JavaScript support is required for our site to be fully operational in your browser.
Trojan.Siggen31.38121
Added to the Dr.Web virus database:
2025-07-10
Virus description added:
2025-07-11
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\lpcu5ai3 apv53deiq9fw (y8oxsqa).mpg.exe
%ProgramFiles%\dvd maker\shared\gzn4ud7e 8ok6yf tsomq34 epyxwn feet 779mipj .avi.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\yzw1afy epyxwn .rar.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\mnho9y54 uncut cock .zip.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\mzwpstr8n epyxwn eigt45 .avi.exe
%ProgramFiles%\microsoft office\templates\s2fkave horse nom72kl cock .rar.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\z9z7rwe porn xxx 7vepaqjm titts fishy .rar.exe
%ProgramFiles%\windows journal\templates\eq7k2xcxt 7nd83wovj lpcu5ai3 sgu4m7oc hole 40+ .zip.exe
%ProgramFiles%\windows sidebar\shared gadgets\s2fkave 7nd83wovj xxx l9hwcs7vvnphd9 nrb42wq (gina,g6u8n4r).rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\upfgetx bd1l5ir sperm ihthd33 .mpeg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\beast 7vepaqjm titts .zip.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\f07qtt porn mnho9y54 [bangbus] boots (haj1oyikd,cy4xpd).mpeg.exe
%CommonProgramFiles(x86)%\microsoft shared\s2fkave 8ok6yf tsomq34 vjq39c1gwy hole hairy (dxocjwba).mpg.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\porn lpcu5ai3 epyxwn boots .rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\f1i7cm 7nd83wovj gay hot (!) titts latex (dxocjwba).avi.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\f1i7cm porn tsomq34 nom72kl hole .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay [milf] boots .rar.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\sperm ihthd33 ash (sandy,jade).avi.exe
%ALLUSERSPROFILE%\templates\gzn4ud7e ddqayq lpcu5ai3 l9hwcs7vvnphd9 js80j73 .mpeg.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\ uncut hole (sandy,karin).zip.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\z9z7rwe w6csjja14n1 gay uncut .zip.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\sperm vjq39c1gwy glans fishy .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\black bd1l5ir nom72kl l9hwcs7vvnphd9 glans ae2sd7u4xh .mpeg.exe
%ALLUSERSPROFILE%\templates\nom72kl [milf] (cy4xpd).avi.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\black wep6b08 mzwpstr8n nom72kl 8bgkvshe1 .rar.exe
C:\users\default\appdata\local\temp\upfgetx h93bklf yzw1afy 7vepaqjm hole gh5b6gd7wrv (sarah).avi.exe
C:\users\default\appdata\local\<INETFILES>\horse [free] (g6u8n4r).mpg.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\ [milf] (g6u8n4r).zip.exe
C:\users\default\templates\sperm big js80j73 (jenna,jade).rar.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\ [free] rv0y8n .avi.exe
%TEMP%\ [free] titts qx2j1b5 .rar.exe
%LOCALAPPDATA%\<INETFILES>\upfgetx porn xxx girls glans nmibe2 .zip.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\sperm 7vepaqjm girly .avi.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\horse epyxwn .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\upfgetx cum xxx bq4kno .avi.exe
%APPDATA%\microsoft\templates\gay bq4kno glans lzxyhb7k (g6u8n4r).mpg.exe
%APPDATA%\microsoft\windows\templates\yzw1afy epyxwn (cy4xpd).mpg.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\s2fkave cum gay [free] nrb42wq .mpeg.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\nom72kl [milf] cock .mpg.exe
%HOMEPATH%\templates\ bq4kno cock .rar.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\f1i7cm nude mnho9y54 uncut (y8oxsqa).zip.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\yzw1afy [bangbus] .mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\horse girls cock .mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\lpcu5ai3 apv53deiq9fw feet ash (cy4xpd).zip.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\z9z7rwe w6csjja14n1 xxx hot (!) (2hbt8wr).mpg.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\xxx [bangbus] qq6w54yfhtqrbwcslg .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\f1i7cm ddqayq horse uncut feet .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\black xakmpl epyxwn fw58kpr41ob1w .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\gay apv53deiq9fw hole boots .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\gzn4ud7e nude xxx nom72kl hole balls .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\f07qtt xakmpl tsomq34 epyxwn qq6w54yfhtqrbwcslg (sonja,cy4xpd).avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\f07qtt ddqayq nom72kl sweet .rar.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\fac71w2 ddqayq nom72kl [bangbus] 6tl9zg0uqa (gina,jade).zip.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\black cum tsomq34 7vepaqjm nmibe2 (sandy,c4w8hqa).rar.exe
%WINDIR%\assembly\temp\gzn4ud7e horse mzwpstr8n nom72kl cock .zip.exe
%WINDIR%\assembly\tmp\z9z7rwe cum yzw1afy girls .zip.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\black horse gay bq4kno (y8oxsqa).rar.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\upfgetx horse beast [milf] 8bgkvshe1 .avi.exe
%WINDIR%\pla\templates\xxx [free] (dxocjwba).zip.exe
%WINDIR%\security\templates\ big sweet .rar.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe xakmpl horse bq4kno hole .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\z9z7rwe w6csjja14n1 beast [free] .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\8r3baiec w6csjja14n1 mzwpstr8n bq4kno .avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\gay ihthd33 (jade).rar.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\gay vjq39c1gwy feet .avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\xxx uncut js80j73 .rar.exe
%WINDIR%\syswow64\config\systemprofile\fac71w2 h93bklf vjq39c1gwy feet .mpeg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\fac71w2 ddqayq beast sgu4m7oc glans .zip.exe
%WINDIR%\syswow64\fxstmp\z9z7rwe 8ok6yf mnho9y54 bq4kno sgoibhh .avi.exe
%WINDIR%\syswow64\ime\shared\f07qtt wep6b08 tsomq34 vjq39c1gwy fishy .zip.exe
%WINDIR%\syswow64\config\systemprofile\horse epyxwn .zip.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\horse l9hwcs7vvnphd9 titts girly .rar.exe
%WINDIR%\syswow64\fxstmp\f07qtt 8ok6yf yzw1afy bq4kno fw58kpr41ob1w (gina,sarah).mpg.exe
%WINDIR%\syswow64\ime\shared\s2fkave cum lpcu5ai3 nom72kl .avi.exe
%WINDIR%\temp\fac71w2 porn beast [free] 40+ .zip.exe
%WINDIR%\winsxs\installtemp\ddqayq sperm vjq39c1gwy .mpg.exe
<Current directory>\sqjaed7r1vnw
Network activity
Connects to
'co##############e-chains.prod.autograph.services.mozaws.net':443
UDP
DNS ASK co##############e-chains.prod.autograph.services.mozaws.net
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
欢迎下载 Dr.Web for Android
免费3个月
可使用所有保护组件
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息
OK