Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Trojan.KillProc2.25251
Added to the Dr.Web virus database:
2025-07-10
Virus description added:
2025-07-11
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\f1i7cm 8ok6yf tsomq34 vjq39c1gwy 40+ .avi.exe
%ProgramFiles%\dvd maker\shared\nom72kl uncut ae2sd7u4xh .mpeg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\fac71w2 ddqayq mnho9y54 sgu4m7oc hole ol6p1tua .zip.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\8r3baiec nude uncut eigt45 .zip.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\z9z7rwe cum tsomq34 vjq39c1gwy cock .avi.exe
%ProgramFiles%\microsoft office\templates\fac71w2 w6csjja14n1 mnho9y54 uncut qq6w54yfhtqrbwcslg .avi.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\fac71w2 nude mnho9y54 ihthd33 titts (dehod0,g6u8n4r).avi.exe
%ProgramFiles%\windows journal\templates\lpcu5ai3 hot (!) .mpg.exe
%ProgramFiles%\windows sidebar\shared gadgets\f07qtt nude mnho9y54 apv53deiq9fw zmc8ujp .rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\mzwpstr8n big feet boots .avi.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\s2fkave 7nd83wovj sperm [milf] zn3tvn .rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\fac71w2 w6csjja14n1 sperm bq4kno 40+ .avi.exe
%CommonProgramFiles(x86)%\microsoft shared\lpcu5ai3 ihthd33 ejn547rbxhd1 .mpg.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\black wep6b08 beast uncut glans latex .mpeg.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\xxx ihthd33 hairy .rar.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\z9z7rwe cum l9hwcs7vvnphd9 titts sm .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\8r3baiec xakmpl nom72kl [bangbus] ae2sd7u4xh .rar.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\mnho9y54 [milf] (jade).zip.exe
%ALLUSERSPROFILE%\templates\z9z7rwe wep6b08 beast ihthd33 latex (haj1oyikd,y8oxsqa).zip.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\f1i7cm 8ok6yf mzwpstr8n apv53deiq9fw hole eigt45 .zip.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gzn4ud7e 8ok6yf nom72kl epyxwn cock .rar.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\horse apv53deiq9fw 8pfmdyy .rar.exe
%ALLUSERSPROFILE%\templates\lpcu5ai3 ihthd33 .mpeg.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\gzn4ud7e horse mzwpstr8n 7vepaqjm feet ol6p1tua .mpeg.exe
C:\users\default\appdata\local\temp\nom72kl l9hwcs7vvnphd9 (jade).mpg.exe
C:\users\default\appdata\local\<INETFILES>\upfgetx xakmpl gay apv53deiq9fw .avi.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\mzwpstr8n uncut titts .rar.exe
C:\users\default\templates\s2fkave porn horse [milf] feet fishy .mpeg.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\eq7k2xcxt h93bklf mzwpstr8n bq4kno glans (sonja,c4w8hqa).rar.exe
%TEMP%\upfgetx h93bklf beast [milf] hole qq6w54yfhtqrbwcslg .mpeg.exe
%LOCALAPPDATA%\<INETFILES>\upfgetx bd1l5ir mzwpstr8n epyxwn hole (jenna,dxocjwba).rar.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\mzwpstr8n bq4kno feet b37oavmx289 .avi.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\upfgetx horse mzwpstr8n apv53deiq9fw glans .mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\f07qtt w6csjja14n1 mnho9y54 uncut young .avi.exe
%APPDATA%\microsoft\templates\z9z7rwe 8ok6yf yzw1afy bq4kno hole 779mipj .rar.exe
%APPDATA%\microsoft\windows\templates\gzn4ud7e porn mzwpstr8n uncut (dxocjwba).avi.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\sperm [bangbus] hole girly .mpeg.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\tsomq34 l9hwcs7vvnphd9 ae2sd7u4xh .avi.exe
%HOMEPATH%\templates\gzn4ud7e cum mzwpstr8n l9hwcs7vvnphd9 girly .rar.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\z9z7rwe w6csjja14n1 horse l9hwcs7vvnphd9 rv0y8n (sandy,cy4xpd).mpeg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\black horse lpcu5ai3 sgu4m7oc glans eigt45 .avi.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\s2fkave h93bklf gay l9hwcs7vvnphd9 hole sm (liz).rar.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\mzwpstr8n vjq39c1gwy (g6u8n4r).zip.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\f07qtt horse lpcu5ai3 nom72kl ash (dehod0,karin).mpeg.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\yzw1afy [milf] .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\s2fkave xakmpl nom72kl l9hwcs7vvnphd9 cock .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\upfgetx xakmpl horse nom72kl (sarah).mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\tsomq34 girls ejn547rbxhd1 .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\fac71w2 ddqayq [free] nmibe2 .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\fac71w2 ddqayq mnho9y54 uncut (dxocjwba).rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\nom72kl apv53deiq9fw glans rv0y8n .avi.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\black h93bklf horse apv53deiq9fw titts .mpeg.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\nom72kl uncut sgoibhh .avi.exe
%WINDIR%\assembly\temp\z9z7rwe nude nom72kl [bangbus] feet (haj1oyikd,2hbt8wr).rar.exe
%WINDIR%\assembly\tmp\z9z7rwe cum mzwpstr8n sgu4m7oc shoes .mpg.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\upfgetx cum horse apv53deiq9fw .mpeg.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\f07qtt 7nd83wovj beast ihthd33 js80j73 .zip.exe
%WINDIR%\pla\templates\s2fkave wep6b08 sperm nom72kl girly .avi.exe
%WINDIR%\security\templates\mzwpstr8n vjq39c1gwy balls .rar.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\nom72kl apv53deiq9fw glans hairy (g6u8n4r).avi.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\yzw1afy uncut eigt45 .mpeg.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\gzn4ud7e ddqayq nom72kl [bangbus] cock .mpeg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\ uncut feet sweet (jade).mpg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\f1i7cm cum tsomq34 girls .zip.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\ epyxwn hole nmibe2 .mpg.exe
%WINDIR%\syswow64\config\systemprofile\z9z7rwe 7nd83wovj nom72kl [milf] nmibe2 .rar.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\s2fkave 7nd83wovj mzwpstr8n hot (!) mg9fvb2xk9 .rar.exe
%WINDIR%\syswow64\ime\shared\jxaglwti sperm 7vepaqjm gsva2xn (rdl1tfkz,y8oxsqa).mpeg.exe
%WINDIR%\syswow64\config\systemprofile\sperm vjq39c1gwy hole young .mpeg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\f1i7cm wep6b08 nom72kl 7vepaqjm .mpeg.exe
%WINDIR%\syswow64\fxstmp\beast [milf] .mpeg.exe
%WINDIR%\syswow64\ime\shared\s2fkave porn tsomq34 girls .rar.exe
%WINDIR%\temp\s2fkave w6csjja14n1 lpcu5ai3 [milf] glans 50+ (cy4xpd).mpg.exe
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK