マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.25187

Added to the Dr.Web virus database: 2025-07-09

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\gay apv53deiq9fw cock hairy .avi.exe
  • %ProgramFiles%\dvd maker\shared\mzwpstr8n sgu4m7oc (dxocjwba).avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\sperm hot (!) .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\s2fkave h93bklf xxx bq4kno hole ae2sd7u4xh .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\z9z7rwe w6csjja14n1 beast l9hwcs7vvnphd9 rv0y8n .avi.exe
  • %ProgramFiles%\microsoft office\templates\black horse tsomq34 girls cock .mpg.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\eq7k2xcxt wep6b08 yzw1afy uncut (c4w8hqa).mpeg.exe
  • %ProgramFiles%\windows journal\templates\upfgetx cum girls .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\mzwpstr8n epyxwn .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\z9z7rwe horse horse nom72kl cock (haj1oyikd,2hbt8wr).zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\lpcu5ai3 hot (!) 40+ .mpg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\s2fkave bd1l5ir gay hot (!) fishy (sonja,y8oxsqa).zip.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\z9z7rwe h93bklf lpcu5ai3 girls qx2j1b5 .avi.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\sperm uncut cock .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\fac71w2 ddqayq mzwpstr8n l9hwcs7vvnphd9 (liz).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\lpcu5ai3 l9hwcs7vvnphd9 (g6u8n4r).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\eq7k2xcxt 7nd83wovj beast uncut nrb42wq .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\lpcu5ai3 girls glans young .rar.exe
  • %ALLUSERSPROFILE%\templates\tsomq34 sgu4m7oc .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\xxx 7vepaqjm hotel .zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\s2fkave nude mzwpstr8n nom72kl cock .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\nom72kl sgu4m7oc fishy .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\gzn4ud7e ddqayq sperm [milf] (g6u8n4r).rar.exe
  • %ALLUSERSPROFILE%\templates\gzn4ud7e h93bklf xxx uncut 40+ (sandy,y8oxsqa).zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\lpcu5ai3 ihthd33 feet fishy .mpeg.exe
  • C:\users\default\appdata\local\temp\nom72kl hot (!) titts .mpeg.exe
  • C:\users\default\appdata\local\<INETFILES>\mnho9y54 [free] titts js80j73 .mpeg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\s2fkave cum tsomq34 epyxwn balls .zip.exe
  • C:\users\default\templates\horse big .zip.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\nom72kl hot (!) feet .zip.exe
  • %TEMP%\f07qtt xakmpl horse hot (!) 6tl9zg0uqa (hyo87il,c4w8hqa).avi.exe
  • %LOCALAPPDATA%\<INETFILES>\horse big titts (dehod0,cy4xpd).avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\ ihthd33 feet nrb42wq .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\gay [milf] titts balls .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\8r3baiec horse gay big girly .mpg.exe
  • %APPDATA%\microsoft\templates\z9z7rwe xakmpl gay vjq39c1gwy (2hbt8wr).avi.exe
  • %APPDATA%\microsoft\windows\templates\8r3baiec cum uncut (dxocjwba).avi.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\s2fkave 7nd83wovj yzw1afy girls gh5b6gd7wrv (rdl1tfkz,c4w8hqa).mpg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\fac71w2 wep6b08 sperm bq4kno glans .rar.exe
  • %HOMEPATH%\templates\gzn4ud7e 8ok6yf horse hot (!) (dxocjwba).zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\eq7k2xcxt w6csjja14n1 nom72kl epyxwn eigt45 (sonja,2hbt8wr).avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\yzw1afy nom72kl .avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\sperm [bangbus] titts .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\sperm apv53deiq9fw shoes .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\upfgetx bd1l5ir nom72kl sgu4m7oc cock ae2sd7u4xh (g6u8n4r).mpeg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\f07qtt 7nd83wovj tsomq34 uncut titts (jenna,jade).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\upfgetx 7nd83wovj tsomq34 apv53deiq9fw .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\nom72kl uncut .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\lpcu5ai3 [free] glans .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\fac71w2 h93bklf beast apv53deiq9fw boots .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\yzw1afy 7vepaqjm .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\upfgetx porn gay epyxwn glans .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\z9z7rwe xakmpl nom72kl apv53deiq9fw (g6u8n4r).avi.exe
  • %WINDIR%\assembly\temp\z9z7rwe porn tsomq34 [milf] titts 8pfmdyy (karin).zip.exe
  • %WINDIR%\assembly\tmp\f1i7cm w6csjja14n1 beast girls titts .mpg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\upfgetx 7nd83wovj beast bq4kno .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\yzw1afy ihthd33 ae2sd7u4xh .zip.exe
  • %WINDIR%\pla\templates\mnho9y54 big latex (rdl1tfkz,g6u8n4r).avi.exe
  • %WINDIR%\security\templates\f07qtt bd1l5ir tsomq34 vjq39c1gwy feet (sonja,liz).avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\ hot (!) .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\s2fkave 7nd83wovj mzwpstr8n epyxwn lzxyhb7k .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\sperm 7vepaqjm qx2j1b5 .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\mzwpstr8n 7vepaqjm hole (rdl1tfkz,karin).mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\8r3baiec wep6b08 horse big (c4w8hqa).zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\lpcu5ai3 uncut titts qx2j1b5 .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\upfgetx 8ok6yf nom72kl bq4kno ol6p1tua .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\lpcu5ai3 girls cock 50+ .avi.exe
  • %WINDIR%\syswow64\fxstmp\mnho9y54 7vepaqjm titts lady (2hbt8wr).rar.exe
  • %WINDIR%\syswow64\ime\shared\xxx vjq39c1gwy .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\ ihthd33 fw58kpr41ob1w .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\black bd1l5ir tsomq34 [bangbus] titts fw58kpr41ob1w .mpg.exe
  • %WINDIR%\syswow64\fxstmp\sperm hot (!) glans zmc8ujp (g6u8n4r).zip.exe
  • %WINDIR%\syswow64\ime\shared\gzn4ud7e nude sperm 7vepaqjm feet .zip.exe
  • %WINDIR%\temp\8r3baiec h93bklf gay 7vepaqjm hotel .mpg.exe
  • %WINDIR%\winsxs\installtemp\fac71w2 cum sperm ihthd33 boots (dehod0,y8oxsqa).mpeg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android