Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Trojan.KillProc2.28241

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\eq7k2xcxt porn big ae2sd7u4xh (liz,sonja).mpg.exe
  • %ProgramFiles%\dvd maker\shared\8r3baiec mzwpstr8n sperm uncut hotel (sonja,liz).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\lpcu5ai3 sgu4m7oc fw58kpr41ob1w (cy4xpd).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\mzwpstr8n nude nom72kl cock (c4w8hqa).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\f1i7cm porn xxx hot (!) ejn547rbxhd1 .avi.exe
  • %ProgramFiles%\microsoft office\templates\wpjwijv 7nd83wovj sgu4m7oc kfp2yqq girly .mpeg.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\mzwpstr8n girls .rar.exe
  • %ProgramFiles%\windows journal\templates\tsomq34 [milf] zmc8ujp (rdl1tfkz).mpeg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\4h1e2a346 mzwpstr8n nom72kl lady .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\porn apv53deiq9fw jxqgtp .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\bd1l5ir bq4kno kfp2yqq balls .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\sperm gay nom72kl jxqgtp .mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\xakmpl mnho9y54 vjq39c1gwy (haj1oyikd,liz).zip.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\gay w6csjja14n1 [bangbus] (g6u8n4r,sonja).rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\ uncut .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\eq7k2xcxt h93bklf bd1l5ir nom72kl .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\zc8giv9 ddqayq nude [bangbus] jxqgtp .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\asian porn ihthd33 ash (sandy).mpeg.exe
  • %ALLUSERSPROFILE%\templates\bd1l5ir [bangbus] legs latex .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\upfgetx bd1l5ir [free] legs .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\horse [free] titts sweet .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\z1qxwcd 8ok6yf nom72kl .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\8r3baiec xakmpl [bangbus] glans qx2j1b5 .mpeg.exe
  • %ALLUSERSPROFILE%\templates\wep6b08 7vepaqjm glans .avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\f1i7cm h93bklf bd1l5ir bq4kno legs lady .rar.exe
  • C:\users\default\appdata\local\<INETFILES>\mnho9y54 7vepaqjm b37oavmx289 .zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\viaz50 7vepaqjm hole hotel .avi.exe
  • C:\users\default\templates\z1qxwcd mnho9y54 ihthd33 .avi.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\zc8giv9 7nd83wovj xakmpl ihthd33 cock gh5b6gd7wrv .mpg.exe
  • %TEMP%\horse 7vepaqjm qq6w54yfhtqrbwcslg .zip.exe
  • %LOCALAPPDATA%\<INETFILES>\porn horse bq4kno (sandy).mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\s2fkave 7nd83wovj l9hwcs7vvnphd9 hotel .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\yzw1afy uncut .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\z1qxwcd bd1l5ir ddqayq l9hwcs7vvnphd9 jxqgtp 40+ (y8oxsqa,hyo87il).avi.exe
  • %APPDATA%\microsoft\templates\f1i7cm horse l9hwcs7vvnphd9 779mipj .mpg.exe
  • %APPDATA%\microsoft\windows\templates\z1qxwcd sperm w6csjja14n1 [bangbus] .mpg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\xxx uncut .mpeg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\f07qtt beast uncut legs (hyo87il,dehod0).mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\mnho9y54 [milf] (sonja).zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\xxx [free] nmibe2 .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\zc8giv9 w6csjja14n1 [bangbus] b37oavmx289 .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\zc8giv9 horse ihthd33 ae2sd7u4xh (karin,haj1oyikd).avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\gay vjq39c1gwy zmc8ujp (y8oxsqa).rar.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android