Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Trojan.KillProc2.29113

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\gay 7vepaqjm cock .rar.exe
  • %ProgramFiles%\dvd maker\shared\f07qtt bd1l5ir uncut glans .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\z9z7rwe h93bklf gay 7vepaqjm glans .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\nom72kl hot (!) feet (sonja,sarah).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\z9z7rwe 8ok6yf nom72kl uncut sm .mpg.exe
  • %ProgramFiles%\microsoft office\templates\black 8ok6yf mzwpstr8n big titts girly .rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\eq7k2xcxt h93bklf xxx ihthd33 hole .zip.exe
  • %ProgramFiles%\windows journal\templates\f07qtt 7nd83wovj nom72kl bq4kno .zip.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\lpcu5ai3 [free] hairy .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\f07qtt horse yzw1afy [free] titts boots (2hbt8wr).mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\f1i7cm h93bklf xxx vjq39c1gwy .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\s2fkave wep6b08 mzwpstr8n apv53deiq9fw 6tl9zg0uqa .rar.exe
  • %CommonProgramFiles(x86)%\microsoft shared\z9z7rwe 7nd83wovj tsomq34 [free] lzxyhb7k .mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\f07qtt porn gay nom72kl titts fw58kpr41ob1w .rar.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\f1i7cm 7nd83wovj tsomq34 [free] glans .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\black nude yzw1afy sgu4m7oc gsva2xn (rdl1tfkz,g6u8n4r).zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\upfgetx bd1l5ir nom72kl uncut .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\upfgetx 7nd83wovj nom72kl uncut glans 779mipj (c4w8hqa).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\gzn4ud7e bd1l5ir mzwpstr8n hot (!) 50+ .mpg.exe
  • %ALLUSERSPROFILE%\templates\nom72kl epyxwn zmc8ujp .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\upfgetx h93bklf beast sgu4m7oc 40+ .zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\eq7k2xcxt h93bklf xxx vjq39c1gwy feet .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\upfgetx nude xxx 7vepaqjm feet .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\nom72kl hot (!) .mpg.exe
  • %ALLUSERSPROFILE%\templates\f1i7cm w6csjja14n1 mnho9y54 hot (!) wifey (sonja,dxocjwba).mpeg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe nude gay [free] eigt45 .rar.exe
  • C:\users\default\appdata\local\temp\z9z7rwe nude tsomq34 vjq39c1gwy feet .rar.exe
  • C:\users\default\appdata\local\<INETFILES>\mnho9y54 sgu4m7oc titts .zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\mnho9y54 hot (!) glans nmibe2 (y8oxsqa).mpg.exe
  • C:\users\default\templates\gay uncut titts (rdl1tfkz,cy4xpd).avi.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\gzn4ud7e wep6b08 beast bq4kno 8bgkvshe1 .zip.exe
  • %TEMP%\z9z7rwe w6csjja14n1 nom72kl vjq39c1gwy feet .mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\upfgetx 8ok6yf mnho9y54 sgu4m7oc glans .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\xxx [bangbus] glans gsva2xn (jade).mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\black xakmpl horse uncut .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\eq7k2xcxt nude nom72kl bq4kno nmibe2 .mpg.exe
  • %APPDATA%\microsoft\templates\z9z7rwe ddqayq [free] .rar.exe
  • %APPDATA%\microsoft\windows\templates\sperm uncut 50+ .mpg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\8r3baiec horse hot (!) (liz).zip.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\beast sgu4m7oc ash .mpg.exe
  • %HOMEPATH%\templates\s2fkave wep6b08 beast 7vepaqjm feet sm (sarah).mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\horse ihthd33 cock nrb42wq .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\yzw1afy uncut (jade).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\lpcu5ai3 [free] (jade).avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\sperm epyxwn feet zmc8ujp .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\mnho9y54 hot (!) cock lady (c4w8hqa).mpeg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\xxx epyxwn feet .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\f1i7cm nude mzwpstr8n uncut sgoibhh .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\nom72kl bq4kno .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\tsomq34 vjq39c1gwy lzxyhb7k .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\gzn4ud7e cum sperm ihthd33 (g6u8n4r).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\lpcu5ai3 [bangbus] girly .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\lpcu5ai3 l9hwcs7vvnphd9 40+ .avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\gzn4ud7e h93bklf nom72kl girls shoes .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\f1i7cm ddqayq mnho9y54 big feet (haj1oyikd,dxocjwba).avi.exe
  • %WINDIR%\assembly\temp\black w6csjja14n1 beast apv53deiq9fw nmibe2 .mpg.exe
  • %WINDIR%\assembly\tmp\horse l9hwcs7vvnphd9 girly .zip.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\fac71w2 porn yzw1afy epyxwn titts nmibe2 .mpeg.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\black xakmpl yzw1afy uncut hole .rar.exe
  • %WINDIR%\pla\templates\s2fkave h93bklf nom72kl sgu4m7oc titts mg9fvb2xk9 (sarah).mpeg.exe
  • %WINDIR%\security\templates\8r3baiec horse lpcu5ai3 nom72kl hole .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\beast uncut titts sweet .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\gzn4ud7e w6csjja14n1 xxx nom72kl gsva2xn .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\f1i7cm wep6b08 girls glans .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\xxx uncut titts .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\upfgetx nude tsomq34 vjq39c1gwy (c4w8hqa).mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\xxx nom72kl 8bgkvshe1 .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\z9z7rwe ddqayq mnho9y54 ihthd33 titts 40+ .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt ddqayq girls 50+ .avi.exe
  • %WINDIR%\syswow64\fxstmp\horse yzw1afy sgu4m7oc titts ejn547rbxhd1 .mpg.exe
  • %WINDIR%\syswow64\ime\shared\yzw1afy 7vepaqjm zmc8ujp .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\gzn4ud7e xakmpl sperm vjq39c1gwy sweet .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt w6csjja14n1 gay girls .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\gzn4ud7e 7nd83wovj sperm ihthd33 glans .rar.exe
  • %WINDIR%\syswow64\ime\shared\mzwpstr8n 7vepaqjm cock nmibe2 .mpg.exe
  • %WINDIR%\temp\8r3baiec h93bklf tsomq34 sgu4m7oc rv0y8n (36mho73,cy4xpd).mpg.exe
  • %WINDIR%\winsxs\installtemp\fac71w2 wep6b08 mnho9y54 big hole (dehod0,sarah).mpeg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android