Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.KillProc2.29229

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\0287zh tsomq34 h93bklf uncut hole .zip.exe
  • %ProgramFiles%\dvd maker\shared\bd1l5ir w6csjja14n1 [bangbus] zmc8ujp (c4w8hqa).mpg.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\h93bklf gay uncut hole gh5b6gd7wrv .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\z9z7rwe h93bklf bq4kno titts .zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\eq7k2xcxt ddqayq apv53deiq9fw .avi.exe
  • %ProgramFiles%\microsoft office\templates\7b6fhxi nom72kl 7vepaqjm legs sm .zip.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\jxaglwti cum girls .avi.exe
  • %ProgramFiles%\windows journal\templates\0287zh lpcu5ai3 tsomq34 uncut (2hbt8wr).mpg.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\4h1e2a346 bd1l5ir hot (!) 8pfmdyy .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\0287zh lpcu5ai3 sgu4m7oc zmc8ujp .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\8r3baiec [bangbus] qx2j1b5 .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\gzn4ud7e tsomq34 bq4kno 8bgkvshe1 .mpg.exe
  • %CommonProgramFiles(x86)%\microsoft shared\z1qxwcd ddqayq sperm vjq39c1gwy .mpg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\z9z7rwe 8ok6yf 7vepaqjm sm .mpeg.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\beast horse hot (!) hole wifey .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\8r3baiec 8ok6yf cum l9hwcs7vvnphd9 boobs .zip.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\8r3baiec ddqayq beast l9hwcs7vvnphd9 8pfmdyy (gina).zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\z9z7rwe nude sgu4m7oc boobs .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\upfgetx wep6b08 porn ihthd33 gsva2xn .avi.exe
  • %ALLUSERSPROFILE%\templates\bd1l5ir yzw1afy [milf] feet (liz,haj1oyikd).mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\sperm big (hyo87il,g6u8n4r).rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\4h1e2a346 ddqayq h93bklf l9hwcs7vvnphd9 .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\bd1l5ir bq4kno .mpg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\z9z7rwe cum epyxwn sm .mpg.exe
  • %ALLUSERSPROFILE%\templates\z9z7rwe yzw1afy girls girly (sarah,karin).zip.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\8r3baiec porn porn [bangbus] .mpg.exe
  • C:\users\default\appdata\local\temp\fac71w2 vjq39c1gwy sgoibhh (sonja).mpg.exe
  • C:\users\default\appdata\local\<INETFILES>\gay wep6b08 sgu4m7oc (sonja).avi.exe
  • C:\users\default\templates\horse w6csjja14n1 sgu4m7oc ash .rar.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\xxx w6csjja14n1 [milf] boobs (gina).zip.exe
  • %TEMP%\z1qxwcd nom72kl nom72kl ihthd33 latex (36mho73,rdl1tfkz).zip.exe
  • %LOCALAPPDATA%\<INETFILES>\asian w6csjja14n1 horse uncut feet (c4w8hqa,karin).rar.exe
  • %LOCALAPPDATA%low\mozilla\temp-{070abd97-84e1-4f5f-9c02-f1d76dd9fce4}\xxx sperm uncut (dxocjwba).zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{1fae114c-c2b0-4da1-b23a-8e5ad0c3d722}\upfgetx mnho9y54 xxx uncut boots .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{3571406e-c08c-4c74-b145-8857b365f6e7}\ddqayq [bangbus] ash .avi.exe
  • %APPDATA%\microsoft\templates\gzn4ud7e nom72kl cum nom72kl .mpg.exe
  • %APPDATA%\microsoft\windows\templates\viaz50 wep6b08 yzw1afy nom72kl (liz).rar.exe
  • %APPDATA%\mozilla\firefox\profiles\v08trqk6.default-release\storage\temporary\horse hot (!) fw58kpr41ob1w (sandy).mpeg.exe
  • %APPDATA%\thunderbird\profiles\chdgbv82.default-release\storage\temporary\nude 7vepaqjm qx2j1b5 .avi.exe
  • %HOMEPATH%\templates\fac71w2 xakmpl apv53deiq9fw (dxocjwba).mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\z1qxwcd ddqayq cum hot (!) boobs (haj1oyikd,sonja).rar.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\f07qtt mzwpstr8n bd1l5ir ihthd33 .mpeg.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\8ok6yf uncut boobs zmc8ujp .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\wpjwijv xakmpl ihthd33 jxqgtp nmibe2 .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\horse mzwpstr8n ihthd33 ash .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\cum hot (!) b37oavmx289 .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\xxx epyxwn ash zmc8ujp .rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\w6csjja14n1 7nd83wovj hot (!) titts .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\bd1l5ir vjq39c1gwy ol6p1tua (sarah).rar.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\xakmpl apv53deiq9fw .mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\f07qtt tsomq34 wep6b08 sgu4m7oc (dehod0,hyo87il).zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\mzwpstr8n vjq39c1gwy .mpg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\viaz50 w6csjja14n1 tsomq34 epyxwn hole zmc8ujp .zip.exe
  • %WINDIR%\assembly\temp\w6csjja14n1 lpcu5ai3 uncut js80j73 .avi.exe
  • %WINDIR%\assembly\tmp\z9z7rwe bd1l5ir [bangbus] .mpeg.exe
  • %WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\xakmpl h93bklf 7vepaqjm ash .rar.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\wep6b08 yzw1afy vjq39c1gwy hairy .rar.exe
  • %WINDIR%\pla\templates\black bd1l5ir nom72kl vjq39c1gwy titts .zip.exe
  • %WINDIR%\security\templates\s2fkave horse [milf] .avi.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\ikdyfwhy lpcu5ai3 uncut hotel (dehod0).rar.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\local\temp\porn vjq39c1gwy hotel .mpg.exe
  • %WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\8r3baiec tsomq34 7vepaqjm glans sweet .mpeg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\upfgetx 7nd83wovj uncut .mpg.exe
  • %WINDIR%\serviceprofiles\networkservice\appdata\local\temp\wpjwijv sperm nom72kl [free] sm (g6u8n4r).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\4h1e2a346 yzw1afy ddqayq bq4kno .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\black horse uncut balls (karin,sandy).rar.exe
  • %WINDIR%\syswow64\ime\shared\4h1e2a346 nude h93bklf sgu4m7oc feet shoes (g6u8n4r).rar.exe
  • %WINDIR%\syswow64\config\systemprofile\ lpcu5ai3 apv53deiq9fw nrb42wq .zip.exe
  • %WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\cum tsomq34 [milf] b37oavmx289 .avi.exe
  • %WINDIR%\syswow64\fxstmp\yzw1afy ihthd33 cock shoes .mpg.exe
  • %WINDIR%\syswow64\ime\shared\zc8giv9 yzw1afy porn ihthd33 glans shoes (sandy).mpeg.exe
  • %WINDIR%\temp\z1qxwcd ddqayq cum uncut .zip.exe
  • %WINDIR%\winsxs\installtemp\gay big boots (dxocjwba).mpg.exe
  • <Current directory>\sqjaed7r1vnw
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android