scancl.exe --nombr --showall --verboselog /a /z /s --log=c:\scanner\output.tmp c:\scanner\downloads\144780\demo_bubblebomb.exe
configuration file: r:\scancl.conf
c:\scanner\downloads\144780\demo_bubblebomb.exe
Date: 02.03.2013 Time: 05:47:40 Size: 1294045
WARNING: [The files in archive are multiple volume] c:\scanner\downloads\144780\demo_bubblebomb.exe --> demo_bubblebomb-1.bin
Statistics :
Directories............... : 0
Archives.................. : 1
Files..................... : 4
Infected.............. : 0
Warnings.............. : 1
Suspicious............ : 0
Infections................ : 0
Time...................... : 00:00:01
// BDC scan report
//
// Time: Sat Mar 02 05:47:43 2013
// Command line: /arc /list /nohed /log=c:\scanner\output.tmp demo_bubblebomb.exe
// Core: AVCORE v2.1 Windows/i386 11.0.1.6 (Oct 10, 2012)
// Engines: scan: 14, unpack: 10, archive: 50, mail: 8
// Total signatures: 9217604
//
demo_bubblebomb.exe ok
demo_bubblebomb.exe=>(7z o) ok
demo_bubblebomb.exe=>(7z o)=>setup.0 ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 0) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 1) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 2) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 3) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 4) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 5) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 6) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 7) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 8) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 9) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 10) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 11) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 12) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 13) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 14) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 15) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 16) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 17) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 18) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 19) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 20) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 21) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 22) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 23) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 24) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 25) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 26) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 27) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 28) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 29) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 30) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 31) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 32) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 33) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 34) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 35) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 36) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 37) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 38) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 39) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 40) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb-1.bin=>(Inno Module 41) ok
demo_bubblebomb.exe=>(7z o)=>demo_bubblebomb.exe ok
demo_bubblebomb.exe=>(7z o)=>setup.msg ok
Results:
Folders :0
Files :48
Packed :0
Archives :3
Infected files :0
Suspect files :0
Warnings :0
I/O errors :0
Mb/s :3
Files/second :24
Scan time :00:00:02
; --- Settings ---
; Action on detect: Disinfect automatically
; Scan objects: All objects
; Use iChecker: No
; Use iSwift: No
; Try disinfect: No
; Try delete: No
; Try delete container: No
; Time limit: 180 sec.
; Exclude by mask: No
; Include by mask: No
; Objects to scan:
; "demo_bubblebomb.exe" Enable=Yes Recursive=No
; ------------------
2013-03-02 05:48:20 Scan_Objects$607717 running 50%
2013-03-02 05:48:20 demo_bubblebomb.exe archive 7-Zip
2013-03-02 05:48:20 demo_bubblebomb.exe//setup.0 ok
2013-03-02 05:48:21 demo_bubblebomb.exe//demo_bubblebomb-1.bin ok
2013-03-02 05:48:21 demo_bubblebomb.exe//demo_bubblebomb.exe//data0046.res ok
2013-03-02 05:48:21 demo_bubblebomb.exe//demo_bubblebomb.exe ok
2013-03-02 05:48:21 demo_bubblebomb.exe//setup.msg ok
2013-03-02 05:48:21 demo_bubblebomb.exe ok
2013-03-02 05:48:21 Scan_Objects$607717 completed
; --- Statistics ---
; Time Start: 2013-03-02 05:48:20
; Time Finish: 2013-03-02 05:48:21
; Completion: 100%
; Processed objects: 6
; Total detected: 0
; Detected exact: 0
; Suspicions: 0
; Treats detected: 0
; Untreated: 0
; Disinfected: 0
; Quarantined: 0
; Deleted: 0
; Skipped: 0
; Archived: 1
; Packed: 0
; Password protected: 0
; Corrupted: 0
; Errors: 0
; Last object:
; ------------------
ECLS Command-line scanner, version 4.2.71.2, (C) 1992-2010 ESET, spol. s r.o.
Module loader, version 1041 (20120430), build 1049
Module perseus, version 1382 (20130213), build 1507
Module scanner, version 8075 (20130304), build 13294
Module archiver, version 1161 (20130213), build 1128
Module advheur, version 1139 (20130208), build 1104
Command line: --base-dir=c:\Program Files\ESET\ESET NOD32 Antivirus /log-rewrite /log-all /files /no-boots /no-heur /no-adv-heur /mail /sfx /rtp /adware /unsafe /unwanted /pattern /action=none /no-quarantine /log-file=c:\scanner\output.tmp demo_bubblebomb.exe
Scan started at: 03/02/13 05:47:51
name="demo_bubblebomb.exe", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - config.txt", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - setup.0", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - demo_bubblebomb-1.bin", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - demo_bubblebomb.exe", threat="is OK", action="", info=""
name="demo_bubblebomb.exe - 7ZSD - setup.msg", threat="is OK", action="", info=""
Scan completed at: 03/02/13 05:47:52
Scan time: 1 sec (0:00:01)
Total: files - 1, objects 5
Infected: files - 0, objects 0
Cleaned: files - 0, objects 0
Download3k's recomendaciones de seguridad
1. Instale un antivirus
Con el fin de mantener tu ordenador libre de malware, le recomendamos que siempre tenga instalado un programa antivirus, sobre todo para descarga e instalación de nuevos programas de la web. Por lo menos una vez al día, siga su programa de actualización de bases de datos. Esto permitirá que su antivirus sea al día con las últimas amenazas de software maligno y proteja mejor sus datos informáticos.
Si aun no tiene una potente solución antivirus para proteger su ordenador, usted puede tomar en cuenta una de nuestras recomendaciones: Avast Free, AVG Free, Avira Free, Bitdefender Free, NOD32.
2. Elija un navegador web seguro
Una cosa importante a tener en cuenta es el navegador web que utilice. La mayoría de los vulnerabilidades de seguridad y virus atacan Internet Explorer por lo que es mejor que usted considere otra alternativa. Los navegadores web más seguros disponibles Hoy en día se consideran Mozilla Firefox et Google Chrome. Además de ser gratis, ambos son rápidos, tienen bloqueo de ventanas emergentes, pestañas de navegación, con privacidad y características de seguridad. Probarlos: Descarga Mozilla Firefox ou Descarga Google Chrome.
3. Obtenga más información sobre cómo proteger su PC
Estos artículos deben ayudarle más (Inglés):
- - Our Chart of Top Dumb Ways to Mess Up Your PC
- - PC improvement tips for National Clean Out Your Computer Day (or any other day)
- - The Crucial Actions to take when using a new Windows PC for the first time
- - Introduction to Sandboxed Browsing
- - Will Clearing Your Browser's Cache Actually Improve Your Browsing Experience?
- - Browser Hijacking Signs and How To Clean-up
- - Comprehensive Guide to Secure Passwords
- - Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
Obtenga el código HTML para el presente informe
Enlace Gráfico
Texto del Enlace
- Ejemplo:Bubble Bomb Antivirus informe realizado por Download3k.es.
- HTML:
- Code de forum: