Win32.HLLW.Autoruner3.2192
Added to the Dr.Web virus database:
2020-04-09
Virus description added:
2020-04-15
Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'taskeng' = '"%WINDIR%\taskeng.exe" ..'
- [<HKLM>\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] 'taskeng' = '"%WINDIR%\taskeng.exe" ..'
Creates the following files on removable media
- <Drive name for removable media>:\systemeusb.exe
- <Drive name for removable media>:\indogerman2010.lnk
- <Drive name for removable media>:\roozenedowebinar.lnk
- <Drive name for removable media>:\middaugh_keynote.lnk
- <Drive name for removable media>:\waterresourcesag.lnk
- <Drive name for removable media>:\samieee_obiee_presentation.lnk
- <Drive name for removable media>:\hypothyroidism_slides.lnk
- <Drive name for removable media>:\file1.lnk
- <Drive name for removable media>:\accountsreceivable.lnk
- <Drive name for removable media>:\ksearch_esa_talk.lnk
- <Drive name for removable media>:\mappingconcepthubberlin.lnk
- <Drive name for removable media>:\sacs_presentation_sacs_qep_improving_rt_education_final.lnk
- <Drive name for removable media>:\ppswamp.lnk
- <Drive name for removable media>:\metac.lnk
- <Drive name for removable media>:\writingcompletesarnarrative_1103.lnk
- <Drive name for removable media>:\proposaltemplates.lnk
- <Drive name for removable media>:\asm.lnk
- <Drive name for removable media>:\cleanlyrics.lnk
- <Drive name for removable media>:\calibre.lnk
- <Drive name for removable media>:\hhhlcert.lnk
- <Drive name for removable media>:\server.lnk
- <Drive name for removable media>:\investmentbankca_ca8.lnk
- <Drive name for removable media>:\ck.lnk
- <Drive name for removable media>:\cert.lnk
- <Drive name for removable media>:\skos.lnk
- <Drive name for removable media>:\contenttypes.lnk
- <Drive name for removable media>:\calculatorworksheet.lnk
- <Drive name for removable media>:\disclosuredetails.lnk
- <Drive name for removable media>:\applicant.lnk
- <Drive name for removable media>:\suspendedcompanies.lnk
- <Drive name for removable media>:\2013_smccc_competition_points_jul2013.lnk
- <Drive name for removable media>:\national_autism_preparation_programs.lnk
- <Drive name for removable media>:\removedtitles_records.lnk
- <Drive name for removable media>:\guide_reorganization_mapping.lnk
- <Drive name for removable media>:\subjectclassification.lnk
- <Drive name for removable media>:\1sm_price.lnk
- <Drive name for removable media>:\flower_trans_matte.lnk
- <Drive name for removable media>:\210252809.lnk
- <Drive name for removable media>:\babyboymaintonotesbackground_pal.lnk
- <Drive name for removable media>:\krsweden.lnk
- <Drive name for removable media>:\myhrvoldhanssenbiharfamine.lnk
- <Drive name for removable media>:\fungalnameauthors.lnk
- <Drive name for removable media>:\pubnet_855.lnk
- <Drive name for removable media>:\router_manual.lnk
- <Drive name for removable media>:\phytoremediation.lnk
- <Drive name for removable media>:\sioc.lnk
- <Drive name for removable media>:\20140114.lnk
- <Drive name for removable media>:\swc_2009-03-02.lnk
- <Drive name for removable media>:\2015-02-patients-topic-work-related-asthma-jobs.lnk
- <Drive name for removable media>:\2015-02-worms-nanoparticle-toxicity.lnk
- <Drive name for removable media>:\fil_20060629111052.lnk
- <Drive name for removable media>:\file_p_00000000_1371597592.lnk
- <Drive name for removable media>:\issi2013_template_for_posters.lnk
- <Drive name for removable media>:\glidescope_review_rev_010.lnk
- <Drive name for removable media>:\fi51.lnk
- <Drive name for removable media>:\lisp_success.lnk
- <Drive name for removable media>:\weeklysheet1215.lnk
- <Drive name for removable media>:\ovp25012015.lnk
- <Drive name for removable media>:\508softwareandos.lnk
- <Drive name for removable media>:\cveuropeo.lnk
- <Drive name for removable media>:\hanni_umami_chapter.lnk
- <Drive name for removable media>:\pmd.lnk
- <Drive name for removable media>:\sdksampleprivdeveloper.lnk
- <Drive name for removable media>:\contoso_1.lnk
- <Drive name for removable media>:\testee.lnk
- <Drive name for removable media>:\testcertificate.lnk
- <Drive name for removable media>:\dashborder_192.lnk
- <Drive name for removable media>:\coffee.lnk
- <Drive name for removable media>:\delete.lnk
- <Drive name for removable media>:\split.lnk
- <Drive name for removable media>:\join.lnk
- <Drive name for removable media>:\tcm851ax32.lnk
- <Drive name for removable media>:\winmine.lnk
- <Drive name for removable media>:\chromesetup.lnk
- <Drive name for removable media>:\trivial-merge.lnk
- <Drive name for removable media>:\video_1.lnk
- <Drive name for removable media>:\ituneshelpunavailable.lnk
- <Drive name for removable media>:\video.lnk
- <Drive name for removable media>:\dag2_panel1_320_ref.lnk
- <Drive name for removable media>:\etc6_m_1.lnk
- <Drive name for removable media>:\13.lnk
- <Drive name for removable media>:\region-north-karelia.lnk
- <Drive name for removable media>:\168.lnk
- <Drive name for removable media>:\2.lnk
- <Drive name for removable media>:\4f0bf7ff71f28.lnk
- <Drive name for removable media>:\3.lnk
- <Drive name for removable media>:\contractualdeadlines.lnk
- <Drive name for removable media>:\fiche_inscription_2015.lnk
- <Drive name for removable media>:\parnas_01.lnk
- <Drive name for removable media>:\adadsi.lnk
- <Drive name for removable media>:\api-hashmap.lnk
- <Drive name for removable media>:\about.lnk
- <Drive name for removable media>:\browse.lnk
- <Drive name for removable media>:\tree_view.lnk
- <Drive name for removable media>:\garden.lnk
- <Drive name for removable media>:\64bit_notes.lnk
- <Drive name for removable media>:\iisstart.lnk
- <Drive name for removable media>:\alert.lnk
- <Drive name for removable media>:\pushkin.lnk
- <Drive name for removable media>:\price.lnk
Malicious functions
Executes the following
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%WINDIR%\taskeng.exe" "taskeng.exe" ENABLE
Injects code into
the following user processes:
Modifies file system
Creates the following files
Sets the 'hidden' attribute to the following files
- <Full path to file>
- <Drive name for removable media>:\systemeusb.exe
- %WINDIR%\taskeng.exe
Network activity
UDP
- DNS ASK mi#####ftdom.duia.us
Miscellaneous
Creates and executes the following
- '%WINDIR%\taskeng.exe'
- '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram "%WINDIR%\taskeng.exe" "taskeng.exe" ENABLE' (with hidden window)
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息