マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.26394

Added to the Dr.Web virus database: 2025-07-13

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\eq7k2xcxt horse mnho9y54 girls feet .mpg.exe
  • %ProgramFiles%\dvd maker\shared\horse uncut glans 6tl9zg0uqa .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\upfgetx wep6b08 vjq39c1gwy titts 6tl9zg0uqa .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\upfgetx cum mnho9y54 ihthd33 balls .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\fac71w2 nude tsomq34 nom72kl hole .zip.exe
  • %ProgramFiles%\microsoft office\templates\eq7k2xcxt nude sperm sgu4m7oc eigt45 (haj1oyikd,karin).zip.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\xxx uncut 6tl9zg0uqa (36mho73,cy4xpd).mpg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\s2fkave porn gay girls .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\black bd1l5ir yzw1afy girls hole .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\black 7nd83wovj tsomq34 girls .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\gzn4ud7e h93bklf nom72kl sgu4m7oc rv0y8n .zip.exe
  • %CommonProgramFiles(x86)%\microsoft shared\gzn4ud7e nude lpcu5ai3 hot (!) b37oavmx289 .mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\horse epyxwn (c4w8hqa).avi.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\beast hot (!) ol6p1tua .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\eq7k2xcxt xakmpl lpcu5ai3 l9hwcs7vvnphd9 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\upfgetx h93bklf yzw1afy nom72kl (y8oxsqa).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\tsomq34 [free] .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\z9z7rwe 8ok6yf nom72kl girls ash .mpg.exe
  • %ALLUSERSPROFILE%\templates\f1i7cm xakmpl sperm [bangbus] cock zn3tvn .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\8r3baiec cum mzwpstr8n 7vepaqjm 50+ .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\yzw1afy 7vepaqjm mg9fvb2xk9 (sonja,sarah).rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\black wep6b08 tsomq34 epyxwn .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\beast [bangbus] .rar.exe
  • %ALLUSERSPROFILE%\templates\f1i7cm h93bklf mzwpstr8n [bangbus] titts .avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\black ddqayq nom72kl nom72kl ejn547rbxhd1 .avi.exe
  • C:\users\default\appdata\local\temp\beast epyxwn ol6p1tua .mpg.exe
  • C:\users\default\appdata\local\<INETFILES>\f1i7cm ddqayq tsomq34 uncut ash .rar.exe
  • C:\users\default\templates\porn horse ihthd33 titts .avi.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\tsomq34 [milf] feet (gina,dxocjwba).mpg.exe
  • %TEMP%\s2fkave porn mnho9y54 [free] 779mipj (36mho73,2hbt8wr).mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\mzwpstr8n [milf] .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\black h93bklf mzwpstr8n sgu4m7oc glans .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\gzn4ud7e h93bklf gay hot (!) balls .mpg.exe
  • %APPDATA%\microsoft\templates\mnho9y54 big fw58kpr41ob1w .mpg.exe
  • %APPDATA%\microsoft\windows\templates\yzw1afy big feet ash .mpeg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\gzn4ud7e bd1l5ir horse [milf] titts gh5b6gd7wrv .rar.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\lpcu5ai3 l9hwcs7vvnphd9 glans .mpg.exe
  • %HOMEPATH%\templates\tsomq34 7vepaqjm .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\f1i7cm nude nom72kl [milf] hole qq6w54yfhtqrbwcslg .avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\z9z7rwe porn nom72kl big sm .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\s2fkave ddqayq mnho9y54 apv53deiq9fw qx2j1b5 .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\beast uncut hole qx2j1b5 (cy4xpd).mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\lpcu5ai3 uncut .avi.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\fac71w2 bd1l5ir gay girls hole .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\lpcu5ai3 hot (!) rv0y8n .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\f07qtt 8ok6yf tsomq34 [milf] hole ejn547rbxhd1 .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\yzw1afy hot (!) feet zmc8ujp .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\mnho9y54 big cock (jenna,y8oxsqa).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\eq7k2xcxt nude gay uncut ejn547rbxhd1 .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\s2fkave nude sperm hot (!) hole balls (liz).mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\eq7k2xcxt porn beast l9hwcs7vvnphd9 hole latex (dxocjwba).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\beast [free] fw58kpr41ob1w .rar.exe
  • %WINDIR%\assembly\temp\beast apv53deiq9fw cock .rar.exe
  • %WINDIR%\assembly\tmp\8r3baiec wep6b08 mnho9y54 7vepaqjm feet js80j73 .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\tsomq34 bq4kno nmibe2 .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\nom72kl sgu4m7oc sweet .zip.exe
  • %WINDIR%\pla\templates\tsomq34 ihthd33 cock .zip.exe
  • %WINDIR%\security\templates\horse sgu4m7oc feet js80j73 .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\s2fkave w6csjja14n1 xxx hot (!) (2hbt8wr).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\8r3baiec cum horse epyxwn fw58kpr41ob1w (jenna,g6u8n4r).rar.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\sperm l9hwcs7vvnphd9 hotel .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\black bd1l5ir sperm sgu4m7oc .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\z9z7rwe wep6b08 tsomq34 big (liz).mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\beast epyxwn cock balls .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\fac71w2 bd1l5ir mnho9y54 bq4kno titts wifey (cy4xpd).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe ddqayq tsomq34 l9hwcs7vvnphd9 feet gsva2xn .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\fac71w2 xakmpl gay 7vepaqjm feet sm (sarah).mpeg.exe
  • %WINDIR%\syswow64\ime\shared\mzwpstr8n vjq39c1gwy wifey .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\s2fkave porn horse [milf] hole .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\mnho9y54 girls hairy .mpg.exe
  • %WINDIR%\syswow64\fxstmp\beast 7vepaqjm feet mg9fvb2xk9 (g6u8n4r).zip.exe
  • %WINDIR%\syswow64\ime\shared\beast girls sweet .mpg.exe
  • %WINDIR%\temp\fac71w2 porn mnho9y54 uncut titts .mpeg.exe
  • %WINDIR%\winsxs\installtemp\f1i7cm bd1l5ir beast ihthd33 .mpeg.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android