マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.29923

Added to the Dr.Web virus database: 2025-07-17

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\8r3baiec sperm vjq39c1gwy .avi.exe
  • %ProgramFiles%\dvd maker\shared\gay [bangbus] cock nmibe2 .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\f07qtt tsomq34 bd1l5ir ihthd33 mg9fvb2xk9 (hyo87il).rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\fac71w2 sperm [milf] kfp2yqq (sonja).zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\upfgetx horse hot (!) mg9fvb2xk9 (dxocjwba,36mho73).mpg.exe
  • %ProgramFiles%\microsoft office\templates\sperm sgu4m7oc 50+ (jade).rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\7nd83wovj bq4kno cock eigt45 (sonja).mpeg.exe
  • %ProgramFiles%\windows journal\templates\ wep6b08 sgu4m7oc gh5b6gd7wrv (sonja).mpeg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\f1i7cm nude xakmpl 7vepaqjm .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\wpjwijv wep6b08 beast big ae2sd7u4xh .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\8ok6yf mzwpstr8n [milf] young (y8oxsqa,cy4xpd).rar.exe
  • %CommonProgramFiles(x86)%\microsoft shared\nude l9hwcs7vvnphd9 .avi.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\tsomq34 ihthd33 rv0y8n .zip.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\eq7k2xcxt w6csjja14n1 big ejn547rbxhd1 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\wep6b08 uncut 6tl9zg0uqa (karin).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\f07qtt cum bd1l5ir nom72kl young .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\f1i7cm beast uncut (2hbt8wr).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\7b6fhxi xakmpl nom72kl zmc8ujp .avi.exe
  • %ALLUSERSPROFILE%\templates\wpjwijv sperm big ol6p1tua .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\4h1e2a346 h93bklf uncut titts .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\z1qxwcd horse uncut .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\nude [free] .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\0287zh bd1l5ir h93bklf uncut .rar.exe
  • %ALLUSERSPROFILE%\templates\z1qxwcd w6csjja14n1 [free] .rar.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\0287zh xxx hot (!) (sonja,sonja).rar.exe
  • C:\users\default\appdata\local\temp\porn epyxwn sm .rar.exe
  • C:\users\default\appdata\local\<INETFILES>\zc8giv9 8ok6yf 7nd83wovj l9hwcs7vvnphd9 zmc8ujp .avi.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\wep6b08 hot (!) gh5b6gd7wrv .avi.exe
  • C:\users\default\templates\xakmpl [milf] hairy (jade,sonja).zip.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\7nd83wovj uncut fw58kpr41ob1w .rar.exe
  • %TEMP%\0287zh yzw1afy horse [free] legs (gina,liz).rar.exe
  • %LOCALAPPDATA%\<INETFILES>\mnho9y54 yzw1afy [bangbus] .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\f07qtt horse nom72kl apv53deiq9fw 8bgkvshe1 .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\7b6fhxi [milf] shoes .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\xxx 7vepaqjm ash .avi.exe
  • %APPDATA%\microsoft\templates\z9z7rwe h93bklf sperm bq4kno feet 8pfmdyy (cy4xpd).rar.exe
  • %APPDATA%\microsoft\windows\templates\ikdyfwhy 8ok6yf nude apv53deiq9fw .rar.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\s2fkave bd1l5ir hot (!) hole ae2sd7u4xh .mpg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\gay h93bklf epyxwn glans .rar.exe
  • %HOMEPATH%\templates\black beast bq4kno .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\gay sgu4m7oc eigt45 (hyo87il).avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\sperm mnho9y54 [bangbus] jxqgtp zmc8ujp .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\8ok6yf beast vjq39c1gwy glans young .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\beast bd1l5ir apv53deiq9fw .avi.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\s2fkave cum h93bklf apv53deiq9fw (dehod0,karin).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\8r3baiec gay mnho9y54 [free] fw58kpr41ob1w .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\gzn4ud7e horse wep6b08 [bangbus] .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\viaz50 7nd83wovj mzwpstr8n [milf] hairy (liz,jenna).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\fac71w2 beast w6csjja14n1 big feet 8bgkvshe1 .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\eq7k2xcxt w6csjja14n1 [free] shoes .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\f07qtt lpcu5ai3 nom72kl (sonja,hyo87il).avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\eq7k2xcxt sperm h93bklf vjq39c1gwy (rdl1tfkz).avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\zc8giv9 xxx vjq39c1gwy feet 50+ .mpeg.exe
  • %WINDIR%\assembly\temp\f07qtt w6csjja14n1 nom72kl .avi.exe
  • %WINDIR%\assembly\tmp\mnho9y54 7vepaqjm (rdl1tfkz).avi.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\wpjwijv horse epyxwn glans sm .avi.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\7nd83wovj ddqayq apv53deiq9fw .mpeg.exe
  • %WINDIR%\pla\templates\4h1e2a346 mzwpstr8n uncut cock ol6p1tua (sonja).zip.exe
  • %WINDIR%\security\templates\upfgetx xakmpl nude [milf] qq6w54yfhtqrbwcslg (y8oxsqa,2hbt8wr).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\s2fkave h93bklf xakmpl bq4kno feet .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\gay wep6b08 uncut qq6w54yfhtqrbwcslg .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\fac71w2 w6csjja14n1 horse [milf] ejn547rbxhd1 (jade,haj1oyikd).mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\xxx 7vepaqjm .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\jxaglwti bd1l5ir uncut fw58kpr41ob1w .zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\f1i7cm horse l9hwcs7vvnphd9 legs mg9fvb2xk9 .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\viaz50 porn bq4kno .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\nude apv53deiq9fw ash (y8oxsqa,liz).avi.exe
  • %WINDIR%\syswow64\fxstmp\black porn [milf] titts .zip.exe
  • %WINDIR%\syswow64\ime\shared\wpjwijv xakmpl wep6b08 sgu4m7oc 8bgkvshe1 (sandy).avi.exe
  • %WINDIR%\syswow64\config\systemprofile\jxaglwti lpcu5ai3 nude epyxwn jxqgtp zmc8ujp (jenna,cy4xpd).zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\jxaglwti gay apv53deiq9fw zmc8ujp .zip.exe
  • %WINDIR%\syswow64\fxstmp\z9z7rwe yzw1afy wep6b08 [bangbus] boobs ash .rar.exe
  • %WINDIR%\syswow64\ime\shared\h93bklf sgu4m7oc boobs .rar.exe
  • %WINDIR%\temp\black mzwpstr8n yzw1afy sgu4m7oc mg9fvb2xk9 .avi.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android