lol after installing the new version my Antivir popped up saying it has found a virus :shock:
visitors can't see pics , please register or login
TR/Patched.Gen is a generic one though and Avira is overly sensitive.
Case in point Battlefield 3: https://forum.avira.com/wbb/index.php?page=Thread&threadID=138159 (https://forum.avira.com/wbb/index.php?page=Thread&threadID=138159) -- same positive TR/Patched.Gen
Get Malwarebytes Anti-Malware (http://www.malwarebytes.org/) to be safe, the free version is enough to scan and protect -- which haven't detected anything and it is by far the superior product to Avira Antivir.
EDIT:
Full scan log from Malwarebytes:
Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org
Database version: v2012.04.21.04
Protection: Enabled
21-04-2012 17:31:53
mbam-log-2012-04-21 (17-31-53).txt
Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 360254
Time elapsed: 15 minute(s), 24 second(s)
Memory Processes Detected: 0
(No malicious items detected)
Memory Modules Detected: 0
(No malicious items detected)
Registry Keys Detected: 0
(No malicious items detected)
Registry Values Detected: 0
(No malicious items detected)
Registry Data Items Detected: 0
(No malicious items detected)
Folders Detected: 0
(No malicious items detected)
Files Detected: 0
(No malicious items detected)
(end)
Nothing to worry about :wink:
> Info
Time: 03/11/111 00:49:23
Type: EXCEPTION_ACCESS_VIOLATION (0xC0000005, 0x00000000, 0xE4BF5D2D)
> Stack trace
0x7341BB93 nvd3dum.dll+0x42BB93 (QueryOglResource+0x1263)
0x73DC7E0B d3d9.dll+0x117E0B (DebugSetLevel+0x6F55A)
0x73DC8032 d3d9.dll+0x118032 (DebugSetLevel+0x6F781)
0x73DC8073 d3d9.dll+0x118073 (DebugSetLevel+0x6F7C2)
0x76D3339A kernel32.dll+0x1339A (BaseThreadInitThunk+0x12)
0x77CC9ED2 ntdll.dll+0x39ED2 (RtlInitializeExceptionChain+0x63)
0x77CC9EA5 ntdll.dll+0x39EA5 (RtlInitializeExceptionChain+0x36)
0x77CC9EA5 ntdll.dll+0x39EA5 (RtlInitializeExceptionChain+0x36)
>
WSE LOG!
Time: 21/04/2012 23:35:48
Type: EXCEPTION_ACCESS_VIOLATION (0xC0000005, 0x00000000, 0xBDF8CCC2)
> Stack trace
0x0042A7C6 mb_warband.exe+0x2A7C6 (??+0x0)
0x0041CD1E mb_warband.exe+0x1CD1E (??+0x0)
0x004709B4 mb_warband.exe+0x709B4 (??+0x0)
0x0046FF58 mb_warband.exe+0x6FF58 (??+0x0)
0x0041A6EB mb_warband.exe+0x1A6EB (??+0x0)
0x0041A6EB mb_warband.exe+0x1A6EB (??+0x0)
>