|
iexplore.exe (6.0.2800.1106)
Contained in software |
Name: | Windows XP Home Edition, Deutsch |
License: | commercial |
Information link: | http://www.microsoft.com/windowsxp/ |
File details |
Filepath: | C:\WINDOWS\system32\dllcache \ iexplore.exe |
Filedate: | 2002-08-29 14:00:00 |
Version: | 6.0.2800.1106 |
Filesize: | 91.136 bytes |
Checksum and file hashes |
CRC32: | ED5B2470 |
MD5: | 258A EF4C 5EAF 5E95 E1D4 CA5A 3D1B BDFA |
SHA1: | 72D8 4587 0006 2BFC 2C3C E1BD 0393 B08E 42B7 259F |
Version resource information |
CompanyName: | Microsoft Corporation |
FileDescription: | Internet Explorer |
FileOS: | Windows NT, Windows 2000, Windows XP, Windows 2003 |
FileType: | Application |
FileVersion: | 6.0.2800.1106 |
InternalName: | iexplore |
LegalCopyright: | © Microsoft Corporation. Alle Rechte vorbehalten. |
OriginalFilename: | IEXPLORE.EXE |
ProductName: | Betriebssystem Microsoft® Windows® |
ProductVersion: | 6.0.2800.1106 |
iexplore.exe was found in the following malware reports:
|
W32.HLLC.Abessive |
Technical details ...For example, if the virus's file name is iexplore.exe, then iexplore_.exe will be executed.... ...the following file names: iexplore.exe Mspaint.exe... ...finds any of these files, it adds an underscore (_) to the file name (for example, iexplore.exe becomes iexplore_.exe), and it then copies itself to the hard disk using the host's... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllc.abessive.html |
Backdoor.Pspider.310.b |
Technical details ...Copies itself to %System%Iexplore.exe. NOTE: %System% is a variable.... ..."mssysint"="iexplore.exe" to the registry key:... Removal instructions ..."mssysint"="iexplore.exe" Exit the Registry Editor.... Source: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.pspider.310.b.html |
Trojan.KillAV.B |
Technical details ...Copies itself as C:WinntJavaJavaiexplore.exe. NOTE:... ..."Java Runtimes"="C:WinntJavaJavaiexplore.exe" in the registry key:... ...If the file, C:WinntJavaJavaiexplore.exe, was not created, this key will have no effect.... ..."ApplicationList1"="C:WinntJavaJavaiexplore.exe" in the registry key:... ...HKey_Local_MachineSoftwareSymantecIAMFirewallObjects Applicationsiexplore.exe ... Removal instructions ..."Java Runtimes"="C:WinntJavaJavaiexplore.exe" Exit the Registry Editor.... Source: http://securityresponse.symantec.com/avcenter/venc/data/trojan.killav.b.html |
Trojan.Boxer |
Technical details ...Copies itself as %System%Iexplore.exe. Note: %System% is a variable.... ..."Iexplore"="iexplore.exe" to the registry key:... Removal instructions ...Scroll through the list and look for Iexplore.exe. If you find the file, click... ..."Iexplore"="iexplore.exe" Exit the Registry Editor.... Source: http://securityresponse.symantec.com/avcenter/venc/data/trojan.boxer.html |
W32.Memas@mm |
Threat assessment ...folders whose name contains windows, system, system32, C: The files whose name is IEXPLORE.EXE, ccAPP.exe, or ccRegVfy.exe.... ...folders whose name contains windows, system, system32, C: The files whose name is IEXPLORE.EXE, ccAPP.exe, or ccRegVfy.exe.... Technical details ...C: The files Iexplore.exe, ccAPP.exe, or ccRegVfy.exe... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.memas@mm.html |
W32.Randex.AD |
Technical details ...Copies itself as the file, %System%iexplore.exe. Note: %System% is a variable.... ..."System Configuration"="%System%iexplore.exe" to the registry keys:... Removal instructions ...Scroll through the list and look for iexplore.exe. If you find the file, click... ..."System Configuration"="iexplore.exe" Navigate to the key:... ..."System Configuration"="iexplore.exe" Exit the Registry Editor.... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.a.d.html |
W32.Lovgate.AO@mm |
Technical details ...%Windir%Video.EXE %System%IEXPLORE.EXE %System%Kernel66.dll (A hidden... ...%System%hxdef.exe %System%iexplorer.exe %System%
eal.exe... ..."Microsoft Inc." = "iexplorer.exe..." "Program In Windows"... ...This thread will attempt to launch %System%Iexplore.exe if it detects that the worm's process has stopped.... Removal instructions ..."Microsoft Inc." = "iexplorer.exe..." "Program In Windows"... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.lovgate.ao@mm.html |
Backdoor.Beasty.H |
About Backdoor.Beasty.H ...that has the .blf extension in the system folder, or an Internet Explorer process (IExplore.exe) that runs even when you are not browsing the Web.... Technical details ...or more of the following: IExplore.exe Explorer.exe... Source: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.beasty.h.html |
W32.Lovgate.Y@mm |
Technical details ...%Windir%Systra.exe %System%iexplore.exe %System%RAVMOND.exe... ..."Program in Windows"="%system%iexplore.exe" "Protected Storage"="RUNDLL32.exe... ..."Program in Windows"="%system%IEXPLORE.exe" "Microsoft NetMeeting... ...This thread will attempt to launch %System32%Iexplore.exe if it detects that the worm process is stopped.... Removal instructions ..."Program in Windows"="%system%IEXPLORE.exe" "Microsoft NetMeeting... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.lovgate.y@mm.html |
W32.Lovgate.AN@mm |
Technical details ...%System%hxdef.exe %System%IEXPLORE.EXE %System%iexplorer.exe... ..."Program In Windows" = "%System%IEXPLORE.EXE" "Protected Storage"... ...This thread will attempt to launch %System%Iexplore.exe if it detects that the worm process has stopped.... Removal instructions ..."Program In Windows" = "%System%IEXPLORE.EXE" "Protected Storage"... ...... Source: http://securityresponse.symantec.com/avcenter/venc/data/w32.lovgate.an@mm.html |
|
|