JavaScript support is required for our site to be fully operational in your browser.
Trojan.KillProc2.28000
Added to the Dr.Web virus database:
2025-07-16
Virus description added:
2025-07-18
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\fac71w2 wep6b08 beast uncut .mpg.exe
%ProgramFiles%\dvd maker\shared\ [free] .mpg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\mzwpstr8n ihthd33 feet shoes .zip.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\8r3baiec horse beast uncut (c4w8hqa).zip.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\8r3baiec cum [milf] (karin).avi.exe
%ProgramFiles%\microsoft office\templates\lpcu5ai3 [free] gh5b6gd7wrv .rar.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\sperm bq4kno cock gh5b6gd7wrv .zip.exe
%ProgramFiles%\windows journal\templates\gay nom72kl (g6u8n4r).avi.exe
%ProgramFiles%\windows sidebar\shared gadgets\fac71w2 cum sperm uncut girly .rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\gzn4ud7e bd1l5ir nom72kl (liz).avi.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\z9z7rwe wep6b08 lpcu5ai3 7vepaqjm qq6w54yfhtqrbwcslg .mpg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\f1i7cm wep6b08 [milf] titts 779mipj .mpeg.exe
%CommonProgramFiles(x86)%\microsoft shared\mzwpstr8n big boots (sonja,cy4xpd).avi.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\black ddqayq tsomq34 sgu4m7oc feet qx2j1b5 .mpeg.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\mnho9y54 sgu4m7oc (cy4xpd).rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\z9z7rwe ddqayq gay sgu4m7oc .avi.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\gzn4ud7e w6csjja14n1 nom72kl girls 6tl9zg0uqa .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay sgu4m7oc sm .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\f1i7cm w6csjja14n1 mzwpstr8n bq4kno js80j73 .mpg.exe
%ALLUSERSPROFILE%\templates\black nude mnho9y54 [free] cock .mpeg.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\z9z7rwe ddqayq nom72kl vjq39c1gwy hairy .avi.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\eq7k2xcxt nude sperm [milf] sm .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\tsomq34 uncut glans .mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\horse uncut feet qq6w54yfhtqrbwcslg .mpeg.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\0287zh sperm [bangbus] .mpeg.exe
C:\users\default\appdata\local\temp\s2fkave bd1l5ir tsomq34 epyxwn hole gh5b6gd7wrv (y8oxsqa).zip.exe
C:\users\default\appdata\local\<INETFILES>\black xakmpl xxx epyxwn 50+ .zip.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\gzn4ud7e bd1l5ir mzwpstr8n [milf] latex .mpg.exe
C:\users\default\templates\mnho9y54 hot (!) nrb42wq .rar.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\nom72kl [free] (jade).mpeg.exe
%TEMP%\gay ihthd33 glans fw58kpr41ob1w .mpeg.exe
%LOCALAPPDATA%\<INETFILES>\f07qtt 8ok6yf beast big titts 40+ (liz).mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\s2fkave cum sperm epyxwn titts sweet .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\eq7k2xcxt nude yzw1afy sgu4m7oc .zip.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\f1i7cm porn xxx [free] cock .zip.exe
%APPDATA%\microsoft\templates\eq7k2xcxt 7nd83wovj horse girls hole balls .mpg.exe
%APPDATA%\microsoft\windows\templates\8r3baiec 7nd83wovj mnho9y54 [bangbus] (2hbt8wr).zip.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\s2fkave bd1l5ir beast l9hwcs7vvnphd9 feet (sandy,g6u8n4r).rar.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\f07qtt wep6b08 xxx l9hwcs7vvnphd9 hole 779mipj .rar.exe
%HOMEPATH%\templates\mnho9y54 nom72kl wifey .mpeg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\gzn4ud7e wep6b08 vjq39c1gwy .avi.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f07qtt ddqayq tsomq34 apv53deiq9fw titts young .rar.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\black xakmpl tsomq34 apv53deiq9fw sweet (36mho73,sarah).rar.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\0287zh girls (dxocjwba).mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\upfgetx nude sperm [bangbus] 779mipj .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\black cum mnho9y54 [milf] glans (haj1oyikd,dxocjwba).mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\beast bq4kno (c4w8hqa).mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\f1i7cm ddqayq mzwpstr8n girls lady .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\lpcu5ai3 sgu4m7oc boots .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\beast nom72kl .zip.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\eq7k2xcxt bd1l5ir nom72kl l9hwcs7vvnphd9 glans .avi.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\f1i7cm wep6b08 gay bq4kno glans .rar.exe
%WINDIR%\assembly\temp\gzn4ud7e xakmpl lpcu5ai3 hot (!) gsva2xn .zip.exe
%WINDIR%\assembly\tmp\eq7k2xcxt 8ok6yf mzwpstr8n ihthd33 .mpeg.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\gay uncut hole mg9fvb2xk9 .mpeg.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\s2fkave w6csjja14n1 mnho9y54 uncut glans balls (y8oxsqa).rar.exe
%WINDIR%\pla\templates\beast [free] feet fw58kpr41ob1w .zip.exe
%WINDIR%\security\templates\black 8ok6yf tsomq34 [milf] titts boots .mpg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\f1i7cm ddqayq horse [bangbus] cock .mpeg.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\fac71w2 wep6b08 mnho9y54 hot (!) .avi.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\upfgetx wep6b08 sperm l9hwcs7vvnphd9 latex .mpg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\ l9hwcs7vvnphd9 .zip.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\s2fkave h93bklf gay uncut titts 40+ .avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\horse [milf] sm .zip.exe
%WINDIR%\syswow64\config\systemprofile\f07qtt horse lpcu5ai3 [free] hole nrb42wq .mpeg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt w6csjja14n1 mnho9y54 [milf] feet (hyo87il,jade).mpeg.exe
%WINDIR%\syswow64\fxstmp\eq7k2xcxt xakmpl mnho9y54 [milf] titts ae2sd7u4xh (g6u8n4r).mpg.exe
%WINDIR%\syswow64\config\systemprofile\mzwpstr8n big .mpg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\horse ihthd33 wifey .avi.exe
%WINDIR%\syswow64\fxstmp\yzw1afy ihthd33 cock ol6p1tua .rar.exe
%WINDIR%\temp\jxaglwti apv53deiq9fw (c4w8hqa).mpeg.exe
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
Download Dr.Web for Android
Free three-month trial
All protection features available
Renew your trial license in AppGallery/on Google Pay
By continuing to use this website, you are consenting to Doctor Web’s use of cookies and other technologies related to the collection of visitor statistics. Learn more
OK