[filename.info logo]
[cn hh.exe][de hh.exe][es hh.exe][fr hh.exe][gb hh.exe][it hh.exe][jp hh.exe][kr hh.exe][nl hh.exe][pt hh.exe][ru hh.exe][us hh.exe]
 

hh.exe (5.2.3644.0)

ソフトウェアに含まれている

名前:Windows XP Home Edition, Deutsch
免許証:商業
情報リンク:http://www.microsoft.com/windowsxp/

ファイル細部

ファイル道:C:\WINDOWS\system32\dllcache \ hh.exe
ファイル日付:2002-11-09 13:47:56
版:5.2.3644.0
ファイルサイズ:10.752 バイト

検査合計及びファイルは切り刻む

CRC32:DDEF5935
MD5:ED97 F327 6D9F ABCF 0068 DE21 72DF 8DA5
SHA1:1E38 7DD1 3B7B 9C98 0EEC 101C 48A9 2E84 2A08 DFF9

版資源情報

会社名前:Microsoft Corporation
ファイル記述:Microsoft HTML Help Executable
ファイル旗:PRIVATE-BUILD
ファイルオペレーティングシステム:Windows NT, Windows 2000, Windows XP, Windows 2003
ファイル・タイプ:Application
ファイル版:5.2.3644.0
内部名:HH 1.4
法的版権: Microsoft Corporation. All rights reserved.
元のファイル名:HH.exe
製品名:HTML Help
プロダクト版:5.2.3644.0

hh.exe は次のレポートで見つけられた:

W32.Dexec

技術的詳細
...the following Windows files: C:\%Windir%hh.exe is copied as C:\%Windir%Fontsh.exe....
...Copies itself as: C:\%Windir%hh.exe and sets its attribute to Hidden....
取り外しの指示
...Restore these files: C:\%Windir%Fontshh.exe to C:\%Windir%hh.exe C:\%Windir%FontsNotepa.exe...
...C:\%Windir%Fontsh.exe to C:\%Windir%hh.exe C:\%Windir%FontsNotepa.exe...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.dexec.html

W32.Toal.A@mm

技術的詳細
...The worm specifically infects Hh.exe, which is a standard Windows executable file....
...When it sends the email message, the worm attaches the infected Hh.exe file as Binladen_brasil.exe....
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.toal.a@mm.html

W32.Blebla.Worm

技術的詳細
...When executed, the Myromeo.exe file looks for the running copy of HH.exe (that is associated with .chm files) and tries to stop it in order to hide its activity....
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.blebla.worm.html

W32.Nosys

技術的詳細
...Winhlp32.exe HH.exe If it finds those files, it...
...Winhlp32.vir Hh.vir If the Trojan finds them,...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.nosys.html

Trojan.PWS.QQPass.C

取り外しの指示
...box and replace it with the path to the Windows installation folder followed by hh.exe" %1. This will vary with the operating system and where it is installed....
...Windows NT/2000: C:WINNThh.exe" %1 Windows 95/98/Me/XP: C:WINDOWShh.exe"...
源: http://securityresponse.symantec.com/avcenter/venc/data/trojan.pws.qqpass.c.html

W32.HLLW.Maax@mm

技術的詳細
...F-Stopw.exe HH.exe Iamapp.exe...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.maax@mm.html

W32.BleBla.J.Worm

技術的詳細
...To hide its activity, the Melh32.exe file attempts to terminate the HH.exe process. The worm then queries the...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.blebla.j.worm.html

W32.Benpao.Trojan

技術的詳細
...Changes the value: (Default) %Windir%hh.exe %1 to:...
取り外しの指示
...to: (Default) %Windir%hh.exe %1 Navigate to the key:...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.benpao.trojan.html

W32.HLLW.BenfGame.B

技術的詳細
...Replaces the references to hh.exe with one of the random filenames that the worm created....
取り外しの指示
...HKEY_CLASSES_ROOTchm.fileshellopencommand Restore value to: hh.exe %1 Key: HKEY_CLASSES_ROOTscrfileshellopencommand...
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.benfgame.b.html

W32.Faisal@mm

技術的詳細
...HKEY_CLASSES_ROOTApplicationsHH.exeShellopencommand @=%Windir%Myvwa.com...
取り外しの指示
...HKEY_CLASSES_ROOTApplicationsHH.exeShellopencommand HKEY_CLASSES_ROOTApplicationsIamapp.exeShellopencommand...
......
源: http://securityresponse.symantec.com/avcenter/venc/data/w32.faisal@mm.html



Valid HTML 4.01!