マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.28932

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\upfgetx w6csjja14n1 gay nom72kl .mpg.exe
  • %ProgramFiles%\dvd maker\shared\xxx big lzxyhb7k .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\beast [bangbus] girly .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\f07qtt nude mzwpstr8n vjq39c1gwy titts rv0y8n .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\nom72kl [milf] titts 6tl9zg0uqa .rar.exe
  • %ProgramFiles%\microsoft office\templates\f1i7cm nude xxx girls feet .avi.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\8r3baiec wep6b08 mzwpstr8n hot (!) glans (rdl1tfkz,cy4xpd).mpg.exe
  • %ProgramFiles%\windows journal\templates\mzwpstr8n apv53deiq9fw cock nmibe2 .zip.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\mnho9y54 epyxwn js80j73 .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\mnho9y54 nom72kl lzxyhb7k (dehod0,c4w8hqa).avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\upfgetx horse nom72kl [bangbus] (liz).avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\ uncut .avi.exe
  • %CommonProgramFiles(x86)%\microsoft shared\mnho9y54 girls hole .rar.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\beast hot (!) mg9fvb2xk9 .mpg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\fac71w2 nude nom72kl big .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\f1i7cm cum gay bq4kno hole zmc8ujp .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\beast epyxwn (cy4xpd).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gzn4ud7e h93bklf bq4kno ejn547rbxhd1 .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\eq7k2xcxt nude xxx uncut hole js80j73 .avi.exe
  • %ALLUSERSPROFILE%\templates\s2fkave 7nd83wovj mnho9y54 vjq39c1gwy cock .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\s2fkave h93bklf lpcu5ai3 vjq39c1gwy latex (sandy,jade).rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\tsomq34 uncut ash .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\s2fkave h93bklf nom72kl 7vepaqjm sm .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\horse 7vepaqjm 8pfmdyy .mpeg.exe
  • %ALLUSERSPROFILE%\templates\sperm 7vepaqjm young .mpg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\ 7vepaqjm hole (36mho73,liz).zip.exe
  • C:\users\default\appdata\local\temp\sperm [milf] feet rv0y8n .rar.exe
  • C:\users\default\appdata\local\<INETFILES>\mzwpstr8n l9hwcs7vvnphd9 .zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\upfgetx nude tsomq34 ihthd33 8bgkvshe1 .mpeg.exe
  • C:\users\default\templates\beast girls zmc8ujp .rar.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\black nude tsomq34 l9hwcs7vvnphd9 hole ejn547rbxhd1 (g6u8n4r).avi.exe
  • %TEMP%\8r3baiec 7nd83wovj beast epyxwn sweet .zip.exe
  • %LOCALAPPDATA%\<INETFILES>\tsomq34 [milf] .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\upfgetx porn tsomq34 epyxwn titts 8pfmdyy (g6u8n4r).mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\gzn4ud7e porn xxx big shoes .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\ bq4kno (karin).mpeg.exe
  • %APPDATA%\microsoft\templates\horse l9hwcs7vvnphd9 glans b37oavmx289 (karin).zip.exe
  • %APPDATA%\microsoft\windows\templates\fac71w2 bd1l5ir beast uncut (karin).zip.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\fac71w2 7nd83wovj nom72kl ihthd33 feet qx2j1b5 (liz).rar.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\black 7nd83wovj tsomq34 hot (!) js80j73 .avi.exe
  • %HOMEPATH%\templates\black nude mzwpstr8n ihthd33 girly .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\z9z7rwe porn sperm bq4kno glans .mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\f1i7cm wep6b08 7vepaqjm lady .avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\w6csjja14n1 nom72kl uncut lady .avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\upfgetx porn sperm l9hwcs7vvnphd9 feet .zip.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\mzwpstr8n epyxwn cock .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\gay sgu4m7oc glans 8bgkvshe1 .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\eq7k2xcxt porn xxx [bangbus] hole eigt45 .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\f07qtt nude xxx vjq39c1gwy titts qx2j1b5 .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\gzn4ud7e h93bklf mnho9y54 [bangbus] .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\gay [milf] nrb42wq (jenna,2hbt8wr).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\8r3baiec porn tsomq34 epyxwn titts lady .avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\sperm uncut feet ash (karin).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\f1i7cm cum mnho9y54 [bangbus] glans hairy .mpeg.exe
  • %WINDIR%\assembly\temp\mzwpstr8n ihthd33 ol6p1tua (haj1oyikd,c4w8hqa).mpeg.exe
  • %WINDIR%\assembly\tmp\mzwpstr8n 7vepaqjm 40+ .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\f1i7cm bd1l5ir mzwpstr8n nom72kl 6tl9zg0uqa .mpeg.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\ ihthd33 gsva2xn (hyo87il,sarah).mpg.exe
  • %WINDIR%\pla\templates\nom72kl ihthd33 cock nrb42wq (2hbt8wr).mpeg.exe
  • %WINDIR%\security\templates\ [bangbus] mg9fvb2xk9 .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\upfgetx xakmpl mzwpstr8n uncut .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\s2fkave horse beast uncut rv0y8n .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\yzw1afy epyxwn feet (dehod0,sarah).mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\fac71w2 bd1l5ir sperm uncut hole .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\z9z7rwe w6csjja14n1 horse [milf] hole ae2sd7u4xh .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\xxx uncut hotel .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\sperm l9hwcs7vvnphd9 .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\sperm [milf] hole .rar.exe
  • %WINDIR%\syswow64\fxstmp\eq7k2xcxt porn xxx bq4kno .mpeg.exe
  • %WINDIR%\syswow64\ime\shared\s2fkave cum lpcu5ai3 [milf] (c4w8hqa).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\sperm bq4kno (c4w8hqa).zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt xakmpl tsomq34 [bangbus] (2hbt8wr).rar.exe
  • %WINDIR%\syswow64\fxstmp\f1i7cm h93bklf xxx uncut .rar.exe
  • %WINDIR%\syswow64\ime\shared\nom72kl sgu4m7oc hotel (rdl1tfkz,sarah).avi.exe
  • %WINDIR%\temp\black nude yzw1afy big cock .mpeg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android