Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Trojan.KillProc2.29544

Added to the Dr.Web virus database: 2025-07-17

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\upfgetx w6csjja14n1 lpcu5ai3 [free] balls .mpg.exe
  • %ProgramFiles%\dvd maker\shared\asian beast uncut js80j73 .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\eq7k2xcxt ddqayq porn ihthd33 hairy .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\cum tsomq34 7vepaqjm glans js80j73 (jade,sonja).avi.exe
  • %ProgramFiles%\microsoft office\templates\porn sperm vjq39c1gwy (haj1oyikd).avi.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\wpjwijv horse xakmpl bq4kno boots .rar.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\4h1e2a346 mzwpstr8n xakmpl l9hwcs7vvnphd9 mg9fvb2xk9 (gina).mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\sperm l9hwcs7vvnphd9 sm (y8oxsqa).zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\7b6fhxi bd1l5ir yzw1afy epyxwn (sonja,sonja).rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\jxaglwti tsomq34 mnho9y54 l9hwcs7vvnphd9 young .rar.exe
  • %CommonProgramFiles(x86)%\microsoft shared\z9z7rwe sperm hot (!) gh5b6gd7wrv .mpg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\xakmpl horse vjq39c1gwy feet .mpeg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\s2fkave xakmpl sgu4m7oc fishy (c4w8hqa).zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\0287zh 7nd83wovj nom72kl eigt45 .avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\gzn4ud7e 7nd83wovj [bangbus] feet zmc8ujp .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\0287zh horse lpcu5ai3 bq4kno legs .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\0287zh sperm l9hwcs7vvnphd9 young (c4w8hqa).mpg.exe
  • %ALLUSERSPROFILE%\templates\beast sgu4m7oc .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\nude nom72kl bq4kno jxqgtp wifey .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\fac71w2 horse xakmpl apv53deiq9fw .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\nom72kl tsomq34 big .zip.exe
  • %ALLUSERSPROFILE%\templates\porn [free] .zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\8r3baiec hot (!) .zip.exe
  • C:\users\default\appdata\local\temp\8r3baiec yzw1afy gay girls boobs 779mipj .rar.exe
  • C:\users\default\appdata\local\<INETFILES>\z9z7rwe 7nd83wovj h93bklf girls hole .avi.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\7nd83wovj tsomq34 [bangbus] hotel .avi.exe
  • C:\users\default\templates\black horse h93bklf nom72kl feet (c4w8hqa).mpeg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\w6csjja14n1 nude epyxwn hole sweet (36mho73,rdl1tfkz).mpeg.exe
  • %TEMP%\4h1e2a346 xxx epyxwn (c4w8hqa,dxocjwba).mpeg.exe
  • %LOCALAPPDATA%\<INETFILES>\wpjwijv xxx w6csjja14n1 [milf] .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\7b6fhxi beast big hole .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\0287zh uncut kfp2yqq .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\f1i7cm mnho9y54 ihthd33 (36mho73).avi.exe
  • %APPDATA%\microsoft\templates\0287zh sperm ihthd33 qx2j1b5 .zip.exe
  • %APPDATA%\microsoft\windows\templates\asian bd1l5ir porn bq4kno ejn547rbxhd1 .mpeg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\eq7k2xcxt bd1l5ir bq4kno .mpg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\ddqayq cum uncut balls .mpeg.exe
  • %HOMEPATH%\templates\xxx big hole lzxyhb7k .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\4h1e2a346 7nd83wovj mzwpstr8n uncut gsva2xn .mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\s2fkave nude nude hot (!) cock lzxyhb7k (gina,sonja).rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\lpcu5ai3 7vepaqjm boobs (sonja).zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\jxaglwti yzw1afy [free] (36mho73).rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\7nd83wovj xakmpl nom72kl lady .mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\horse [free] 779mipj .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zc8giv9 h93bklf bq4kno hole hotel (dehod0,haj1oyikd).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\w6csjja14n1 gay l9hwcs7vvnphd9 (36mho73,36mho73).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\eq7k2xcxt w6csjja14n1 h93bklf hot (!) b37oavmx289 .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\wpjwijv wep6b08 uncut cock (liz).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\h93bklf w6csjja14n1 big ash 50+ (sonja,jade).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\jxaglwti xakmpl l9hwcs7vvnphd9 boobs ol6p1tua (sonja).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\zc8giv9 sperm bq4kno glans mg9fvb2xk9 .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\8r3baiec gay lpcu5ai3 bq4kno latex .zip.exe
  • %WINDIR%\assembly\temp\7nd83wovj girls balls .avi.exe
  • %WINDIR%\assembly\tmp\7b6fhxi 8ok6yf wep6b08 [free] hotel (dxocjwba,jade).mpg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\ [milf] .avi.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\cum big latex .zip.exe
  • %WINDIR%\pla\templates\nom72kl gay epyxwn fishy .rar.exe
  • %WINDIR%\security\templates\black xakmpl vjq39c1gwy .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\viaz50 mzwpstr8n mzwpstr8n uncut ae2sd7u4xh .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\jxaglwti tsomq34 uncut 6tl9zg0uqa .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\lpcu5ai3 l9hwcs7vvnphd9 hole fw58kpr41ob1w (liz).mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\gzn4ud7e tsomq34 horse epyxwn sweet .mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\upfgetx horse vjq39c1gwy zmc8ujp (haj1oyikd).mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\xxx 7vepaqjm 8bgkvshe1 .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\gzn4ud7e ddqayq 8ok6yf vjq39c1gwy cock .zip.exe
  • %WINDIR%\syswow64\fxstmp\8r3baiec xakmpl apv53deiq9fw .mpg.exe
  • %WINDIR%\syswow64\ime\shared\horse 7nd83wovj ihthd33 .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\0287zh 7nd83wovj porn [free] .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\yzw1afy ihthd33 (g6u8n4r,c4w8hqa).mpeg.exe
  • %WINDIR%\syswow64\fxstmp\mnho9y54 wep6b08 girls latex .rar.exe
  • %WINDIR%\syswow64\ime\shared\z1qxwcd sperm w6csjja14n1 girls .mpeg.exe
  • %WINDIR%\temp\mzwpstr8n bq4kno jxqgtp .mpg.exe
Network activity
TCP
Other
  • '34.##9.100.209':443
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android