Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.KillProc2.28922

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\4h1e2a346 yzw1afy nom72kl .rar.exe
  • %ProgramFiles%\dvd maker\shared\nude wep6b08 l9hwcs7vvnphd9 .mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\f07qtt tsomq34 l9hwcs7vvnphd9 (sandy).rar.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\nude girls jxqgtp (rdl1tfkz).mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\bd1l5ir h93bklf [milf] ol6p1tua (cy4xpd).avi.exe
  • %ProgramFiles%\microsoft office\templates\porn 7vepaqjm js80j73 .avi.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\jxaglwti 7nd83wovj [milf] cock (hyo87il).rar.exe
  • %ProgramFiles%\windows journal\templates\mnho9y54 h93bklf sgu4m7oc .mpeg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\nude vjq39c1gwy js80j73 .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\yzw1afy [milf] ol6p1tua (karin).mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\wpjwijv yzw1afy big legs nrb42wq .avi.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\z9z7rwe porn h93bklf bq4kno fishy (liz).mpeg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\asian w6csjja14n1 girls .avi.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\xakmpl girls young .avi.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\8r3baiec tsomq34 uncut 779mipj .avi.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\jxaglwti bd1l5ir uncut 8bgkvshe1 .avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\h93bklf porn nom72kl (dxocjwba).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay nude uncut young (jenna,gina).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\7b6fhxi porn sgu4m7oc kfp2yqq zn3tvn (36mho73,rdl1tfkz).mpeg.exe
  • %ALLUSERSPROFILE%\templates\upfgetx 8ok6yf ddqayq ihthd33 fw58kpr41ob1w .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\7b6fhxi porn uncut shoes .zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\f07qtt beast 7vepaqjm 8bgkvshe1 .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\viaz50 8ok6yf nude nom72kl .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\bd1l5ir girls (jenna,g6u8n4r).rar.exe
  • %ALLUSERSPROFILE%\templates\ [bangbus] ejn547rbxhd1 .mpg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\z9z7rwe 8ok6yf xakmpl big gsva2xn (jenna).zip.exe
  • C:\users\default\appdata\local\temp\horse epyxwn cock (c4w8hqa,sonja).zip.exe
  • C:\users\default\appdata\local\<INETFILES>\asian beast horse vjq39c1gwy sweet (jenna,jenna).avi.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\gzn4ud7e nude girls hairy (2hbt8wr,dehod0).mpg.exe
  • C:\users\default\templates\cum [free] (haj1oyikd).mpeg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\gay vjq39c1gwy legs lzxyhb7k (sonja,sonja).mpeg.exe
  • %TEMP%\black tsomq34 uncut (haj1oyikd).mpg.exe
  • %LOCALAPPDATA%\<INETFILES>\f07qtt 8ok6yf 7nd83wovj ihthd33 (jade,gina).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\nom72kl [milf] 779mipj (y8oxsqa).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\wep6b08 girls .mpeg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\black yzw1afy [free] fishy .avi.exe
  • %APPDATA%\microsoft\templates\0287zh mzwpstr8n beast hot (!) boobs (g6u8n4r).mpeg.exe
  • %APPDATA%\microsoft\windows\templates\yzw1afy ddqayq [bangbus] (cy4xpd,jade).mpeg.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\viaz50 yzw1afy nom72kl [free] boobs ejn547rbxhd1 .mpeg.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\ikdyfwhy w6csjja14n1 mzwpstr8n bq4kno 8bgkvshe1 .avi.exe
  • %HOMEPATH%\templates\jxaglwti xxx big titts hairy (gina).rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\asian bq4kno .zip.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\wpjwijv 7nd83wovj sgu4m7oc b37oavmx289 (2hbt8wr,jade).avi.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f07qtt xakmpl mnho9y54 uncut eigt45 .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\0287zh cum 8ok6yf uncut nmibe2 .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\horse bd1l5ir [milf] cock .rar.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\jxaglwti xxx apv53deiq9fw 8pfmdyy .avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\jxaglwti porn 7vepaqjm .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\z9z7rwe wep6b08 apv53deiq9fw .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\eq7k2xcxt lpcu5ai3 big feet ol6p1tua .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\h93bklf ihthd33 hole sm .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\4h1e2a346 nude cum l9hwcs7vvnphd9 legs .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\sperm horse bq4kno lady .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\f1i7cm sperm nom72kl apv53deiq9fw glans mg9fvb2xk9 .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\porn nom72kl l9hwcs7vvnphd9 zn3tvn (36mho73,g6u8n4r).avi.exe
  • %WINDIR%\assembly\temp\ddqayq wep6b08 vjq39c1gwy .zip.exe
  • %WINDIR%\assembly\tmp\f1i7cm ddqayq horse uncut legs 6tl9zg0uqa (dehod0,c4w8hqa).avi.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\mnho9y54 7nd83wovj nom72kl legs 40+ .avi.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\porn beast vjq39c1gwy mg9fvb2xk9 (c4w8hqa,sonja).rar.exe
  • %WINDIR%\pla\templates\zc8giv9 gay 7nd83wovj [milf] .rar.exe
  • %WINDIR%\security\templates\mnho9y54 l9hwcs7vvnphd9 fw58kpr41ob1w (jenna).mpeg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\wep6b08 bd1l5ir girls hole js80j73 .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\nom72kl gay nom72kl ash .zip.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\yzw1afy hot (!) eigt45 .rar.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\lpcu5ai3 big 8pfmdyy (dehod0).mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\7b6fhxi xxx bq4kno ash qx2j1b5 .avi.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\z1qxwcd porn nom72kl nmibe2 .mpeg.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\black sperm wep6b08 uncut cock 8pfmdyy .mpeg.exe
  • %WINDIR%\syswow64\fxstmp\asian 8ok6yf vjq39c1gwy glans ol6p1tua (2hbt8wr,2hbt8wr).mpg.exe
  • %WINDIR%\syswow64\ime\shared\beast yzw1afy [free] balls (gina,jenna).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\viaz50 lpcu5ai3 ihthd33 .avi.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\asian horse bq4kno glans ejn547rbxhd1 (haj1oyikd).avi.exe
  • %WINDIR%\syswow64\fxstmp\fac71w2 xxx apv53deiq9fw gsva2xn .zip.exe
  • %WINDIR%\syswow64\ime\shared\ikdyfwhy girls kfp2yqq lady .mpg.exe
  • %WINDIR%\temp\nude 8ok6yf uncut gh5b6gd7wrv (cy4xpd).mpeg.exe
  • %WINDIR%\winsxs\installtemp\f07qtt mzwpstr8n girls titts 8pfmdyy .mpg.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android