マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.25459

Added to the Dr.Web virus database: 2025-07-10

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\porn horse nom72kl feet balls (c4w8hqa,sandy).rar.exe
  • %ProgramFiles%\dvd maker\shared\black nude l9hwcs7vvnphd9 cock .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\tsomq34 hot (!) .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\fac71w2 mnho9y54 bd1l5ir bq4kno (dxocjwba).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\ikdyfwhy nom72kl uncut fw58kpr41ob1w (liz,rdl1tfkz).zip.exe
  • %ProgramFiles%\microsoft office\templates\xxx hot (!) .avi.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\bd1l5ir big cock ae2sd7u4xh .mpg.exe
  • %ProgramFiles%\windows journal\templates\zc8giv9 wep6b08 bd1l5ir girls cock (jenna,haj1oyikd).rar.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\sperm sgu4m7oc balls (cy4xpd,y8oxsqa).rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\tsomq34 horse l9hwcs7vvnphd9 (cy4xpd,g6u8n4r).avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\yzw1afy lpcu5ai3 [free] titts (dehod0).mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\ mzwpstr8n uncut .mpg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\wep6b08 apv53deiq9fw ash qx2j1b5 .mpg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\gzn4ud7e cum [free] (cy4xpd).avi.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\yzw1afy cum nom72kl girly .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\4h1e2a346 w6csjja14n1 cum sgu4m7oc qx2j1b5 .avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\upfgetx horse apv53deiq9fw kfp2yqq boots .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\asian h93bklf w6csjja14n1 girls .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\4h1e2a346 wep6b08 epyxwn feet gsva2xn (c4w8hqa,sarah).mpeg.exe
  • %ALLUSERSPROFILE%\templates\s2fkave nom72kl xxx ihthd33 cock (sandy,sonja).rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\black tsomq34 bq4kno rv0y8n (36mho73,dxocjwba).avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\beast mnho9y54 ihthd33 ae2sd7u4xh (dehod0,jade).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\viaz50 lpcu5ai3 beast [bangbus] ol6p1tua (c4w8hqa).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\lpcu5ai3 wep6b08 girls young .avi.exe
  • %ALLUSERSPROFILE%\templates\yzw1afy vjq39c1gwy feet .zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\mnho9y54 wep6b08 girls mg9fvb2xk9 (g6u8n4r).zip.exe
  • C:\users\default\appdata\local\<INETFILES>\black horse horse epyxwn sm (dxocjwba).mpg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\nude sgu4m7oc jxqgtp ae2sd7u4xh .zip.exe
  • C:\users\default\templates\beast nude girls .mpg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\ikdyfwhy horse xakmpl apv53deiq9fw (jenna).mpeg.exe
  • %TEMP%\viaz50 gay uncut hole gh5b6gd7wrv .avi.exe
  • %LOCALAPPDATA%\<INETFILES>\viaz50 cum nom72kl bq4kno gsva2xn (sonja).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{070abd97-84e1-4f5f-9c02-f1d76dd9fce4}\ xxx uncut ae2sd7u4xh (gina).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{1fae114c-c2b0-4da1-b23a-8e5ad0c3d722}\black yzw1afy horse [bangbus] js80j73 (cy4xpd,dxocjwba).mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{3571406e-c08c-4c74-b145-8857b365f6e7}\zc8giv9 nude ddqayq girls qx2j1b5 (karin).rar.exe
  • %APPDATA%\microsoft\templates\tsomq34 gay epyxwn .avi.exe
  • %APPDATA%\microsoft\windows\templates\8r3baiec nom72kl apv53deiq9fw (y8oxsqa).avi.exe
  • %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\storage\temporary\black xxx horse epyxwn jxqgtp lzxyhb7k .avi.exe
  • %APPDATA%\thunderbird\profiles\chdgbv82.default-release\storage\temporary\zc8giv9 mzwpstr8n sgu4m7oc .rar.exe
  • %HOMEPATH%\templates\s2fkave tsomq34 cum epyxwn .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\gzn4ud7e yzw1afy uncut wifey .zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\fac71w2 ddqayq beast apv53deiq9fw feet lady .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\xxx horse epyxwn kfp2yqq hairy (hyo87il,cy4xpd).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\f1i7cm nude l9hwcs7vvnphd9 zn3tvn (sarah).mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\8r3baiec lpcu5ai3 bd1l5ir apv53deiq9fw boots .rar.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\nude xakmpl big .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\upfgetx horse nom72kl sgu4m7oc qq6w54yfhtqrbwcslg .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\wpjwijv xakmpl 7nd83wovj epyxwn mg9fvb2xk9 .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\eq7k2xcxt mzwpstr8n 7vepaqjm (dehod0,2hbt8wr).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\horse sgu4m7oc titts qx2j1b5 .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\f07qtt cum l9hwcs7vvnphd9 eigt45 .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\sperm [milf] eigt45 .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\cum porn bq4kno (y8oxsqa,jade).avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\s2fkave xxx nude apv53deiq9fw ol6p1tua .avi.exe
  • %WINDIR%\assembly\temp\mzwpstr8n epyxwn kfp2yqq fishy .mpg.exe
  • %WINDIR%\assembly\tmp\z1qxwcd sperm 7vepaqjm sm .avi.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\4h1e2a346 ddqayq l9hwcs7vvnphd9 (sandy,haj1oyikd).avi.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\jxaglwti sperm [milf] .mpeg.exe
  • %WINDIR%\pla\templates\h93bklf gay nom72kl 779mipj .mpg.exe
  • %WINDIR%\security\templates\upfgetx cum vjq39c1gwy (dxocjwba).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe nude ddqayq big glans hotel (rdl1tfkz).rar.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\ikdyfwhy xakmpl w6csjja14n1 girls kfp2yqq balls .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\fac71w2 apv53deiq9fw young .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\z1qxwcd beast tsomq34 ihthd33 zmc8ujp (sonja).zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\black cum mzwpstr8n uncut .zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\black beast epyxwn hole .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\wep6b08 nom72kl 50+ .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\beast [bangbus] jxqgtp .mpg.exe
  • %WINDIR%\syswow64\fxstmp\gay lpcu5ai3 [milf] kfp2yqq lzxyhb7k .mpeg.exe
  • %WINDIR%\syswow64\ime\shared\lpcu5ai3 apv53deiq9fw .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\4h1e2a346 mnho9y54 7vepaqjm gsva2xn .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\wpjwijv horse tsomq34 nom72kl sm (c4w8hqa,hyo87il).rar.exe
  • %WINDIR%\syswow64\fxstmp\z9z7rwe lpcu5ai3 nom72kl girls zmc8ujp .zip.exe
  • %WINDIR%\syswow64\ime\shared\upfgetx bd1l5ir hot (!) cock .rar.exe
  • %WINDIR%\temp\viaz50 horse 7nd83wovj nom72kl boots (sandy,dehod0).rar.exe
  • %WINDIR%\winsxs\installtemp\cum sgu4m7oc cock .mpeg.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android