|
calc.exe (5.1.2600.0)
Contained in software |
Name: | Windows XP Home Edition, Deutsch |
License: | commercial |
Information link: | http://www.microsoft.com/windowsxp/ |
File details |
Filepath: | C:\WINDOWS\system32\dllcache \ calc.exe |
Filedate: | 2002-08-29 14:00:00 |
Version: | 5.1.2600.0 |
Filesize: | 114.688 bytes |
Checksum and file hashes |
CRC32: | B7B6CACE |
MD5: | 5CCF 290F 9612 E53A 853A D6BD 59B0 2E55 |
SHA1: | B766 4461 F78C DDC9 2C07 A2DA C54B 8953 E295 966B |
Version resource information |
CompanyName: | Microsoft Corporation |
FileDescription: | Windows Rechner |
FileOS: | Windows NT, Windows 2000, Windows XP, Windows 2003 |
FileType: | Application |
FileVersion: | 5.1.2600.0 |
InternalName: | CALC |
LegalCopyright: | © Microsoft Corporation. Alle Rechte vorbehalten. |
OriginalFilename: | CALC.EXE |
ProductName: | Betriebssystem Microsoft® Windows® |
ProductVersion: | 5.1.2600.0 |
calc.exe was found in the following malware reports:
|
W32.HLLC.Happylow |
About W32.HLLC.Happylow ...For example, the virus encrypts the file Calc.exe and renames it to Calc.wal.... ...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus executes its routine.... ...Finally, it decrypts the Calc.wal file and executes it to make it appear that Calc.exe has run normally. Also Known As: HLLC.HappyFlowers,... Technical details ...For example, the virus encrypts Calc.exe and renames it to Calc.wal.... ...Then the virus copies itself as Calc.exe, so that when the infected Calc.exe is executed, the virus execute its routine.... ...Finally, it decrypts the Calc.wal file and executes it to make it appear as if Calc.exe has run normally. The virus has a harmless payload.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllc.happylow.html |
W32.HLLW.Astef |
Technical details ...following files, if they exist: %Windir%Calc.exe to %System%Calc.com %Windir%Notepad.exe to %System%Notepad.exe... ...Copies itself as the following: %Windir%Calc.exe %Windir%Notepad.exe... ...HKEY_CURRENT_USERSoftwareKazaaLocalContent Modifies the value data of... ...HKEY_CURRENT_USERSoftwareGroksterLocalContent In the registry key:... Removal instructions ...following files, if they exist: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe... ...to the locations indicated: %System%Calc.com to %Windir%Calc.exe %System%Notepad.exe to %Windir%Notepad.exe... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.astef.html |
W32.Arnger |
Technical details ...Syscalc.com Calc.exe Syspad.com... Removal instructions ...If the worm was able to delete Systmger.exe, Syscalc.com, Calc.exe, Syspad.com, Notepad.exe, or Sysctrl.com, you may need to restore these files.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.arnger.html |
W32.Brof |
Technical details ...prepended to the filename. For example calc.exe changes to _calc.exe. This is an encrypted copy... ...When an infected file is executed, the encrypted copy (_calc.exe) is decrypted and run. Overwrites the first 8kb of... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.brof.html |
W32.HLLP.Kroter |
Technical details ...with the .com extensions. For example, if Calc.exe was an infected file, the virus would extract the clean Calc.exe file to Calc.com,... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllp.kroter.html |
BAT.Install.Trojan |
Technical details ...C:WindowsChile.bat C:WindowsCalc.exe C:WindowsMcAfee.bat... Source: http://securityresponse.symantec.com/avcenter/venc/data/bat.install.trojan.html |
W95.Miam.4716 |
Technical details ...The virus will also infect Calc.exe and Notepad.exe in the Windows folder.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w95.miam.4716.html |
W32.Collo |
Technical details ...Scandskw.exe Calc.exe Explorer.exe... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.collo.html |
W32.Servese |
Removal instructions ...For example, if the virus overwrote Calc.exe, the copy that it saved would be Calc.dll.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.servese.html |
W32.Indor |
Technical details ...For example, if it finds C:WindowsCalc.exe, the worm may copy itself as C:WindowsCalc.exe.pif.... ...... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.indor.html |
|
|