Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Trend Micro Maximum Security 2024
Message
<blockquote data-quote="Trident" data-source="post: 1092325" data-attributes="member: 99014"><p>The version doesn’t matter too much, as Trend Micro is using a large bunch of components that get updated whenever there is an update. The update mentioned there on the changelog, only affects the agent (general bugs and improvements).</p><p>In addition, Trend Micro is heavily cloud-based so a lot of improvements happen on the cloud.</p><p></p><p>Upon installation, Trend Micro automatically checks for updates straight away.</p><p></p><p>Most likely, the video was recorded long before it was published and 17.7 was still the latest version available.</p><p></p><p>The table below explores the different components and what they do. They update independently from the program version.</p><p>[SPOILER="Components"]</p><table style='width: 100%'><tr><th>Component</th><th>Distributed To</th><th>Description</th></tr><tr><td>Virus Scan Engine 32/64-bit</td><td>OfficeScan agents</td><td>At the heart of all Trend Micro products lies the scan engine, which was originally developed in response to early file-based viruses. The scan engine today is exceptionally sophisticated and capable of detecting different types of viruses and malware. The scan engine also detects controlled viruses that are developed and used for research.<br /> Rather than scanning every byte of every file, the engine and pattern file work together to identify the following:<br /> <ul> <li data-xf-list-type="ul">Tell-tale characteristics of the virus code</li> <li data-xf-list-type="ul">The precise location within a file where the virus resides</li> </ul> </td></tr><tr><td>Smart Scan Pattern</td><td>Not distributed to OfficeScan agents. This pattern stays in theOfficeScan serverand is used when responding to scan queries received from OfficeScan agents.</td><td>When in smart scan mode, OfficeScan agents use two lightweight patterns that work together to provide the same protection provided by conventional anti-malware and anti-spyware patterns.<br /> The Smart Scan Pattern contains majority of the pattern definitions. The Smart Scan Agent Pattern contains all the other pattern definitions not found on the Smart Scan Pattern.<br /> The OfficeScan agent scans for security threats using the Smart Scan Agent Pattern. OfficeScan agents that cannot determine the risk of the file during the scan verify the risk by sending a scan query to the Scan Server, a service hosted on the OfficeScan server. The Scan Server verifies the risk using the Smart Scan Pattern. The OfficeScan agent "caches" the scan query result provided by the Scan Server to improve the scan performance.</td></tr><tr><td>Smart Scan Agent Pattern</td><td>OfficeScan agentsusing smart scan</td><td></td></tr><tr><td>Virus Pattern</td><td>OfficeScan agentsusing conventional scan</td><td>The Virus Pattern contains information that helps OfficeScan agents identify the latest virus/malware and mixed threat attacks. Trend Micro creates and releases new versions of the Virus Pattern several times a week, and any time after the discovery of a particularly damaging virus/malware.</td></tr><tr><td>IntelliTrap Exception Pattern</td><td>OfficeScan agents</td><td>The IntelliTrap Exception Pattern contains a list of "approved" compression files.</td></tr><tr><td>IntelliTrap Pattern</td><td>OfficeScan agents</td><td>The IntelliTrap Pattern detects real-time compression files packed as executable files.<br /> For details, see <a href="https://docs.trendmicro.com/all/ent/officescan/v12.0/en-us/osce_12.0_agent_olh/IntelliTrap.html#GUID-FCE2D882-C1EC-4048-822A-A6214C8834F2" target="_blank">IntelliTrap</a>.</td></tr><tr><td>Memory Inspection Pattern</td><td>OfficeScan agents</td><td>This technology provides enhanced virus scanning for polymorphic and mutation viruses, and augments virus-pattern-based scans by emulating file execution. The results are then analyzed in a controlled environment for evidence of malicious intent with little impact on system performance.</td></tr><tr><td>Early Launch Anti-Malware Pattern 32/64-bit</td><td>OfficeScan agents</td><td>OfficeScan supports the Early Launch Anti-Malware (ELAM) feature as part of the Secure Boot standard to provide boot time protection on endpoints. This feature enables OfficeScan agents to detect malware during the operating system boot process.</td></tr><tr><td>Contextual Intelligence Engine 32/64-bit</td><td>OfficeScan agents</td><td>The Contextual Intelligence Engine monitors processes executed by low prevalence files and extracts behavioral features that the Contextual Intelligence Query Handler sends to the Predictive Machine Learning engine for analysis.</td></tr><tr><td>Contextual Intelligence Pattern</td><td>OfficeScan agents</td><td>The Contextual Intelligence Pattern contains a list of "approved" behaviors that are not relevant to any known threats.</td></tr><tr><td>Contextual Intelligence Query Handler 32/64-bit</td><td>OfficeScan agents</td><td>The Contextual Intelligence Query Handler processes the behaviors identified by the Contextual Intelligence Engine and sends the report to the Predictive Machine Learning engine.</td></tr><tr><td>Advanced Threat Scan Engine 32/64-bit</td><td>OfficeScan agents</td><td>The Advanced Threat Scan Engine extracts file features from low prevalence files and sends the the information to the Predictive Machine Learning engine.</td></tr><tr><td>Advanced Threat Correlation Pattern</td><td>OfficeScan agents</td><td>The Advanced Threat Correlation Pattern contains a list of file features that are not relevant to any known threats.</td></tr></table><h4>Anti-spyware</h4> <table style='width: 100%'><tr><th>Component</th><th>Distributed To</th><th>Description</th></tr><tr><td>Spyware/Grayware Scan Engine 32/64-bit</td><td>OfficeScan agents</td><td>The Spyware/Grayware Scan Engine scans for and performs the appropriate scan action on spyware/grayware.</td></tr><tr><td>Spyware/Grayware Pattern</td><td>OfficeScan agents</td><td>The Spyware/Grayware Pattern identifies spyware/grayware in files and programs, modules in memory, Windows registry and URL shortcuts.</td></tr><tr><td>Spyware Active-monitoring Pattern</td><td>OfficeScan agentsusing conventional scan</td><td>The Spyware Active-monitoring Pattern is used for real-time spyware/grayware scanning. Only conventional scan agentsuse this pattern.</td></tr></table><h4>Damage Cleanup Services</h4> <table style='width: 100%'><tr><th>Component</th><th>Distributed To</th><th>Description</th></tr><tr><td>Damage Cleanup Engine 32/64-bit</td><td>OfficeScan agents</td><td>The Damage Cleanup Engine scans for and removes Trojans and Trojan processes.</td></tr><tr><td>Damage Cleanup Template</td><td>OfficeScan agents</td><td>The Damage Cleanup Template is used by the Damage Cleanup Engine to identify Trojan files and processes so the engine can eliminate them.</td></tr><tr><td>Early Boot Cleanup Driver 32/64-bit</td><td>OfficeScan agents</td><td>The Trend Micro Early Boot Cleanup Driver loads before the operating system drivers which enables the detection and blocking of boot-type rootkits. After the OfficeScan agent loads, Trend Micro Early Boot Cleanup Driver calls Damage Cleanup Services to clean the rootkit.</td></tr></table><h4>Web Reputation</h4> <table style='width: 100%'><tr><th>Component</th><th>Distributed To</th><th>Description</th></tr><tr><td>URL Filtering Engine</td><td>OfficeScan agents</td><td>The URL Filtering Engine facilitates communication between OfficeScan and the Trend Micro URL Filtering Service. The URL Filtering Service is a system that rates URLs and provides rating information to OfficeScan.</td></tr></table><h4>Firewall</h4> <table style='width: 100%'><tr><th>Component</th><th>Distributed To</th><th>Description</th></tr><tr><td>Common Firewall Driver 32/64-bit</td><td>OfficeScan agents</td><td>The Common Firewall Driver is used with the Common Firewall Pattern to scan agentendpoints for network viruses. This driver supports 32-bit and 64-bit platforms.</td></tr><tr><td>Common Firewall Pattern</td><td>OfficeScan agents</td><td>Like the Virus Pattern, the Common Firewall Pattern helps agents identify virus signatures, unique patterns of bits and bytes that signal the presence of a network virus.</td></tr></table><h4>Behavior Monitoring and Device Control</h4> <table style='width: 100%'><tr><th>Component</th><th>Distributed To</th><th>Description</th></tr><tr><td>Behavior Monitoring Detection Pattern 32/64-bit</td><td>OfficeScan agents</td><td>This pattern contains the rules for detecting suspicious threat behavior.</td></tr><tr><td>Behavior Monitoring Core Driver 32/64-bit</td><td>OfficeScan agents</td><td>This kernel mode driver monitors system events and passes them to the Behavior Monitoring Core Service for policy enforcement.</td></tr><tr><td>Behavior Monitoring Core Service 32/64-bit</td><td>OfficeScan agents</td><td>This user mode service has the following functions:<br /> <ul> <li data-xf-list-type="ul">Provides rootkit detection</li> <li data-xf-list-type="ul">Regulates access to external devices</li> <li data-xf-list-type="ul">Protects files, registry keys, and services</li> </ul> </td></tr><tr><td>Behavior Monitoring Configuration Pattern</td><td>OfficeScan agents</td><td>The Behavior Monitoring Driver uses this pattern to identify normal system events and exclude them from policy enforcement.</td></tr><tr><td>Policy Enforcement Pattern</td><td>OfficeScan agents</td><td>The Behavior Monitoring Core Service checks system events against the policies in this pattern.</td></tr><tr><td>Digital Signature Pattern</td><td>OfficeScan agents</td><td>This pattern contains a list of valid digital signatures that are used by the Behavior Monitoring Core Service to determine whether a program responsible for a system event is safe.</td></tr><tr><td>Memory Scan Trigger Pattern (32/64-bit)</td><td>OfficeScan agents</td><td>The Memory Scan Trigger service executes other scan engines when it detects the process in memory is unpacked.</td></tr><tr><td>Program Inspection Monitoring Pattern</td><td>OfficeScan agents</td><td>The Program Inspection Monitoring Pattern monitors and stores inspection points that are used for Behavior Monitoring.</td></tr><tr><td>Damage Recovery Pattern</td><td>OfficeScan agents</td><td>The Damage Recovery Pattern contains policies that are used for monitoring suspicious threat behavior.</td></tr></table><h4>Browser Exploits</h4> <table style='width: 100%'><tr><th>Component</th><th>Distributed To</th><th>Description</th></tr><tr><td>Browser Exploit Prevention Pattern</td><td>OfficeScan agents</td><td>This pattern identifies the latest web browser exploits and prevents the exploits from being used to compromise the web browser.</td></tr><tr><td>Script Analyzer Unified Pattern</td><td>OfficeScan agents</td><td>This pattern analyzes script in web</td></tr></table><p></p><p></p><p>[/SPOILER]</p><p></p><p>Edit: not all components are listed there, some components such as wrappers around the engine that should prevent Trend Micro from being exploited by malware writers are not mentioned.</p><p></p><p>The release notes for the scan engine are <a href="https://success.trendmicro.com/dcx/s/solution/000148744?language=ja" target="_blank">here</a> (only in Japanese):</p><p></p><p>VSAPI 22.610 / ATSE 22.610~23.570 Release date 2023.08.23</p><p>[SPOILER="Engine "]</p><p>■New features of VSAPI 22.610 / ATSE 22.610~23.570</p><p></p><ul> <li data-xf-list-type="ul">Added search function using machine learning</li> <li data-xf-list-type="ul">(This is a local model type search function that is included inside the search engine.)</li> <li data-xf-list-type="ul">Added and improved detection functions for new threats</li> <li data-xf-list-type="ul">Supports identification of Lzip file types</li> <li data-xf-list-type="ul">Improved identification function for MP3 file types</li> <li data-xf-list-type="ul">Fixes for various bugs</li> </ul><p>[/spoiler]</p><p>The version number of the engine (second part of it) is calculated by multiplying the release month by 10 and adding 500. Example, december = 12*10 + 500 = 620.</p></blockquote><p></p>
[QUOTE="Trident, post: 1092325, member: 99014"] The version doesn’t matter too much, as Trend Micro is using a large bunch of components that get updated whenever there is an update. The update mentioned there on the changelog, only affects the agent (general bugs and improvements). In addition, Trend Micro is heavily cloud-based so a lot of improvements happen on the cloud. Upon installation, Trend Micro automatically checks for updates straight away. Most likely, the video was recorded long before it was published and 17.7 was still the latest version available. The table below explores the different components and what they do. They update independently from the program version. [SPOILER="Components"] [TABLE] [TR] [TH]Component[/TH] [TH]Distributed To[/TH] [TH]Description[/TH] [/TR] [TR] [TD]Virus Scan Engine 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]At the heart of all Trend Micro products lies the scan engine, which was originally developed in response to early file-based viruses. The scan engine today is exceptionally sophisticated and capable of detecting different types of viruses and malware. The scan engine also detects controlled viruses that are developed and used for research. Rather than scanning every byte of every file, the engine and pattern file work together to identify the following: [LIST] [*]Tell-tale characteristics of the virus code [*]The precise location within a file where the virus resides [/LIST][/TD] [/TR] [TR] [TD]Smart Scan Pattern[/TD] [TD]Not distributed to OfficeScan agents. This pattern stays in theOfficeScan serverand is used when responding to scan queries received from OfficeScan agents.[/TD] [TD]When in smart scan mode, OfficeScan agents use two lightweight patterns that work together to provide the same protection provided by conventional anti-malware and anti-spyware patterns. The Smart Scan Pattern contains majority of the pattern definitions. The Smart Scan Agent Pattern contains all the other pattern definitions not found on the Smart Scan Pattern. The OfficeScan agent scans for security threats using the Smart Scan Agent Pattern. OfficeScan agents that cannot determine the risk of the file during the scan verify the risk by sending a scan query to the Scan Server, a service hosted on the OfficeScan server. The Scan Server verifies the risk using the Smart Scan Pattern. The OfficeScan agent "caches" the scan query result provided by the Scan Server to improve the scan performance.[/TD] [/TR] [TR] [TD]Smart Scan Agent Pattern[/TD] [TD]OfficeScan agentsusing smart scan[/TD] [TD][/TD] [/TR] [TR] [TD]Virus Pattern[/TD] [TD]OfficeScan agentsusing conventional scan[/TD] [TD]The Virus Pattern contains information that helps OfficeScan agents identify the latest virus/malware and mixed threat attacks. Trend Micro creates and releases new versions of the Virus Pattern several times a week, and any time after the discovery of a particularly damaging virus/malware.[/TD] [/TR] [TR] [TD]IntelliTrap Exception Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The IntelliTrap Exception Pattern contains a list of "approved" compression files.[/TD] [/TR] [TR] [TD]IntelliTrap Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The IntelliTrap Pattern detects real-time compression files packed as executable files. For details, see [URL='https://docs.trendmicro.com/all/ent/officescan/v12.0/en-us/osce_12.0_agent_olh/IntelliTrap.html#GUID-FCE2D882-C1EC-4048-822A-A6214C8834F2']IntelliTrap[/URL].[/TD] [/TR] [TR] [TD]Memory Inspection Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]This technology provides enhanced virus scanning for polymorphic and mutation viruses, and augments virus-pattern-based scans by emulating file execution. The results are then analyzed in a controlled environment for evidence of malicious intent with little impact on system performance.[/TD] [/TR] [TR] [TD]Early Launch Anti-Malware Pattern 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]OfficeScan supports the Early Launch Anti-Malware (ELAM) feature as part of the Secure Boot standard to provide boot time protection on endpoints. This feature enables OfficeScan agents to detect malware during the operating system boot process.[/TD] [/TR] [TR] [TD]Contextual Intelligence Engine 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]The Contextual Intelligence Engine monitors processes executed by low prevalence files and extracts behavioral features that the Contextual Intelligence Query Handler sends to the Predictive Machine Learning engine for analysis.[/TD] [/TR] [TR] [TD]Contextual Intelligence Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The Contextual Intelligence Pattern contains a list of "approved" behaviors that are not relevant to any known threats.[/TD] [/TR] [TR] [TD]Contextual Intelligence Query Handler 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]The Contextual Intelligence Query Handler processes the behaviors identified by the Contextual Intelligence Engine and sends the report to the Predictive Machine Learning engine.[/TD] [/TR] [TR] [TD]Advanced Threat Scan Engine 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]The Advanced Threat Scan Engine extracts file features from low prevalence files and sends the the information to the Predictive Machine Learning engine.[/TD] [/TR] [TR] [TD]Advanced Threat Correlation Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The Advanced Threat Correlation Pattern contains a list of file features that are not relevant to any known threats.[/TD] [/TR] [/TABLE] [HEADING=3]Anti-spyware[/HEADING] [TABLE] [TR] [TH]Component[/TH] [TH]Distributed To[/TH] [TH]Description[/TH] [/TR] [TR] [TD]Spyware/Grayware Scan Engine 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]The Spyware/Grayware Scan Engine scans for and performs the appropriate scan action on spyware/grayware.[/TD] [/TR] [TR] [TD]Spyware/Grayware Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The Spyware/Grayware Pattern identifies spyware/grayware in files and programs, modules in memory, Windows registry and URL shortcuts.[/TD] [/TR] [TR] [TD]Spyware Active-monitoring Pattern[/TD] [TD]OfficeScan agentsusing conventional scan[/TD] [TD]The Spyware Active-monitoring Pattern is used for real-time spyware/grayware scanning. Only conventional scan agentsuse this pattern.[/TD] [/TR] [/TABLE] [HEADING=3]Damage Cleanup Services[/HEADING] [TABLE] [TR] [TH]Component[/TH] [TH]Distributed To[/TH] [TH]Description[/TH] [/TR] [TR] [TD]Damage Cleanup Engine 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]The Damage Cleanup Engine scans for and removes Trojans and Trojan processes.[/TD] [/TR] [TR] [TD]Damage Cleanup Template[/TD] [TD]OfficeScan agents[/TD] [TD]The Damage Cleanup Template is used by the Damage Cleanup Engine to identify Trojan files and processes so the engine can eliminate them.[/TD] [/TR] [TR] [TD]Early Boot Cleanup Driver 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]The Trend Micro Early Boot Cleanup Driver loads before the operating system drivers which enables the detection and blocking of boot-type rootkits. After the OfficeScan agent loads, Trend Micro Early Boot Cleanup Driver calls Damage Cleanup Services to clean the rootkit.[/TD] [/TR] [/TABLE] [HEADING=3]Web Reputation[/HEADING] [TABLE] [TR] [TH]Component[/TH] [TH]Distributed To[/TH] [TH]Description[/TH] [/TR] [TR] [TD]URL Filtering Engine[/TD] [TD]OfficeScan agents[/TD] [TD]The URL Filtering Engine facilitates communication between OfficeScan and the Trend Micro URL Filtering Service. The URL Filtering Service is a system that rates URLs and provides rating information to OfficeScan.[/TD] [/TR] [/TABLE] [HEADING=3]Firewall[/HEADING] [TABLE] [TR] [TH]Component[/TH] [TH]Distributed To[/TH] [TH]Description[/TH] [/TR] [TR] [TD]Common Firewall Driver 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]The Common Firewall Driver is used with the Common Firewall Pattern to scan agentendpoints for network viruses. This driver supports 32-bit and 64-bit platforms.[/TD] [/TR] [TR] [TD]Common Firewall Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]Like the Virus Pattern, the Common Firewall Pattern helps agents identify virus signatures, unique patterns of bits and bytes that signal the presence of a network virus.[/TD] [/TR] [/TABLE] [HEADING=3]Behavior Monitoring and Device Control[/HEADING] [TABLE] [TR] [TH]Component[/TH] [TH]Distributed To[/TH] [TH]Description[/TH] [/TR] [TR] [TD]Behavior Monitoring Detection Pattern 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]This pattern contains the rules for detecting suspicious threat behavior.[/TD] [/TR] [TR] [TD]Behavior Monitoring Core Driver 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]This kernel mode driver monitors system events and passes them to the Behavior Monitoring Core Service for policy enforcement.[/TD] [/TR] [TR] [TD]Behavior Monitoring Core Service 32/64-bit[/TD] [TD]OfficeScan agents[/TD] [TD]This user mode service has the following functions: [LIST] [*]Provides rootkit detection [*]Regulates access to external devices [*]Protects files, registry keys, and services [/LIST][/TD] [/TR] [TR] [TD]Behavior Monitoring Configuration Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The Behavior Monitoring Driver uses this pattern to identify normal system events and exclude them from policy enforcement.[/TD] [/TR] [TR] [TD]Policy Enforcement Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The Behavior Monitoring Core Service checks system events against the policies in this pattern.[/TD] [/TR] [TR] [TD]Digital Signature Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]This pattern contains a list of valid digital signatures that are used by the Behavior Monitoring Core Service to determine whether a program responsible for a system event is safe.[/TD] [/TR] [TR] [TD]Memory Scan Trigger Pattern (32/64-bit)[/TD] [TD]OfficeScan agents[/TD] [TD]The Memory Scan Trigger service executes other scan engines when it detects the process in memory is unpacked.[/TD] [/TR] [TR] [TD]Program Inspection Monitoring Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The Program Inspection Monitoring Pattern monitors and stores inspection points that are used for Behavior Monitoring.[/TD] [/TR] [TR] [TD]Damage Recovery Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]The Damage Recovery Pattern contains policies that are used for monitoring suspicious threat behavior.[/TD] [/TR] [/TABLE] [HEADING=3]Browser Exploits[/HEADING] [TABLE] [TR] [TH]Component[/TH] [TH]Distributed To[/TH] [TH]Description[/TH] [/TR] [TR] [TD]Browser Exploit Prevention Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]This pattern identifies the latest web browser exploits and prevents the exploits from being used to compromise the web browser.[/TD] [/TR] [TR] [TD]Script Analyzer Unified Pattern[/TD] [TD]OfficeScan agents[/TD] [TD]This pattern analyzes script in web[/TD] [/TR] [/TABLE] [/SPOILER] Edit: not all components are listed there, some components such as wrappers around the engine that should prevent Trend Micro from being exploited by malware writers are not mentioned. The release notes for the scan engine are [URL='https://success.trendmicro.com/dcx/s/solution/000148744?language=ja']here[/URL] (only in Japanese): VSAPI 22.610 / ATSE 22.610~23.570 Release date 2023.08.23 [SPOILER="Engine "] ■New features of VSAPI 22.610 / ATSE 22.610~23.570 [LIST] [*]Added search function using machine learning [*](This is a local model type search function that is included inside the search engine.) [*]Added and improved detection functions for new threats [*]Supports identification of Lzip file types [*]Improved identification function for MP3 file types [*]Fixes for various bugs [/LIST] [/spoiler] The version number of the engine (second part of it) is calculated by multiplying the release month by 10 and adding 500. Example, december = 12*10 + 500 = 620. [/QUOTE]
Insert quotes…
Verification
Post reply
Top