dllx32.exe - Dangerous
dllx32.exe
Manual removal instructions:
Antivirus Report of dllx32.exe:
dllx32.exe
Backdoor.Nibu.H opens a backdoor Trojan horse on a compromised system.
It also runs a keylogger, periodically sending the stolen information to a predetermined email address.
Copies itself as these files:
%System%\dllx32.exe
%System%\dlla32.exe
%Startup%\dllw32.exe
Adds the value: "load32"="%System%\dllx32.exe"
to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Modifies the value data of: Shell
in the following registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
from: "explorer.exe" to: "explorer.exe %Windir%\system32\dlla32.exe"
Looks for windows that have certain strings in the title bar. These strings vary, but may include the following:
Bank; bank; bull; Bull; cash; ebay; e-metal; Fethard; fethard; gold; Keeper; localhost; mull; PayPal; Storm; WebMoney; Winamp; WM Keeper
Captures keystrokes that are typed into windows that contain the previously listed strings and stores them in a log file.
This file may be named %Windir%\1111k.log.
Launches a thread that monitors the Clipboard, saving to a log file any data that it finds.
The file may be named %Windir%\1111c.sys.
May steal passwords from the WebMoney and Far FTP accounts that are stored in the registry.
Periodically checks the size of the files that it uses for logging stolen information.
When the files are a certain size, the log files will be emailed to a hard-coded email address, along with System information such as the IP address and operating system.
Remove it witn RegRun.
dllx32.exe | Malware |
dllx32.exe | Dangerous |
dllx32.exe | High Risk |
It also runs a keylogger, periodically sending the stolen information to a predetermined email address.
Copies itself as these files:
%System%\dllx32.exe
%System%\dlla32.exe
%Startup%\dllw32.exe
Adds the value: "load32"="%System%\dllx32.exe"
to the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Modifies the value data of: Shell
in the following registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
from: "explorer.exe" to: "explorer.exe %Windir%\system32\dlla32.exe"
Looks for windows that have certain strings in the title bar. These strings vary, but may include the following:
Bank; bank; bull; Bull; cash; ebay; e-metal; Fethard; fethard; gold; Keeper; localhost; mull; PayPal; Storm; WebMoney; Winamp; WM Keeper
Captures keystrokes that are typed into windows that contain the previously listed strings and stores them in a log file.
This file may be named %Windir%\1111k.log.
Launches a thread that monitors the Clipboard, saving to a log file any data that it finds.
The file may be named %Windir%\1111c.sys.
May steal passwords from the WebMoney and Far FTP accounts that are stored in the registry.
Periodically checks the size of the files that it uses for logging stolen information.
When the files are a certain size, the log files will be emailed to a hard-coded email address, along with System information such as the IP address and operating system.
Remove it witn RegRun.
Dmitry Sokolov:
I created UnHackMe in 2006 to fix the problem that antivioruses did not fix: detecting rootkits.
Since that time I work every day to fix the issues that antiviruses cannot.
If your antivirus have not helped you solve the problem, you should try UnHackMe.
We are a small company and you can ask me directly, if you have any questions.