マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話

03-6550-8770

Profile

Trojan.KillProc2.28981

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\ikdyfwhy bd1l5ir epyxwn titts .avi.exe
  • %ProgramFiles%\dvd maker\shared\gzn4ud7e mzwpstr8n hot (!) zn3tvn .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\yzw1afy ihthd33 titts js80j73 .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\wep6b08 xxx girls ash (karin,karin).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\wep6b08 [bangbus] .rar.exe
  • %ProgramFiles%\microsoft office\templates\f1i7cm porn 7vepaqjm boots .avi.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\wpjwijv xxx yzw1afy bq4kno gsva2xn .rar.exe
  • %ProgramFiles%\windows journal\templates\8r3baiec bd1l5ir sgu4m7oc qx2j1b5 .avi.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\jxaglwti wep6b08 vjq39c1gwy hole .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\ikdyfwhy w6csjja14n1 apv53deiq9fw feet .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\gay epyxwn cock balls (rdl1tfkz).mpg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\asian yzw1afy hot (!) balls .avi.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\7b6fhxi mnho9y54 w6csjja14n1 [bangbus] boots .avi.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\f1i7cm xxx ddqayq ihthd33 young .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\wpjwijv xxx horse l9hwcs7vvnphd9 feet .avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\asian bd1l5ir girls ash .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\z1qxwcd beast epyxwn ash .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\viaz50 horse girls .mpg.exe
  • %ALLUSERSPROFILE%\templates\upfgetx mzwpstr8n [free] (dehod0).rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\wpjwijv 7vepaqjm boobs .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\horse ddqayq [bangbus] shoes (sandy,cy4xpd).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\ikdyfwhy wep6b08 8ok6yf uncut boots (dehod0,karin).avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\gzn4ud7e h93bklf cum [milf] nrb42wq (haj1oyikd,dehod0).rar.exe
  • %ALLUSERSPROFILE%\templates\asian nom72kl mzwpstr8n uncut (sandy,dxocjwba).rar.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\nude porn uncut titts hairy .avi.exe
  • C:\users\default\appdata\local\<INETFILES>\s2fkave mnho9y54 uncut feet 779mipj .rar.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\7b6fhxi xakmpl w6csjja14n1 vjq39c1gwy ash (sarah).mpeg.exe
  • C:\users\default\templates\nude bd1l5ir uncut latex .mpg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\f07qtt 8ok6yf sgu4m7oc mg9fvb2xk9 (rdl1tfkz,jade).mpg.exe
  • %TEMP%\8r3baiec horse vjq39c1gwy ejn547rbxhd1 (liz,haj1oyikd).mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\fac71w2 xakmpl horse hot (!) .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\z9z7rwe xxx [bangbus] latex .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\8r3baiec tsomq34 apv53deiq9fw .rar.exe
  • %APPDATA%\microsoft\templates\upfgetx nom72kl [free] ash ash .mpg.exe
  • %APPDATA%\microsoft\windows\templates\wpjwijv beast hot (!) lady (sarah).mpg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\black xxx [milf] legs ae2sd7u4xh (cy4xpd).mpg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\gzn4ud7e nude w6csjja14n1 vjq39c1gwy .avi.exe
  • %HOMEPATH%\templates\gzn4ud7e sperm ddqayq hot (!) fishy .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\ikdyfwhy 8ok6yf epyxwn 6tl9zg0uqa (dehod0).avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\f1i7cm cum bd1l5ir bq4kno feet shoes .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\eq7k2xcxt beast nom72kl 7vepaqjm .avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\mnho9y54 horse epyxwn girly (36mho73,dxocjwba).zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\ikdyfwhy h93bklf sgu4m7oc .rar.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\4h1e2a346 gay mzwpstr8n girls legs sweet (sonja,sonja).rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\7b6fhxi 8ok6yf bq4kno (36mho73,haj1oyikd).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\s2fkave horse beast sgu4m7oc hole .mpeg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android