[filename.info logo]
[cn iexplore.exe][de iexplore.exe][es iexplore.exe][fr iexplore.exe][gb iexplore.exe][it iexplore.exe][jp iexplore.exe][kr iexplore.exe][nl iexplore.exe][pt iexplore.exe][ru iexplore.exe][us iexplore.exe]
 

iexplore.exe (6.0.2800.1106)

소프트웨어안에 포함하는

이름:Windows XP Home Edition, Deutsch
면허:상업
정보 연결:http://www.microsoft.com/windowsxp/

파일 세부사항

파일 경로:C:\WINDOWS\system32\dllcache \ iexplore.exe
파일 날짜:2002-08-29 14:00:00
버전:6.0.2800.1106
파일 사이즈:91.136 바이트

검사함과 파일은 잘게 썬다

CRC32:ED5B2470
MD5:258A EF4C 5EAF 5E95 E1D4 CA5A 3D1B BDFA
SHA1:72D8 4587 0006 2BFC 2C3C E1BD 0393 B08E 42B7 259F

버전 자원 정보

회사명:Microsoft Corporation
파일 설명:Internet Explorer
파일 운영 체계:Windows NT, Windows 2000, Windows XP, Windows 2003
파일 유형:Application
파일 버전:6.0.2800.1106
내부 이름:iexplore
법적인 저작권:© Microsoft Corporation. Alle Rechte vorbehalten.
원래 파일 이름:IEXPLORE.EXE
제품 이름:Betriebssystem Microsoft® Windows®
제품 버전:6.0.2800.1106

iexplore.exe은 뒤에 오는 보고안에 발견되었다:

W32.HLLC.Abessive

기술적 세부사항
...For example, if the virus's file name is iexplore.exe, then iexplore_.exe will be executed....
...the following file names: iexplore.exe Mspaint.exe...
...finds any of these files, it adds an underscore (_) to the file name (for example, iexplore.exe becomes iexplore_.exe), and it then copies itself to the hard disk using the host's...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllc.abessive.html

Backdoor.Pspider.310.b

기술적 세부사항
...Copies itself to %System%Iexplore.exe. NOTE: %System% is a variable....
..."mssysint"="iexplore.exe" to the registry key:...
제거 지시
..."mssysint"="iexplore.exe" Exit the Registry Editor....
근원: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.pspider.310.b.html

Trojan.KillAV.B

기술적 세부사항
...Copies itself as C:WinntJavaJavaiexplore.exe. NOTE:...
..."Java Runtimes"="C:WinntJavaJavaiexplore.exe" in the registry key:...
...If the file, C:WinntJavaJavaiexplore.exe, was not created, this key will have no effect....
..."ApplicationList1"="C:WinntJavaJavaiexplore.exe" in the registry key:...
...HKey_Local_MachineSoftwareSymantecIAMFirewallObjects Applicationsiexplore.exe ...
제거 지시
..."Java Runtimes"="C:WinntJavaJavaiexplore.exe" Exit the Registry Editor....
근원: http://securityresponse.symantec.com/avcenter/venc/data/trojan.killav.b.html

Trojan.Boxer

기술적 세부사항
...Copies itself as %System%Iexplore.exe. Note: %System% is a variable....
..."Iexplore"="iexplore.exe" to the registry key:...
제거 지시
...Scroll through the list and look for Iexplore.exe. If you find the file, click...
..."Iexplore"="iexplore.exe" Exit the Registry Editor....
근원: http://securityresponse.symantec.com/avcenter/venc/data/trojan.boxer.html

W32.Memas@mm

위협 평가
...folders whose name contains windows, system, system32, C: The files whose name is IEXPLORE.EXE, ccAPP.exe, or ccRegVfy.exe....
...folders whose name contains windows, system, system32, C: The files whose name is IEXPLORE.EXE, ccAPP.exe, or ccRegVfy.exe....
기술적 세부사항
...C: The files Iexplore.exe, ccAPP.exe, or ccRegVfy.exe...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.memas@mm.html

W32.Randex.AD

기술적 세부사항
...Copies itself as the file, %System%iexplore.exe. Note: %System% is a variable....
..."System Configuration"="%System%iexplore.exe" to the registry keys:...
제거 지시
...Scroll through the list and look for iexplore.exe. If you find the file, click...
..."System Configuration"="iexplore.exe" Navigate to the key:...
..."System Configuration"="iexplore.exe" Exit the Registry Editor....
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.a.d.html

W32.Lovgate.AO@mm

기술적 세부사항
...%Windir%Video.EXE %System%IEXPLORE.EXE %System%Kernel66.dll (A hidden...
...%System%hxdef.exe %System%iexplorer.exe %System% eal.exe...
..."Microsoft Inc." = "iexplorer.exe..." "Program In Windows"...
...This thread will attempt to launch %System%Iexplore.exe if it detects that the worm's process has stopped....
제거 지시
..."Microsoft Inc." = "iexplorer.exe..." "Program In Windows"...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.lovgate.ao@mm.html

Backdoor.Beasty.H

Backdoor.Beasty.H에 관하여
...that has the .blf extension in the system folder, or an Internet Explorer process (IExplore.exe) that runs even when you are not browsing the Web....
기술적 세부사항
...or more of the following: IExplore.exe Explorer.exe...
근원: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.beasty.h.html

W32.Lovgate.Y@mm

기술적 세부사항
...%Windir%Systra.exe %System%iexplore.exe %System%RAVMOND.exe...
..."Program in Windows"="%system%iexplore.exe" "Protected Storage"="RUNDLL32.exe...
..."Program in Windows"="%system%IEXPLORE.exe"   "Microsoft NetMeeting...
...This thread will attempt to launch %System32%Iexplore.exe if it detects that the worm process is stopped....
제거 지시
..."Program in Windows"="%system%IEXPLORE.exe"   "Microsoft NetMeeting...
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.lovgate.y@mm.html

W32.Lovgate.AN@mm

기술적 세부사항
...%System%hxdef.exe %System%IEXPLORE.EXE %System%iexplorer.exe...
..."Program In Windows" = "%System%IEXPLORE.EXE" "Protected Storage"...
...This thread will attempt to launch %System%Iexplore.exe if it detects that the worm process has stopped....
제거 지시
..."Program In Windows" = "%System%IEXPLORE.EXE" "Protected Storage"...
......
근원: http://securityresponse.symantec.com/avcenter/venc/data/w32.lovgate.an@mm.html



Valid HTML 4.01!