JavaScript support is required for our site to be fully operational in your browser.
Trojan.KillProc2.30283
Added to the Dr.Web virus database:
2025-07-17
Virus description added:
2025-07-18
Technical Information
Malicious functions
Terminates or attempts to terminate
the following system processes:
%WINDIR%\explorer.exe
<SYSTEM32>\taskhost.exe
<SYSTEM32>\dwm.exe
the following user processes:
Modifies file system
Creates the following files
%WINDIR%y1s2fctrp3
%CommonProgramFiles%\microsoft shared\lpcu5ai3 uncut girly .mpg.exe
%ProgramFiles%\dvd maker\shared\fac71w2 h93bklf nom72kl vjq39c1gwy glans gh5b6gd7wrv (sarah).zip.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\documentshare\tsomq34 epyxwn cock mg9fvb2xk9 .rar.exe
%ProgramFiles%\microsoft office\office14\groove\tooldata\groove.net\grooveforms\formstemplates\xxx ihthd33 50+ .rar.exe
%ProgramFiles%\microsoft office\office14\groove\xml files\space templates\mzwpstr8n uncut fishy .mpg.exe
%ProgramFiles%\microsoft office\templates\f07qtt xakmpl tsomq34 apv53deiq9fw ae2sd7u4xh .rar.exe
%ProgramFiles%\microsoft office\templates\1033\onenote\14\notebook templates\z9z7rwe 7nd83wovj xxx vjq39c1gwy (dxocjwba).zip.exe
%ProgramFiles%\windows journal\templates\f1i7cm xakmpl beast apv53deiq9fw rv0y8n (sonja,jade).mpg.exe
%ProgramFiles%\windows sidebar\shared gadgets\ [milf] rv0y8n .rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\idtemplates\gzn4ud7e cum mzwpstr8n 7vepaqjm sweet .zip.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files\f1i7cm wep6b08 nom72kl big cock 8pfmdyy (cy4xpd).rar.exe
%ProgramFiles(x86)%\adobe\acrobat reader dc\reader\webresources\resource0\static\js\plugins\my-sharepoint-files-select\horse epyxwn titts fishy .rar.exe
%CommonProgramFiles(x86)%\microsoft shared\black h93bklf mzwpstr8n bq4kno cock .zip.exe
%ProgramFiles(x86)%\microsoft visual studio 8\common7\ide\vsta\itemtemplates\tsomq34 big .zip.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\4h1e2a346 xxx uncut feet qx2j1b5 .mpg.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\black horse yzw1afy uncut nrb42wq (sonja,sarah).rar.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\s2fkave w6csjja14n1 horse epyxwn sm .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\f07qtt wep6b08 bq4kno .rar.exe
%ALLUSERSPROFILE%\templates\beast big lzxyhb7k .mpg.exe
%ALLUSERSPROFILE%\microsoft\rac\temp\f1i7cm wep6b08 yzw1afy ihthd33 (liz).rar.exe
%ALLUSERSPROFILE%\microsoft\search\data\temp\fac71w2 wep6b08 sperm big titts .rar.exe
%ALLUSERSPROFILE%\microsoft\windows\start menu\programs\sharepoint\mnho9y54 nom72kl young .mpeg.exe
%ALLUSERSPROFILE%\microsoft\windows\templates\sperm uncut (g6u8n4r).mpeg.exe
%ALLUSERSPROFILE%\templates\gzn4ud7e cum mzwpstr8n vjq39c1gwy glans sgoibhh .zip.exe
C:\users\default\appdata\local\microsoft\windows\<INETFILES>\sperm [bangbus] .rar.exe
C:\users\default\appdata\local\temp\xxx l9hwcs7vvnphd9 feet shoes .mpg.exe
C:\users\default\appdata\local\<INETFILES>\fac71w2 7nd83wovj beast nom72kl hole b37oavmx289 (karin).mpeg.exe
C:\users\default\appdata\roaming\microsoft\windows\templates\upfgetx bd1l5ir tsomq34 [bangbus] ae2sd7u4xh .zip.exe
C:\users\default\templates\8r3baiec ddqayq ihthd33 ae2sd7u4xh .mpg.exe
%LOCALAPPDATA%\microsoft\windows\<INETFILES>\mzwpstr8n epyxwn qq6w54yfhtqrbwcslg .mpg.exe
%TEMP%\f07qtt cum nom72kl [milf] (karin).avi.exe
%LOCALAPPDATA%\<INETFILES>\8r3baiec h93bklf tsomq34 7vepaqjm 8pfmdyy .mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{12c7f776-de07-4d8a-a6eb-93019fcb4f66}\8r3baiec 7nd83wovj beast big rv0y8n .mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{28060726-42ae-4e49-b300-93149d394ff5}\f07qtt nude mnho9y54 big glans (36mho73,y8oxsqa).mpg.exe
%LOCALAPPDATA%low\mozilla\temp-{bc1f1f78-2666-4310-aef7-f6fd5ba4bc43}\z9z7rwe w6csjja14n1 gay vjq39c1gwy feet latex .rar.exe
%APPDATA%\microsoft\templates\f1i7cm ddqayq gay girls titts .mpg.exe
%APPDATA%\microsoft\windows\templates\beast l9hwcs7vvnphd9 glans 50+ .mpeg.exe
%APPDATA%\mozilla\firefox\profiles\apc2n9d1.default-release\storage\temporary\s2fkave porn beast [milf] titts lzxyhb7k .zip.exe
%APPDATA%\thunderbird\profiles\rehh7ft5.default-release\storage\temporary\nom72kl sgu4m7oc feet fw58kpr41ob1w (c4w8hqa).mpg.exe
%HOMEPATH%\templates\fac71w2 w6csjja14n1 mzwpstr8n l9hwcs7vvnphd9 qq6w54yfhtqrbwcslg .mpg.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor\mzwpstr8n bq4kno balls .zip.exe
%WINDIR%\assembly\gac_32\microsoft.grouppolicy.admtmpleditor.resources\gay sgu4m7oc (2hbt8wr).mpg.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor\f07qtt 8ok6yf nom72kl uncut feet hotel .avi.exe
%WINDIR%\assembly\gac_64\microsoft.grouppolicy.admtmpleditor.resources\mzwpstr8n vjq39c1gwy .avi.exe
%WINDIR%\assembly\gac_64\microsoft.sharepoint.businessdata.administration.client\z9z7rwe cum nom72kl epyxwn lzxyhb7k .rar.exe
%WINDIR%\assembly\gac_msil\microsoft.sharepoint.businessdata.administration.client.intl\horse [milf] titts (gina,jade).avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\black nude mnho9y54 7vepaqjm zmc8ujp .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_32\temp\zap9e41.tmp\beast [bangbus] shoes .rar.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\tsomq34 epyxwn feet .zip.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zap6b8e.tmp\sperm bq4kno cock ejn547rbxhd1 .avi.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape291.tmp\z9z7rwe h93bklf lpcu5ai3 [milf] .mpeg.exe
%WINDIR%\assembly\nativeimages_v2.0.50727_64\temp\zape56e.tmp\s2fkave xakmpl yzw1afy big .avi.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_32\temp\f07qtt w6csjja14n1 nom72kl uncut 8bgkvshe1 .zip.exe
%WINDIR%\assembly\nativeimages_v4.0.30319_64\temp\fac71w2 xakmpl lpcu5ai3 vjq39c1gwy sweet (sandy,sarah).zip.exe
%WINDIR%\assembly\temp\upfgetx cum gay apv53deiq9fw .avi.exe
%WINDIR%\assembly\tmp\upfgetx nude gay hot (!) .mpg.exe
%WINDIR%\microsoft.net\framework\v4.0.30319\temporary asp.net files\f07qtt nude sperm uncut (karin).zip.exe
%WINDIR%\microsoft.net\framework64\v4.0.30319\temporary asp.net files\black porn nom72kl vjq39c1gwy zmc8ujp .zip.exe
%WINDIR%\pla\templates\f07qtt porn lpcu5ai3 uncut feet 8bgkvshe1 (dxocjwba).mpeg.exe
%WINDIR%\security\templates\gay vjq39c1gwy feet .zip.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\microsoft\windows\<INETFILES>\s2fkave porn mnho9y54 7vepaqjm titts boots .rar.exe
%WINDIR%\serviceprofiles\localservice\appdata\local\temp\horse 7vepaqjm feet .avi.exe
%WINDIR%\serviceprofiles\localservice\appdata\roaming\microsoft\windows\templates\eq7k2xcxt cum l9hwcs7vvnphd9 lzxyhb7k .zip.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\microsoft\windows\<INETFILES>\eq7k2xcxt h93bklf tsomq34 [bangbus] .mpg.exe
%WINDIR%\serviceprofiles\networkservice\appdata\local\temp\eq7k2xcxt porn beast girls (dxocjwba).avi.exe
%WINDIR%\serviceprofiles\networkservice\appdata\roaming\microsoft\windows\templates\eq7k2xcxt 8ok6yf mnho9y54 apv53deiq9fw qq6w54yfhtqrbwcslg .rar.exe
%WINDIR%\syswow64\config\systemprofile\gay hot (!) titts .zip.exe
%WINDIR%\syswow64\config\systemprofile\appdata\local\microsoft\windows\<INETFILES>\tsomq34 big feet .avi.exe
Miscellaneous
Searches for the following windows
ClassName: 'Progman' WindowName: ''
ClassName: 'Proxy Desktop' WindowName: ''
Restarts the analyzed sample
Executes the following
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細
OK