|
calc.exe (5.1.2600.0)
Contenu dans le logiciel |
Nom: | Windows XP Home Edition, Deutsch |
Permis: | commercial |
Lien de l'information: | http://www.microsoft.com/windowsxp/ |
Détails de dossier |
Chemin de dossier: | C:\WINDOWS\system32\dllcache \ calc.exe |
Date de dossier: | 2002-08-29 14:00:00 |
Version: | 5.1.2600.0 |
Volume de fichier: | 114.688 bytes |
La somme et le dossier hache |
CRC32: | B7B6CACE |
MD5: | 5CCF 290F 9612 E53A 853A D6BD 59B0 2E55 |
SHA1: | B766 4461 F78C DDC9 2C07 A2DA C54B 8953 E295 966B |
L'information de ressource de version |
Nom de compagnie: | Microsoft Corporation |
Description de dossier: | Windows Rechner |
Logiciel d'exploitation de dossier: | Windows NT, Windows 2000, Windows XP, Windows 2003 |
Type de dossier: | Application |
Version de dossier: | 5.1.2600.0 |
Nom interne: | CALC |
Copyright lĂ©gal: | © Microsoft Corporation. Alle Rechte vorbehalten. |
Nom de fichier original: | CALC.EXE |
Nom de produit: | Betriebssystem Microsoft® Windows® |
Version de produit: | 5.1.2600.0 |
calc.exe a été trouvé dans les rapports suivants:
|
W32.HLLC.Happylow |
Au sujet du W32.HLLC.Happylow ...For example, the virus encrypts the file Calc.exe and renames it to Calc.wal.... ...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus executes its routine.... ...Finally, it decrypts the Calc.wal file and executes it to make it appear that Calc.exe has run normally. Also Known As: HLLC.HappyFlowers,... Détails techniques ...For example, the virus encrypts Calc.exe and renames it to Calc.wal.... ...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus execute its routine.... ...Finally, it decrypts the Calc.wal file and executes it to make it appear as if Calc.exe has run normally. The virus has a harmless payload.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllc.happylow.html |
W32.HLLW.Astef |
Détails techniques ...following files, if they exist: %Windir%Calc.exe to %System%Calc.com %Windir%Notepad.exe to %System%Notepad.exe... ...Copies itself as the following: %Windir%Calc.exe %Windir%Notepad.exe... ...HKEY_CURRENT_USERSoftwareKazaaLocalContent Modifies the value data of... ...HKEY_CURRENT_USERSoftwareGroksterLocalContent In the registry key:... Instructions de déplacement ...following files, if they exist: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe... ...to the locations indicated: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.astef.html |
W32.Arnger |
Détails techniques ...Syscalc.com Calc.exe Syspad.com... Instructions de déplacement ...If the worm was able to delete Systmger.exe, Syscalc.com, Calc.exe, Syspad.com, Notepad.exe, or Sysctrl.com, you may need to restore these files.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.arnger.html |
W32.Brof |
Détails techniques ...prepended to the filename. For example calc.exe changes to _calc.exe. This is an encrypted copy... ...When an infected file is executed, the encrypted copy (_calc.exe) is decrypted and run. Overwrites the first 8kb of... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.brof.html |
W32.HLLP.Kroter |
Détails techniques ...with the .com extensions. For example, if Calc.exe was an infected file, the virus would extract the clean Calc.exe file to Calc.com,... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllp.kroter.html |
BAT.Install.Trojan |
Détails techniques ...C:WindowsChile.bat C:WindowsCalc.exe C:WindowsMcAfee.bat... Source: http://securityresponse.symantec.com/avcenter/venc/data/bat.install.trojan.html |
W95.Miam.4716 |
Détails techniques ...The virus will also infect Calc.exe and Notepad.exe in the Windows folder.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w95.miam.4716.html |
W32.Collo |
Détails techniques ...Scandskw.exe Calc.exe Explorer.exe... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.collo.html |
W32.Servese |
Instructions de déplacement ...For example, if the virus overwrote Calc.exe, the copy that it saved would be Calc.dll.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.servese.html |
W32.Indor |
Détails techniques ...For example, if it finds C:WindowsCalc.exe, the worm may copy itself as C:WindowsCalc.exe.pif.... ...... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.indor.html |
|
|