マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.26418

Added to the Dr.Web virus database: 2025-07-13

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\eq7k2xcxt 7nd83wovj tsomq34 uncut balls .mpeg.exe
  • %ProgramFiles%\dvd maker\shared\black horse lpcu5ai3 sgu4m7oc qx2j1b5 .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\mnho9y54 uncut (sarah).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\s2fkave nude mnho9y54 uncut 6tl9zg0uqa .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\mnho9y54 nom72kl feet lzxyhb7k (cy4xpd).avi.exe
  • %ProgramFiles%\microsoft office\templates\eq7k2xcxt nude mzwpstr8n 7vepaqjm 40+ (dehod0,karin).zip.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\tsomq34 ihthd33 zmc8ujp .avi.exe
  • %ProgramFiles%\windows journal\templates\black bd1l5ir beast ihthd33 titts girly .mpg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\lpcu5ai3 hot (!) sweet .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\f1i7cm 8ok6yf tsomq34 epyxwn b37oavmx289 .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\fac71w2 ddqayq yzw1afy bq4kno 50+ .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\z9z7rwe bd1l5ir lpcu5ai3 sgu4m7oc (cy4xpd).rar.exe
  • %CommonProgramFiles(x86)%\microsoft shared\sperm [bangbus] .avi.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\s2fkave 8ok6yf sperm big latex .rar.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\xxx girls (dxocjwba).rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\mnho9y54 nom72kl hole sgoibhh (dxocjwba).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\eq7k2xcxt 7nd83wovj tsomq34 nom72kl lady .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\s2fkave bd1l5ir nom72kl [bangbus] titts .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\upfgetx w6csjja14n1 lpcu5ai3 apv53deiq9fw .rar.exe
  • %ALLUSERSPROFILE%\templates\mzwpstr8n uncut feet (dehod0,karin).zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\s2fkave ddqayq yzw1afy bq4kno .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\eq7k2xcxt ddqayq mzwpstr8n epyxwn young .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay [free] cock sgoibhh .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\mzwpstr8n [milf] sm (hyo87il,jade).avi.exe
  • %ALLUSERSPROFILE%\templates\upfgetx wep6b08 nom72kl ihthd33 hole .avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\sperm [bangbus] feet .mpg.exe
  • C:\users\default\appdata\local\temp\gay l9hwcs7vvnphd9 glans nmibe2 .mpeg.exe
  • C:\users\default\appdata\local\<INETFILES>\f1i7cm w6csjja14n1 horse [bangbus] wifey .zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\8r3baiec bd1l5ir tsomq34 epyxwn shoes .zip.exe
  • C:\users\default\templates\fac71w2 h93bklf tsomq34 7vepaqjm hole balls (jade).mpg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\z9z7rwe xakmpl tsomq34 ihthd33 glans .mpeg.exe
  • %TEMP%\gzn4ud7e xakmpl [milf] b37oavmx289 .avi.exe
  • %LOCALAPPDATA%\<INETFILES>\upfgetx cum mnho9y54 sgu4m7oc hole latex .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\horse l9hwcs7vvnphd9 feet .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\f07qtt 7nd83wovj mzwpstr8n [bangbus] titts .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\yzw1afy [milf] feet .zip.exe
  • %APPDATA%\microsoft\templates\black w6csjja14n1 yzw1afy nom72kl .mpg.exe
  • %APPDATA%\microsoft\windows\templates\beast nom72kl js80j73 (sonja,g6u8n4r).mpg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\fac71w2 ddqayq lpcu5ai3 epyxwn ae2sd7u4xh (jenna,jade).mpeg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\s2fkave cum horse l9hwcs7vvnphd9 .zip.exe
  • %HOMEPATH%\templates\yzw1afy [free] .mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\z9z7rwe 8ok6yf mzwpstr8n [milf] hole .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\mzwpstr8n bq4kno lady .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\8r3baiec xakmpl tsomq34 uncut cock .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\tsomq34 sgu4m7oc hole .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\eq7k2xcxt nude horse ihthd33 .zip.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\tsomq34 [free] .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\z9z7rwe bd1l5ir l9hwcs7vvnphd9 js80j73 .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\gay bq4kno gh5b6gd7wrv .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\fac71w2 cum beast sgu4m7oc titts wifey .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\mnho9y54 [milf] (karin).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\horse 7vepaqjm feet .rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\f1i7cm cum tsomq34 apv53deiq9fw eigt45 .avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\gay [milf] latex .mpg.exe
  • %WINDIR%\assembly\temp\mzwpstr8n nom72kl latex .avi.exe
  • %WINDIR%\assembly\tmp\s2fkave ddqayq nom72kl [bangbus] qq6w54yfhtqrbwcslg .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\8r3baiec h93bklf beast [bangbus] fw58kpr41ob1w .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\lpcu5ai3 [milf] .rar.exe
  • %WINDIR%\pla\templates\ girls .zip.exe
  • %WINDIR%\security\templates\beast sgu4m7oc (jade).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\xxx apv53deiq9fw cock .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\nom72kl apv53deiq9fw 40+ .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\s2fkave cum yzw1afy 7vepaqjm (liz).avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\mnho9y54 l9hwcs7vvnphd9 .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\eq7k2xcxt nude lpcu5ai3 nom72kl shoes .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\s2fkave horse beast 7vepaqjm hole zmc8ujp .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\f07qtt ddqayq xxx bq4kno boots (dehod0,liz).zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\tsomq34 ihthd33 .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\8ok6yf sperm uncut ol6p1tua (dehod0,dxocjwba).zip.exe
  • %WINDIR%\syswow64\ime\shared\nom72kl uncut zmc8ujp .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\eq7k2xcxt porn vjq39c1gwy feet .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\f1i7cm h93bklf beast girls lady .rar.exe
  • %WINDIR%\syswow64\fxstmp\upfgetx bd1l5ir beast 7vepaqjm cock 50+ (c4w8hqa).avi.exe
  • %WINDIR%\syswow64\ime\shared\xxx epyxwn glans qq6w54yfhtqrbwcslg .mpg.exe
  • %WINDIR%\temp\beast hot (!) gsva2xn .zip.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android