JavaScript support is required for our site to be fully operational in your browser.
Trojan.KillProc2.29538
Added to the Dr.Web virus database:
2025-07-17
Virus description added:
2025-07-18
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\eq7k2xcxt 8ok6yf horse uncut feet 8bgkvshe1 .zip.exe
%ProgramFiles%\dvd maker\shared\z9z7rwe horse lpcu5ai3 [free] glans sweet .mpg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\beast ihthd33 boots .rar.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\eq7k2xcxt ddqayq lpcu5ai3 apv53deiq9fw girly .mpeg.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\s2fkave horse mnho9y54 hot (!) cock balls .avi.exe
%ProgramFiles%\microsoft office\templates\fac71w2 wep6b08 mzwpstr8n sgu4m7oc (g6u8n4r).rar.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\f1i7cm ddqayq gay big mg9fvb2xk9 .zip.exe
%ProgramFiles%\windows journal\templates\f1i7cm 7nd83wovj lpcu5ai3 [milf] feet qx2j1b5 (y8oxsqa).avi.exe
%ProgramFiles%\windows sidebar\shared gadgets\gzn4ud7e w6csjja14n1 nom72kl 7vepaqjm young .rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\s2fkave horse sperm bq4kno js80j73 .avi.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\z9z7rwe bd1l5ir lpcu5ai3 [bangbus] titts nrb42wq .zip.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\horse vjq39c1gwy hole .avi.exe
%CommonProgramFiles(x86)%\microsoft shared\tsomq34 big .mpeg.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\ big js80j73 .avi.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\xxx sgu4m7oc sweet .avi.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\mzwpstr8n uncut feet 50+ (2hbt8wr).zip.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\upfgetx cum yzw1afy l9hwcs7vvnphd9 nrb42wq .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\z9z7rwe 8ok6yf beast epyxwn .mpg.exe
%ALLUSERSPROFILE%\templates\f1i7cm horse yzw1afy sgu4m7oc 50+ (hyo87il,karin).rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\f07qtt 8ok6yf beast nom72kl (2hbt8wr).mpeg.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\tsomq34 hot (!) .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\z9z7rwe w6csjja14n1 xxx 7vepaqjm 8bgkvshe1 .zip.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\gay 7vepaqjm .zip.exe
%ALLUSERSPROFILE%\templates\z9z7rwe wep6b08 mzwpstr8n bq4kno .zip.exe
C:\users\default\appdata\local\<INETFILES>\h93bklf tsomq34 uncut (2hbt8wr).avi.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\eq7k2xcxt h93bklf gay apv53deiq9fw (c4w8hqa).mpg.exe
C:\users\default\templates\yzw1afy nom72kl girly (sonja,y8oxsqa).mpg.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\8r3baiec porn mnho9y54 [free] gh5b6gd7wrv .rar.exe
%TEMP%\eq7k2xcxt ddqayq girls (jade).mpg.exe
%LOCALAPPDATA%\<INETFILES>\mnho9y54 [milf] (jade).avi.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\s2fkave w6csjja14n1 lpcu5ai3 uncut wifey .rar.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\eq7k2xcxt xakmpl nom72kl uncut feet js80j73 (y8oxsqa).rar.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\fac71w2 8ok6yf xxx [bangbus] qq6w54yfhtqrbwcslg (sandy,liz).mpg.exe
%APPDATA%\microsoft\templates\gzn4ud7e nude horse 7vepaqjm cock eigt45 (c4w8hqa).mpg.exe
%APPDATA%\microsoft\windows\templates\f07qtt bd1l5ir mnho9y54 apv53deiq9fw titts mg9fvb2xk9 .rar.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\black horse nom72kl [free] .mpg.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\eq7k2xcxt porn mzwpstr8n ihthd33 ae2sd7u4xh .avi.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\8ok6yf gay epyxwn b37oavmx289 .mpeg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\s2fkave horse tsomq34 big (dxocjwba).mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\eq7k2xcxt horse nom72kl nom72kl hole boots .mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\8r3baiec w6csjja14n1 mzwpstr8n l9hwcs7vvnphd9 feet zmc8ujp (cy4xpd).mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\gzn4ud7e porn mzwpstr8n 7vepaqjm feet fw58kpr41ob1w (karin).mpeg.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\yzw1afy big .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\horse uncut 8pfmdyy .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\beast apv53deiq9fw cock nmibe2 .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\fac71w2 xakmpl mnho9y54 vjq39c1gwy 6tl9zg0uqa .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\gzn4ud7e w6csjja14n1 gay epyxwn .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\gzn4ud7e xakmpl mzwpstr8n vjq39c1gwy sweet (haj1oyikd,g6u8n4r).avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\xxx [milf] b37oavmx289 .mpg.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\upfgetx xakmpl ihthd33 .avi.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\eq7k2xcxt cum nom72kl big rv0y8n (sonja,2hbt8wr).mpg.exe
%WINDIR%\assembly\temp\yzw1afy sgu4m7oc hole fw58kpr41ob1w .zip.exe
%WINDIR%\assembly\tmp\black ddqayq beast [bangbus] 40+ .mpg.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\eq7k2xcxt cum xxx uncut .rar.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\ apv53deiq9fw feet balls (c4w8hqa).rar.exe
%WINDIR%\pla\templates\8r3baiec w6csjja14n1 tsomq34 l9hwcs7vvnphd9 feet qq6w54yfhtqrbwcslg .avi.exe
%WINDIR%\security\templates\z9z7rwe wep6b08 sperm girls .zip.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\horse l9hwcs7vvnphd9 rv0y8n .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\fac71w2 h93bklf beast [free] (2hbt8wr).mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\horse [bangbus] (sarah).mpeg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\upfgetx cum horse apv53deiq9fw ejn547rbxhd1 (jenna,y8oxsqa).zip.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\horse uncut .mpg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\eq7k2xcxt ddqayq tsomq34 [bangbus] qq6w54yfhtqrbwcslg .avi.exe
%WINDIR%\syswow64\config\systemprofile\s2fkave 8ok6yf horse ihthd33 sweet .mpeg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\f1i7cm wep6b08 tsomq34 bq4kno glans fw58kpr41ob1w .rar.exe
%WINDIR%\syswow64\fxstmp\nom72kl big rv0y8n .mpg.exe
%WINDIR%\syswow64\ime\shared\gay uncut .zip.exe
%WINDIR%\syswow64\config\systemprofile\eq7k2xcxt xakmpl lpcu5ai3 [milf] sgoibhh .zip.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\black 8ok6yf mzwpstr8n [bangbus] (2hbt8wr).avi.exe
%WINDIR%\syswow64\fxstmp\f07qtt 7nd83wovj lpcu5ai3 [milf] glans .mpg.exe
%WINDIR%\syswow64\ime\shared\f1i7cm 7nd83wovj xxx nom72kl .zip.exe
%WINDIR%\temp\s2fkave w6csjja14n1 yzw1afy hot (!) glans .avi.exe
%WINDIR%\winsxs\installtemp\wpjwijv uncut mg9fvb2xk9 (sonja,liz).mpeg.exe
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK