[filename.info logo]
[cn calc.exe][de calc.exe][es calc.exe][fr calc.exe][gb calc.exe][it calc.exe][jp calc.exe][kr calc.exe][nl calc.exe][pt calc.exe][ru calc.exe][us calc.exe]
 

calc.exe (5.1.2600.0)

소프트웨어안에 포함하는

이름:Windows XP Home Edition, Deutsch
면허:상업
정보 연결:http://www.microsoft.com/windowsxp/

파일 세부사항

파일 경로:C:\WINDOWS\system32\dllcache \ calc.exe
파일 날짜:2002-08-29 14:00:00
버전:5.1.2600.0
파일 사이즈:114.688 바이트

검사함과 파일은 잘게 썬다

CRC32:B7B6CACE
MD5:5CCF 290F 9612 E53A 853A D6BD 59B0 2E55
SHA1:B766 4461 F78C DDC9 2C07 A2DA C54B 8953 E295 966B

버전 자원 정보

회사명:Microsoft Corporation
파일 설명:Windows Rechner
파일 운영 체계:Windows NT, Windows 2000, Windows XP, Windows 2003
파일 유형:Application
파일 버전:5.1.2600.0
내부 이름:CALC
법적인 저작권: Microsoft Corporation. Alle Rechte vorbehalten.
원래 파일 이름:CALC.EXE
제품 이름:Betriebssystem Microsoft Windows
제품 버전:5.1.2600.0

calc.exe은 뒤에 오는 보고안에 발견되었다:

W32.HLLC.Happylow

W32.HLLC.Happylow에 관하여
...For example, the virus encrypts the file Calc.exe and renames it to Calc.wal....
...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus executes its routine....
...Finally, it decrypts the Calc.wal file and executes it to make it appear that Calc.exe has run normally. Also Known As: HLLC.HappyFlowers,...
기술적 세부사항
...For example, the virus encrypts Calc.exe and renames it to Calc.wal....
...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus execute its routine....
...Finally, it decrypts the Calc.wal file and executes it to make it appear as if Calc.exe has run normally. The virus has a harmless payload....
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllc.happylow.html

W32.HLLW.Astef

기술적 세부사항
...following files, if they exist: %Windir%Calc.exe to %System%Calc.com %Windir%Notepad.exe to %System%Notepad.exe...
...Copies itself as the following: %Windir%Calc.exe %Windir%Notepad.exe...
...HKEY_CURRENT_USERSoftwareKazaaLocalContent Modifies the value data of...
...HKEY_CURRENT_USERSoftwareGroksterLocalContent In the registry key:...
제거 지시
...following files, if they exist: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe...
...to the locations indicated: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.astef.html

W32.Arnger

기술적 세부사항
...Syscalc.com Calc.exe Syspad.com...
제거 지시
...If the worm was able to delete Systmger.exe, Syscalc.com, Calc.exe, Syspad.com, Notepad.exe, or Sysctrl.com, you may need to restore these files....
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.arnger.html

W32.Brof

기술적 세부사항
...prepended to the filename. For example calc.exe changes to _calc.exe. This is an encrypted copy...
...When an infected file is executed, the encrypted copy (_calc.exe) is decrypted and run. Overwrites the first 8kb of...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.brof.html

W32.HLLP.Kroter

기술적 세부사항
...with the .com extensions. For example, if Calc.exe was an infected file, the virus would extract the clean Calc.exe file to Calc.com,...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllp.kroter.html

BAT.Install.Trojan

기술적 세부사항
...C:WindowsChile.bat C:WindowsCalc.exe C:WindowsMcAfee.bat...
근원: http://securityresponse.symantec.com/avcenter/venc/data/bat.install.trojan.html

W95.Miam.4716

기술적 세부사항
...The virus will also infect Calc.exe and Notepad.exe in the Windows folder....
근원: http://securityresponse.symantec.com/avcenter/venc/data/w95.miam.4716.html

W32.Collo

기술적 세부사항
...Scandskw.exe Calc.exe Explorer.exe...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.collo.html

W32.Servese

제거 지시
...For example, if the virus overwrote Calc.exe, the copy that it saved would be Calc.dll....
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.servese.html

W32.Indor

기술적 세부사항
...For example, if it finds C:WindowsCalc.exe, the worm may copy itself as C:WindowsCalc.exe.pif....
......
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.indor.html



Valid HTML 4.01!