Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Trojan.KillProc2.27985

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\s2fkave gay big jxqgtp (36mho73,sarah).mpg.exe
  • %ProgramFiles%\dvd maker\shared\z9z7rwe horse tsomq34 epyxwn .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\z9z7rwe mzwpstr8n l9hwcs7vvnphd9 sweet .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\beast vjq39c1gwy ash .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\sperm bq4kno (sarah).rar.exe
  • %ProgramFiles%\microsoft office\templates\8ok6yf sperm bq4kno ejn547rbxhd1 (karin,2hbt8wr).rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\nude nom72kl l9hwcs7vvnphd9 .mpg.exe
  • %ProgramFiles%\windows journal\templates\mzwpstr8n sperm apv53deiq9fw .avi.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\f1i7cm beast nude [bangbus] glans 50+ .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\mzwpstr8n nude vjq39c1gwy legs zn3tvn .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\tsomq34 sgu4m7oc hairy (sonja).mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\eq7k2xcxt cum nom72kl b37oavmx289 .mpg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\jxaglwti h93bklf bd1l5ir ihthd33 gh5b6gd7wrv .mpg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\fac71w2 mnho9y54 yzw1afy girls qq6w54yfhtqrbwcslg (sonja,dehod0).zip.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\4h1e2a346 horse uncut jxqgtp 50+ .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\tsomq34 7vepaqjm qq6w54yfhtqrbwcslg .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\4h1e2a346 w6csjja14n1 girls .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\porn bd1l5ir [bangbus] cock js80j73 (rdl1tfkz,36mho73).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\bd1l5ir xakmpl 7vepaqjm boots .zip.exe
  • %ALLUSERSPROFILE%\templates\beast xakmpl [bangbus] zn3tvn .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\z9z7rwe porn hot (!) ash (haj1oyikd).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\cum 7vepaqjm ash .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\zc8giv9 xxx [bangbus] ash (dxocjwba).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\upfgetx 7nd83wovj ddqayq [bangbus] (2hbt8wr).avi.exe
  • %ALLUSERSPROFILE%\templates\f1i7cm yzw1afy nom72kl shoes (dxocjwba).zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\8r3baiec beast xakmpl uncut .mpeg.exe
  • C:\users\default\appdata\local\temp\cum yzw1afy [bangbus] glans 40+ .zip.exe
  • C:\users\default\appdata\local\<INETFILES>\gzn4ud7e ddqayq w6csjja14n1 girls .rar.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\horse apv53deiq9fw hotel (sonja,sarah).avi.exe
  • C:\users\default\templates\fac71w2 tsomq34 uncut .zip.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\gzn4ud7e 8ok6yf horse epyxwn .rar.exe
  • %TEMP%\viaz50 tsomq34 nom72kl sgoibhh .rar.exe
  • %LOCALAPPDATA%\<INETFILES>\eq7k2xcxt cum l9hwcs7vvnphd9 feet (jenna).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\porn epyxwn wifey .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\ikdyfwhy gay nom72kl gsva2xn .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\lpcu5ai3 gay apv53deiq9fw zn3tvn (sonja,2hbt8wr).mpeg.exe
  • %APPDATA%\microsoft\templates\0287zh wep6b08 girls .mpg.exe
  • %APPDATA%\microsoft\windows\templates\cum nom72kl [bangbus] eigt45 (jenna,sonja).avi.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\z9z7rwe ddqayq ihthd33 jxqgtp gh5b6gd7wrv .mpeg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\zc8giv9 lpcu5ai3 8ok6yf sgu4m7oc (sonja).mpg.exe
  • %HOMEPATH%\templates\xakmpl porn epyxwn .zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\asian mnho9y54 nom72kl nrb42wq (g6u8n4r).avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\wep6b08 epyxwn ash gh5b6gd7wrv .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\asian nude vjq39c1gwy young (sonja).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\horse ihthd33 b37oavmx289 .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\gzn4ud7e nude h93bklf girls ash .mpeg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\f07qtt horse h93bklf ihthd33 nmibe2 .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\gay lpcu5ai3 big girly .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\lpcu5ai3 mzwpstr8n apv53deiq9fw qx2j1b5 (sandy).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\wpjwijv cum apv53deiq9fw hole gsva2xn (jade,cy4xpd).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\s2fkave tsomq34 [milf] legs eigt45 .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\7b6fhxi lpcu5ai3 ihthd33 50+ .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\fac71w2 horse uncut legs balls (hyo87il).rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\horse [bangbus] ae2sd7u4xh .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\horse mnho9y54 ihthd33 ae2sd7u4xh (jenna,rdl1tfkz).avi.exe
  • %WINDIR%\assembly\temp\horse nom72kl uncut .mpg.exe
  • %WINDIR%\assembly\tmp\viaz50 cum sgu4m7oc mg9fvb2xk9 .mpeg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android