Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLP.Dinda

Added to the Dr.Web virus database: 2011-11-12

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'svchost.exe' = '%WINDIR%\system\svchost.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'spoolsv.exe' = '%WINDIR%\system\spoolsv.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost.exe' = '%WINDIR%\system\svchost.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'spoolsv.exe' = '%WINDIR%\system\spoolsv.exe'
Infects the following executable system files:
  • <SYSTEM32>\taskmgr.exe
  • %WINDIR%\regedit.exe
  • %WINDIR%\pchealth\helpctr\binaries\msconfig.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
blocks execution of the following system utilities:
  • Windows Task Manager (Taskmgr)
  • Registry Editor (RegEdit)
Modifies settings of Windows Explorer:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFind' = '00000001'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'Norun' = '00000001'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFolderOptions' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFind' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'Norun' = '00000001'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies file system :
Creates the following files:
  • %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\User Account Pictures.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Network\Connections\Pbk\Pbk.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\User Account Pictures\Default Pictures\Default Pictures.exe
  • %ALLUSERSPROFILE%\Documents\Documents.exe
  • %ALLUSERSPROFILE%\Desktop\Desktop.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Media Player\Media Player.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Media Index\Media Index.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Network\Network.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Network\Connections\Cm\Cm.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Network\Connections\Connections.exe
  • %ALLUSERSPROFILE%\Documents\My Pictures\Sample Pictures\Sample Pictures.exe
  • %ALLUSERSPROFILE%\Documents\My Pictures\My Pictures.exe
  • %ALLUSERSPROFILE%\Documents\My Videos\My Videos.exe
  • %ALLUSERSPROFILE%\Favorites\Favorites.exe
  • %ALLUSERSPROFILE%\DRM\DRM.exe
  • %ALLUSERSPROFILE%\Documents\My Music\My Playlists\My Playlists.exe
  • %ALLUSERSPROFILE%\Documents\My Music\My Music.exe
  • %ALLUSERSPROFILE%\Documents\My Music\Sample Music\Sample Music.exe
  • %ALLUSERSPROFILE%\Documents\My Music\Sample Playlists\0338E140\0338E140.exe
  • %ALLUSERSPROFILE%\Documents\My Music\Sample Playlists\Sample Playlists.exe
  • C:\Sang Perawan.exe
  • %WINDIR%\system\spoolsv.exe
  • <Current directory>\af32d3b0.exe
  • %ALLUSERSPROFILE%\All Users.exe
  • C:\Documents and Settings\Documents and Settings.exe
  • %WINDIR%\system\dllchace\msconfig.exe
  • %WINDIR%\system\dllchace\regedit.exe
  • %WINDIR%\system\svchost.exe
  • %WINDIR%\system\dllchace\taskmgr.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\RSA\MachineKeys\MachineKeys.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\RSA\RSA.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\RSA\S-1-5-18\S-1-5-18.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\HTML Help\HTML Help.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Dr Watson\Dr Watson.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Microsoft.exe
  • %ALLUSERSPROFILE%\Application Data\Application Data.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\Crypto.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\DSS\MachineKeys\MachineKeys.exe
  • %ALLUSERSPROFILE%\Application Data\Microsoft\Crypto\DSS\DSS.exe
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''