Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Trojan.KillProc2.25297
Added to the Dr.Web virus database:
2025-07-10
Virus description added:
2025-07-11
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\xakmpl [free] legs qx2j1b5 .avi.exe
%ProgramFiles%\dvd maker\shared\ikdyfwhy sperm nom72kl legs b37oavmx289 .avi.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\7b6fhxi xakmpl [milf] (gina).rar.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\viaz50 beast big .rar.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\f07qtt h93bklf lpcu5ai3 [milf] boots .mpg.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\7b6fhxi cum beast [milf] (karin).rar.exe
%ProgramFiles%\windows journal\templates\0287zh wep6b08 mnho9y54 epyxwn gh5b6gd7wrv .mpg.exe
%ProgramFiles%\windows sidebar\shared gadgets\cum epyxwn .mpeg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\eq7k2xcxt sgu4m7oc hole lady .mpeg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\viaz50 wep6b08 nom72kl titts gh5b6gd7wrv .mpg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\8ok6yf mnho9y54 ihthd33 feet boots .rar.exe
%CommonProgramFiles(x86)%\microsoft shared\xakmpl bd1l5ir epyxwn legs ejn547rbxhd1 .avi.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\zc8giv9 h93bklf 8ok6yf [bangbus] rv0y8n .rar.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\black cum vjq39c1gwy .mpeg.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\asian 7nd83wovj vjq39c1gwy ash .mpeg.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\z9z7rwe porn [bangbus] mg9fvb2xk9 .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\f1i7cm bq4kno boobs fw58kpr41ob1w .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\gzn4ud7e yzw1afy ihthd33 mg9fvb2xk9 .rar.exe
%ALLUSERSPROFILE%\templates\horse bd1l5ir [milf] .zip.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\sperm vjq39c1gwy latex .rar.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\w6csjja14n1 epyxwn feet .mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\wpjwijv gay h93bklf bq4kno .mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\8ok6yf [milf] ol6p1tua .rar.exe
%ALLUSERSPROFILE%\templates\horse horse bq4kno (jenna).mpeg.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\mzwpstr8n 7vepaqjm ol6p1tua .zip.exe
C:\users\default\appdata\local\temp\zc8giv9 beast xakmpl l9hwcs7vvnphd9 latex (36mho73,gina).mpeg.exe
C:\users\default\appdata\local\<INETFILES>\s2fkave mnho9y54 [free] .mpg.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\0287zh horse xxx sgu4m7oc sgoibhh (sonja).zip.exe
C:\users\default\templates\7b6fhxi tsomq34 girls kfp2yqq ol6p1tua .rar.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\mzwpstr8n wep6b08 apv53deiq9fw qq6w54yfhtqrbwcslg (2hbt8wr).avi.exe
%TEMP%\4h1e2a346 mzwpstr8n [free] .mpeg.exe
%LOCALAPPDATA%\<INETFILES>\black cum cum apv53deiq9fw feet (jenna).rar.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\viaz50 beast 7vepaqjm (jade,jade).avi.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\0287zh h93bklf yzw1afy vjq39c1gwy .avi.exe
%APPDATA%\microsoft\templates\bd1l5ir beast bq4kno .rar.exe
%APPDATA%\microsoft\windows\templates\ikdyfwhy gay xxx vjq39c1gwy (sandy,g6u8n4r).avi.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\nude sperm sgu4m7oc .rar.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\mzwpstr8n yzw1afy big shoes (karin,liz).mpeg.exe
%HOMEPATH%\templates\h93bklf porn l9hwcs7vvnphd9 .mpg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\viaz50 xakmpl [free] (jenna,sonja).rar.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\7b6fhxi nude nom72kl bq4kno .mpg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\eq7k2xcxt wep6b08 uncut .avi.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\f07qtt w6csjja14n1 8ok6yf [free] .mpg.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\zc8giv9 sperm girls (cy4xpd).avi.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\jxaglwti 7nd83wovj [milf] titts fw58kpr41ob1w .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\jxaglwti tsomq34 apv53deiq9fw 779mipj (sarah,dehod0).avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\wpjwijv w6csjja14n1 nude apv53deiq9fw jxqgtp .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\4h1e2a346 porn [milf] (gina,sarah).mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\w6csjja14n1 big ejn547rbxhd1 .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\f1i7cm xxx beast big (dehod0,y8oxsqa).avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\f07qtt 7nd83wovj uncut qx2j1b5 .rar.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\ddqayq bq4kno .mpeg.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\eq7k2xcxt xxx mnho9y54 [free] jxqgtp 8bgkvshe1 .avi.exe
%WINDIR%\assembly\temp\zc8giv9 yzw1afy 7nd83wovj girls .zip.exe
%WINDIR%\assembly\tmp\xxx gay l9hwcs7vvnphd9 rv0y8n .zip.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\eq7k2xcxt lpcu5ai3 nom72kl (g6u8n4r,sonja).mpg.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\yzw1afy [bangbus] (2hbt8wr).zip.exe
%WINDIR%\pla\templates\wpjwijv 7nd83wovj w6csjja14n1 7vepaqjm jxqgtp zmc8ujp (g6u8n4r).mpg.exe
%WINDIR%\security\templates\black xakmpl nom72kl epyxwn .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\8r3baiec porn yzw1afy uncut (gina).avi.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\wpjwijv lpcu5ai3 7vepaqjm lzxyhb7k .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\z9z7rwe lpcu5ai3 ddqayq ihthd33 ae2sd7u4xh .rar.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt bd1l5ir big mg9fvb2xk9 .avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\z9z7rwe beast 8ok6yf uncut 40+ (sonja,c4w8hqa).mpg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\xakmpl hot (!) jxqgtp .zip.exe
%WINDIR%\syswow64\config\systemprofile\ikdyfwhy wep6b08 ihthd33 (c4w8hqa,36mho73).mpg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\upfgetx porn porn hot (!) (g6u8n4r).mpeg.exe
%WINDIR%\syswow64\fxstmp\z9z7rwe cum ihthd33 .mpg.exe
%WINDIR%\syswow64\ime\shared\wep6b08 h93bklf apv53deiq9fw .zip.exe
%WINDIR%\syswow64\config\systemprofile\xakmpl [bangbus] kfp2yqq .rar.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt xxx [bangbus] hotel .mpg.exe
%WINDIR%\syswow64\fxstmp\4h1e2a346 ddqayq [bangbus] .avi.exe
%WINDIR%\syswow64\ime\shared\jxaglwti w6csjja14n1 sperm epyxwn zmc8ujp .mpg.exe
%WINDIR%\temp\upfgetx yzw1afy sgu4m7oc .mpg.exe
%WINDIR%\winsxs\installtemp\fac71w2 cum wep6b08 sgu4m7oc glans ol6p1tua .rar.exe
<Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK