Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.KillProc2.24999

Added to the Dr.Web virus database: 2025-07-02

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\viaz50 lpcu5ai3 l9hwcs7vvnphd9 boobs ash .rar.exe
  • %ProgramFiles%\dvd maker\shared\black beast xakmpl apv53deiq9fw .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\z1qxwcd cum 7vepaqjm glans fishy (sonja,cy4xpd).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\7nd83wovj [free] gh5b6gd7wrv (2hbt8wr,jade).avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\nude sperm hot (!) .mpeg.exe
  • %ProgramFiles%\microsoft office\templates\viaz50 wep6b08 mzwpstr8n uncut cock .zip.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\h93bklf nude vjq39c1gwy (jenna).mpeg.exe
  • %ProgramFiles%\windows journal\templates\gzn4ud7e lpcu5ai3 [bangbus] mg9fvb2xk9 .zip.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\xakmpl sperm l9hwcs7vvnphd9 fw58kpr41ob1w (sonja).mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\yzw1afy [free] kfp2yqq ash .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\7b6fhxi gay big .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\8ok6yf 7vepaqjm hole boots .mpg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\jxaglwti sperm girls qq6w54yfhtqrbwcslg .zip.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\z9z7rwe horse horse l9hwcs7vvnphd9 ae2sd7u4xh .mpeg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\gzn4ud7e vjq39c1gwy (sandy,dehod0).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\mzwpstr8n nom72kl 7vepaqjm fw58kpr41ob1w .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\7b6fhxi mnho9y54 mzwpstr8n nom72kl .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\xakmpl sperm [free] wifey .mpeg.exe
  • %ALLUSERSPROFILE%\templates\4h1e2a346 beast 7nd83wovj sgu4m7oc cock ae2sd7u4xh .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\mnho9y54 8ok6yf nom72kl 779mipj .rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\ddqayq horse [free] qq6w54yfhtqrbwcslg .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\h93bklf cum hot (!) titts .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\asian wep6b08 big mg9fvb2xk9 .zip.exe
  • %ALLUSERSPROFILE%\templates\bd1l5ir nude sgu4m7oc (sonja,36mho73).avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\0287zh porn nom72kl sm .mpg.exe
  • C:\users\default\appdata\local\temp\nom72kl l9hwcs7vvnphd9 .zip.exe
  • C:\users\default\appdata\local\<INETFILES>\viaz50 horse girls girly .mpeg.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\w6csjja14n1 uncut ae2sd7u4xh .rar.exe
  • C:\users\default\templates\zc8giv9 beast big ejn547rbxhd1 .mpg.exe
  • %TEMP%\z9z7rwe ihthd33 cock hotel (rdl1tfkz,rdl1tfkz).mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\z1qxwcd mnho9y54 [milf] hole fishy .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\z1qxwcd cum w6csjja14n1 ihthd33 lady (cy4xpd,rdl1tfkz).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\fac71w2 ddqayq hot (!) js80j73 .avi.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\f07qtt beast vjq39c1gwy nrb42wq .mpg.exe
  • %APPDATA%\microsoft\templates\eq7k2xcxt beast l9hwcs7vvnphd9 rv0y8n .mpeg.exe
  • %APPDATA%\microsoft\windows\templates\0287zh gay xakmpl [milf] cock b37oavmx289 .mpeg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\zc8giv9 nude bd1l5ir uncut fw58kpr41ob1w .rar.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\upfgetx tsomq34 xxx 7vepaqjm fw58kpr41ob1w (sonja).avi.exe
  • %HOMEPATH%\templates\asian wep6b08 [free] ash (dehod0,sonja).mpg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\8r3baiec sperm lpcu5ai3 big lzxyhb7k .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\7b6fhxi 7nd83wovj gay [bangbus] feet eigt45 .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\7b6fhxi bd1l5ir [bangbus] hole .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\4h1e2a346 nude sperm hot (!) feet rv0y8n .rar.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\xxx 7vepaqjm ash boots .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\gzn4ud7e sperm xakmpl apv53deiq9fw kfp2yqq lzxyhb7k .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\wpjwijv nom72kl epyxwn qx2j1b5 .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\ cum big kfp2yqq nmibe2 .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\0287zh yzw1afy girls cock latex (hyo87il).zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\yzw1afy bd1l5ir l9hwcs7vvnphd9 wifey .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\7b6fhxi porn h93bklf [milf] (dxocjwba,g6u8n4r).avi.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\asian w6csjja14n1 girls kfp2yqq 8pfmdyy .mpg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android