Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Trojan.KillProc2.28113

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\f1i7cm cum xxx apv53deiq9fw feet hotel (sarah).avi.exe
  • %ProgramFiles%\dvd maker\shared\gzn4ud7e wep6b08 xxx girls glans .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\s2fkave bd1l5ir nom72kl nom72kl qx2j1b5 (haj1oyikd,karin).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\nom72kl nom72kl feet (sandy,c4w8hqa).avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\beast l9hwcs7vvnphd9 hole zn3tvn .avi.exe
  • %ProgramFiles%\microsoft office\templates\z9z7rwe w6csjja14n1 big gsva2xn .avi.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\eq7k2xcxt bd1l5ir mzwpstr8n epyxwn .avi.exe
  • %ProgramFiles%\windows journal\templates\lpcu5ai3 7vepaqjm glans .avi.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\eq7k2xcxt horse mzwpstr8n hot (!) glans fw58kpr41ob1w .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\lpcu5ai3 7vepaqjm lzxyhb7k .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\eq7k2xcxt 7nd83wovj mzwpstr8n sgu4m7oc hole .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\upfgetx cum beast big glans sgoibhh .zip.exe
  • %CommonProgramFiles(x86)%\microsoft shared\8r3baiec 7nd83wovj tsomq34 hot (!) hole .avi.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\upfgetx xakmpl nom72kl l9hwcs7vvnphd9 js80j73 .rar.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\nom72kl apv53deiq9fw .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\z9z7rwe h93bklf lpcu5ai3 [free] boots .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\tsomq34 sgu4m7oc eigt45 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\f1i7cm cum sperm [milf] glans lady .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\xxx big hairy .mpeg.exe
  • %ALLUSERSPROFILE%\templates\s2fkave bd1l5ir beast hot (!) glans gh5b6gd7wrv (y8oxsqa).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\z9z7rwe bd1l5ir nom72kl nom72kl boots .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\f07qtt cum mzwpstr8n hot (!) 40+ .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gzn4ud7e xakmpl nom72kl ihthd33 eigt45 .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\s2fkave xakmpl beast hot (!) balls (haj1oyikd,cy4xpd).avi.exe
  • %ALLUSERSPROFILE%\templates\fac71w2 8ok6yf xxx l9hwcs7vvnphd9 hole .avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt horse nom72kl l9hwcs7vvnphd9 ol6p1tua .avi.exe
  • C:\users\default\appdata\local\temp\s2fkave ddqayq xxx girls nmibe2 .avi.exe
  • C:\users\default\appdata\local\<INETFILES>\upfgetx 8ok6yf nom72kl [free] fw58kpr41ob1w (gina,2hbt8wr).mpeg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\z9z7rwe ddqayq yzw1afy l9hwcs7vvnphd9 titts sgoibhh (2hbt8wr).zip.exe
  • C:\users\default\templates\beast girls .avi.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\s2fkave 8ok6yf xxx hot (!) sgoibhh .mpg.exe
  • %TEMP%\beast epyxwn .mpeg.exe
  • %LOCALAPPDATA%\<INETFILES>\upfgetx cum sperm big (cy4xpd).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\beast 7vepaqjm glans ash .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\mnho9y54 7vepaqjm (sarah).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\fac71w2 h93bklf mzwpstr8n bq4kno (2hbt8wr).zip.exe
  • %APPDATA%\microsoft\templates\gay uncut .zip.exe
  • %APPDATA%\microsoft\windows\templates\gzn4ud7e h93bklf beast hot (!) ejn547rbxhd1 .zip.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\mzwpstr8n 7vepaqjm .zip.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\z9z7rwe h93bklf mnho9y54 vjq39c1gwy sm (haj1oyikd,sarah).mpg.exe
  • %HOMEPATH%\templates\ l9hwcs7vvnphd9 cock .zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\mnho9y54 epyxwn titts b37oavmx289 (karin).zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\lpcu5ai3 hot (!) hole js80j73 (y8oxsqa).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\z9z7rwe cum yzw1afy apv53deiq9fw .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\tsomq34 vjq39c1gwy (c4w8hqa).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\gay uncut girly .avi.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\beast nom72kl qq6w54yfhtqrbwcslg .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\upfgetx 7nd83wovj sperm bq4kno (g6u8n4r).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\s2fkave cum gay apv53deiq9fw gh5b6gd7wrv .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\f1i7cm 7nd83wovj gay nom72kl girly (36mho73,2hbt8wr).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\black wep6b08 lpcu5ai3 sgu4m7oc js80j73 .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\gzn4ud7e xakmpl horse nom72kl titts .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\gzn4ud7e cum gay vjq39c1gwy nmibe2 .avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\z9z7rwe bd1l5ir nom72kl ihthd33 feet .mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\mzwpstr8n [free] hole .mpg.exe
  • %WINDIR%\assembly\temp\fac71w2 h93bklf yzw1afy uncut feet ae2sd7u4xh .mpeg.exe
  • %WINDIR%\assembly\tmp\fac71w2 w6csjja14n1 sperm [milf] zmc8ujp .avi.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\nom72kl 7vepaqjm latex .zip.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\beast apv53deiq9fw (dxocjwba).zip.exe
  • %WINDIR%\pla\templates\z9z7rwe bd1l5ir tsomq34 7vepaqjm .mpg.exe
  • %WINDIR%\security\templates\beast nom72kl lady (sonja,sarah).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe cum sperm l9hwcs7vvnphd9 .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\s2fkave 7nd83wovj tsomq34 ihthd33 lady (haj1oyikd,dxocjwba).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\black wep6b08 gay [bangbus] (y8oxsqa).avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\8r3baiec ddqayq girls (cy4xpd).mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\ 7vepaqjm 6tl9zg0uqa .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\8r3baiec xakmpl [bangbus] .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\f1i7cm xakmpl horse apv53deiq9fw fishy .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\gay [milf] young .zip.exe
  • %WINDIR%\syswow64\fxstmp\0287zh mzwpstr8n uncut hole eigt45 .rar.exe
  • %WINDIR%\syswow64\ime\shared\mzwpstr8n big hole ol6p1tua .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\s2fkave xakmpl sperm [bangbus] feet sm .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\mzwpstr8n big sweet .zip.exe
  • %WINDIR%\syswow64\fxstmp\z9z7rwe w6csjja14n1 tsomq34 sgu4m7oc .zip.exe
  • %WINDIR%\syswow64\ime\shared\sperm [free] lady .mpg.exe
  • %WINDIR%\temp\tsomq34 hot (!) nrb42wq (jenna,g6u8n4r).avi.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android