JavaScript support is required for our site to be fully operational in your browser.
Trojan.KillProc2.25486
Added to the Dr.Web virus database:
2025-07-10
Virus description added:
2025-07-11
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\viaz50 xxx vjq39c1gwy zmc8ujp .zip.exe
%ProgramFiles%\dvd maker\shared\black ddqayq cum bq4kno .mpeg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\f1i7cm horse [milf] .mpg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\fac71w2 mzwpstr8n ddqayq uncut nmibe2 .avi.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\f1i7cm 8ok6yf uncut (g6u8n4r,rdl1tfkz).avi.exe
%ProgramFiles%\microsoft office\templates\tsomq34 7nd83wovj epyxwn qq6w54yfhtqrbwcslg .zip.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\h93bklf [free] titts .mpeg.exe
%ProgramFiles%\windows journal\templates\eq7k2xcxt mzwpstr8n mnho9y54 [bangbus] .avi.exe
%ProgramFiles%\windows sidebar\shared gadgets\h93bklf bq4kno glans sweet .mpg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\gzn4ud7e ddqayq cum girls .mpg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\s2fkave horse 8ok6yf ihthd33 feet hotel (y8oxsqa).rar.exe
%CommonProgramFiles(x86)%\microsoft shared\fac71w2 h93bklf bq4kno legs (hyo87il).zip.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\jxaglwti gay ihthd33 lzxyhb7k (rdl1tfkz,36mho73).mpg.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\porn bq4kno jxqgtp nrb42wq .zip.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\lpcu5ai3 horse uncut hotel .zip.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\0287zh beast 7nd83wovj 7vepaqjm kfp2yqq js80j73 (hyo87il).rar.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\upfgetx lpcu5ai3 [bangbus] shoes .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\4h1e2a346 porn 7nd83wovj epyxwn .mpg.exe
%ALLUSERSPROFILE%\templates\bd1l5ir xxx epyxwn gsva2xn .avi.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\8r3baiec ddqayq mnho9y54 girls boobs .avi.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\nude ddqayq vjq39c1gwy nrb42wq .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\h93bklf gay epyxwn nmibe2 (dxocjwba,karin).mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\tsomq34 ddqayq vjq39c1gwy glans nmibe2 (gina,sonja).mpeg.exe
%ALLUSERSPROFILE%\templates\zc8giv9 8ok6yf [milf] sm .mpg.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\f07qtt mnho9y54 ddqayq big shoes .avi.exe
C:\users\default\appdata\local\temp\f1i7cm sperm sperm ihthd33 jxqgtp mg9fvb2xk9 (y8oxsqa).avi.exe
C:\users\default\appdata\local\<INETFILES>\tsomq34 vjq39c1gwy feet fw58kpr41ob1w .mpg.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\xxx [bangbus] lzxyhb7k .avi.exe
C:\users\default\templates\wpjwijv 7nd83wovj wep6b08 l9hwcs7vvnphd9 titts mg9fvb2xk9 (2hbt8wr,dxocjwba).mpeg.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\viaz50 porn [milf] (gina,hyo87il).mpg.exe
%TEMP%\z9z7rwe lpcu5ai3 8ok6yf sgu4m7oc nrb42wq (jenna).avi.exe
%LOCALAPPDATA%\<INETFILES>\z9z7rwe tsomq34 wep6b08 nom72kl kfp2yqq lady .mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\cum porn [free] qx2j1b5 .zip.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\black bd1l5ir horse uncut .avi.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\7b6fhxi cum gay l9hwcs7vvnphd9 zmc8ujp .mpeg.exe
%APPDATA%\microsoft\templates\bd1l5ir w6csjja14n1 vjq39c1gwy feet ae2sd7u4xh .mpg.exe
%APPDATA%\microsoft\windows\templates\gzn4ud7e mzwpstr8n uncut ash (liz).zip.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\7b6fhxi xxx beast girls ae2sd7u4xh (rdl1tfkz).rar.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\xxx vjq39c1gwy jxqgtp (sonja).mpg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\s2fkave tsomq34 xakmpl nom72kl legs mg9fvb2xk9 (c4w8hqa).mpg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\8r3baiec horse ihthd33 .mpg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f1i7cm beast [milf] lzxyhb7k .mpg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\yzw1afy ddqayq l9hwcs7vvnphd9 cock (jade,sarah).rar.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\gzn4ud7e wep6b08 xxx [free] zmc8ujp .mpeg.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\z9z7rwe cum [milf] js80j73 .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\eq7k2xcxt 8ok6yf sperm [free] js80j73 (liz).mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\beast 7vepaqjm 8bgkvshe1 .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\h93bklf apv53deiq9fw glans fw58kpr41ob1w .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\s2fkave nude 8ok6yf l9hwcs7vvnphd9 sweet (hyo87il).mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\zc8giv9 xakmpl porn uncut qq6w54yfhtqrbwcslg .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\8r3baiec beast apv53deiq9fw .avi.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\nom72kl gay [milf] glans rv0y8n .rar.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\s2fkave wep6b08 hot (!) jxqgtp .avi.exe
%WINDIR%\assembly\temp\fac71w2 horse sperm nom72kl hole ol6p1tua .avi.exe
%WINDIR%\assembly\tmp\horse xakmpl vjq39c1gwy js80j73 (36mho73).avi.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\4h1e2a346 beast big .avi.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\viaz50 sperm nude vjq39c1gwy titts (2hbt8wr).zip.exe
%WINDIR%\pla\templates\horse big ash young .mpeg.exe
%WINDIR%\security\templates\sperm xakmpl apv53deiq9fw cock rv0y8n .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt mzwpstr8n vjq39c1gwy .zip.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\viaz50 wep6b08 yzw1afy apv53deiq9fw (hyo87il,liz).avi.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\viaz50 mnho9y54 [bangbus] girly (jade).rar.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\bd1l5ir sperm big hairy (rdl1tfkz,liz).avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\horse sgu4m7oc .rar.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\fac71w2 8ok6yf xxx epyxwn gsva2xn .zip.exe
%WINDIR%\syswow64\config\systemprofile\xakmpl l9hwcs7vvnphd9 .mpeg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\viaz50 w6csjja14n1 gay apv53deiq9fw .zip.exe
%WINDIR%\syswow64\fxstmp\z1qxwcd mzwpstr8n l9hwcs7vvnphd9 feet sweet .avi.exe
%WINDIR%\syswow64\ime\shared\mnho9y54 big (liz,sandy).avi.exe
%WINDIR%\syswow64\config\systemprofile\4h1e2a346 bd1l5ir nude uncut jxqgtp nrb42wq .avi.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\upfgetx yzw1afy gay hot (!) glans sgoibhh (hyo87il,sandy).rar.exe
%WINDIR%\syswow64\fxstmp\mnho9y54 hot (!) (g6u8n4r,c4w8hqa).rar.exe
%WINDIR%\syswow64\ime\shared\7b6fhxi tsomq34 nude hot (!) ae2sd7u4xh .rar.exe
%WINDIR%\temp\nude l9hwcs7vvnphd9 qx2j1b5 .avi.exe
%WINDIR%\winsxs\installtemp\lpcu5ai3 apv53deiq9fw rv0y8n (cy4xpd,hyo87il).mpg.exe
<Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK