[filename.info logo]
[cn calc.exe][de calc.exe][es calc.exe][fr calc.exe][gb calc.exe][it calc.exe][jp calc.exe][kr calc.exe][nl calc.exe][pt calc.exe][ru calc.exe][us calc.exe]
 

calc.exe (5.1.2600.0)

ソフトウェアに含まれている

名前:Windows XP Home Edition, Deutsch
免許証:商業
情報リンク:http://www.microsoft.com/windowsxp/

ファイル細部

ファイル道:C:\WINDOWS\system32\dllcache \ calc.exe
ファイル日付:2002-08-29 14:00:00
版:5.1.2600.0
ファイルサイズ:114.688 バイト

検査合計及びファイルは切り刻む

CRC32:B7B6CACE
MD5:5CCF 290F 9612 E53A 853A D6BD 59B0 2E55
SHA1:B766 4461 F78C DDC9 2C07 A2DA C54B 8953 E295 966B

版資源情報

会社名前:Microsoft Corporation
ファイル記述:Windows Rechner
ファイルオペレーティングシステム:Windows NT, Windows 2000, Windows XP, Windows 2003
ファイル・タイプ:Application
ファイル版:5.1.2600.0
内部名:CALC
法的版権: Microsoft Corporation. Alle Rechte vorbehalten.
元のファイル名:CALC.EXE
製品名:Betriebssystem Microsoft Windows
プロダクト版:5.1.2600.0

calc.exe は次のレポートで見つけられた:

W32.HLLC.Happylow

W32.HLLC.Happylow について
...For example, the virus encrypts the file Calc.exe and renames it to Calc.wal....
...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus executes its routine....
...Finally, it decrypts the Calc.wal file and executes it to make it appear that Calc.exe has run normally. Also Known As: HLLC.HappyFlowers,...
技術的詳細
...For example, the virus encrypts Calc.exe and renames it to Calc.wal....
...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus execute its routine....
...Finally, it decrypts the Calc.wal file and executes it to make it appear as if Calc.exe has run normally. The virus has a harmless payload....
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllc.happylow.html

W32.HLLW.Astef

技術的詳細
...following files, if they exist: %Windir%Calc.exe to %System%Calc.com %Windir%Notepad.exe to %System%Notepad.exe...
...Copies itself as the following: %Windir%Calc.exe %Windir%Notepad.exe...
...HKEY_CURRENT_USERSoftwareKazaaLocalContent Modifies the value data of...
...HKEY_CURRENT_USERSoftwareGroksterLocalContent In the registry key:...
取り外しの指示
...following files, if they exist: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe...
...to the locations indicated: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.astef.html

W32.Arnger

技術的詳細
...Syscalc.com Calc.exe Syspad.com...
取り外しの指示
...If the worm was able to delete Systmger.exe, Syscalc.com, Calc.exe, Syspad.com, Notepad.exe, or Sysctrl.com, you may need to restore these files....
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.arnger.html

W32.Brof

技術的詳細
...prepended to the filename. For example calc.exe changes to _calc.exe. This is an encrypted copy...
...When an infected file is executed, the encrypted copy (_calc.exe) is decrypted and run. Overwrites the first 8kb of...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.brof.html

W32.HLLP.Kroter

技術的詳細
...with the .com extensions. For example, if Calc.exe was an infected file, the virus would extract the clean Calc.exe file to Calc.com,...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllp.kroter.html

BAT.Install.Trojan

技術的詳細
...C:WindowsChile.bat C:WindowsCalc.exe C:WindowsMcAfee.bat...
源: http://securityresponse.symantec.com/avcenter/venc/data/bat.install.trojan.html

W95.Miam.4716

技術的詳細
...The virus will also infect Calc.exe and Notepad.exe in the Windows folder....
源: http://securityresponse.symantec.com/avcenter/venc/data/w95.miam.4716.html

W32.Collo

技術的詳細
...Scandskw.exe Calc.exe Explorer.exe...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.collo.html

W32.Servese

取り外しの指示
...For example, if the virus overwrote Calc.exe, the copy that it saved would be Calc.dll....
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.servese.html

W32.Indor

技術的詳細
...For example, if it finds C:WindowsCalc.exe, the worm may copy itself as C:WindowsCalc.exe.pif....
......
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.indor.html



Valid HTML 4.01!