[filename.info logo]
[cn hh.exe][de hh.exe][es hh.exe][fr hh.exe][gb hh.exe][it hh.exe][jp hh.exe][kr hh.exe][nl hh.exe][pt hh.exe][ru hh.exe][us hh.exe]
 

hh.exe (5.2.3644.0)

Enthalten in den Programmen

Name:Windows XP Home Edition, Deutsch
Lizenz:kommerziell
Info-Link:http://www.microsoft.com/windowsxp/

Dateidetails

Dateipfad:C:\WINDOWS\system32\dllcache \ hh.exe
Dateidatum:2002-11-09 13:47:56
Version:5.2.3644.0
Dateigröße:10.752 Bytes

Prüfsumme und Datei-Hashwerte

CRC32:DDEF5935
MD5:ED97 F327 6D9F ABCF 0068 DE21 72DF 8DA5
SHA1:1E38 7DD1 3B7B 9C98 0EEC 101C 48A9 2E84 2A08 DFF9

Versions-Informationen

Firmenname:Microsoft Corporation
Datei-Beschreibung:Microsoft® HTML Help Executable
Datei-Flags:PRIVATE-BUILD
Datei-Betriebssystem:Windows NT, Windows 2000, Windows XP, Windows 2003
Datei-Typ:Application
Datei-Version:5.2.3644.0
Interner Name:HH 1.4
Copyright:© Microsoft Corporation. All rights reserved.
Ursprünglicher Dateiname:HH.exe
Produktname:HTML Help
Produktversion:5.2.3644.0

hh.exe wurde in den folgenden Reports gefunden:

W32.Dexec

Technische Details
...the following Windows files: C:\%Windir%hh.exe is copied as C:\%Windir%Fontsh.exe....
...Copies itself as: C:\%Windir%hh.exe and sets its attribute to Hidden....
Entfernungs-Anweisungen
...Restore these files: C:\%Windir%Fontshh.exe to C:\%Windir%hh.exe C:\%Windir%FontsNotepa.exe...
...C:\%Windir%Fontsh.exe to C:\%Windir%hh.exe C:\%Windir%FontsNotepa.exe...
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.dexec.html

W32.Toal.A@mm

Technische Details
...The worm specifically infects Hh.exe, which is a standard Windows executable file....
...When it sends the email message, the worm attaches the infected Hh.exe file as Binladen_brasil.exe....
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.toal.a@mm.html

W32.Blebla.Worm

Technische Details
...When executed, the Myromeo.exe file looks for the running copy of HH.exe (that is associated with .chm files) and tries to stop it in order to hide its activity....
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.blebla.worm.html

W32.Nosys

Technische Details
...Winhlp32.exe HH.exe If it finds those files, it...
...Winhlp32.vir Hh.vir If the Trojan finds them,...
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.nosys.html

Trojan.PWS.QQPass.C

Entfernungs-Anweisungen
...box and replace it with the path to the Windows installation folder followed by hh.exe" %1. This will vary with the operating system and where it is installed....
...Windows NT/2000: C:WINNThh.exe" %1 Windows 95/98/Me/XP: C:WINDOWShh.exe"...
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/trojan.pws.qqpass.c.html

W32.HLLW.Maax@mm

Technische Details
...F-Stopw.exe HH.exe Iamapp.exe...
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.maax@mm.html

W32.BleBla.J.Worm

Technische Details
...To hide its activity, the Melh32.exe file attempts to terminate the HH.exe process. The worm then queries the...
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.blebla.j.worm.html

W32.Benpao.Trojan

Technische Details
...Changes the value: (Default) %Windir%hh.exe %1 to:...
Entfernungs-Anweisungen
...to: (Default) %Windir%hh.exe %1 Navigate to the key:...
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.benpao.trojan.html

W32.HLLW.BenfGame.B

Technische Details
...Replaces the references to hh.exe with one of the random filenames that the worm created....
Entfernungs-Anweisungen
...HKEY_CLASSES_ROOTchm.fileshellopencommand Restore value to: hh.exe %1 Key: HKEY_CLASSES_ROOTscrfileshellopencommand...
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.benfgame.b.html

W32.Faisal@mm

Technische Details
...HKEY_CLASSES_ROOTApplicationsHH.exeShellopencommand @=%Windir%Myvwa.com...
Entfernungs-Anweisungen
...HKEY_CLASSES_ROOTApplicationsHH.exeShellopencommand HKEY_CLASSES_ROOTApplicationsIamapp.exeShellopencommand...
......
Quelle: http://securityresponse.symantec.com/avcenter/venc/data/w32.faisal@mm.html



Valid HTML 4.01!