Per il corretto funzionamento del sito, è necessario attivare il supporto di JavaScript nel browser.
Trojan.KillProc2.25101
Aggiunto al database dei virus Dr.Web:
2025-07-06
La descrizione è stata aggiunta:
2025-07-07
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\fac71w2 7nd83wovj mnho9y54 epyxwn girly .zip.exe
%ProgramFiles%\dvd maker\shared\beast epyxwn cock mg9fvb2xk9 (y8oxsqa).avi.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\8r3baiec bd1l5ir beast bq4kno .mpg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\lpcu5ai3 [milf] boots .rar.exe
%ProgramFiles%\microsoft office\templates\fac71w2 xakmpl lpcu5ai3 epyxwn titts nmibe2 (dxocjwba).mpg.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\gzn4ud7e cum lpcu5ai3 uncut .zip.exe
%ProgramFiles%\windows journal\templates\s2fkave wep6b08 yzw1afy ihthd33 fishy .zip.exe
%ProgramFiles%\windows sidebar\shared gadgets\8r3baiec ddqayq l9hwcs7vvnphd9 titts .zip.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\fac71w2 xakmpl horse l9hwcs7vvnphd9 cock 779mipj .rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\eq7k2xcxt ddqayq sgu4m7oc lzxyhb7k .mpg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\f1i7cm porn mnho9y54 l9hwcs7vvnphd9 glans fw58kpr41ob1w (g6u8n4r).zip.exe
%CommonProgramFiles(x86)%\microsoft shared\xxx vjq39c1gwy ae2sd7u4xh .zip.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\fac71w2 porn horse epyxwn sgoibhh .avi.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\yzw1afy sgu4m7oc nmibe2 .mpg.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\black nude beast nom72kl glans 779mipj (karin).rar.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\f07qtt cum lpcu5ai3 uncut glans (rdl1tfkz,2hbt8wr).mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\mzwpstr8n nom72kl glans .rar.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\beast big sweet .mpeg.exe
%ALLUSERSPROFILE%\templates\horse sgu4m7oc nmibe2 .rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\yzw1afy epyxwn .rar.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\beast big (dxocjwba).zip.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\f07qtt wep6b08 lpcu5ai3 ihthd33 feet gsva2xn .zip.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\sperm sgu4m7oc feet hotel (g6u8n4r).mpeg.exe
%ALLUSERSPROFILE%\templates\black w6csjja14n1 tsomq34 vjq39c1gwy .avi.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\sperm girls titts ejn547rbxhd1 .avi.exe
C:\users\default\appdata\local\temp\s2fkave 8ok6yf tsomq34 7vepaqjm mg9fvb2xk9 (dehod0,y8oxsqa).mpeg.exe
C:\users\default\appdata\local\<INETFILES>\z9z7rwe h93bklf tsomq34 epyxwn (cy4xpd).mpeg.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\eq7k2xcxt bd1l5ir horse sgu4m7oc hole nmibe2 (g6u8n4r).zip.exe
C:\users\default\templates\ l9hwcs7vvnphd9 .mpg.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\eq7k2xcxt cum yzw1afy girls fishy .avi.exe
%TEMP%\ l9hwcs7vvnphd9 eigt45 .mpg.exe
%LOCALAPPDATA%\<INETFILES>\eq7k2xcxt porn gay l9hwcs7vvnphd9 rv0y8n .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{070abd97-84e1-4f5f-9c02-f1d76dd9fce4}\z9z7rwe h93bklf l9hwcs7vvnphd9 titts 6tl9zg0uqa (c4w8hqa).mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{1fae114c-c2b0-4da1-b23a-8e5ad0c3d722}\black bd1l5ir nom72kl ihthd33 .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{3571406e-c08c-4c74-b145-8857b365f6e7}\yzw1afy [bangbus] (karin).rar.exe
%APPDATA%\microsoft\templates\horse ihthd33 hotel .mpg.exe
%APPDATA%\microsoft\windows\templates\upfgetx cum yzw1afy vjq39c1gwy titts (sonja,2hbt8wr).zip.exe
%APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\storage\temporary\nom72kl l9hwcs7vvnphd9 sweet .avi.exe
%APPDATA%\thunderbird\profiles\chdgbv82.default-release\storage\temporary\black 7nd83wovj xxx sgu4m7oc 50+ .mpg.exe
%HOMEPATH%\templates\lpcu5ai3 nom72kl mg9fvb2xk9 .rar.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\jxaglwti yzw1afy [milf] cock gh5b6gd7wrv .avi.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f1i7cm 8ok6yf yzw1afy bq4kno glans rv0y8n (cy4xpd).avi.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\s2fkave w6csjja14n1 nom72kl nom72kl cock .zip.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\f1i7cm h93bklf mzwpstr8n ihthd33 glans ol6p1tua .mpeg.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\mnho9y54 [bangbus] zmc8ujp .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\8r3baiec w6csjja14n1 [free] titts (dehod0,dxocjwba).rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\black wep6b08 sperm nom72kl 8pfmdyy .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\s2fkave wep6b08 sperm [free] titts .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\s2fkave 7nd83wovj l9hwcs7vvnphd9 cock 8pfmdyy (g6u8n4r).mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\eq7k2xcxt ddqayq mzwpstr8n epyxwn hole .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\upfgetx nude yzw1afy uncut feet girly .zip.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\lpcu5ai3 uncut (karin).mpeg.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\gzn4ud7e nude lpcu5ai3 bq4kno ejn547rbxhd1 .rar.exe
%WINDIR%\assembly\temp\eq7k2xcxt cum nom72kl ihthd33 .avi.exe
%WINDIR%\assembly\tmp\eq7k2xcxt h93bklf tsomq34 big gh5b6gd7wrv .avi.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\f07qtt 8ok6yf mnho9y54 vjq39c1gwy young .avi.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\f1i7cm ddqayq beast apv53deiq9fw 8bgkvshe1 .mpeg.exe
%WINDIR%\pla\templates\f07qtt bd1l5ir mnho9y54 ihthd33 hole sweet .rar.exe
%WINDIR%\security\templates\gay uncut 8bgkvshe1 (36mho73,2hbt8wr).mpeg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe xakmpl lpcu5ai3 hot (!) feet sweet .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\f07qtt horse xxx sgu4m7oc .mpeg.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\f07qtt ddqayq lpcu5ai3 apv53deiq9fw ejn547rbxhd1 .mpeg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\lpcu5ai3 big titts .mpeg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\f1i7cm nude sperm girls glans zmc8ujp .avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\nom72kl sgu4m7oc .avi.exe
%WINDIR%\syswow64\config\systemprofile\gzn4ud7e h93bklf yzw1afy nom72kl cock b37oavmx289 (karin).rar.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\horse [bangbus] .mpeg.exe
%WINDIR%\syswow64\fxstmp\wep6b08 mnho9y54 epyxwn latex .mpeg.exe
%WINDIR%\syswow64\ime\shared\beast l9hwcs7vvnphd9 gsva2xn .zip.exe
%WINDIR%\syswow64\config\systemprofile\horse uncut cock .avi.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\s2fkave h93bklf sperm nom72kl .mpeg.exe
%WINDIR%\syswow64\fxstmp\gzn4ud7e cum yzw1afy girls .zip.exe
%WINDIR%\syswow64\ime\shared\f1i7cm xakmpl yzw1afy l9hwcs7vvnphd9 8pfmdyy .avi.exe
%WINDIR%\temp\mzwpstr8n nom72kl (sarah).mpeg.exe
%WINDIR%\winsxs\installtemp\mnho9y54 bq4kno gh5b6gd7wrv .mpg.exe
<Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
Scaricate Dr.Web per Android
Gratis per 3 mesi
Tutti i componenti di protezione
Rinnovo versione di prova tramite AppGallery/Google Pay
Continuando a utilizzare questo sito, l'utente acconsente al nostro utilizzo di file Cookie e di altre tecnologie per la raccolta di informazioni statistiche sui visitatori. Per maggiori informazioni
OK