Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Trojan.KillProc2.28023

Added to the Dr.Web virus database: 2025-07-16

Virus description added:

Technical Information

Malicious functions
Terminates or attempts to terminate
the following system processes:
  • %WINDIR%\explorer.exe
  • <SYSTEM32>\taskhost.exe
  • <SYSTEM32>\dwm.exe
the following user processes:
  • iexplore.exe
  • firefox.exe
Modifies file system
Creates the following files
  • %WINDIR%y1s2fctrp3
  • %CommonProgramFiles%\microsoft shared\beast [bangbus] b37oavmx289 .mpeg.exe
  • %ProgramFiles%\dvd maker\shared\bd1l5ir w6csjja14n1 girls .avi.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\tsomq34 sgu4m7oc boots (sandy,dxocjwba).zip.exe
  • %ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\z1qxwcd nude nude epyxwn legs girly .mpeg.exe
  • %ProgramFiles%\microsoft office\office14\groove\xml files\space templates\wpjwijv xxx 7vepaqjm .mpeg.exe
  • %ProgramFiles%\microsoft office\templates\f1i7cm beast vjq39c1gwy jxqgtp .rar.exe
  • %ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\w6csjja14n1 bq4kno 779mipj (jade).mpg.exe
  • %ProgramFiles%\windows journal\templates\cum wep6b08 apv53deiq9fw .avi.exe
  • %ProgramFiles%\windows sidebar\shared gadgets\black mnho9y54 beast [milf] legs latex .zip.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\beast ddqayq nom72kl titts lady .mpeg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\0287zh horse epyxwn zn3tvn .mpg.exe
  • %ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\horse [free] boobs .avi.exe
  • %CommonProgramFiles(x86)%\microsoft shared\yzw1afy 7vepaqjm eigt45 .mpeg.exe
  • %ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\f07qtt sperm hot (!) jxqgtp ejn547rbxhd1 .zip.exe
  • %ProgramFiles(x86)%\windows sidebar\shared gadgets\xxx 8ok6yf bq4kno glans sm (y8oxsqa).mpg.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\8r3baiec 8ok6yf hot (!) (dxocjwba,karin).rar.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\beast porn uncut hole boots .avi.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\0287zh h93bklf nom72kl .mpeg.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\gzn4ud7e nude vjq39c1gwy js80j73 (gina,liz).rar.exe
  • %ALLUSERSPROFILE%\templates\mzwpstr8n yzw1afy big kfp2yqq js80j73 .rar.exe
  • %ALLUSERSPROFILE%\microsoft\rac\temp\f07qtt yzw1afy porn 7vepaqjm hairy .avi.exe
  • %ALLUSERSPROFILE%\microsoft\search\data\temp\8ok6yf tsomq34 l9hwcs7vvnphd9 titts ash .rar.exe
  • %ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\jxaglwti horse [bangbus] sweet .zip.exe
  • %ALLUSERSPROFILE%\microsoft\windows\templates\8ok6yf horse bq4kno jxqgtp 40+ .mpeg.exe
  • %ALLUSERSPROFILE%\templates\0287zh xakmpl uncut titts .mpeg.exe
  • C:\users\default\appdata\local\microsoft\windows\<INETFILES>\0287zh sperm nom72kl ash ol6p1tua .rar.exe
  • C:\users\default\appdata\local\temp\gzn4ud7e mzwpstr8n w6csjja14n1 uncut feet girly (liz,sonja).zip.exe
  • C:\users\default\appdata\local\<INETFILES>\jxaglwti bd1l5ir l9hwcs7vvnphd9 .rar.exe
  • C:\users\default\appdata\roaming\microsoft\windows\templates\nude nom72kl boobs girly (36mho73).mpeg.exe
  • C:\users\default\templates\4h1e2a346 nom72kl vjq39c1gwy legs gsva2xn .mpg.exe
  • %LOCALAPPDATA%\microsoft\windows\<INETFILES>\wep6b08 [bangbus] js80j73 .avi.exe
  • %TEMP%\asian porn sgu4m7oc hole (sonja).rar.exe
  • %LOCALAPPDATA%\<INETFILES>\8r3baiec h93bklf [milf] kfp2yqq 8bgkvshe1 .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\ikdyfwhy 8ok6yf ddqayq vjq39c1gwy .zip.exe
  • %LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\f1i7cm 8ok6yf girls sweet .mpg.exe
  • %LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\f07qtt porn h93bklf epyxwn boobs eigt45 (dehod0).mpeg.exe
  • %APPDATA%\microsoft\templates\7nd83wovj sgu4m7oc girly .mpg.exe
  • %APPDATA%\microsoft\windows\templates\asian gay 8ok6yf bq4kno ash (sonja).avi.exe
  • %APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\4h1e2a346 xxx nom72kl ejn547rbxhd1 (sonja,cy4xpd).avi.exe
  • %APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\ikdyfwhy 7nd83wovj porn uncut boobs eigt45 .avi.exe
  • %HOMEPATH%\templates\black [milf] latex (hyo87il).avi.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\z9z7rwe 7nd83wovj big 779mipj .mpeg.exe
  • %WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\wpjwijv xakmpl cum bq4kno wifey .rar.exe
  • %WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\wpjwijv w6csjja14n1 uncut wifey .zip.exe
  • %WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\s2fkave nude wep6b08 bq4kno glans (jade,2hbt8wr).mpg.exe
  • %WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\z1qxwcd lpcu5ai3 [milf] hole hairy .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\nude nom72kl hairy .zip.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\mzwpstr8n wep6b08 nom72kl 8pfmdyy .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\eq7k2xcxt bd1l5ir bq4kno (jenna,y8oxsqa).avi.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\8r3baiec h93bklf big legs wifey .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\fac71w2 nom72kl epyxwn (sandy,jenna).mpg.exe
  • %WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\mnho9y54 horse uncut lady .mpeg.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\upfgetx mnho9y54 big ol6p1tua .zip.exe
  • %WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\h93bklf cum epyxwn gsva2xn (liz).mpeg.exe
  • %WINDIR%\assembly\temp\w6csjja14n1 ihthd33 legs sm .avi.exe
  • %WINDIR%\assembly\tmp\beast [milf] hole girly (dxocjwba).avi.exe
  • %WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\horse epyxwn (sonja,rdl1tfkz).mpeg.exe
  • %WINDIR%\pla\templates\h93bklf mzwpstr8n bq4kno kfp2yqq 40+ .rar.exe
Miscellaneous
Searches for the following windows
  • ClassName: 'Progman' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
  • '%WINDIR%\explorer.exe'

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android