[filename.info logo]
[cn hh.exe][de hh.exe][es hh.exe][fr hh.exe][gb hh.exe][it hh.exe][jp hh.exe][kr hh.exe][nl hh.exe][pt hh.exe][ru hh.exe][us hh.exe]
 

hh.exe ( 5.2.3644.0)

Содержали в средстве программирования

Имя:Windows XP Home Edition, Deutsch
Лицензия:коммерчески
Соединение информации:http://www.microsoft.com/windowsxp/

Детали архива

Курс архива:C:\WINDOWS\$NtUninstallKB826939$ \ hh.exe
Дата архива:2002-08-29 14:00:00
Вариант: 5.2.3644.0
Размер архива:10.752 байты

Hashes checksum и архива

CRC32:E789E9B5
MD5:0324 5A0A F7BB 8D55 913B 17AC 297C 38C5
SHA1:FB32 ECCB 0F59 35C7 D0DA 864D F9EB 1E51 0EA2 FDF1

Данные по ресурса варианта

Имя компании:Microsoft Corporation
Описание архива:Microsoft HTML Help Executable
Флаги архива:PRIVATE-BUILD
Оперативная система архива:Windows NT, Windows 2000, Windows XP, Windows 2003
Тип архива:Application
Вариант архива:5.2.3644.0
Внутренне имя:HH 1.4
Законное авторское право: Microsoft Corporation. All rights reserved.
Первоначально filename:HH.exe
Имя продукта:HTML Help
Вариант продукта:5.2.3644.0

hh.exe было найдено в following рапортах:

W32.Dexec

Технически детали
...the following Windows files: C:\%Windir%hh.exe is copied as C:\%Windir%Fontsh.exe....
...Copies itself as: C:\%Windir%hh.exe and sets its attribute to Hidden....
Инструкции удаления
...Restore these files: C:\%Windir%Fontshh.exe to C:\%Windir%hh.exe C:\%Windir%FontsNotepa.exe...
...C:\%Windir%Fontsh.exe to C:\%Windir%hh.exe C:\%Windir%FontsNotepa.exe...
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.dexec.html

W32.Toal.A@mm

Технически детали
...The worm specifically infects Hh.exe, which is a standard Windows executable file....
...When it sends the email message, the worm attaches the infected Hh.exe file as Binladen_brasil.exe....
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.toal.a@mm.html

W32.Blebla.Worm

Технически детали
...When executed, the Myromeo.exe file looks for the running copy of HH.exe (that is associated with .chm files) and tries to stop it in order to hide its activity....
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.blebla.worm.html

W32.Nosys

Технически детали
...Winhlp32.exe HH.exe If it finds those files, it...
...Winhlp32.vir Hh.vir If the Trojan finds them,...
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.nosys.html

Trojan.PWS.QQPass.C

Инструкции удаления
...box and replace it with the path to the Windows installation folder followed by hh.exe" %1. This will vary with the operating system and where it is installed....
...Windows NT/2000: C:WINNThh.exe" %1 Windows 95/98/Me/XP: C:WINDOWShh.exe"...
Источник: http://securityresponse.symantec.com/avcenter/venc/data/trojan.pws.qqpass.c.html

W32.HLLW.Maax@mm

Технически детали
...F-Stopw.exe HH.exe Iamapp.exe...
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.maax@mm.html

W32.BleBla.J.Worm

Технически детали
...To hide its activity, the Melh32.exe file attempts to terminate the HH.exe process. The worm then queries the...
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.blebla.j.worm.html

W32.Benpao.Trojan

Технически детали
...Changes the value: (Default) %Windir%hh.exe %1 to:...
Инструкции удаления
...to: (Default) %Windir%hh.exe %1 Navigate to the key:...
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.benpao.trojan.html

W32.HLLW.BenfGame.B

Технически детали
...Replaces the references to hh.exe with one of the random filenames that the worm created....
Инструкции удаления
...HKEY_CLASSES_ROOTchm.fileshellopencommand Restore value to: hh.exe %1 Key: HKEY_CLASSES_ROOTscrfileshellopencommand...
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.benfgame.b.html

W32.Faisal@mm

Технически детали
...HKEY_CLASSES_ROOTApplicationsHH.exeShellopencommand @=%Windir%Myvwa.com...
Инструкции удаления
...HKEY_CLASSES_ROOTApplicationsHH.exeShellopencommand HKEY_CLASSES_ROOTApplicationsIamapp.exeShellopencommand...
......
Источник: http://securityresponse.symantec.com/avcenter/venc/data/w32.faisal@mm.html



Valid HTML 4.01!