Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Trojan.KillProc2.25471

Added to the Dr.Web virus database: 2025-07-10

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\rundll32.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\nom72kl l9hwcs7vvnphd9 feet zmc8ujp .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\z1qxwcd tsomq34 epyxwn latex .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\f07qtt wep6b08 lpcu5ai3 uncut hairy (gina,y8oxsqa).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\f07qtt xakmpl nom72kl girls cock (hyo87il,g6u8n4r).avi.exe
  • %ProgramFiles%\microsoft office\templates\s2fkave wep6b08 nom72kl apv53deiq9fw 40+ .mpeg.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\mnho9y54 vjq39c1gwy wifey .mpeg.exe
  • %ProgramFiles%\windows journal\templates\f1i7cm w6csjja14n1 mnho9y54 ihthd33 nmibe2 (jenna,dxocjwba).mpeg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\gzn4ud7e xakmpl nom72kl epyxwn feet ash (g6u8n4r).avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\eq7k2xcxt ddqayq sperm ihthd33 .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\ apv53deiq9fw hole .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\s2fkave bd1l5ir tsomq34 apv53deiq9fw hotel .zip.exe
  • %CommonProgramFiles(x86)%\microsoft shared\eq7k2xcxt xakmpl sperm big qq6w54yfhtqrbwcslg .mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\gzn4ud7e nude beast [free] hole hairy .rar.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\tsomq34 sgu4m7oc .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\mzwpstr8n hot (!) cock fw58kpr41ob1w (cy4xpd).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\yzw1afy nom72kl js80j73 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\beast apv53deiq9fw glans .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\tsomq34 [milf] (g6u8n4r).avi.exe
  • %ALLUSERSPROFILE%\templates\gzn4ud7e cum mnho9y54 girls (liz).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\fac71w2 nude gay 7vepaqjm cock wifey .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\upfgetx 7nd83wovj tsomq34 [free] ol6p1tua (haj1oyikd,dxocjwba).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\beast ihthd33 titts .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\nom72kl ihthd33 feet .mpeg.exe
  • %ALLUSERSPROFILE%\templates\ l9hwcs7vvnphd9 (c4w8hqa).mpg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\beast ihthd33 .zip.exe
  • C:\users\default\appdata\local\temp\f07qtt porn tsomq34 bq4kno cock .rar.exe
  • C:\users\default\appdata\local\<INETFILES>\eq7k2xcxt 7nd83wovj lpcu5ai3 ihthd33 gh5b6gd7wrv .mpg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\mzwpstr8n girls gh5b6gd7wrv (dehod0,g6u8n4r).mpg.exe
  • C:\users\default\templates\gzn4ud7e bd1l5ir [bangbus] cock eigt45 (y8oxsqa).rar.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\tsomq34 epyxwn feet .rar.exe
  • %TEMP%\gay [bangbus] (karin).zip.exe
  • %LOCALAPPDATA%\<INETFILES>\nom72kl [milf] feet .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\f07qtt h93bklf gay big gh5b6gd7wrv .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\zc8giv9 xxx big cock ejn547rbxhd1 .mpg.exe
  • %APPDATA%\microsoft\templates\tsomq34 [bangbus] sm .mpeg.exe
  • %APPDATA%\microsoft\windows\templates\f07qtt xakmpl yzw1afy epyxwn titts .mpg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\z9z7rwe 8ok6yf sperm [bangbus] rv0y8n .mpg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\f07qtt xakmpl tsomq34 bq4kno 40+ .mpeg.exe
  • %HOMEPATH%\templates\z9z7rwe 8ok6yf lpcu5ai3 girls hole (haj1oyikd,2hbt8wr).rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\nom72kl [milf] feet young (dxocjwba).avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\mnho9y54 big hole .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\black xakmpl mnho9y54 ihthd33 qx2j1b5 .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\lpcu5ai3 big glans .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\black 8ok6yf tsomq34 [free] lzxyhb7k .mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\f07qtt bd1l5ir nom72kl apv53deiq9fw ejn547rbxhd1 .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\wpjwijv lpcu5ai3 uncut 8pfmdyy .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\mzwpstr8n uncut nmibe2 (rdl1tfkz,sarah).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\fac71w2 xakmpl gay ihthd33 shoes .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\yzw1afy ihthd33 rv0y8n .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\f1i7cm xakmpl sperm uncut sweet .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\mnho9y54 hot (!) feet js80j73 (g6u8n4r).mpg.exe
  • %WINDIR%\assembly\temp\z9z7rwe wep6b08 vjq39c1gwy (cy4xpd).mpg.exe
  • %WINDIR%\assembly\tmp\f07qtt horse yzw1afy apv53deiq9fw girly (sonja,karin).rar.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\nom72kl hot (!) zn3tvn .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\gzn4ud7e cum tsomq34 ihthd33 (jade).mpeg.exe
  • %WINDIR%\pla\templates\z9z7rwe ddqayq nom72kl big 6tl9zg0uqa .zip.exe
  • %WINDIR%\security\templates\f1i7cm w6csjja14n1 yzw1afy epyxwn (karin).avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\ uncut 8bgkvshe1 (sandy,cy4xpd).avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\horse 7vepaqjm mg9fvb2xk9 .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\upfgetx ddqayq mzwpstr8n nom72kl titts ejn547rbxhd1 .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\beast apv53deiq9fw balls .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\upfgetx wep6b08 nom72kl 7vepaqjm hole balls (g6u8n4r).zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\horse vjq39c1gwy balls .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\eq7k2xcxt h93bklf yzw1afy 7vepaqjm qq6w54yfhtqrbwcslg .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\f1i7cm 8ok6yf horse girls .avi.exe
  • %WINDIR%\syswow64\fxstmp\ikdyfwhy nom72kl epyxwn 40+ (sonja,g6u8n4r).mpeg.exe
  • %WINDIR%\syswow64\ime\shared\f07qtt bd1l5ir lpcu5ai3 uncut feet fishy .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\f07qtt ddqayq yzw1afy big zn3tvn .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\black bd1l5ir tsomq34 vjq39c1gwy titts hairy (g6u8n4r).zip.exe
  • %WINDIR%\syswow64\fxstmp\eq7k2xcxt wep6b08 beast sgu4m7oc titts gsva2xn .mpg.exe
  • %WINDIR%\syswow64\ime\shared\z9z7rwe ddqayq beast apv53deiq9fw glans nrb42wq .mpg.exe
  • %WINDIR%\temp\sperm bq4kno hole .mpg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android