La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Trojan.KillProc2.25472

Aggiunto al database dei virus Dr.Web: 2025-07-10

La descrizione è stata aggiunta:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\f07qtt 7nd83wovj bq4kno titts .zip.exe
  • %ProgramFiles%\dvd maker\shared\sperm l9hwcs7vvnphd9 ol6p1tua (dehod0,jade).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\horse big 50+ (rdl1tfkz,g6u8n4r).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\fac71w2 ddqayq sperm apv53deiq9fw hole b37oavmx289 .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\fac71w2 xakmpl beast sgu4m7oc .zip.exe
  • %ProgramFiles%\microsoft office\templates\gzn4ud7e porn horse nom72kl .rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\black bd1l5ir beast uncut 6tl9zg0uqa (sonja,y8oxsqa).mpg.exe
  • %ProgramFiles%\windows journal\templates\upfgetx xakmpl lpcu5ai3 nom72kl titts b37oavmx289 (sarah).rar.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\yzw1afy girls hole fishy .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\yzw1afy uncut feet lzxyhb7k .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\beast uncut glans rv0y8n (y8oxsqa).rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\tsomq34 [free] titts (hyo87il,cy4xpd).zip.exe
  • %CommonProgramFiles(x86)%\microsoft shared\z9z7rwe ddqayq yzw1afy [milf] cock nrb42wq (karin).zip.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\gzn4ud7e xakmpl tsomq34 nom72kl titts .zip.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\yzw1afy nom72kl .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\f1i7cm 8ok6yf horse girls gh5b6gd7wrv .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\ girls .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\tsomq34 big (sarah).avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\nom72kl [milf] glans young .zip.exe
  • %ALLUSERSPROFILE%\templates\z9z7rwe wep6b08 mnho9y54 epyxwn ae2sd7u4xh .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\mnho9y54 big glans (haj1oyikd,2hbt8wr).zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\gzn4ud7e h93bklf horse apv53deiq9fw cock 6tl9zg0uqa .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\fac71w2 porn yzw1afy [bangbus] b37oavmx289 (dehod0,c4w8hqa).avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\z9z7rwe porn yzw1afy uncut (karin).mpg.exe
  • %ALLUSERSPROFILE%\templates\fac71w2 porn yzw1afy ihthd33 .mpeg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\s2fkave h93bklf mzwpstr8n big feet .mpeg.exe
  • C:\users\default\appdata\local\temp\gzn4ud7e bd1l5ir horse epyxwn ejn547rbxhd1 .avi.exe
  • C:\users\default\appdata\local\<INETFILES>\s2fkave ddqayq mzwpstr8n nom72kl (c4w8hqa).rar.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\z9z7rwe wep6b08 mzwpstr8n [bangbus] .mpeg.exe
  • C:\users\default\templates\horse sgu4m7oc gsva2xn .mpeg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\fac71w2 porn mnho9y54 uncut .mpg.exe
  • %TEMP%\s2fkave h93bklf lpcu5ai3 sgu4m7oc .avi.exe
  • %LOCALAPPDATA%\<INETFILES>\eq7k2xcxt wep6b08 nom72kl uncut cock girly .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{070abd97-84e1-4f5f-9c02-f1d76dd9fce4}\fac71w2 h93bklf horse epyxwn hole 40+ .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{1fae114c-c2b0-4da1-b23a-8e5ad0c3d722}\beast nom72kl cock (hyo87il,cy4xpd).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{3571406e-c08c-4c74-b145-8857b365f6e7}\f1i7cm h93bklf nom72kl [free] .zip.exe
  • %APPDATA%\microsoft\templates\8r3baiec wep6b08 lpcu5ai3 [bangbus] titts .rar.exe
  • %APPDATA%\microsoft\windows\templates\eq7k2xcxt 7nd83wovj horse bq4kno (cy4xpd).mpg.exe
  • %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\storage\temporary\tsomq34 nom72kl balls .avi.exe
  • %APPDATA%\thunderbird\profiles\chdgbv82.default-release\storage\temporary\z9z7rwe horse tsomq34 epyxwn .mpeg.exe
  • %HOMEPATH%\templates\tsomq34 nom72kl feet gh5b6gd7wrv .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\fac71w2 nude lpcu5ai3 uncut 8pfmdyy .zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\nom72kl [milf] balls .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f07qtt nude tsomq34 vjq39c1gwy hole .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\black nude mzwpstr8n sgu4m7oc js80j73 (gina,2hbt8wr).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\fac71w2 cum yzw1afy hot (!) sweet .rar.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\s2fkave h93bklf horse epyxwn latex .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\lpcu5ai3 uncut .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\gzn4ud7e h93bklf xxx 7vepaqjm boots .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\s2fkave w6csjja14n1 nom72kl qq6w54yfhtqrbwcslg (sandy,cy4xpd).rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\eq7k2xcxt nude lpcu5ai3 l9hwcs7vvnphd9 feet ejn547rbxhd1 (jade).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\s2fkave ddqayq [free] hole wifey .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\mzwpstr8n uncut cock .mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\f07qtt wep6b08 beast big .avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\s2fkave 7nd83wovj horse girls .avi.exe
  • %WINDIR%\assembly\temp\f07qtt 7nd83wovj sperm sgu4m7oc .mpeg.exe
  • %WINDIR%\assembly\tmp\gzn4ud7e 7nd83wovj lpcu5ai3 7vepaqjm (dxocjwba).mpg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\f07qtt xakmpl tsomq34 girls feet 6tl9zg0uqa (cy4xpd).mpeg.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\upfgetx xakmpl lpcu5ai3 nom72kl hole .mpg.exe
  • %WINDIR%\pla\templates\f07qtt xakmpl lpcu5ai3 uncut (y8oxsqa).rar.exe
  • %WINDIR%\security\templates\nom72kl girls titts lzxyhb7k .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\f1i7cm cum mnho9y54 nom72kl feet lady .rar.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\8r3baiec h93bklf horse [bangbus] feet girly .rar.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\yzw1afy 7vepaqjm ash .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\horse nom72kl titts (36mho73,g6u8n4r).zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\f1i7cm h93bklf beast l9hwcs7vvnphd9 feet (sonja,dxocjwba).avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\f07qtt xakmpl [free] (sarah).zip.exe
  • %WINDIR%\syswow64\config\systemprofile\f1i7cm bd1l5ir yzw1afy girls (2hbt8wr).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\f07qtt 8ok6yf mnho9y54 sgu4m7oc girly .zip.exe
  • %WINDIR%\syswow64\fxstmp\ddqayq tsomq34 hot (!) qq6w54yfhtqrbwcslg .zip.exe
  • %WINDIR%\syswow64\ime\shared\mnho9y54 sgu4m7oc hole nrb42wq .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\upfgetx h93bklf tsomq34 apv53deiq9fw .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt cum epyxwn eigt45 .rar.exe
  • %WINDIR%\syswow64\fxstmp\f1i7cm 8ok6yf beast [bangbus] gsva2xn .mpg.exe
  • %WINDIR%\syswow64\ime\shared\nom72kl [free] hairy .avi.exe
  • %WINDIR%\temp\lpcu5ai3 bq4kno glans lzxyhb7k .zip.exe
  • %WINDIR%\winsxs\installtemp\sperm nom72kl girly .rar.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android