Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.KillProc2.25000

Added to the Dr.Web virus database: 2025-07-02

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\cum xxx epyxwn feet 8pfmdyy (y8oxsqa,sarah).avi.exe
  • %ProgramFiles%\dvd maker\shared\asian tsomq34 vjq39c1gwy .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\fac71w2 tsomq34 cum big .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\f07qtt 7nd83wovj girls fishy .rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\ikdyfwhy tsomq34 xxx uncut titts 50+ .zip.exe
  • %ProgramFiles%\microsoft office\templates\beast ihthd33 b37oavmx289 .rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\fac71w2 nom72kl sperm l9hwcs7vvnphd9 6tl9zg0uqa .mpeg.exe
  • %ProgramFiles%\windows journal\templates\f1i7cm w6csjja14n1 tsomq34 uncut glans (sarah).rar.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\wep6b08 nude hot (!) .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\0287zh mzwpstr8n [bangbus] fw58kpr41ob1w .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\z1qxwcd tsomq34 nude [milf] 6tl9zg0uqa .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\cum epyxwn legs .avi.exe
  • %CommonProgramFiles(x86)%\microsoft shared\yzw1afy yzw1afy epyxwn jxqgtp balls .mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\h93bklf 7nd83wovj hot (!) 8bgkvshe1 .mpeg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\8r3baiec xakmpl xxx vjq39c1gwy feet zn3tvn .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\8r3baiec tsomq34 bq4kno (jade,dehod0).avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\cum wep6b08 bq4kno hairy .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\f1i7cm w6csjja14n1 ddqayq nom72kl .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\xakmpl uncut .zip.exe
  • %ALLUSERSPROFILE%\templates\bd1l5ir epyxwn .zip.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\upfgetx nude mzwpstr8n hot (!) jxqgtp (dxocjwba,y8oxsqa).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\eq7k2xcxt bd1l5ir [milf] feet (karin,sarah).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\viaz50 w6csjja14n1 nude nom72kl fw58kpr41ob1w .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\4h1e2a346 wep6b08 mnho9y54 sgu4m7oc ash (haj1oyikd).rar.exe
  • %ALLUSERSPROFILE%\templates\h93bklf sgu4m7oc .avi.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\bd1l5ir apv53deiq9fw boobs zmc8ujp .mpg.exe
  • C:\users\default\appdata\local\temp\7b6fhxi wep6b08 sgu4m7oc .mpeg.exe
  • C:\users\default\appdata\local\<INETFILES>\nude uncut legs 40+ .zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\ddqayq horse sgu4m7oc gsva2xn .zip.exe
  • C:\users\default\templates\7b6fhxi lpcu5ai3 sgu4m7oc sgoibhh (sarah).mpg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\8ok6yf ihthd33 cock eigt45 .zip.exe
  • %TEMP%\f1i7cm horse girls feet ash .avi.exe
  • %LOCALAPPDATA%\<INETFILES>\4h1e2a346 w6csjja14n1 ihthd33 ol6p1tua (36mho73,rdl1tfkz).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\w6csjja14n1 hot (!) (g6u8n4r).mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\ddqayq girls titts qx2j1b5 (rdl1tfkz,dxocjwba).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\tsomq34 horse [milf] hotel (36mho73,rdl1tfkz).mpg.exe
  • %APPDATA%\microsoft\templates\jxaglwti ddqayq vjq39c1gwy lzxyhb7k .avi.exe
  • %APPDATA%\microsoft\windows\templates\black cum vjq39c1gwy 8pfmdyy .avi.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\s2fkave porn nude [free] legs fishy .mpg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\eq7k2xcxt horse sgu4m7oc girly .mpeg.exe
  • %HOMEPATH%\templates\nom72kl uncut boobs sm .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\asian gay girls jxqgtp 8bgkvshe1 (liz).zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\wep6b08 apv53deiq9fw .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\gzn4ud7e wep6b08 ihthd33 .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\f07qtt mnho9y54 bq4kno (y8oxsqa).mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\h93bklf 7vepaqjm (liz).mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\lpcu5ai3 mnho9y54 epyxwn 8bgkvshe1 .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\ddqayq porn epyxwn sgoibhh .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\viaz50 gay sperm ihthd33 .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\ddqayq 8ok6yf ihthd33 (36mho73,36mho73).rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\jxaglwti horse nom72kl epyxwn .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\mzwpstr8n nude l9hwcs7vvnphd9 6tl9zg0uqa (sonja).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\mzwpstr8n xxx l9hwcs7vvnphd9 balls .mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\mnho9y54 nom72kl sgu4m7oc .mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\sperm uncut .mpeg.exe
  • %WINDIR%\assembly\temp\nom72kl gay vjq39c1gwy qq6w54yfhtqrbwcslg (rdl1tfkz,2hbt8wr).mpg.exe
  • %WINDIR%\assembly\tmp\nude bd1l5ir l9hwcs7vvnphd9 (2hbt8wr).rar.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\viaz50 beast [bangbus] .mpeg.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\nom72kl epyxwn titts qq6w54yfhtqrbwcslg .rar.exe
  • %WINDIR%\pla\templates\f1i7cm yzw1afy nom72kl .zip.exe
  • %WINDIR%\security\templates\z9z7rwe tsomq34 uncut feet mg9fvb2xk9 (sonja,liz).mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\tsomq34 bq4kno titts 8bgkvshe1 (jenna,gina).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\eq7k2xcxt 7nd83wovj horse epyxwn .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\0287zh girls glans sm .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe 8ok6yf l9hwcs7vvnphd9 .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\4h1e2a346 sperm l9hwcs7vvnphd9 .zip.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\f07qtt nude tsomq34 [bangbus] kfp2yqq hairy (jade,g6u8n4r).zip.exe
  • %WINDIR%\syswow64\config\systemprofile\z9z7rwe beast w6csjja14n1 vjq39c1gwy jxqgtp sm (gina,jenna).avi.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\xakmpl uncut .avi.exe
  • %WINDIR%\syswow64\fxstmp\asian mnho9y54 sperm girls cock nrb42wq .avi.exe
  • %WINDIR%\syswow64\ime\shared\0287zh lpcu5ai3 sperm 7vepaqjm hole .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\7nd83wovj apv53deiq9fw boobs .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\8r3baiec tsomq34 uncut cock (gina,36mho73).avi.exe
  • %WINDIR%\syswow64\fxstmp\ikdyfwhy nom72kl l9hwcs7vvnphd9 kfp2yqq sgoibhh .mpg.exe
  • %WINDIR%\syswow64\ime\shared\zc8giv9 nom72kl nom72kl (c4w8hqa,liz).avi.exe
  • %WINDIR%\temp\f1i7cm wep6b08 [bangbus] 8pfmdyy .rar.exe
  • %WINDIR%\winsxs\installtemp\sperm porn 7vepaqjm .avi.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android