Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Trojan.KillProc2.25393

Added to the Dr.Web virus database: 2025-07-10

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\horse epyxwn nrb42wq (2hbt8wr,y8oxsqa).mpg.exe
  • %ProgramFiles%\dvd maker\shared\bd1l5ir apv53deiq9fw shoes .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\black nude xxx girls ol6p1tua .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\xakmpl big .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\black gay 8ok6yf [free] (sonja).mpeg.exe
  • %ProgramFiles%\microsoft office\templates\wpjwijv cum apv53deiq9fw 779mipj .rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\wpjwijv xakmpl 7vepaqjm boots .mpeg.exe
  • %ProgramFiles%\windows journal\templates\z1qxwcd wep6b08 nude epyxwn cock .rar.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\gzn4ud7e nom72kl ddqayq uncut jxqgtp 8pfmdyy .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\8ok6yf uncut nrb42wq .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\8r3baiec porn sperm ihthd33 hole shoes .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\lpcu5ai3 hot (!) .rar.exe
  • %CommonProgramFiles(x86)%\microsoft shared\cum uncut .rar.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\4h1e2a346 ddqayq nom72kl [bangbus] boobs (c4w8hqa,sandy).zip.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\4h1e2a346 cum ddqayq [free] hotel .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\asian w6csjja14n1 cum girls cock ejn547rbxhd1 .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\nom72kl uncut sm .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\jxaglwti cum big .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\black nom72kl [bangbus] latex .zip.exe
  • %ALLUSERSPROFILE%\templates\horse nude sgu4m7oc feet hotel .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\mnho9y54 nom72kl .avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\nude horse uncut .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\z1qxwcd nom72kl vjq39c1gwy 40+ (sonja,sonja).rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\xxx cum uncut cock (sandy).avi.exe
  • %ALLUSERSPROFILE%\templates\porn uncut girly .mpg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\asian gay bq4kno nrb42wq .mpg.exe
  • C:\users\default\appdata\local\temp\bd1l5ir hot (!) hairy .mpg.exe
  • C:\users\default\appdata\local\<INETFILES>\h93bklf porn [milf] kfp2yqq 8bgkvshe1 .zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\w6csjja14n1 uncut .mpeg.exe
  • C:\users\default\templates\4h1e2a346 horse w6csjja14n1 epyxwn 50+ (rdl1tfkz).mpg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\horse [bangbus] boobs gsva2xn .zip.exe
  • %TEMP%\xakmpl uncut sm .rar.exe
  • %LOCALAPPDATA%\<INETFILES>\gay nom72kl young .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\0287zh beast l9hwcs7vvnphd9 .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\lpcu5ai3 cum 7vepaqjm 40+ (jenna).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\wpjwijv beast tsomq34 [free] .zip.exe
  • %APPDATA%\microsoft\templates\0287zh wep6b08 wep6b08 [milf] (sandy,g6u8n4r).zip.exe
  • %APPDATA%\microsoft\windows\templates\asian nom72kl [bangbus] .avi.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\xxx horse big (dxocjwba,rdl1tfkz).mpeg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\fac71w2 lpcu5ai3 w6csjja14n1 hot (!) feet (sonja).rar.exe
  • %HOMEPATH%\templates\horse uncut feet ae2sd7u4xh (karin,liz).mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\eq7k2xcxt yzw1afy beast ihthd33 titts .mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\fac71w2 horse sgu4m7oc .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\7b6fhxi ddqayq nude [free] .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\zc8giv9 mnho9y54 [free] zmc8ujp (2hbt8wr).zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\8r3baiec w6csjja14n1 nom72kl (gina).avi.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\4h1e2a346 yzw1afy ddqayq [milf] hole (hyo87il,rdl1tfkz).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\z1qxwcd nude yzw1afy vjq39c1gwy ash wifey .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\fac71w2 yzw1afy nom72kl 7vepaqjm titts (2hbt8wr,36mho73).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\gzn4ud7e wep6b08 epyxwn zn3tvn .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\nude hot (!) kfp2yqq sweet (y8oxsqa).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\wpjwijv mnho9y54 [free] (sonja,hyo87il).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\f1i7cm 8ok6yf big .mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\black mzwpstr8n vjq39c1gwy fishy .rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\porn nude nom72kl mg9fvb2xk9 .avi.exe
  • %WINDIR%\assembly\temp\h93bklf mnho9y54 [milf] (dxocjwba,sonja).rar.exe
  • %WINDIR%\assembly\tmp\upfgetx nom72kl xxx uncut jxqgtp .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\ikdyfwhy yzw1afy beast nom72kl young .zip.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\wpjwijv horse girls kfp2yqq gsva2xn (haj1oyikd,c4w8hqa).mpeg.exe
  • %WINDIR%\pla\templates\0287zh 8ok6yf l9hwcs7vvnphd9 .zip.exe
  • %WINDIR%\security\templates\7nd83wovj w6csjja14n1 [milf] (g6u8n4r).rar.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\z9z7rwe lpcu5ai3 lpcu5ai3 epyxwn feet girly .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\black horse hot (!) qq6w54yfhtqrbwcslg (gina).zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\horse vjq39c1gwy .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\tsomq34 [bangbus] nrb42wq .zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\sperm beast hot (!) b37oavmx289 .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\wpjwijv cum porn l9hwcs7vvnphd9 rv0y8n .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe tsomq34 ihthd33 cock zn3tvn .zip.exe
  • %WINDIR%\syswow64\fxstmp\nude apv53deiq9fw .avi.exe
  • %WINDIR%\syswow64\ime\shared\0287zh lpcu5ai3 porn nom72kl ae2sd7u4xh (gina).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\gay vjq39c1gwy qq6w54yfhtqrbwcslg .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\asian h93bklf vjq39c1gwy 6tl9zg0uqa .mpg.exe
  • %WINDIR%\syswow64\fxstmp\asian tsomq34 xxx [milf] nrb42wq (36mho73,g6u8n4r).mpg.exe
  • %WINDIR%\syswow64\ime\shared\4h1e2a346 mzwpstr8n ihthd33 qx2j1b5 (liz,2hbt8wr).mpg.exe
  • %WINDIR%\temp\0287zh yzw1afy uncut .rar.exe
  • %WINDIR%\winsxs\installtemp\nom72kl uncut hole .mpg.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android