La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Trojan.KillProc2.27998

Aggiunto al database dei virus Dr.Web: 2025-07-16

La descrizione è stata aggiunta:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\ nom72kl sm .mpeg.exe
  • %ProgramFiles%\dvd maker\shared\lpcu5ai3 girls feet lzxyhb7k (c4w8hqa).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\f1i7cm h93bklf mnho9y54 uncut feet 6tl9zg0uqa .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\fac71w2 h93bklf lpcu5ai3 uncut .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\mzwpstr8n epyxwn 50+ (gina,liz).rar.exe
  • %ProgramFiles%\microsoft office\templates\upfgetx ddqayq yzw1afy [milf] hole 8bgkvshe1 (g6u8n4r).avi.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\black cum lpcu5ai3 epyxwn fishy .mpeg.exe
  • %ProgramFiles%\windows journal\templates\mzwpstr8n [bangbus] .rar.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\mzwpstr8n vjq39c1gwy feet fw58kpr41ob1w .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\8r3baiec porn horse 7vepaqjm .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\beast [free] glans gsva2xn .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\sperm [bangbus] .rar.exe
  • %CommonProgramFiles(x86)%\microsoft shared\gzn4ud7e porn gay [bangbus] .zip.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\yzw1afy hot (!) hole rv0y8n (liz).avi.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\beast epyxwn hole qx2j1b5 .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\s2fkave 8ok6yf beast girls sgoibhh .avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\yzw1afy vjq39c1gwy hole 8bgkvshe1 (g6u8n4r).avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\f1i7cm w6csjja14n1 l9hwcs7vvnphd9 mg9fvb2xk9 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\xxx 7vepaqjm titts (rdl1tfkz,2hbt8wr).mpeg.exe
  • %ALLUSERSPROFILE%\templates\upfgetx bd1l5ir horse hot (!) .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\xxx apv53deiq9fw 8pfmdyy .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\8r3baiec horse beast [free] glans (dehod0,2hbt8wr).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\black xakmpl nom72kl 7vepaqjm (g6u8n4r).rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\ 7vepaqjm ol6p1tua .rar.exe
  • %ALLUSERSPROFILE%\templates\tsomq34 nom72kl mg9fvb2xk9 .zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\xxx sgu4m7oc hole .mpg.exe
  • C:\users\default\appdata\local\temp\lpcu5ai3 big cock .avi.exe
  • C:\users\default\appdata\local\<INETFILES>\mzwpstr8n uncut hole wifey (dxocjwba).mpg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\8r3baiec cum beast uncut feet shoes (karin).avi.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\f1i7cm nude gay [milf] b37oavmx289 (sandy,cy4xpd).rar.exe
  • %TEMP%\fac71w2 w6csjja14n1 horse [milf] cock 6tl9zg0uqa .rar.exe
  • %LOCALAPPDATA%\<INETFILES>\fac71w2 nude mzwpstr8n ihthd33 .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\f1i7cm 7nd83wovj beast 7vepaqjm glans .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\fac71w2 cum apv53deiq9fw (cy4xpd).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\fac71w2 8ok6yf mnho9y54 apv53deiq9fw b37oavmx289 (sonja,dxocjwba).rar.exe
  • %APPDATA%\microsoft\templates\eq7k2xcxt 7nd83wovj mnho9y54 7vepaqjm feet .avi.exe
  • %APPDATA%\microsoft\windows\templates\upfgetx bd1l5ir mnho9y54 epyxwn 6tl9zg0uqa .rar.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\gzn4ud7e ddqayq xxx hot (!) gsva2xn (sonja,jade).zip.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\black h93bklf yzw1afy l9hwcs7vvnphd9 (g6u8n4r).avi.exe
  • %HOMEPATH%\templates\black nude mzwpstr8n [bangbus] .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\f1i7cm 8ok6yf epyxwn gsva2xn .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\gzn4ud7e w6csjja14n1 l9hwcs7vvnphd9 ae2sd7u4xh (sandy,y8oxsqa).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f1i7cm cum horse 7vepaqjm glans .avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\s2fkave ddqayq nom72kl [free] .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\eq7k2xcxt bd1l5ir mzwpstr8n uncut hole .mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\8r3baiec cum l9hwcs7vvnphd9 .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\fac71w2 8ok6yf beast 7vepaqjm eigt45 .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\gay uncut cock .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\nom72kl uncut hotel (rdl1tfkz,g6u8n4r).rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\z9z7rwe xakmpl beast ihthd33 glans ash (sarah).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\mnho9y54 nom72kl 6tl9zg0uqa .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\lpcu5ai3 girls .mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\f1i7cm bd1l5ir beast hot (!) gsva2xn (sonja,jade).zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\f07qtt bd1l5ir 7vepaqjm js80j73 .avi.exe
  • %WINDIR%\assembly\temp\gzn4ud7e bd1l5ir mzwpstr8n hot (!) titts girly .zip.exe
  • %WINDIR%\assembly\tmp\f1i7cm 7nd83wovj beast vjq39c1gwy (2hbt8wr).mpg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\f1i7cm horse hot (!) ae2sd7u4xh .zip.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\f07qtt ddqayq tsomq34 ihthd33 40+ .mpeg.exe
  • %WINDIR%\pla\templates\gay apv53deiq9fw cock .avi.exe
  • %WINDIR%\security\templates\beast epyxwn feet .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\f1i7cm 8ok6yf tsomq34 vjq39c1gwy js80j73 .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\beast [free] titts .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\beast ihthd33 hole rv0y8n (y8oxsqa).mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\ bq4kno js80j73 .mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\z9z7rwe xakmpl tsomq34 apv53deiq9fw .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\8r3baiec xakmpl yzw1afy hot (!) cock latex (dxocjwba).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\yzw1afy sgu4m7oc glans .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\s2fkave 7nd83wovj sperm bq4kno .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\f07qtt cum beast uncut b37oavmx289 .avi.exe
  • %WINDIR%\syswow64\ime\shared\mnho9y54 girls glans young .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\lpcu5ai3 [milf] titts (sandy,g6u8n4r).avi.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\beast l9hwcs7vvnphd9 cock .mpg.exe
  • %WINDIR%\syswow64\fxstmp\eq7k2xcxt w6csjja14n1 gay big feet (sandy,g6u8n4r).avi.exe
  • %WINDIR%\syswow64\ime\shared\upfgetx bd1l5ir horse vjq39c1gwy titts zn3tvn (liz).avi.exe
  • %WINDIR%\temp\s2fkave nude beast big feet ae2sd7u4xh .rar.exe
  • %WINDIR%\winsxs\installtemp\mnho9y54 [free] (c4w8hqa).rar.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android