Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Trojan.KillProc2.27677

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\s2fkave lpcu5ai3 tsomq34 uncut ash hairy (2hbt8wr).rar.exe
  • %ProgramFiles%\dvd maker\shared\h93bklf lpcu5ai3 apv53deiq9fw 779mipj .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\f07qtt bd1l5ir [bangbus] glans sweet (jade,y8oxsqa).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\f1i7cm gay uncut .zip.exe
  • %ProgramFiles%\microsoft office\templates\ddqayq uncut js80j73 (sandy,cy4xpd).zip.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\ddqayq apv53deiq9fw .mpg.exe
  • %ProgramFiles%\windows journal\templates\fac71w2 nom72kl cum hot (!) ash ash .mpg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\horse sgu4m7oc .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\ wep6b08 nom72kl .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\cum epyxwn fw58kpr41ob1w .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\z9z7rwe wep6b08 epyxwn .avi.exe
  • %CommonProgramFiles(x86)%\microsoft shared\7nd83wovj bq4kno lady (hyo87il,c4w8hqa).rar.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\porn tsomq34 nom72kl feet .rar.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\yzw1afy vjq39c1gwy balls .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\f1i7cm cum porn hot (!) ol6p1tua .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\8ok6yf vjq39c1gwy .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\eq7k2xcxt nom72kl porn [free] glans .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\eq7k2xcxt lpcu5ai3 epyxwn ash .zip.exe
  • %ALLUSERSPROFILE%\templates\7b6fhxi mzwpstr8n nom72kl 7vepaqjm .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\w6csjja14n1 girls titts zmc8ujp .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\h93bklf xakmpl [free] cock balls (sandy).avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\7b6fhxi wep6b08 vjq39c1gwy ash .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\zc8giv9 tsomq34 7nd83wovj bq4kno nrb42wq .mpeg.exe
  • %ALLUSERSPROFILE%\templates\7b6fhxi horse ddqayq girls .avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\f07qtt lpcu5ai3 bd1l5ir ihthd33 mg9fvb2xk9 .zip.exe
  • C:\users\default\appdata\local\temp\xakmpl uncut (sarah,sonja).avi.exe
  • C:\users\default\appdata\local\<INETFILES>\0287zh porn hot (!) (2hbt8wr).mpg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\viaz50 porn cum nom72kl feet .rar.exe
  • C:\users\default\templates\asian yzw1afy l9hwcs7vvnphd9 qq6w54yfhtqrbwcslg (sandy,sonja).mpeg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\fac71w2 mnho9y54 big glans .zip.exe
  • %TEMP%\z1qxwcd tsomq34 [bangbus] .mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\asian ddqayq bq4kno jxqgtp sweet .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\wpjwijv 8ok6yf uncut titts .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\tsomq34 vjq39c1gwy 50+ .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\z9z7rwe mnho9y54 [free] qx2j1b5 .rar.exe
  • %APPDATA%\microsoft\templates\upfgetx nude apv53deiq9fw lzxyhb7k .mpeg.exe
  • %APPDATA%\microsoft\windows\templates\sperm apv53deiq9fw glans fw58kpr41ob1w .mpeg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\f07qtt lpcu5ai3 girls kfp2yqq .mpg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\z1qxwcd w6csjja14n1 7nd83wovj uncut 8pfmdyy (rdl1tfkz,jade).zip.exe
  • %HOMEPATH%\templates\xxx apv53deiq9fw lzxyhb7k .mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\eq7k2xcxt 7nd83wovj nom72kl (sonja,hyo87il).zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\7b6fhxi bd1l5ir uncut nrb42wq .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\beast porn epyxwn shoes .avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\gzn4ud7e xxx sgu4m7oc jxqgtp gh5b6gd7wrv .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\lpcu5ai3 sgu4m7oc ol6p1tua .mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\bd1l5ir hot (!) jxqgtp gh5b6gd7wrv .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\ xakmpl [free] ash (2hbt8wr,36mho73).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\tsomq34 bd1l5ir [free] zmc8ujp (sonja).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\ikdyfwhy porn nom72kl .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\asian horse sgu4m7oc girly (haj1oyikd).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\z1qxwcd nude [free] nrb42wq (dxocjwba).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\jxaglwti tsomq34 mnho9y54 uncut boots .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\bd1l5ir apv53deiq9fw .rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\8r3baiec yzw1afy nom72kl [bangbus] .mpg.exe
  • %WINDIR%\assembly\temp\fac71w2 horse nom72kl ihthd33 kfp2yqq .zip.exe
  • %WINDIR%\assembly\tmp\s2fkave mzwpstr8n beast [milf] glans b37oavmx289 .zip.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\asian nom72kl vjq39c1gwy cock boots .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\ [free] legs ejn547rbxhd1 .mpg.exe
  • %WINDIR%\pla\templates\8r3baiec ddqayq nude uncut kfp2yqq boots .rar.exe
  • %WINDIR%\security\templates\horse nude [milf] 6tl9zg0uqa .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\zc8giv9 ddqayq nom72kl kfp2yqq .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\sperm mzwpstr8n ihthd33 latex .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\4h1e2a346 8ok6yf epyxwn glans fw58kpr41ob1w .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\jxaglwti porn girls .mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\f1i7cm horse vjq39c1gwy .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\beast uncut .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\0287zh 7nd83wovj mzwpstr8n apv53deiq9fw qq6w54yfhtqrbwcslg .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\porn nom72kl eigt45 .mpg.exe
  • %WINDIR%\syswow64\fxstmp\ddqayq ihthd33 cock .mpeg.exe
  • %WINDIR%\syswow64\ime\shared\f1i7cm cum xakmpl ihthd33 jxqgtp nrb42wq .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\f07qtt sperm ihthd33 (g6u8n4r,sandy).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\mnho9y54 gay bq4kno (cy4xpd).zip.exe
  • %WINDIR%\syswow64\fxstmp\upfgetx yzw1afy [milf] .rar.exe
  • %WINDIR%\syswow64\ime\shared\xxx nude ihthd33 fw58kpr41ob1w .rar.exe
  • %WINDIR%\temp\horse hot (!) 779mipj .mpg.exe
  • %WINDIR%\winsxs\installtemp\yzw1afy nom72kl apv53deiq9fw jxqgtp b37oavmx289 (c4w8hqa,2hbt8wr).avi.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android