Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.KillProc2.28134

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\fac71w2 cum ihthd33 nrb42wq .zip.exe
  • %ProgramFiles%\dvd maker\shared\fac71w2 sperm horse sgu4m7oc hole .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\s2fkave horse sperm [free] .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\ikdyfwhy 8ok6yf horse l9hwcs7vvnphd9 .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\8ok6yf 7vepaqjm glans young .avi.exe
  • %ProgramFiles%\microsoft office\templates\7b6fhxi ddqayq cum vjq39c1gwy jxqgtp .rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\sperm l9hwcs7vvnphd9 nrb42wq (liz,dxocjwba).zip.exe
  • %ProgramFiles%\windows journal\templates\wep6b08 lpcu5ai3 vjq39c1gwy jxqgtp .rar.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\bd1l5ir [free] (sandy).avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\wep6b08 tsomq34 [milf] girly .rar.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\7nd83wovj uncut legs (rdl1tfkz,haj1oyikd).mpeg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\upfgetx porn [milf] .rar.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\upfgetx horse nom72kl (hyo87il).mpg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\jxaglwti nom72kl sgu4m7oc fishy (y8oxsqa).rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\gzn4ud7e yzw1afy horse big fishy (haj1oyikd).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\tsomq34 wep6b08 vjq39c1gwy .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\nom72kl mnho9y54 apv53deiq9fw .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\wep6b08 epyxwn sweet .mpeg.exe
  • %ALLUSERSPROFILE%\templates\zc8giv9 h93bklf nom72kl 7vepaqjm sweet .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\4h1e2a346 cum [bangbus] gsva2xn (gina).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\7nd83wovj girls .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay h93bklf vjq39c1gwy mg9fvb2xk9 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\viaz50 lpcu5ai3 yzw1afy sgu4m7oc legs lady (jenna).zip.exe
  • %ALLUSERSPROFILE%\templates\nom72kl porn 7vepaqjm legs .zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\f07qtt nom72kl nude ihthd33 shoes .zip.exe
  • C:\users\default\appdata\local\temp\f07qtt sperm 8ok6yf apv53deiq9fw jxqgtp mg9fvb2xk9 .mpeg.exe
  • C:\users\default\appdata\local\<INETFILES>\z1qxwcd yzw1afy [bangbus] .zip.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\wep6b08 vjq39c1gwy hotel .mpeg.exe
  • C:\users\default\templates\viaz50 mzwpstr8n xxx uncut (gina,dehod0).mpg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\viaz50 horse nude hot (!) .avi.exe
  • %TEMP%\upfgetx tsomq34 wep6b08 hot (!) boobs (cy4xpd).mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\viaz50 yzw1afy bd1l5ir [milf] gh5b6gd7wrv .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\w6csjja14n1 girls boobs (y8oxsqa,2hbt8wr).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\gay vjq39c1gwy ash wifey .rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\8r3baiec mnho9y54 wep6b08 [bangbus] mg9fvb2xk9 .rar.exe
  • %APPDATA%\microsoft\templates\ddqayq big jxqgtp (haj1oyikd).avi.exe
  • %APPDATA%\microsoft\windows\templates\tsomq34 tsomq34 big wifey .mpeg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\f07qtt 7nd83wovj [free] (karin).rar.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\4h1e2a346 nude sgu4m7oc .rar.exe
  • %HOMEPATH%\templates\eq7k2xcxt nom72kl 7nd83wovj big 50+ .mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\asian ddqayq ddqayq hot (!) glans shoes .rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\z1qxwcd cum ihthd33 8pfmdyy .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\black sperm sgu4m7oc ejn547rbxhd1 .mpg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\xxx l9hwcs7vvnphd9 hole .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\bd1l5ir tsomq34 big 8bgkvshe1 .avi.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\mnho9y54 sgu4m7oc feet .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\wpjwijv beast [bangbus] .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\zc8giv9 mnho9y54 mzwpstr8n [free] lady (karin).mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\z1qxwcd wep6b08 xxx sgu4m7oc latex .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\nom72kl wep6b08 sgu4m7oc .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\gay ihthd33 kfp2yqq 779mipj .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\viaz50 yzw1afy big qq6w54yfhtqrbwcslg .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\mzwpstr8n sperm bq4kno .mpeg.exe
  • %WINDIR%\assembly\temp\black cum uncut qx2j1b5 .zip.exe
  • %WINDIR%\assembly\tmp\horse ihthd33 qx2j1b5 .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\8r3baiec mnho9y54 girls qq6w54yfhtqrbwcslg .mpeg.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\mnho9y54 tsomq34 uncut .rar.exe
  • %WINDIR%\pla\templates\0287zh nude h93bklf 7vepaqjm .avi.exe
  • %WINDIR%\security\templates\z9z7rwe cum apv53deiq9fw zn3tvn .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\ikdyfwhy nude nom72kl [free] 8bgkvshe1 .mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\xxx horse 7vepaqjm feet boots .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\ ihthd33 qq6w54yfhtqrbwcslg .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\xxx nude vjq39c1gwy sgoibhh .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\horse girls .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\4h1e2a346 w6csjja14n1 horse apv53deiq9fw kfp2yqq (liz,liz).mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\tsomq34 sgu4m7oc .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\nude nude uncut ash (c4w8hqa,dehod0).mpg.exe
  • %WINDIR%\syswow64\fxstmp\horse [milf] nrb42wq .rar.exe
  • %WINDIR%\syswow64\ime\shared\f07qtt 7nd83wovj nude big girly .rar.exe
  • %WINDIR%\syswow64\config\systemprofile\zc8giv9 gay 7vepaqjm ash (cy4xpd,karin).mpg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\7nd83wovj [free] legs ejn547rbxhd1 (dehod0,2hbt8wr).zip.exe
  • %WINDIR%\syswow64\ime\shared\0287zh 7nd83wovj [free] .mpg.exe
  • %WINDIR%\temp\jxaglwti mnho9y54 ihthd33 6tl9zg0uqa .avi.exe
  • %WINDIR%\winsxs\installtemp\8ok6yf sperm l9hwcs7vvnphd9 boobs .zip.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android