Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.KillProc2.24977

Added to the Dr.Web virus database: 2025-07-02

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\upfgetx beast [milf] b37oavmx289 (cy4xpd).mpg.exe
  • %ProgramFiles%\dvd maker\shared\xakmpl mnho9y54 bq4kno sm (2hbt8wr).avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\beast wep6b08 [milf] hole boots .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\mzwpstr8n porn uncut (sonja).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\ikdyfwhy wep6b08 8ok6yf sgu4m7oc zmc8ujp .mpeg.exe
  • %ProgramFiles%\microsoft office\templates\viaz50 mzwpstr8n horse [milf] lzxyhb7k .zip.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\7b6fhxi beast girls (hyo87il,dxocjwba).rar.exe
  • %ProgramFiles%\windows journal\templates\upfgetx wep6b08 7nd83wovj big zn3tvn .zip.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\4h1e2a346 sperm apv53deiq9fw fishy .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\zc8giv9 girls kfp2yqq (c4w8hqa).rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\z9z7rwe cum l9hwcs7vvnphd9 cock shoes .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\z1qxwcd sperm tsomq34 [milf] .mpg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\beast horse epyxwn 779mipj (dehod0).avi.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\7nd83wovj cum vjq39c1gwy jxqgtp sm .mpeg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\z9z7rwe mzwpstr8n girls kfp2yqq 40+ .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\fac71w2 nom72kl yzw1afy [free] 50+ .zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\mzwpstr8n uncut boobs gsva2xn (liz).rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay gay epyxwn jxqgtp .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\ikdyfwhy w6csjja14n1 [milf] .rar.exe
  • %ALLUSERSPROFILE%\templates\jxaglwti nude sperm girls .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\0287zh ddqayq sgu4m7oc .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\7nd83wovj [bangbus] (sandy,c4w8hqa).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\ikdyfwhy wep6b08 yzw1afy uncut (g6u8n4r,36mho73).avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\xakmpl 7nd83wovj l9hwcs7vvnphd9 rv0y8n .avi.exe
  • %ALLUSERSPROFILE%\templates\w6csjja14n1 vjq39c1gwy boobs gsva2xn .rar.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\ddqayq nude [bangbus] fw58kpr41ob1w .mpeg.exe
  • C:\users\default\appdata\local\temp\gay epyxwn cock latex (jade).mpeg.exe
  • C:\users\default\appdata\local\<INETFILES>\8r3baiec mzwpstr8n w6csjja14n1 [free] fishy .avi.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\nom72kl uncut ash .mpg.exe
  • C:\users\default\templates\zc8giv9 nom72kl sperm hot (!) kfp2yqq .rar.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\7nd83wovj nom72kl titts eigt45 .mpeg.exe
  • %TEMP%\porn uncut hotel .avi.exe
  • %LOCALAPPDATA%\<INETFILES>\7b6fhxi nom72kl hot (!) .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\s2fkave 8ok6yf l9hwcs7vvnphd9 sm .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\eq7k2xcxt mzwpstr8n [bangbus] ejn547rbxhd1 (y8oxsqa,2hbt8wr).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\7b6fhxi h93bklf nom72kl (jenna).mpg.exe
  • %APPDATA%\microsoft\templates\mzwpstr8n epyxwn wifey .mpg.exe
  • %APPDATA%\microsoft\windows\templates\7b6fhxi w6csjja14n1 xxx ihthd33 glans ol6p1tua (y8oxsqa).avi.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\lpcu5ai3 girls .zip.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\xakmpl l9hwcs7vvnphd9 glans sm (karin).mpeg.exe
  • %HOMEPATH%\templates\fac71w2 bd1l5ir hot (!) (cy4xpd).rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\black yzw1afy xxx [bangbus] wifey .mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\w6csjja14n1 uncut (jenna,36mho73).zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f1i7cm cum tsomq34 apv53deiq9fw (y8oxsqa).zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\8ok6yf cum l9hwcs7vvnphd9 gsva2xn .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\z9z7rwe h93bklf sgu4m7oc legs eigt45 (liz,karin).mpeg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\7b6fhxi sperm ihthd33 kfp2yqq .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\f07qtt bd1l5ir horse [bangbus] 50+ (sarah).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\zc8giv9 xakmpl sgu4m7oc legs .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\sperm mzwpstr8n girls titts 6tl9zg0uqa .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\ikdyfwhy horse yzw1afy vjq39c1gwy ash .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\asian horse bq4kno (jenna).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\zc8giv9 xxx apv53deiq9fw ash .rar.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\asian xakmpl apv53deiq9fw nrb42wq (hyo87il).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\8r3baiec ddqayq wep6b08 bq4kno shoes .avi.exe
  • %WINDIR%\assembly\temp\0287zh gay tsomq34 epyxwn .rar.exe
  • %WINDIR%\assembly\tmp\zc8giv9 beast yzw1afy sgu4m7oc feet .rar.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\mnho9y54 wep6b08 7vepaqjm fishy .mpg.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\s2fkave h93bklf mzwpstr8n sgu4m7oc boobs boots .avi.exe
  • %WINDIR%\pla\templates\upfgetx mzwpstr8n uncut (karin,y8oxsqa).avi.exe
  • %WINDIR%\security\templates\0287zh 7nd83wovj 8ok6yf big .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\ddqayq lpcu5ai3 uncut .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\gzn4ud7e horse big 779mipj .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\upfgetx h93bklf 8ok6yf uncut cock latex .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\asian wep6b08 horse [free] fw58kpr41ob1w .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\black w6csjja14n1 nom72kl l9hwcs7vvnphd9 .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\mzwpstr8n nude hot (!) glans eigt45 (jade,sonja).mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\xakmpl apv53deiq9fw .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe 8ok6yf [milf] .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\nom72kl girls cock .mpeg.exe
  • %WINDIR%\syswow64\ime\shared\wep6b08 l9hwcs7vvnphd9 hairy .mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\bd1l5ir uncut .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\wpjwijv bd1l5ir [free] nmibe2 (liz).avi.exe
  • %WINDIR%\syswow64\fxstmp\8r3baiec 8ok6yf l9hwcs7vvnphd9 b37oavmx289 .zip.exe
  • %WINDIR%\syswow64\ime\shared\upfgetx horse porn big js80j73 .avi.exe
  • %WINDIR%\temp\horse l9hwcs7vvnphd9 legs .zip.exe
  • %WINDIR%\winsxs\installtemp\0287zh xxx bd1l5ir [free] kfp2yqq sweet (hyo87il,liz).avi.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android