|
cmd.exe (5.1.2600.0)
Contenuto nel software |
Nome: | Windows XP Home Edition, Deutsch |
Autorizzazione: | commerciale |
Collegamento delle informazioni: | http://www.microsoft.com/windowsxp/ |
Particolari della lima |
Percorso della lima: | C:\WINDOWS\system32\dllcache \ cmd.exe |
Data della lima: | 2002-08-29 14:00:00 |
Versione: | 5.1.2600.0 |
Formato di lima: | 388.608 byte |
Il totale di controllo e la lima hashes |
CRC32: | 49DB1266 |
MD5: | 1CDE DA08 15E6 59B9 6A3C EE52 A32A 1BD7 |
SHA1: | 03D6 2DF9 CA73 2897 B480 0CD3 0956 8B99 5BAB DC98 |
Le informazioni delle risorse di versione |
Nome di azienda: | Microsoft Corporation |
Descrizione della lima: | Windows-Befehlsprozessor |
Sistema operativo della lima: | Windows NT, Windows 2000, Windows XP, Windows 2003 |
Tipo della lima: | Application |
Versione della lima: | 5.1.2600.0 |
Nome interno: | cmd |
Copyright legale: | © Microsoft Corporation. Alle Rechte vorbehalten. |
Nome di schedario originale: | Cmd.Exe |
Nome del prodotto: | Betriebssystem Microsoft® Windows® |
Versione del prodotto: | 5.1.2600.0 |
cmd.exe è stato trovato nei seguenti rapporti:
|
Backdoor.RemoteNC |
Particolari tecnici ...system to delete, rename, copy, execute and any other commands that can be used by Cmd.exe. NOTE:... ...This is because Windows 95/98/Me systems do not use the Cmd.exe file, but instead use the Command.com file.... ...The Trojan is coded to use only Cmd.exe and its commands, which will function only on Windows NT/2000/XP systems.... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.remotenc.html |
Backdoor.Ndad |
Particolari tecnici ...attributes, read, write, and edit files, as well as run DOS commands directly through Cmd.exe. A remote user can also upload... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.ndad.html |
Backdoor.RemoteNC.B |
Particolari tecnici ...execute files and execute other commands that can be used by the command shell (Cmd.exe or Command.com). ... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.remotenc.b.html |
VBS.Suconelo |
Particolari tecnici ...%System%Regedt32.exe %Windir%Cmd.exe %System%Cmd.exe... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/vbs.suconelo.html |
Backdoor.Cmdkill |
Privacy Policy Circa Backdoor.Cmdkill Discovered on:... ...June 17, 2003 05:15:29 PM Backdoor.Cmdkill is a Trojan Horse script that can be added to HTML files.... Particolari tecnici ... Backdoor.Cmdkill is a simple script that can be inserted into HTML files.... ...The script will give an individual with unauthorized access full access to Cmd.exe, thereby allowing him/her to perform virtually anything on the system.... Istruzioni di rimozione ...Run a full system scan and delete all the files detected as Backdoor.Cmdkill. For specific details on each... ...If any files are detected as infected with Backdoor.Cmdkill, click Delete. Write-up by:... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.cmdkill.html |
VBS.Gaggle.C |
Particolari tecnici ...current day is the 10th of any month, or later, the worm deletes the file, C:WindowsCmd.exe. If the current day is the... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/vbs.gaggle.c.html |
Backdoor.Femo |
Particolari tecnici ...Access the Windows command shell (CMD.exe or command.com) Run executable files... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/backdoor.femo.html |
W32.Randex.E |
Valutazione di minaccia ...Compromises security settings: Opens a hidden remote cmd.exe shell. Distribution... Particolari tecnici ...that particular IP address. Creates a hidden Cmd.exe remote shell that will listen on TCP port 4444, allowing an attacker to issue remote... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/w32.randex.e.html |
W32.Miroot.Worm |
Particolari tecnici ...Copies itself as: C:Cmd.exe %System%Rundll32.exe... ..."(Default)"="C:cmd.exe %1 %*" in the registry key:... Fonte: http://securityresponse.symantec.com/avcenter/venc/data/w32.miroot.worm.html |
Symantec ManHunt 3.0 Security Update 7 |
Dumaru Worm Propagation MS Welchia Backdoor cmd.exe shell HTTP IIS Webdav Exploit (updated)... ...... Fonte: http://securityresponse.symantec.com/avcenter/security/Content/2003.08.19b.html |
|
|