Для коректної роботи нашого сайта необхідно включити підтримку JavaScript у Вашому браузері.
Win32.HLLW.Autoruner3.2192
Добавлен в вирусную базу Dr.Web:
2020-04-09
Описание добавлено:
2020-04-15
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'taskeng' = '"%WINDIR%\taskeng.exe" ..'
[<HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'taskeng' = '"%WINDIR%\taskeng.exe" ..'
Creates the following files on removable media
<Drive name for removable media>:\systemeusb.exe
<Drive name for removable media>:\indogerman2010.lnk
<Drive name for removable media>:\roozenedowebinar.lnk
<Drive name for removable media>:\middaugh_keynote.lnk
<Drive name for removable media>:\waterresourcesag.lnk
<Drive name for removable media>:\samieee_obiee_presentation.lnk
<Drive name for removable media>:\hypothyroidism_slides.lnk
<Drive name for removable media>:\file1.lnk
<Drive name for removable media>:\accountsreceivable.lnk
<Drive name for removable media>:\ksearch_esa_talk.lnk
<Drive name for removable media>:\mappingconcepthubberlin.lnk
<Drive name for removable media>:\sacs_presentation_sacs_qep_improving_rt_education_final.lnk
<Drive name for removable media>:\ppswamp.lnk
<Drive name for removable media>:\metac.lnk
<Drive name for removable media>:\writingcompletesarnarrative_1103.lnk
<Drive name for removable media>:\proposaltemplates.lnk
<Drive name for removable media>:\asm.lnk
<Drive name for removable media>:\cleanlyrics.lnk
<Drive name for removable media>:\calibre.lnk
<Drive name for removable media>:\hhhlcert.lnk
<Drive name for removable media>:\server.lnk
<Drive name for removable media>:\investmentbankca_ca8.lnk
<Drive name for removable media>:\ck.lnk
<Drive name for removable media>:\cert.lnk
<Drive name for removable media>:\skos.lnk
<Drive name for removable media>:\contenttypes.lnk
<Drive name for removable media>:\calculatorworksheet.lnk
<Drive name for removable media>:\disclosuredetails.lnk
<Drive name for removable media>:\applicant.lnk
<Drive name for removable media>:\suspendedcompanies.lnk
<Drive name for removable media>:\2013_smccc_competition_points_jul2013.lnk
<Drive name for removable media>:\national_autism_preparation_programs.lnk
<Drive name for removable media>:\removedtitles_records.lnk
<Drive name for removable media>:\guide_reorganization_mapping.lnk
<Drive name for removable media>:\subjectclassification.lnk
<Drive name for removable media>:\1sm_price.lnk
<Drive name for removable media>:\flower_trans_matte.lnk
<Drive name for removable media>:\210252809.lnk
<Drive name for removable media>:\babyboymaintonotesbackground_pal.lnk
<Drive name for removable media>:\krsweden.lnk
<Drive name for removable media>:\myhrvoldhanssenbiharfamine.lnk
<Drive name for removable media>:\fungalnameauthors.lnk
<Drive name for removable media>:\pubnet_855.lnk
<Drive name for removable media>:\router_manual.lnk
<Drive name for removable media>:\phytoremediation.lnk
<Drive name for removable media>:\sioc.lnk
<Drive name for removable media>:\20140114.lnk
<Drive name for removable media>:\swc_2009-03-02.lnk
<Drive name for removable media>:\2015-02-patients-topic-work-related-asthma-jobs.lnk
<Drive name for removable media>:\2015-02-worms-nanoparticle-toxicity.lnk
<Drive name for removable media>:\fil_20060629111052.lnk
<Drive name for removable media>:\file_p_00000000_1371597592.lnk
<Drive name for removable media>:\issi2013_template_for_posters.lnk
<Drive name for removable media>:\glidescope_review_rev_010.lnk
<Drive name for removable media>:\fi51.lnk
<Drive name for removable media>:\lisp_success.lnk
<Drive name for removable media>:\weeklysheet1215.lnk
<Drive name for removable media>:\ovp25012015.lnk
<Drive name for removable media>:\508softwareandos.lnk
<Drive name for removable media>:\cveuropeo.lnk
<Drive name for removable media>:\hanni_umami_chapter.lnk
<Drive name for removable media>:\pmd.lnk
<Drive name for removable media>:\sdksampleprivdeveloper.lnk
<Drive name for removable media>:\contoso_1.lnk
<Drive name for removable media>:\testee.lnk
<Drive name for removable media>:\testcertificate.lnk
<Drive name for removable media>:\dashborder_192.lnk
<Drive name for removable media>:\coffee.lnk
<Drive name for removable media>:\delete.lnk
<Drive name for removable media>:\split.lnk
<Drive name for removable media>:\join.lnk
<Drive name for removable media>:\tcm851ax32.lnk
<Drive name for removable media>:\winmine.lnk
<Drive name for removable media>:\chromesetup.lnk
<Drive name for removable media>:\trivial-merge.lnk
<Drive name for removable media>:\video_1.lnk
<Drive name for removable media>:\ituneshelpunavailable.lnk
<Drive name for removable media>:\video.lnk
<Drive name for removable media>:\dag2_panel1_320_ref.lnk
<Drive name for removable media>:\etc6_m_1.lnk
<Drive name for removable media>:\13.lnk
<Drive name for removable media>:\region-north-karelia.lnk
<Drive name for removable media>:\168.lnk
<Drive name for removable media>:\2.lnk
<Drive name for removable media>:\4f0bf7ff71f28.lnk
<Drive name for removable media>:\3.lnk
<Drive name for removable media>:\contractualdeadlines.lnk
<Drive name for removable media>:\fiche_inscription_2015.lnk
<Drive name for removable media>:\parnas_01.lnk
<Drive name for removable media>:\adadsi.lnk
<Drive name for removable media>:\api-hashmap.lnk
<Drive name for removable media>:\about.lnk
<Drive name for removable media>:\browse.lnk
<Drive name for removable media>:\tree_view.lnk
<Drive name for removable media>:\garden.lnk
<Drive name for removable media>:\64bit_notes.lnk
<Drive name for removable media>:\iisstart.lnk
<Drive name for removable media>:\alert.lnk
<Drive name for removable media>:\pushkin.lnk
<Drive name for removable media>:\price.lnk
Malicious functions
Executes the following
'%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%WINDIR%\taskeng.exe" "taskeng.exe" ENABLE
Injects code into
the following user processes:
Modifies file system
Creates the following files
Sets the 'hidden' attribute to the following files
<Full path to file>
<Drive name for removable media>:\systemeusb.exe
%WINDIR%\taskeng.exe
Network activity
UDP
DNS ASK mi#####ftdom.duia.us
Miscellaneous
Creates and executes the following
'%WINDIR%\taskeng.exe'
'%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%WINDIR%\taskeng.exe" "taskeng.exe" ENABLE' (with hidden window)
Завантажте Dr.Web для Android
Безкоштовно на 3 місяці
Всі компоненти захисту
Подовження демо в AppGallery/Google Pay
Подальший перегляд даного сайта означає, що Ви погоджуєтесь на використання нами cookie-файлів та інших технологій збору статистичних відомостей про відвідувачів. Докладніше
OK