マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.31090

Added to the Dr.Web virus database: 2025-07-17

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\h93bklf 7nd83wovj bq4kno js80j73 .mpg.exe
  • %ProgramFiles%\dvd maker\shared\black mzwpstr8n hot (!) 8bgkvshe1 .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\horse hot (!) kfp2yqq .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\xxx [free] .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\8ok6yf xakmpl l9hwcs7vvnphd9 legs .mpg.exe
  • %ProgramFiles%\microsoft office\templates\wep6b08 girls titts 6tl9zg0uqa .mpeg.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\ikdyfwhy 8ok6yf [free] gh5b6gd7wrv .zip.exe
  • %ProgramFiles%\windows journal\templates\4h1e2a346 horse 7vepaqjm (haj1oyikd).zip.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\horse [milf] lzxyhb7k (liz,liz).mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\h93bklf girls ash zn3tvn .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\ikdyfwhy gay vjq39c1gwy qq6w54yfhtqrbwcslg (jenna).mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\wpjwijv w6csjja14n1 ihthd33 (rdl1tfkz,36mho73).zip.exe
  • %CommonProgramFiles(x86)%\microsoft shared\horse hot (!) latex .avi.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\upfgetx xakmpl uncut 50+ .avi.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\mzwpstr8n apv53deiq9fw boobs js80j73 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\f07qtt bd1l5ir 8ok6yf vjq39c1gwy hotel .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\bd1l5ir mnho9y54 bq4kno (sonja).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\nom72kl [milf] fw58kpr41ob1w .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\7nd83wovj 7nd83wovj nom72kl boobs qq6w54yfhtqrbwcslg .avi.exe
  • %ALLUSERSPROFILE%\templates\f07qtt beast sgu4m7oc nmibe2 .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\xakmpl ihthd33 ash sm .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\z9z7rwe xakmpl horse epyxwn jxqgtp gh5b6gd7wrv .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\wpjwijv mnho9y54 apv53deiq9fw glans (y8oxsqa).rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\jxaglwti lpcu5ai3 vjq39c1gwy .rar.exe
  • %ALLUSERSPROFILE%\templates\fac71w2 sperm ihthd33 glans .mpeg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\tsomq34 nom72kl .zip.exe
  • C:\users\default\appdata\local\temp\eq7k2xcxt horse xakmpl ihthd33 cock .avi.exe
  • C:\users\default\appdata\local\<INETFILES>\f1i7cm w6csjja14n1 lpcu5ai3 sgu4m7oc .avi.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\zc8giv9 h93bklf vjq39c1gwy titts ash .rar.exe
  • C:\users\default\templates\beast beast vjq39c1gwy fishy .zip.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\nom72kl girls hairy .avi.exe
  • %TEMP%\eq7k2xcxt cum girls b37oavmx289 .avi.exe
  • %LOCALAPPDATA%\<INETFILES>\upfgetx yzw1afy wep6b08 ihthd33 gh5b6gd7wrv .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\bd1l5ir tsomq34 [bangbus] ash .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\lpcu5ai3 horse apv53deiq9fw 40+ .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\7nd83wovj ihthd33 lady .mpeg.exe
  • %APPDATA%\microsoft\templates\ vjq39c1gwy .mpg.exe
  • %APPDATA%\microsoft\windows\templates\w6csjja14n1 xxx epyxwn .avi.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\0287zh beast sgu4m7oc .avi.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\xxx ddqayq ihthd33 feet .zip.exe
  • %HOMEPATH%\templates\f1i7cm h93bklf uncut zmc8ujp .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\upfgetx sperm w6csjja14n1 l9hwcs7vvnphd9 .zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\jxaglwti porn vjq39c1gwy .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\sperm cum ihthd33 gsva2xn .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\f07qtt mzwpstr8n 8ok6yf girls lady .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\eq7k2xcxt sperm xakmpl l9hwcs7vvnphd9 hole ejn547rbxhd1 (2hbt8wr).avi.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\bd1l5ir h93bklf 7vepaqjm ol6p1tua (36mho73).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\wpjwijv hot (!) sweet (jenna,g6u8n4r).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\upfgetx w6csjja14n1 girls .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\wpjwijv porn lpcu5ai3 girls cock ash .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\jxaglwti xakmpl apv53deiq9fw .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\viaz50 lpcu5ai3 tsomq34 hot (!) titts sgoibhh .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\black yzw1afy mnho9y54 [bangbus] wifey (sonja,sonja).mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\ikdyfwhy nude [bangbus] .rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\ddqayq 7nd83wovj epyxwn boobs .avi.exe
  • %WINDIR%\assembly\temp\4h1e2a346 yzw1afy girls (2hbt8wr,sandy).mpeg.exe
  • %WINDIR%\assembly\tmp\jxaglwti ddqayq epyxwn girly .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\ wep6b08 apv53deiq9fw girly .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\horse vjq39c1gwy .avi.exe
  • %WINDIR%\pla\templates\f07qtt yzw1afy girls (gina,jade).avi.exe
  • %WINDIR%\security\templates\f07qtt porn [free] .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\asian cum tsomq34 hot (!) girly .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\black h93bklf big .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\tsomq34 horse girls cock ash .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\jxaglwti lpcu5ai3 bd1l5ir 7vepaqjm sgoibhh (dxocjwba,jenna).rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\gay bd1l5ir uncut mg9fvb2xk9 .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\bd1l5ir uncut legs ol6p1tua .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\zc8giv9 7nd83wovj ihthd33 legs eigt45 .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\wpjwijv 7nd83wovj xxx big ash .zip.exe
  • %WINDIR%\syswow64\ime\shared\ikdyfwhy xakmpl apv53deiq9fw (dxocjwba).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\mnho9y54 mnho9y54 7vepaqjm .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\horse mnho9y54 uncut titts eigt45 .zip.exe
  • %WINDIR%\syswow64\fxstmp\viaz50 xakmpl 7nd83wovj girls girly (sonja).zip.exe
  • %WINDIR%\syswow64\ime\shared\nude [free] 50+ .rar.exe
  • %WINDIR%\temp\0287zh horse nom72kl epyxwn sweet (sonja,jenna).mpeg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android