Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Trojan.KillProc2.28107
Added to the Dr.Web virus database:
2025-07-16
Virus description added:
2025-07-18
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\horse l9hwcs7vvnphd9 eigt45 .rar.exe
%ProgramFiles%\dvd maker\shared\7b6fhxi [milf] kfp2yqq balls .mpg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\viaz50 xxx horse apv53deiq9fw feet nrb42wq .mpeg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\7b6fhxi w6csjja14n1 [bangbus] mg9fvb2xk9 .mpeg.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\bd1l5ir nom72kl hairy .avi.exe
%ProgramFiles%\microsoft office\templates\8ok6yf [milf] hole rv0y8n (jenna).zip.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\z1qxwcd bd1l5ir apv53deiq9fw hole 50+ .rar.exe
%ProgramFiles%\windows journal\templates\nom72kl mnho9y54 [free] nrb42wq .rar.exe
%ProgramFiles%\windows sidebar\shared gadgets\bd1l5ir horse bq4kno boots .zip.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\f07qtt porn [free] glans nrb42wq (y8oxsqa).mpeg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\8ok6yf mzwpstr8n 7vepaqjm hairy .mpg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\8r3baiec horse mzwpstr8n girls .rar.exe
%CommonProgramFiles(x86)%\microsoft shared\z1qxwcd ddqayq mnho9y54 girls latex .rar.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\beast ihthd33 glans .avi.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\gay mzwpstr8n 7vepaqjm fishy .rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\wpjwijv ddqayq l9hwcs7vvnphd9 zn3tvn .zip.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\bd1l5ir [free] glans lzxyhb7k .rar.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gzn4ud7e 7nd83wovj beast [bangbus] (y8oxsqa).avi.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\ikdyfwhy sperm [bangbus] .zip.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\viaz50 xxx uncut kfp2yqq sgoibhh .mpeg.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\asian ddqayq wep6b08 7vepaqjm 779mipj (2hbt8wr).rar.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gzn4ud7e bd1l5ir epyxwn .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\zc8giv9 7nd83wovj [milf] (sonja).avi.exe
%ALLUSERSPROFILE%\templates\nom72kl ddqayq vjq39c1gwy sgoibhh .mpg.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe sperm [bangbus] .avi.exe
C:\users\default\appdata\local\temp\8r3baiec beast epyxwn .rar.exe
C:\users\default\appdata\local\<INETFILES>\sperm xakmpl bq4kno 8pfmdyy .zip.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\xxx [free] .avi.exe
C:\users\default\templates\ikdyfwhy 7nd83wovj w6csjja14n1 bq4kno kfp2yqq .avi.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\mnho9y54 w6csjja14n1 ihthd33 779mipj (sonja,haj1oyikd).mpeg.exe
%TEMP%\gay yzw1afy sgu4m7oc feet gh5b6gd7wrv (c4w8hqa,sarah).avi.exe
%LOCALAPPDATA%\<INETFILES>\z1qxwcd cum 7vepaqjm eigt45 (dxocjwba,y8oxsqa).rar.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\7b6fhxi gay apv53deiq9fw .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\nude hot (!) hole 40+ .rar.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\z1qxwcd nude sperm 7vepaqjm 6tl9zg0uqa .avi.exe
%APPDATA%\microsoft\templates\fac71w2 ddqayq girls .avi.exe
%APPDATA%\microsoft\windows\templates\mnho9y54 gay uncut latex .zip.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\zc8giv9 yzw1afy vjq39c1gwy 8pfmdyy .rar.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\wep6b08 [milf] .avi.exe
%HOMEPATH%\templates\viaz50 xxx big ash .mpeg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\z1qxwcd 8ok6yf wep6b08 nom72kl (dehod0).rar.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\yzw1afy l9hwcs7vvnphd9 jxqgtp boots .avi.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\7b6fhxi xxx gay nom72kl balls (rdl1tfkz,g6u8n4r).mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\tsomq34 nom72kl 779mipj .mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\gay beast l9hwcs7vvnphd9 glans (sarah,jade).mpeg.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\horse girls .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\h93bklf bq4kno eigt45 .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\eq7k2xcxt cum apv53deiq9fw (jenna).avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\f07qtt bd1l5ir sperm ihthd33 hairy .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\tsomq34 cum uncut 40+ (y8oxsqa).rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\horse hot (!) .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\ddqayq tsomq34 [bangbus] ejn547rbxhd1 .mpeg.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\mnho9y54 bd1l5ir big legs .mpg.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\nude vjq39c1gwy .mpg.exe
%WINDIR%\assembly\temp\cum l9hwcs7vvnphd9 zmc8ujp (36mho73,hyo87il).avi.exe
%WINDIR%\assembly\tmp\z1qxwcd mzwpstr8n porn hot (!) glans .mpeg.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\upfgetx xxx ihthd33 zmc8ujp (cy4xpd,y8oxsqa).zip.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\gzn4ud7e mzwpstr8n ddqayq apv53deiq9fw .avi.exe
%WINDIR%\pla\templates\ddqayq mzwpstr8n uncut .avi.exe
%WINDIR%\security\templates\w6csjja14n1 nom72kl .avi.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt horse yzw1afy [bangbus] 50+ .rar.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\jxaglwti lpcu5ai3 bd1l5ir big boobs .avi.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\fac71w2 7nd83wovj mnho9y54 vjq39c1gwy (sandy).avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\beast beast bq4kno (y8oxsqa,gina).rar.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\s2fkave nom72kl uncut 6tl9zg0uqa (dehod0).mpg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\nom72kl mnho9y54 vjq39c1gwy glans nmibe2 .mpeg.exe
%WINDIR%\syswow64\config\systemprofile\bd1l5ir [milf] hole .zip.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\xakmpl mnho9y54 ihthd33 titts qq6w54yfhtqrbwcslg .zip.exe
%WINDIR%\syswow64\fxstmp\tsomq34 beast uncut fw58kpr41ob1w .avi.exe
%WINDIR%\syswow64\ime\shared\7b6fhxi porn yzw1afy uncut (haj1oyikd,rdl1tfkz).mpeg.exe
%WINDIR%\syswow64\config\systemprofile\s2fkave cum nom72kl sweet .rar.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\zc8giv9 h93bklf porn girls feet .avi.exe
%WINDIR%\syswow64\fxstmp\wep6b08 nom72kl girly .rar.exe
%WINDIR%\syswow64\ime\shared\jxaglwti yzw1afy horse uncut legs .avi.exe
%WINDIR%\temp\wpjwijv tsomq34 girls titts js80j73 (dehod0).zip.exe
%WINDIR%\winsxs\installtemp\0287zh mnho9y54 horse [bangbus] .mpg.exe
<Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK