JavaScript support is required for our site to be fully operational in your browser.
Trojan.KillProc2.27402
Added to the Dr.Web virus database:
2025-07-15
Virus description added:
2025-07-17
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\gzn4ud7e ddqayq sgu4m7oc 779mipj (sandy).mpeg.exe
%ProgramFiles%\dvd maker\shared\jxaglwti nom72kl (36mho73).zip.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\beast h93bklf bq4kno .avi.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\4h1e2a346 mzwpstr8n bq4kno ae2sd7u4xh (hyo87il,2hbt8wr).mpeg.exe
%ProgramFiles%\microsoft office\templates\0287zh horse w6csjja14n1 epyxwn ash .mpeg.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\porn nom72kl young (sandy).zip.exe
%ProgramFiles%\windows journal\templates\mzwpstr8n w6csjja14n1 hot (!) mg9fvb2xk9 .mpg.exe
%ProgramFiles%\windows sidebar\shared gadgets\8r3baiec sperm horse vjq39c1gwy (sonja,haj1oyikd).zip.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\black ddqayq mzwpstr8n l9hwcs7vvnphd9 .mpg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\z1qxwcd beast yzw1afy bq4kno boots (sandy,haj1oyikd).avi.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\f1i7cm horse [milf] zmc8ujp .avi.exe
%CommonProgramFiles(x86)%\microsoft shared\gzn4ud7e w6csjja14n1 8ok6yf epyxwn ol6p1tua .rar.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\bd1l5ir vjq39c1gwy 50+ (sonja,rdl1tfkz).rar.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\s2fkave mzwpstr8n hot (!) .rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\8r3baiec tsomq34 ihthd33 .mpeg.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\black lpcu5ai3 hot (!) cock .avi.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay apv53deiq9fw qx2j1b5 (y8oxsqa,dehod0).mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\eq7k2xcxt xakmpl mzwpstr8n bq4kno .mpeg.exe
%ALLUSERSPROFILE%\templates\black horse big boobs nmibe2 .rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\s2fkave mzwpstr8n yzw1afy big gsva2xn .zip.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\7nd83wovj bq4kno js80j73 .mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\gay epyxwn .rar.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\beast girls glans qx2j1b5 .mpg.exe
%ALLUSERSPROFILE%\templates\black xakmpl [bangbus] cock latex (jade).mpeg.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\xxx wep6b08 sgu4m7oc .rar.exe
C:\users\default\appdata\local\temp\viaz50 8ok6yf yzw1afy l9hwcs7vvnphd9 boots .zip.exe
C:\users\default\appdata\local\<INETFILES>\0287zh 8ok6yf hot (!) ash (gina,dehod0).rar.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\0287zh beast beast l9hwcs7vvnphd9 (y8oxsqa).avi.exe
C:\users\default\templates\mzwpstr8n 8ok6yf [bangbus] .mpeg.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\fac71w2 mzwpstr8n nom72kl l9hwcs7vvnphd9 wifey .mpeg.exe
%TEMP%\fac71w2 mzwpstr8n ddqayq nom72kl qx2j1b5 .rar.exe
%LOCALAPPDATA%\<INETFILES>\z9z7rwe yzw1afy porn hot (!) ae2sd7u4xh (cy4xpd,2hbt8wr).zip.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\ikdyfwhy tsomq34 gay big hotel .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\upfgetx wep6b08 8ok6yf hot (!) .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\8r3baiec horse lpcu5ai3 hot (!) (36mho73,2hbt8wr).zip.exe
%APPDATA%\microsoft\templates\upfgetx ihthd33 .mpeg.exe
%APPDATA%\microsoft\windows\templates\sperm nom72kl apv53deiq9fw latex .mpeg.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\tsomq34 w6csjja14n1 girls .zip.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\w6csjja14n1 l9hwcs7vvnphd9 hole .mpg.exe
%HOMEPATH%\templates\upfgetx 7nd83wovj gay uncut legs lzxyhb7k .mpeg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\xxx apv53deiq9fw ash .avi.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\xxx horse epyxwn eigt45 .mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\z9z7rwe w6csjja14n1 cum hot (!) .mpeg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\upfgetx 7nd83wovj [milf] hairy .rar.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\ nom72kl (36mho73).rar.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\nude xxx [free] kfp2yqq .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\mzwpstr8n lpcu5ai3 [free] .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\z1qxwcd nude porn uncut .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\black yzw1afy lpcu5ai3 [bangbus] hairy .mpg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\fac71w2 nom72kl nom72kl girls .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\f07qtt nom72kl [free] legs hairy .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\s2fkave lpcu5ai3 uncut titts (rdl1tfkz).rar.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\7b6fhxi horse w6csjja14n1 nom72kl .avi.exe
%WINDIR%\assembly\temp\zc8giv9 wep6b08 8ok6yf vjq39c1gwy young .mpeg.exe
%WINDIR%\assembly\tmp\ tsomq34 apv53deiq9fw feet b37oavmx289 .rar.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\jxaglwti bd1l5ir ddqayq 7vepaqjm (36mho73).mpeg.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\0287zh horse [free] zmc8ujp (dxocjwba,liz).rar.exe
%WINDIR%\pla\templates\sperm nom72kl epyxwn ash .mpeg.exe
%WINDIR%\security\templates\beast mnho9y54 nom72kl sweet .rar.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\porn nude uncut jxqgtp 50+ (hyo87il).zip.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\jxaglwti sperm vjq39c1gwy (gina,36mho73).mpeg.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\black cum big legs hairy (36mho73,g6u8n4r).zip.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\f1i7cm sperm nom72kl (c4w8hqa,jenna).mpeg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\upfgetx wep6b08 w6csjja14n1 [milf] (jade,dehod0).zip.exe
%WINDIR%\syswow64\config\systemprofile\asian 7nd83wovj cum hot (!) titts 50+ (rdl1tfkz,sandy).zip.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\cum porn big gsva2xn .zip.exe
%WINDIR%\syswow64\fxstmp\mnho9y54 mzwpstr8n vjq39c1gwy cock ash .rar.exe
%WINDIR%\syswow64\ime\shared\xakmpl xxx big .mpeg.exe
%WINDIR%\syswow64\config\systemprofile\xakmpl w6csjja14n1 ihthd33 qq6w54yfhtqrbwcslg (rdl1tfkz,dxocjwba).mpg.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\gzn4ud7e xxx apv53deiq9fw 40+ .mpg.exe
%WINDIR%\syswow64\fxstmp\zc8giv9 sperm nom72kl hole wifey .zip.exe
%WINDIR%\syswow64\ime\shared\nude h93bklf epyxwn legs .mpg.exe
%WINDIR%\temp\eq7k2xcxt beast w6csjja14n1 l9hwcs7vvnphd9 girly .zip.exe
%WINDIR%\winsxs\installtemp\upfgetx tsomq34 [free] lzxyhb7k .rar.exe
<Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
欢迎下载 Dr.Web for Android
免费3个月
可使用所有保护组件
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息
OK