JavaScript support is required for our site to be fully operational in your browser.
Trojan.KillProc2.27925
Added to the Dr.Web virus database:
2025-07-16
Virus description added:
2025-07-17
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\gzn4ud7e w6csjja14n1 [free] jxqgtp sm (jenna,dxocjwba).mpg.exe
%ProgramFiles%\dvd maker\shared\8ok6yf bq4kno jxqgtp hotel .zip.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\xxx apv53deiq9fw nmibe2 (liz,haj1oyikd).mpeg.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\asian mnho9y54 8ok6yf girls 6tl9zg0uqa .avi.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\porn epyxwn gsva2xn .rar.exe
%ProgramFiles%\microsoft office\templates\fac71w2 w6csjja14n1 ihthd33 8pfmdyy .mpg.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\gay mnho9y54 girls glans .mpeg.exe
%ProgramFiles%\windows journal\templates\wpjwijv tsomq34 cum sgu4m7oc glans 6tl9zg0uqa .rar.exe
%ProgramFiles%\windows sidebar\shared gadgets\8ok6yf porn uncut (cy4xpd,gina).mpeg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\asian mnho9y54 nude uncut young .zip.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\asian xxx sgu4m7oc .mpeg.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\horse ihthd33 latex .mpeg.exe
%CommonProgramFiles(x86)%\microsoft shared\w6csjja14n1 nude nom72kl nmibe2 (c4w8hqa).avi.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\viaz50 7nd83wovj big ejn547rbxhd1 .mpeg.exe
%ProgramFiles(x86)%\windows sidebar\shared gadgets\gay xakmpl ihthd33 feet .zip.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\mzwpstr8n girls .zip.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\ikdyfwhy sperm big .mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\yzw1afy ihthd33 girly .rar.exe
%ALLUSERSPROFILE%\templates\s2fkave 7nd83wovj [free] (c4w8hqa,c4w8hqa).rar.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\w6csjja14n1 bq4kno hole hotel (36mho73,jenna).mpg.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\ bd1l5ir uncut eigt45 (liz).mpg.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\beast ddqayq hot (!) .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\0287zh lpcu5ai3 bq4kno .zip.exe
%ALLUSERSPROFILE%\templates\mzwpstr8n big hotel (jade).rar.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\tsomq34 girls titts nmibe2 .mpeg.exe
C:\users\default\appdata\local\temp\sperm mzwpstr8n vjq39c1gwy jxqgtp .mpg.exe
C:\users\default\appdata\local\<INETFILES>\wpjwijv porn uncut .rar.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\0287zh yzw1afy uncut sweet (36mho73).avi.exe
C:\users\default\templates\h93bklf xakmpl sgu4m7oc ejn547rbxhd1 (karin,g6u8n4r).zip.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\4h1e2a346 8ok6yf l9hwcs7vvnphd9 girly .rar.exe
%TEMP%\z9z7rwe tsomq34 nude bq4kno .mpg.exe
%LOCALAPPDATA%\<INETFILES>\black cum girls fw58kpr41ob1w (sonja).mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\asian 7nd83wovj [bangbus] .mpeg.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\0287zh w6csjja14n1 mzwpstr8n big js80j73 .zip.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\7b6fhxi beast mnho9y54 bq4kno .rar.exe
%APPDATA%\microsoft\templates\bd1l5ir 7vepaqjm glans lady .mpg.exe
%APPDATA%\microsoft\windows\templates\sperm [milf] hole girly .mpg.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\horse l9hwcs7vvnphd9 (36mho73).mpg.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\sperm [bangbus] 8pfmdyy (sonja,dehod0).avi.exe
%HOMEPATH%\templates\ddqayq mnho9y54 nom72kl cock .rar.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\ikdyfwhy nom72kl epyxwn feet .mpg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\horse nom72kl [bangbus] qx2j1b5 .mpg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\eq7k2xcxt h93bklf uncut .mpg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\0287zh h93bklf [bangbus] (g6u8n4r).avi.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\0287zh vjq39c1gwy nmibe2 .zip.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\ddqayq bq4kno ash 50+ .zip.exe
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細
OK