Threat Database Potentially Unwanted Programs Systemauto32.exe CPU Miner

Systemauto32.exe CPU Miner

By GoldSparrow in Potentially Unwanted Programs

The Systemauto32.exe CPU Miner is one of many CPU Mining tools based on the Minergate software, which emerged as a heavily modified version of the XMRig Trojan. The Systemauto32.exe CPU Miner is a program that finds its way into computers by means of software bundling, key generators for shareware and cracked executable for PC game titles. Since the rise of the price of Bitcoin and other digital currencies such as Ethidium, Monero, and Ripple there was a shift in the threat development. Cybersecurity vendors recorded a surge in illegal CPU and GPU mining operations that started in October 2017 and continued into 2018. Due to the nature of the blockchain technology and the demand for processing power that is needed to maintain anonymous and secure money transactions, many threat creators decided to create networks of compromised devices that they use to mine popular cryptocurrencies.

Mining digital money is not an illegal practice as of January 2018, as long as you are using devices you own. On the other hand, there are threat actors who seek to infect remote computers with their brand of CPU/GPU Mining tools and reap the rewards. The mining operations have become costly in 2018 increasingly because the prices of BTC, ETH, XBT, and others are rising and it is tough to make a profit because you need a lot of processing power to handle the demand. However, the processing power you need to make a decent profit is not something your average garage or cellar can handle. In the past, individuals were able to rent the processing power of their devices from platforms like Coindesk.com and earn some side money. In 2018 there are Bitcoin farms that specialize in digital mining and handle complex calculations under strict control and power management. Consequently, the threat creators are looking for cheaper alternatives to mine and use compromised computers to do just that. The infected machines have their processing power hijacked by processes like Systemauto32.exe that may feature a misleading description and run from the Temp folder. The Systemauto32.exe CPU Miner is reported to run from C:/Users/account name/AppData/Temp and add a startup entry in the Registry so that it boots with Windows. You should terminate the Systemauto32.exe CPU Miner using a trustworthy anti-malware scanner.

The variants of Systemauto32.exe include:

Igfxmtc.exe, NsCpuCNMiner64.exe, NvidiaHelp.exe, SecUpdateHost.exe, System Process.exe, auto-upgeade.exe, checkingversion.exe, cherry.exe, curl.exe, engine.exe, equipmentFix.exe, hshgfjahg.exe, isMiner.exe, lkhhfgfdd.exe, lsass.exe, mainServices2.exe, nvxdsync.exe, schose.exe, shghdfhas.exe, spoosvc.exe, stdafx.exe, systemdx32.exe, ventwin.exe, vshub.exe, winlogon.exe.exe, winmgmnt.exe, worker.exe, worker.exe, ytbb.exe

The folders where you might find these programs are:

C:/Users/account name/AppData/Images
C:/Users/account name/AppData/MicroMon
C:/Users/account name/AppData/Microsoft/Network/Connections/Files/winmgmnt
C:/Users/account name/AppData/Microsoft/winlogon
C:/Users/account name/AppData/Roaming/System/CUDA
C:/Users/account name/AppData/Roaming/isMiner
C:/Users/account name/AppData/Roaming/random_folder
C:/Users/account name/AppData/System Process
C:/Users/account name/AppData/Temp
C:/Users/account name/AppData/VentriloWin
C:/Users/account name/AppData/name
C:/Users/account name/AppData/stdafx
C:/Windows/System/SecUpdateHost
C:/Windows/Temp/NVIDIA
C:/Windows/lkhhfgfdd
C:/Windows/schose
C:/Windows/shghdfhas

Trending

Most Viewed

Loading...