La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Trojan.KillProc2.27201

Aggiunto al database dei virus Dr.Web: 2025-07-15

La descrizione è stata aggiunta:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\f1i7cm wep6b08 tsomq34 7vepaqjm .rar.exe
  • %ProgramFiles%\dvd maker\shared\z9z7rwe horse nom72kl big titts .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\sperm uncut titts (gina,g6u8n4r).zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\xxx apv53deiq9fw (jade).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\black 8ok6yf mzwpstr8n epyxwn .rar.exe
  • %ProgramFiles%\microsoft office\templates\8r3baiec xakmpl tsomq34 epyxwn feet 779mipj .mpg.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\gzn4ud7e 8ok6yf lpcu5ai3 girls wifey .avi.exe
  • %ProgramFiles%\windows journal\templates\mzwpstr8n vjq39c1gwy titts hotel (cy4xpd).avi.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\nom72kl hot (!) hole .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\s2fkave h93bklf lpcu5ai3 sgu4m7oc mg9fvb2xk9 (hyo87il,sarah).zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\gay [bangbus] sgoibhh .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\upfgetx 8ok6yf gay nom72kl glans .mpeg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\tsomq34 l9hwcs7vvnphd9 lzxyhb7k .mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\z9z7rwe 7nd83wovj mnho9y54 hot (!) 40+ (gina,2hbt8wr).mpg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\mzwpstr8n uncut .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\gzn4ud7e wep6b08 lpcu5ai3 7vepaqjm glans 50+ (liz).avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\sperm ihthd33 (sarah).avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\z9z7rwe w6csjja14n1 tsomq34 hot (!) young .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\f1i7cm 7nd83wovj xxx girls titts hairy (liz).avi.exe
  • %ALLUSERSPROFILE%\templates\mnho9y54 apv53deiq9fw cock lzxyhb7k (jade).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\tsomq34 vjq39c1gwy hole mg9fvb2xk9 .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\s2fkave porn xxx vjq39c1gwy girly .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\f1i7cm cum mnho9y54 epyxwn hole .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\beast ihthd33 hole hotel .mpg.exe
  • %ALLUSERSPROFILE%\templates\beast epyxwn glans mg9fvb2xk9 .zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt cum sperm ihthd33 hole .mpeg.exe
  • C:\users\default\appdata\local\temp\mnho9y54 [free] feet .avi.exe
  • C:\users\default\appdata\local\<INETFILES>\horse epyxwn cock sm (2hbt8wr).zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\xxx nom72kl cock .zip.exe
  • C:\users\default\templates\upfgetx 8ok6yf nom72kl 7vepaqjm .rar.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\tsomq34 nom72kl young (dehod0,g6u8n4r).zip.exe
  • %TEMP%\s2fkave w6csjja14n1 beast [free] ae2sd7u4xh .mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\8r3baiec 8ok6yf tsomq34 big ol6p1tua (36mho73,c4w8hqa).avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\z9z7rwe nude sperm girls titts rv0y8n (karin).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\8r3baiec horse beast hot (!) gsva2xn .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\ hot (!) cock .rar.exe
  • %APPDATA%\microsoft\templates\eq7k2xcxt nude mzwpstr8n vjq39c1gwy mg9fvb2xk9 .mpeg.exe
  • %APPDATA%\microsoft\windows\templates\mnho9y54 vjq39c1gwy .mpeg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\lpcu5ai3 sgu4m7oc (cy4xpd).zip.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\yzw1afy nom72kl hole 8pfmdyy .mpg.exe
  • %HOMEPATH%\templates\nom72kl big feet (jenna,jade).zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\fac71w2 ddqayq beast epyxwn .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\zc8giv9 big .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\nom72kl big 50+ .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\gay 7vepaqjm young .zip.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\fac71w2 h93bklf mnho9y54 vjq39c1gwy .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\xxx 7vepaqjm titts sweet .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\gzn4ud7e horse xxx sgu4m7oc nmibe2 .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\beast [milf] hole hairy .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\ ihthd33 .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\ [free] cock 40+ .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\z9z7rwe bd1l5ir sperm sgu4m7oc .rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\z9z7rwe 8ok6yf beast vjq39c1gwy 8pfmdyy (gina,g6u8n4r).rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\s2fkave w6csjja14n1 gay ihthd33 wifey .mpeg.exe
  • %WINDIR%\assembly\temp\s2fkave cum horse [milf] hole shoes (y8oxsqa).mpeg.exe
  • %WINDIR%\assembly\tmp\gzn4ud7e horse tsomq34 uncut (sarah).rar.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\s2fkave horse yzw1afy hot (!) feet .mpeg.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\yzw1afy uncut cock sm (jade).mpeg.exe
  • %WINDIR%\pla\templates\gzn4ud7e xakmpl big sm .mpg.exe
  • %WINDIR%\security\templates\sperm ihthd33 .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\tsomq34 hot (!) (jade).mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\s2fkave wep6b08 sperm epyxwn cock gh5b6gd7wrv .rar.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\horse hot (!) .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\black w6csjja14n1 horse vjq39c1gwy (karin).rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\mnho9y54 hot (!) glans latex .zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\f07qtt cum horse hot (!) (y8oxsqa).mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\f07qtt 8ok6yf yzw1afy sgu4m7oc feet balls (jade).mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\8r3baiec bd1l5ir beast uncut zmc8ujp .zip.exe
  • %WINDIR%\syswow64\fxstmp\z9z7rwe w6csjja14n1 horse l9hwcs7vvnphd9 hairy .avi.exe
  • %WINDIR%\syswow64\ime\shared\8r3baiec ddqayq bq4kno .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\bd1l5ir gay epyxwn (c4w8hqa).zip.exe
  • %WINDIR%\syswow64\fxstmp\s2fkave w6csjja14n1 apv53deiq9fw lzxyhb7k .avi.exe
  • %WINDIR%\syswow64\ime\shared\z9z7rwe xakmpl beast 7vepaqjm fw58kpr41ob1w .avi.exe
  • %WINDIR%\temp\horse apv53deiq9fw nrb42wq .mpg.exe
  • %WINDIR%\winsxs\installtemp\f07qtt bd1l5ir mzwpstr8n l9hwcs7vvnphd9 .mpeg.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android