マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.25029

Added to the Dr.Web virus database: 2025-07-05

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\ ihthd33 .mpeg.exe
  • %ProgramFiles%\dvd maker\shared\fac71w2 h93bklf tsomq34 bq4kno hole (rdl1tfkz,c4w8hqa).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\yzw1afy [milf] .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\eq7k2xcxt 8ok6yf bq4kno hotel .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\fac71w2 nude beast vjq39c1gwy titts rv0y8n (dxocjwba).mpg.exe
  • %ProgramFiles%\microsoft office\templates\f07qtt 7nd83wovj bq4kno 40+ (rdl1tfkz,y8oxsqa).mpg.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\f07qtt xakmpl gay epyxwn .avi.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\z9z7rwe 8ok6yf horse l9hwcs7vvnphd9 feet 779mipj .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\mzwpstr8n [milf] balls .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\xxx uncut glans latex (karin).mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\upfgetx bd1l5ir tsomq34 sgu4m7oc titts gsva2xn (sarah).zip.exe
  • %CommonProgramFiles(x86)%\microsoft shared\gzn4ud7e h93bklf xxx [free] glans girly (sarah).mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\s2fkave 8ok6yf sperm apv53deiq9fw cock (hyo87il,dxocjwba).mpg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\s2fkave nude gay vjq39c1gwy .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\eq7k2xcxt 7nd83wovj mzwpstr8n [bangbus] lzxyhb7k .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\gay [milf] (y8oxsqa).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\yzw1afy big titts .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\gay nom72kl glans .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\porn lpcu5ai3 bq4kno feet ash .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\eq7k2xcxt horse beast girls cock .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gzn4ud7e 7nd83wovj sperm [milf] .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\z9z7rwe nude epyxwn titts hairy .avi.exe
  • %ALLUSERSPROFILE%\templates\black porn lpcu5ai3 uncut (sarah).avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\gzn4ud7e horse nom72kl epyxwn 40+ (gina,jade).avi.exe
  • C:\users\default\appdata\local\temp\z9z7rwe 7nd83wovj mnho9y54 sgu4m7oc 6tl9zg0uqa .zip.exe
  • C:\users\default\appdata\local\<INETFILES>\f07qtt cum xxx hot (!) feet 8bgkvshe1 .mpg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\gay [milf] cock rv0y8n (c4w8hqa).zip.exe
  • C:\users\default\templates\mnho9y54 hot (!) feet .avi.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\s2fkave w6csjja14n1 mnho9y54 hot (!) feet young .mpeg.exe
  • %TEMP%\sperm uncut cock zmc8ujp (y8oxsqa).mpeg.exe
  • %LOCALAPPDATA%\<INETFILES>\z9z7rwe bd1l5ir yzw1afy [free] hole .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\horse l9hwcs7vvnphd9 .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\f1i7cm h93bklf gay sgu4m7oc cock .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\mnho9y54 hot (!) .mpg.exe
  • %APPDATA%\microsoft\templates\gzn4ud7e wep6b08 yzw1afy big glans mg9fvb2xk9 .avi.exe
  • %APPDATA%\microsoft\windows\templates\fac71w2 wep6b08 gay l9hwcs7vvnphd9 ash .rar.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\f07qtt w6csjja14n1 gay ihthd33 hole .mpeg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\z9z7rwe horse gay hot (!) fw58kpr41ob1w .avi.exe
  • %HOMEPATH%\templates\xxx [bangbus] (dxocjwba).avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\nom72kl l9hwcs7vvnphd9 feet 8pfmdyy .avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\mnho9y54 [milf] 779mipj (dehod0,c4w8hqa).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\tsomq34 uncut .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\gay hot (!) .avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\mnho9y54 [free] zmc8ujp .mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\8r3baiec horse sperm epyxwn cock ejn547rbxhd1 .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\z9z7rwe w6csjja14n1 beast uncut titts sgoibhh (jade).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\f1i7cm nude tsomq34 hot (!) hotel (36mho73,g6u8n4r).rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\xxx nom72kl .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\eq7k2xcxt horse beast apv53deiq9fw young .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\black horse xxx epyxwn feet (dehod0,g6u8n4r).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\8r3baiec bd1l5ir xxx [bangbus] hole .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\s2fkave porn nom72kl big mg9fvb2xk9 .avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\lpcu5ai3 ihthd33 hole qx2j1b5 (c4w8hqa).mpg.exe
  • %WINDIR%\assembly\temp\s2fkave ddqayq mnho9y54 bq4kno nmibe2 .rar.exe
  • %WINDIR%\assembly\tmp\xxx ihthd33 .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\black horse mzwpstr8n sgu4m7oc .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\black bd1l5ir mzwpstr8n [free] .avi.exe
  • %WINDIR%\pla\templates\ [bangbus] rv0y8n .zip.exe
  • %WINDIR%\security\templates\f07qtt bd1l5ir tsomq34 girls cock .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt nude horse apv53deiq9fw hole .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\s2fkave 8ok6yf horse [bangbus] wifey .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\yzw1afy uncut hairy (rdl1tfkz,2hbt8wr).rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\s2fkave ddqayq nom72kl epyxwn latex .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\tsomq34 girls titts (36mho73,karin).mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\mnho9y54 apv53deiq9fw balls (sonja,cy4xpd).zip.exe
  • %WINDIR%\syswow64\config\systemprofile\upfgetx 8ok6yf tsomq34 [milf] hairy .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\sperm uncut (sarah).zip.exe
  • %WINDIR%\syswow64\fxstmp\viaz50 yzw1afy [free] glans nrb42wq (g6u8n4r).zip.exe
  • %WINDIR%\syswow64\config\systemprofile\horse big (g6u8n4r).mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\xxx girls .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\beast l9hwcs7vvnphd9 cock mg9fvb2xk9 .mpg.exe
  • %WINDIR%\syswow64\ime\shared\ l9hwcs7vvnphd9 glans girly .mpeg.exe
  • %WINDIR%\temp\s2fkave bd1l5ir xxx 7vepaqjm hole 8pfmdyy (karin).zip.exe
  • %WINDIR%\winsxs\installtemp\jxaglwti tsomq34 uncut hotel (gina,y8oxsqa).zip.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android