From a command line, if I type 'test.hta', then the loader finds the association of.hta to mshta.exe in the registry and the launch works.
![]() Mshta.exe file information
The process known as Microsoft速 HTML Application host or Microsoft速 HTML-programvert or ab0bb9e3b144cac60965e5440a4ee583 belongs to software Internet Explorer or Windows Internet Explorer or Microsoft Windows Operating System or ab0bb9e3b144cac60965e5440a4ee583 by Microsoft (www.microsoft.com) or SWIS.
Description: Mshta.exe is an important part of Windows, but often causes problems. Mshta.exe is located in the C:WindowsSystem32 folder or sometimes in a subfolder of C: or in a subfolder of 'C:Program Files'.Known file sizes on Windows 10/8/7/XP are 13,312 bytes (57% of all occurrences), 45,568 bytes and 6 more variants.
Mshta.exe is a Windows system file. The file is a trustworthy file from Microsoft. The program has no visible window.Therefore the technical security rating is 4% dangerous; however you should also read the user reviews.
Uninstalling this variant:In case of any problems with mshta.exe, you can uninstall the software Tweak UI using the Uninstall a Program function of Windows Control Panel (Windows: Start, Settings, Control Panel, Uninstall a Program).
![]() ![]()
Recommended: Identify mshta.exe related errors
Important: Some malware disguises itself as mshta.exe, particularly when not located in the C:WindowsSystem32 folder. Therefore, you should check the mshta.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
Release Date : 2018-11-13 17:15:07 Update Date : 2018-11-27 17:20:06 Author :
【Abstract】After classifying captured samples, it is found that some malicious code uses LNK files during startup or propagation. Analysis of the LNK samples shows that malicious code uses LNK files in various ways. This article analyzes the typical ways.
【Copyright Notice】 This article is the original content of HUAWEI Security Center. When reprinting, you must indicate the source (HUAWEI Security Center), link and author of the article, otherwise you may be held liable.If you find any suspected infringing content on this website, please visit the Feedback page to report and provide relevant evidence. Once verified, we will immediately remove the allegedly infringing content.
Customer Comment
Hello, the submitted comment will be displayed after reviewed and approved by administrator
![]() Comments are closed.
|
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |