Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Trojan.KillProc2.28270

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\8r3baiec bd1l5ir nom72kl ihthd33 .avi.exe
  • %ProgramFiles%\dvd maker\shared\ [milf] b37oavmx289 .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\f1i7cm 7nd83wovj xxx [bangbus] titts hotel (jade).zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\upfgetx ddqayq nom72kl bq4kno hole .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\8r3baiec ddqayq lpcu5ai3 bq4kno titts .mpg.exe
  • %ProgramFiles%\microsoft office\templates\tsomq34 sgu4m7oc 8pfmdyy .mpeg.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\z9z7rwe 7nd83wovj mzwpstr8n [bangbus] titts lady .mpg.exe
  • %ProgramFiles%\windows journal\templates\yzw1afy l9hwcs7vvnphd9 fishy .mpg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\s2fkave horse tsomq34 [milf] hole 40+ .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\black bd1l5ir nom72kl l9hwcs7vvnphd9 hole sweet .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\f1i7cm wep6b08 uncut .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\lpcu5ai3 vjq39c1gwy cock young .mpg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\nom72kl l9hwcs7vvnphd9 .mpeg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\tsomq34 [milf] 50+ .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\black porn xxx uncut sweet .zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\upfgetx wep6b08 sperm big titts eigt45 .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gzn4ud7e ddqayq xxx nom72kl .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\lpcu5ai3 girls zmc8ujp .mpg.exe
  • %ALLUSERSPROFILE%\templates\xxx apv53deiq9fw titts .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\nom72kl sgu4m7oc young .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\gay 7vepaqjm gsva2xn .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\black ddqayq gay sgu4m7oc glans hotel (dxocjwba).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\tsomq34 bq4kno glans .avi.exe
  • %ALLUSERSPROFILE%\templates\upfgetx porn xxx hot (!) 50+ .mpeg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\8r3baiec 7nd83wovj yzw1afy bq4kno cock .mpg.exe
  • C:\users\default\appdata\local\temp\f07qtt nude ihthd33 hole qq6w54yfhtqrbwcslg .avi.exe
  • C:\users\default\appdata\local\<INETFILES>\tsomq34 nom72kl (cy4xpd).zip.exe
  • C:\users\default\templates\asian lpcu5ai3 nom72kl hole (rdl1tfkz,y8oxsqa).avi.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\nom72kl hot (!) (g6u8n4r).rar.exe
  • %TEMP%\upfgetx horse yzw1afy uncut glans rv0y8n (liz).mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\gzn4ud7e bd1l5ir mnho9y54 7vepaqjm sweet .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\f07qtt cum mzwpstr8n [bangbus] glans sgoibhh .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\fac71w2 w6csjja14n1 mnho9y54 ihthd33 cock wifey .rar.exe
  • %APPDATA%\microsoft\templates\8r3baiec xakmpl yzw1afy girls qx2j1b5 .rar.exe
  • %APPDATA%\microsoft\windows\templates\eq7k2xcxt cum beast nom72kl cock mg9fvb2xk9 .mpg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\f1i7cm h93bklf tsomq34 uncut cock .mpeg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\black horse xxx l9hwcs7vvnphd9 hole 8pfmdyy .avi.exe
  • %HOMEPATH%\templates\eq7k2xcxt cum beast apv53deiq9fw titts hairy .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\z9z7rwe 7nd83wovj mzwpstr8n vjq39c1gwy titts .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\8r3baiec ddqayq xxx apv53deiq9fw 8bgkvshe1 (sonja,sarah).avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\upfgetx nude 7vepaqjm lzxyhb7k .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\yzw1afy apv53deiq9fw young (hyo87il,g6u8n4r).zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\yzw1afy uncut cock lzxyhb7k (y8oxsqa).mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\upfgetx cum gay 7vepaqjm feet gh5b6gd7wrv .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\8r3baiec ddqayq mzwpstr8n ihthd33 titts .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\f07qtt wep6b08 mzwpstr8n [bangbus] cock .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\asian xxx bq4kno feet .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\upfgetx wep6b08 beast [free] lzxyhb7k (jenna,jade).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\f07qtt w6csjja14n1 tsomq34 [milf] 6tl9zg0uqa .rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\s2fkave porn horse bq4kno (karin).mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\lpcu5ai3 uncut titts sm .zip.exe
  • %WINDIR%\assembly\temp\8r3baiec horse tsomq34 l9hwcs7vvnphd9 cock ejn547rbxhd1 .zip.exe
  • %WINDIR%\assembly\tmp\upfgetx w6csjja14n1 nom72kl [milf] titts .zip.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android