Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-05-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe
Resource
win7-20220414-en
General
-
Target
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe
-
Size
1.6MB
-
MD5
0d54af59333bf00772438717207cf8e7
-
SHA1
37231c1e27ed127c078ee468a17b5a273e155461
-
SHA256
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b
-
SHA512
4fe306b3246fff59f5320669ee6a4c356742943f14086c98574ddfde2a64cb81b36b649290fa74ea88191dc56ed0620797710a3380e9f288a3a542c6107092e1
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Registers COM server for autorun 1 TTPs
-
suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File
suricata: ET MALWARE Possible Windows executable sent when remote host claims to send a Text File
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\kdb_semrjgj.dll acprotect -
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 16 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exedescription ioc process File created C:\Windows\system32\drivers\kisknl64.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\ksapi.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisknl64_ev.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisknl_ev.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisnetm64.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisnetm64_ev.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisnetmxp.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\ksapi64_ev.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\ksapi_ev.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\ksapi64.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisknl.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File opened for modification C:\Windows\system32\drivers\kisknl.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisnetm.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\kisnetm_ev.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created C:\Windows\system32\drivers\ksskrpr.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Executes dropped EXE 21 IoCs
Processes:
KDbCIHelper.exekavlog2.exeksoftmgr.exekxetray.exekxescore.exekislive.exekxescore.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exekwsprotect64.exepid process 1588 KDbCIHelper.exe 1228 kavlog2.exe 908 ksoftmgr.exe 1728 kxetray.exe 1368 kxescore.exe 1988 kislive.exe 1188 kxescore.exe 900 rcmdhelper.exe 1748 rcmdhelper.exe 1536 rcmdhelper.exe 992 rcmdhelper.exe 1716 rcmdhelper.exe 1624 rcmdhelper.exe 876 rcmdhelper.exe 1620 rcmdhelper.exe 1384 rcmdhelper.exe 2084 rcmdhelper.exe 2104 rcmdhelper.exe 2120 rcmdhelper.exe 2140 kwsprotect64.exe 1132 -
Sets file execution options in registry 2 TTPs
-
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\kdb_semrjgj.dll upx -
Loads dropped DLL 64 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exekavlog2.exeksoftmgr.exekxescore.exekislive.exekxescore.exekxetray.exepid process 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1228 kavlog2.exe 1228 kavlog2.exe 908 ksoftmgr.exe 908 ksoftmgr.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1368 kxescore.exe 1368 kxescore.exe 1368 kxescore.exe 1368 kxescore.exe 1368 kxescore.exe 1368 kxescore.exe 1988 kislive.exe 1988 kislive.exe 1368 kxescore.exe 1988 kislive.exe 1988 kislive.exe 1988 kislive.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1728 kxetray.exe 1728 kxetray.exe 1188 kxescore.exe 1728 kxetray.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1188 kxescore.exe 1728 kxetray.exe 1188 kxescore.exe 1728 kxetray.exe 1188 kxescore.exe 1728 kxetray.exe 1188 kxescore.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kxesc = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxetray.exe\" -autorun" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exedescription ioc process File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kxetray.exedescription ioc process File opened (read-only) \??\F: kxetray.exe File opened (read-only) \??\G: kxetray.exe File opened (read-only) \??\M: kxetray.exe File opened (read-only) \??\U: kxetray.exe File opened (read-only) \??\V: kxetray.exe File opened (read-only) \??\I: kxetray.exe File opened (read-only) \??\J: kxetray.exe File opened (read-only) \??\N: kxetray.exe File opened (read-only) \??\T: kxetray.exe File opened (read-only) \??\W: kxetray.exe File opened (read-only) \??\Y: kxetray.exe File opened (read-only) \??\K: kxetray.exe File opened (read-only) \??\L: kxetray.exe File opened (read-only) \??\Q: kxetray.exe File opened (read-only) \??\Z: kxetray.exe File opened (read-only) \??\D: kxetray.exe File opened (read-only) \??\X: kxetray.exe File opened (read-only) \??\E: kxetray.exe File opened (read-only) \??\H: kxetray.exe File opened (read-only) \??\O: kxetray.exe File opened (read-only) \??\P: kxetray.exe File opened (read-only) \??\R: kxetray.exe File opened (read-only) \??\S: kxetray.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exedescription ioc process File opened for modification \??\PhysicalDrive0 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Drops file in System32 directory 2 IoCs
Processes:
kavlog2.exekxescore.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\KAVEventLog.EVT kavlog2.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat kxescore.exe -
Drops file in Program Files directory 64 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exekislive.exekxetray.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kluaengine.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl64.sys 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\khistory.ini 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksm3rdex.dat 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\kislog.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\update\kav\indexkav.datx kislive.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_realtimeopt_green_btn2.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\weatherconfig.xml 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\sqlite.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kshmpg.ini 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\60040408.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kincomingsoftpurifystate.dat kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\computer_acc.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_realtimeopt_gameicon_bird.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmd_icon_sub.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\knetworkpanel.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_roundicon_taobao1212_test1_main.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_tianmao_icon.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\web\kingsoft_bbs.htm 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\extendimg\4.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kis2live.exe.bak 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kpassport.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\bootoptcfg.ini kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_bobo_new.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kcommon.ini 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\config\ksesysfiles.dat 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\ktrustlist.dat kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\stxmas_skin_imgex.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\skin\skinconfig.ini 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\k2s3rdhmpg.dll.bak 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\60000002.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\61000090.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\productinfo.dat 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\krcmdengine.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksesscan.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\knpescanner.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ks3rdhmpg64.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\shrink_skin_history.ini kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\log\kbootacc.log kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\citys.xml 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon32\index.dat 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\dudubao.skin 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\computer_doctor.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\img_data_revert.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\60000399.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\ksdecs.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecore\kxecore.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\60000030.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\duba123.ico 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\microsoft.vc80.mfc.manifest 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksfilter.dat 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\defendmon.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsui64.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\61000057.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\61000067.png kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kincomingsoftpurifyrecord.dat-journal kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\img_btn_rcmd_green.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\qq_pcmgr_rcmd.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_gamebox2.png 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kincomingsoftpurifyrecord.dat kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\microsoft.vc80.crt.manifest 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksecfg.ini 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kseescan.dll 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
kxetray.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kxetray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kxetray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz kxetray.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
kxetray.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS kxetray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName kxetray.exe -
Processes:
ksoftmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main ksoftmgr.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ksoftmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ksoftmgr.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
kxescore.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections kxescore.exe -
Modifies registry class 53 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exekxetray.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ThreadingModel = "Apartment" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4E1A90C5-52A6-494c-A81F-F38C632C77A2}\Test = "0" kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "1796196298" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\Shellex\ContextMenuHandlers\duba_64bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4E1A90C5-52A6-494c-A81F-F38C632C77A2} kxetray.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu.dll" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shellex\ContextMenuHandlers\duba_64bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "qpskyzc8iumvgzlbmxai9atrzk7t" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\ = "CKavMenuShell Class" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "6efdf419403f642ecd07c0c421f0b6ee" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "qpskyzc8iumvgzlbmxai9atrzk7t" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "1796196298" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Shellex\ContextMenuHandlers\duba_64bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}\PacketPath_0_0_1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kdb_semrjgj.dll" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} kxetray.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}\did = "0B77C0A895B994B579B86D77BB645AC6" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4} 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exekxescore.exekxescore.exekxetray.exepid process 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1368 kxescore.exe 1188 kxescore.exe 1728 kxetray.exe 1728 kxetray.exe 1188 kxescore.exe 1728 kxetray.exe 1728 kxetray.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe 1728 kxetray.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid process 468 468 468 -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exekislive.exekxescore.exekxetray.exedescription pid process Token: SeDebugPrivilege 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Token: SeDebugPrivilege 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Token: SeDebugPrivilege 1988 kislive.exe Token: SeDebugPrivilege 1188 kxescore.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeIncreaseQuotaPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe Token: SeDebugPrivilege 1728 kxetray.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exepid process 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exepid process 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
ksoftmgr.exekwsprotect64.exekxetray.exepid process 908 ksoftmgr.exe 908 ksoftmgr.exe 2140 kwsprotect64.exe 2140 kwsprotect64.exe 1728 kxetray.exe 1728 kxetray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exekxetray.exedescription pid process target process PID 1992 wrote to memory of 1588 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe KDbCIHelper.exe PID 1992 wrote to memory of 1588 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe KDbCIHelper.exe PID 1992 wrote to memory of 1588 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe KDbCIHelper.exe PID 1992 wrote to memory of 1588 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe KDbCIHelper.exe PID 1992 wrote to memory of 1228 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kavlog2.exe PID 1992 wrote to memory of 1228 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kavlog2.exe PID 1992 wrote to memory of 1228 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kavlog2.exe PID 1992 wrote to memory of 1228 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kavlog2.exe PID 1992 wrote to memory of 908 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe ksoftmgr.exe PID 1992 wrote to memory of 908 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe ksoftmgr.exe PID 1992 wrote to memory of 908 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe ksoftmgr.exe PID 1992 wrote to memory of 908 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe ksoftmgr.exe PID 1992 wrote to memory of 1728 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxetray.exe PID 1992 wrote to memory of 1728 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxetray.exe PID 1992 wrote to memory of 1728 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxetray.exe PID 1992 wrote to memory of 1728 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxetray.exe PID 1992 wrote to memory of 1368 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxescore.exe PID 1992 wrote to memory of 1368 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxescore.exe PID 1992 wrote to memory of 1368 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxescore.exe PID 1992 wrote to memory of 1368 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kxescore.exe PID 1992 wrote to memory of 1988 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kislive.exe PID 1992 wrote to memory of 1988 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kislive.exe PID 1992 wrote to memory of 1988 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kislive.exe PID 1992 wrote to memory of 1988 1992 040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe kislive.exe PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE PID 1728 wrote to memory of 1268 1728 kxetray.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe"C:\Users\Admin\AppData\Local\Temp\040b095e18e138023ce13d494974d462448cef810d546795bf99dba906a4828b.exe"2⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\KDbCIHelper.exe"C:\Users\Admin\AppData\Local\Temp\KDbCIHelper.exe" -release3⤵
- Executes dropped EXE
PID:1588 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe" -install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1228 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe" -preload3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:908 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /autorun /hidefloatwin /silentinstrcmd3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
PID:900 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
PID:1748 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
PID:1536 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
PID:1716 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
PID:1624 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
PID:992 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
PID:1620 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
PID:1384 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
PID:2084 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
PID:2104 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe"kwsprotect64.exe" (null)4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
PID:2120 -
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
PID:876 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe" /autorun /std /skipcs33⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /start kxescore3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescore1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
522KB
MD5c7256e3f7702a3848f0259b3cbaf712d
SHA1d268660245346fc92c2832a47e84ae03e6f9ecda
SHA256009d63fbb8f3ab13c0a1a6559c83a493dffa1fbd63c1f243d0ca3f188e489bac
SHA512e9a8e458c82aab1b71618d2391df7a60809d0a711f35e7b45609c3335ab39ec13ff1ec67043781210503ac0f7cd5a836c96d422405b7e3b073ec19463eb2f91f
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.exeFilesize
1.2MB
MD56a001678ac0bee54a27191a7c72b0f56
SHA155bf2ad857a80ca60782c0c524e25c0963747788
SHA2567bad0cbcf9679723fdc5663ea20ff4d0c37a1bd292177ab40329ebcb0163dfcd
SHA5127873a235125288d83a617bc05b77d807e03558fba1f10d6efd5c02e10c256d2d6e7b56b40adadf50879ee40847454edf59afbdb9e640a52c6112d0abf6367a3b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exeFilesize
3.6MB
MD5ec97eb619fd07ba0aee6783eac3bcb47
SHA17f5788269192c59ad8cda179cbf3e5a4cc490972
SHA256699605488bf15f37a167d105f8550c43225ac309bc1b4321e42172e32f70fb42
SHA512e4f923235474b8df81ad407bc9a4e21e6ac6aaa0ae8f3fb3de13f4eb080d60d566035b52175214d416001caf7cf5c1484111799c43dea900aea9df3a87d4f272
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.8MB
MD5da752173d2f6e37fc7826144e12383da
SHA192c4b3f3ec780bd8651886623373ccc3b31c4b05
SHA2568a0f744e1702d7e0867d0fbf2242a88aa686d8987af3fe67c62bdb97d6dd6234
SHA512fe3dd83732c598d513bd2d5dde118f19111a3fa290591708057d9dbbde75d62460975e0016cf91da2199c71b00145d535bc3046118ca4b56d2cd89f73ef1c0b3
-
C:\Users\Admin\AppData\Local\Temp\KDbCIHelper.exeFilesize
270KB
MD56a0416c9d15d5bbfa03c85a96eadad90
SHA1ec383f7104112d92f95c31d0e365db6dd2cd4462
SHA25672e1f20807ed445c506d264d9da2e3687a8b2f4b503f352f1d363d7a5dce73ea
SHA512dfbca32f535b9a39576c653ff731ce5bff087d625dfb2e4498aade783ed1faf9784dd06266a582d4e9d8218b13cf5b9bb4057e4cc3dace05646e1a26d865f3dc
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\KCmppInvoker.dllFilesize
180KB
MD59f70191eae1688db0d18f8d956a88383
SHA146c96305f5f33c1162609dc82f383db538cf428b
SHA2561f39d69c8efb14b77795c139ee76ecc5cb3d2bd16ef587efd996814c9151b664
SHA512017fb06d89268b5c6abb67890497e7edda46077da3dc3cfff322eb5e0ea475ca5796eea287e81fa3b01aa730dda8e705c8cb0e9a198ad419ac48287d29888f4f
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\MSVCP80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\MSVCR80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavevent.dllFilesize
90KB
MD580f899ca024ddcf5218a4fadeacaec54
SHA12756821bde2d8eb44b04da63afbf5496565ddf71
SHA2562a0d8c0778ef91c5e9f7ffac47a0e49a4055d50556895822d84adcbce9375c17
SHA512ae871718f3eb2bcdd4bc6d41a691e9684a98a022d0db9d9444470820847e648e369a5f0c7887dc31d6ffa51572634345fe2448c1defe8535eb79c30f8202f41f
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kpopclt.dllFilesize
213KB
MD51dd2c3ecae68a35cde2d586aa24e0f25
SHA1600f6a6af5b43a00c5ddd040a79afbeadba053cf
SHA256905fbcb0f93015941e884bd37b5d196788bc4422919fead4be12fbfd42fb5440
SHA512237f5623042dfab544458847cebe1a5f95bf83165d6155086378976b1082d7709b0fe8379ba15fff8ea39664ffe67546719983d27ce3e82cec6ac667e0f78145
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksapi64.dllFilesize
193KB
MD52e67447a0b7f3192d09290503b96b738
SHA1fccdb3ed95f71304e40b54c38c0d1a44b083c2e3
SHA2567441b31adbe9c1cdb5af51569b7b32218def2d691f7fad07d1e6be60a3a48041
SHA5121381828c17b1448b8321c2be0509e90742a9235063183bea850bbf940c133eda1b4e67a382750de44dc5a8afe28de05e2047c13ba21c286f9c29e184b2b58b9e
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kskinmgr.dllFilesize
975KB
MD59152c4b02a92bdc24dc63efc86fcbc4e
SHA13e0c9f8406e4ae94b10eab6ce0e66a46bd6e380a
SHA256aaa1aeab64e409bedc751009a8a55d9a081dfade787c6dc9d7272ac2a7489093
SHA512c42cd9deeaafbedd8782f870ece90fcfb8b84bc06e04be4c615d622533b7ec809b93029985f703dfe1c196bd4f8054b9b79180ccf59f7039f2834bcf84bf8de4
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exeFilesize
3.6MB
MD5ec97eb619fd07ba0aee6783eac3bcb47
SHA17f5788269192c59ad8cda179cbf3e5a4cc490972
SHA256699605488bf15f37a167d105f8550c43225ac309bc1b4321e42172e32f70fb42
SHA512e4f923235474b8df81ad407bc9a4e21e6ac6aaa0ae8f3fb3de13f4eb080d60d566035b52175214d416001caf7cf5c1484111799c43dea900aea9df3a87d4f272
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kuidsrv.dllFilesize
461KB
MD5665ba4f0adcec026db80a191cbb92618
SHA17162645603079e9a1a2b77b7c48daec8ae180299
SHA256bf088cc30af2d93728726f668511cfcb38c609b8b4771f599a4ad747ae61e7e8
SHA512fb4a924dc2b4bd145e364a024c47bbbbab188d4a9b2c0d630894b971fa556d5fc600b1482ab95be1f7e8be2715ad4528602a5c020c355f755362f09eefba146b
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwhrequestor.dllFilesize
617KB
MD5a7405a1e67e65e1fc8b6bff36d9626ab
SHA122284f802c417afd111e54d33dc1b738a3fd767c
SHA256e4484073cc318675a35b21f84ded98ce96a9bec1b084ea207fe31c531bf8d162
SHA512ad8136ac4d395967d7b8d9f0fbd5222e1bf3c815d6a0c9f7541a59e5b29ed4120d6831d381fff020d6862a72547e78a355d830f251360aa267b89f9f54a17254
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxebase.dllFilesize
63KB
MD5943e99cf9c0e96a31abb7325558371d8
SHA13188bb90f16c14b03e0d09e244ecaa9d2285be78
SHA256df1dde424ec68bb481f3cdbed66a52c92325134b084c6bd1ad013c3ba0ac3780
SHA512de3047ee0c70adb15a1ffe25e3f21b832ad9b1152d6e3ec3f54ae33e5f8f70d614b9cfff28d9645ddb850a6fb0d71b0a43d96be07857841fd6f37813793f6757
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecore\kxecore.dllFilesize
550KB
MD58565494bb60368adba1b1400fecc362a
SHA1b6727a439521118b68697c29509d99bedd71800c
SHA2562eca3bf8c73371ce181bdd3bede07ee3c319a240df3ab18cb65fed590f6170fb
SHA51281d56323f5e0cdeed5dcc8163813736183f6495a1a2e16a56ef9543a29a8e28ba00ca814ce145a398bae9291e29242aa4b9c2081a84192db73cac0320ec6f8e8
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore_sp.xcfFilesize
87B
MD547f61d0f7bd830f5bfe72c3b65941fde
SHA1d7f440877e23679fd2c480dff2b8f3219702d681
SHA256eb09cf1094904f0d3038ce1e981fd4366eba4000c8b6f13a3dbbaefea4797e37
SHA512d234f17af1440aba1a4f6c2b24d04fdeb3a685f25f391cdc1ac048dfed1b470689bed5b21d7b3db94f9186445932982f462bbee8af919c1a957ab89bd69e68f5
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kismain.iniFilesize
82B
MD5e438ffc734ea91d4c135642c1d13a2f4
SHA1e82c90e348460f9a289ad9a1ba283facbc87ba2b
SHA256628094f4aaa600d66f9f9d9440f3802636788b53cc9a628eeea5b98f4964246f
SHA512c3bb1f7481030c45356841f801697520aad2f75ac329b20c0ac4e9bd8f4d1ec5b96dbc2c492a15746730403f5b25440762b14591ebec1978d7babe398e26168b
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\uplive.svrFilesize
9KB
MD50ff4535960c3d5864b2341ae71d4e5c1
SHA18a48f6390dba08aec7879ba27e0fd11f7e215a5d
SHA2562f5696ebc343b65b284a2e3d37d1bc91c12dc09d42145c86e4ec795f9972d8cf
SHA512d1fcfd4cc6ff094cd0be1f7270ceb11bcd648d763504fc80c3908655fd0bad659e9082e3bd2686e3f9f983544bf0a748bd152028ee5bd31d067af7d354a7cfb0
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\scom.dllFilesize
71KB
MD50d9fd22c4b94746a19478e49c6abe1f5
SHA18ef001a0c1fd44d2c61ff4b55a8043f4e129aff7
SHA256d7c44eeee6a1cfba85c4569b534911ef8ca836b7d821db77f642ea4bdbaad645
SHA5122ec28ab6982fbfcd4050231aba3efd602ef792a5ec365951f71b9a44487f299fd9558a646d8db0604900e070d5b3ff9da1f620f697c08f498e0ebe893d9dec6a
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kavevent.dllFilesize
90KB
MD580f899ca024ddcf5218a4fadeacaec54
SHA12756821bde2d8eb44b04da63afbf5496565ddf71
SHA2562a0d8c0778ef91c5e9f7ffac47a0e49a4055d50556895822d84adcbce9375c17
SHA512ae871718f3eb2bcdd4bc6d41a691e9684a98a022d0db9d9444470820847e648e369a5f0c7887dc31d6ffa51572634345fe2448c1defe8535eb79c30f8202f41f
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
522KB
MD5c7256e3f7702a3848f0259b3cbaf712d
SHA1d268660245346fc92c2832a47e84ae03e6f9ecda
SHA256009d63fbb8f3ab13c0a1a6559c83a493dffa1fbd63c1f243d0ca3f188e489bac
SHA512e9a8e458c82aab1b71618d2391df7a60809d0a711f35e7b45609c3335ab39ec13ff1ec67043781210503ac0f7cd5a836c96d422405b7e3b073ec19463eb2f91f
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kavmenu.dllFilesize
181KB
MD5afe49a8d1f66320acd18cdf54ae11423
SHA144f2cd0a68c659f90d371b54deae0de41ddde98d
SHA25654b370fc596fe4bc32d4b71d371e2c077dd040f520e13d6722a254c95ae98d1a
SHA512f0a5e0f08af38d92d3adbae80c19be6e51e739f674a39d4a1aa9e460d8cfedcc9a2373575c83055b26688bf9196560d71cf9d8b5dee595a82b8f892e80a788dc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kcmppinvoker.dllFilesize
180KB
MD59f70191eae1688db0d18f8d956a88383
SHA146c96305f5f33c1162609dc82f383db538cf428b
SHA2561f39d69c8efb14b77795c139ee76ecc5cb3d2bd16ef587efd996814c9151b664
SHA512017fb06d89268b5c6abb67890497e7edda46077da3dc3cfff322eb5e0ea475ca5796eea287e81fa3b01aa730dda8e705c8cb0e9a198ad419ac48287d29888f4f
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kcmppinvoker.dllFilesize
180KB
MD59f70191eae1688db0d18f8d956a88383
SHA146c96305f5f33c1162609dc82f383db538cf428b
SHA2561f39d69c8efb14b77795c139ee76ecc5cb3d2bd16ef587efd996814c9151b664
SHA512017fb06d89268b5c6abb67890497e7edda46077da3dc3cfff322eb5e0ea475ca5796eea287e81fa3b01aa730dda8e705c8cb0e9a198ad419ac48287d29888f4f
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.exeFilesize
1.2MB
MD56a001678ac0bee54a27191a7c72b0f56
SHA155bf2ad857a80ca60782c0c524e25c0963747788
SHA2567bad0cbcf9679723fdc5663ea20ff4d0c37a1bd292177ab40329ebcb0163dfcd
SHA5127873a235125288d83a617bc05b77d807e03558fba1f10d6efd5c02e10c256d2d6e7b56b40adadf50879ee40847454edf59afbdb9e640a52c6112d0abf6367a3b
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kpopclt.dllFilesize
213KB
MD51dd2c3ecae68a35cde2d586aa24e0f25
SHA1600f6a6af5b43a00c5ddd040a79afbeadba053cf
SHA256905fbcb0f93015941e884bd37b5d196788bc4422919fead4be12fbfd42fb5440
SHA512237f5623042dfab544458847cebe1a5f95bf83165d6155086378976b1082d7709b0fe8379ba15fff8ea39664ffe67546719983d27ce3e82cec6ac667e0f78145
-
\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi64.dllFilesize
193KB
MD52e67447a0b7f3192d09290503b96b738
SHA1fccdb3ed95f71304e40b54c38c0d1a44b083c2e3
SHA2567441b31adbe9c1cdb5af51569b7b32218def2d691f7fad07d1e6be60a3a48041
SHA5121381828c17b1448b8321c2be0509e90742a9235063183bea850bbf940c133eda1b4e67a382750de44dc5a8afe28de05e2047c13ba21c286f9c29e184b2b58b9e
-
\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi64.dllFilesize
193KB
MD52e67447a0b7f3192d09290503b96b738
SHA1fccdb3ed95f71304e40b54c38c0d1a44b083c2e3
SHA2567441b31adbe9c1cdb5af51569b7b32218def2d691f7fad07d1e6be60a3a48041
SHA5121381828c17b1448b8321c2be0509e90742a9235063183bea850bbf940c133eda1b4e67a382750de44dc5a8afe28de05e2047c13ba21c286f9c29e184b2b58b9e
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kskinmgr.dllFilesize
975KB
MD59152c4b02a92bdc24dc63efc86fcbc4e
SHA13e0c9f8406e4ae94b10eab6ce0e66a46bd6e380a
SHA256aaa1aeab64e409bedc751009a8a55d9a081dfade787c6dc9d7272ac2a7489093
SHA512c42cd9deeaafbedd8782f870ece90fcfb8b84bc06e04be4c615d622533b7ec809b93029985f703dfe1c196bd4f8054b9b79180ccf59f7039f2834bcf84bf8de4
-
\Program Files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exeFilesize
3.6MB
MD5ec97eb619fd07ba0aee6783eac3bcb47
SHA17f5788269192c59ad8cda179cbf3e5a4cc490972
SHA256699605488bf15f37a167d105f8550c43225ac309bc1b4321e42172e32f70fb42
SHA512e4f923235474b8df81ad407bc9a4e21e6ac6aaa0ae8f3fb3de13f4eb080d60d566035b52175214d416001caf7cf5c1484111799c43dea900aea9df3a87d4f272
-
\Program Files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exeFilesize
3.6MB
MD5ec97eb619fd07ba0aee6783eac3bcb47
SHA17f5788269192c59ad8cda179cbf3e5a4cc490972
SHA256699605488bf15f37a167d105f8550c43225ac309bc1b4321e42172e32f70fb42
SHA512e4f923235474b8df81ad407bc9a4e21e6ac6aaa0ae8f3fb3de13f4eb080d60d566035b52175214d416001caf7cf5c1484111799c43dea900aea9df3a87d4f272
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kuidsrv.dllFilesize
461KB
MD5665ba4f0adcec026db80a191cbb92618
SHA17162645603079e9a1a2b77b7c48daec8ae180299
SHA256bf088cc30af2d93728726f668511cfcb38c609b8b4771f599a4ad747ae61e7e8
SHA512fb4a924dc2b4bd145e364a024c47bbbbab188d4a9b2c0d630894b971fa556d5fc600b1482ab95be1f7e8be2715ad4528602a5c020c355f755362f09eefba146b
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kuidsrv.dllFilesize
461KB
MD5665ba4f0adcec026db80a191cbb92618
SHA17162645603079e9a1a2b77b7c48daec8ae180299
SHA256bf088cc30af2d93728726f668511cfcb38c609b8b4771f599a4ad747ae61e7e8
SHA512fb4a924dc2b4bd145e364a024c47bbbbab188d4a9b2c0d630894b971fa556d5fc600b1482ab95be1f7e8be2715ad4528602a5c020c355f755362f09eefba146b
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kwhrequestor.dllFilesize
617KB
MD5a7405a1e67e65e1fc8b6bff36d9626ab
SHA122284f802c417afd111e54d33dc1b738a3fd767c
SHA256e4484073cc318675a35b21f84ded98ce96a9bec1b084ea207fe31c531bf8d162
SHA512ad8136ac4d395967d7b8d9f0fbd5222e1bf3c815d6a0c9f7541a59e5b29ed4120d6831d381fff020d6862a72547e78a355d830f251360aa267b89f9f54a17254
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kwhrequestor.dllFilesize
617KB
MD5a7405a1e67e65e1fc8b6bff36d9626ab
SHA122284f802c417afd111e54d33dc1b738a3fd767c
SHA256e4484073cc318675a35b21f84ded98ce96a9bec1b084ea207fe31c531bf8d162
SHA512ad8136ac4d395967d7b8d9f0fbd5222e1bf3c815d6a0c9f7541a59e5b29ed4120d6831d381fff020d6862a72547e78a355d830f251360aa267b89f9f54a17254
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxebase.dllFilesize
63KB
MD5943e99cf9c0e96a31abb7325558371d8
SHA13188bb90f16c14b03e0d09e244ecaa9d2285be78
SHA256df1dde424ec68bb481f3cdbed66a52c92325134b084c6bd1ad013c3ba0ac3780
SHA512de3047ee0c70adb15a1ffe25e3f21b832ad9b1152d6e3ec3f54ae33e5f8f70d614b9cfff28d9645ddb850a6fb0d71b0a43d96be07857841fd6f37813793f6757
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.8MB
MD5da752173d2f6e37fc7826144e12383da
SHA192c4b3f3ec780bd8651886623373ccc3b31c4b05
SHA2568a0f744e1702d7e0867d0fbf2242a88aa686d8987af3fe67c62bdb97d6dd6234
SHA512fe3dd83732c598d513bd2d5dde118f19111a3fa290591708057d9dbbde75d62460975e0016cf91da2199c71b00145d535bc3046118ca4b56d2cd89f73ef1c0b3
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.8MB
MD5da752173d2f6e37fc7826144e12383da
SHA192c4b3f3ec780bd8651886623373ccc3b31c4b05
SHA2568a0f744e1702d7e0867d0fbf2242a88aa686d8987af3fe67c62bdb97d6dd6234
SHA512fe3dd83732c598d513bd2d5dde118f19111a3fa290591708057d9dbbde75d62460975e0016cf91da2199c71b00145d535bc3046118ca4b56d2cd89f73ef1c0b3
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\scom.dllFilesize
71KB
MD50d9fd22c4b94746a19478e49c6abe1f5
SHA18ef001a0c1fd44d2c61ff4b55a8043f4e129aff7
SHA256d7c44eeee6a1cfba85c4569b534911ef8ca836b7d821db77f642ea4bdbaad645
SHA5122ec28ab6982fbfcd4050231aba3efd602ef792a5ec365951f71b9a44487f299fd9558a646d8db0604900e070d5b3ff9da1f620f697c08f498e0ebe893d9dec6a
-
\Program Files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sysFilesize
307KB
MD5614b51a2e2558f62222f36f378ee4773
SHA1d6ed7e99e034c63e4b5226d64fdf387299d16919
SHA256aa1daa14ae9a90c5dc1a1ce00ae844c4e02980a5d451295941eb4d075f6dda2d
SHA5127af759f6569cc87c01fc1f4ce3982be94a08b8354066602046cf14b5f857a7afd0edc3b5010826391c61ec62aff2cb721b9450fc001a8d0cfc48db7c3fabf63d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sysFilesize
307KB
MD5614b51a2e2558f62222f36f378ee4773
SHA1d6ed7e99e034c63e4b5226d64fdf387299d16919
SHA256aa1daa14ae9a90c5dc1a1ce00ae844c4e02980a5d451295941eb4d075f6dda2d
SHA5127af759f6569cc87c01fc1f4ce3982be94a08b8354066602046cf14b5f857a7afd0edc3b5010826391c61ec62aff2cb721b9450fc001a8d0cfc48db7c3fabf63d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\uni0nst.exeFilesize
1.3MB
MD5fe9e9c26854ca93882ea7c8bed6e27b8
SHA1b9eba9efb19d72b7050821316f836879db8d35e6
SHA2563fda0137f43c9edbc90faa432a093de40aa4c55a5839d500b6bcad30f06226a3
SHA5129183d3f5769257c945815adc2cd3cd29148568543be5f4534e72d7d2623765cb9b9ea02ad4c08ddb505342d218d53f94a227f0af792f4167bc2af1c3e8745af7
-
\Users\Admin\AppData\Local\Temp\KDbCIHelper.exeFilesize
270KB
MD56a0416c9d15d5bbfa03c85a96eadad90
SHA1ec383f7104112d92f95c31d0e365db6dd2cd4462
SHA25672e1f20807ed445c506d264d9da2e3687a8b2f4b503f352f1d363d7a5dce73ea
SHA512dfbca32f535b9a39576c653ff731ce5bff087d625dfb2e4498aade783ed1faf9784dd06266a582d4e9d8218b13cf5b9bb4057e4cc3dace05646e1a26d865f3dc
-
\Users\Admin\AppData\Local\Temp\KDbCIHelper.exeFilesize
270KB
MD56a0416c9d15d5bbfa03c85a96eadad90
SHA1ec383f7104112d92f95c31d0e365db6dd2cd4462
SHA25672e1f20807ed445c506d264d9da2e3687a8b2f4b503f352f1d363d7a5dce73ea
SHA512dfbca32f535b9a39576c653ff731ce5bff087d625dfb2e4498aade783ed1faf9784dd06266a582d4e9d8218b13cf5b9bb4057e4cc3dace05646e1a26d865f3dc
-
\Users\Admin\AppData\Local\Temp\kdb_semrjgj.dllFilesize
36.6MB
MD5cf20e3f69ae844fd027ce759f0aa560c
SHA12d5079bf74c4cdc226c605a9e82bd803ff577648
SHA256f9cce6e4026f7be00fbf665bdc9e433baf0932ddf8bf660bcacbc61a4b44748a
SHA51249dae81fe0b2a47c548674ec2dea8c4a9a956308daf6ee6a7448ec373ca07094e0d04cd9dc88c527778d91aa8b13ecd6045eddf60d79a8c061f9530ac1b70015
-
memory/876-284-0x0000000000000000-mapping.dmp
-
memory/900-269-0x0000000000000000-mapping.dmp
-
memory/908-72-0x0000000000000000-mapping.dmp
-
memory/992-277-0x0000000000000000-mapping.dmp
-
memory/1188-135-0x00000000000F0000-0x0000000000127000-memory.dmpFilesize
220KB
-
memory/1188-168-0x00000000015A0000-0x00000000015CD000-memory.dmpFilesize
180KB
-
memory/1188-142-0x00000000001B0000-0x00000000001DA000-memory.dmpFilesize
168KB
-
memory/1188-172-0x0000000003440000-0x00000000034A2000-memory.dmpFilesize
392KB
-
memory/1188-139-0x0000000000130000-0x000000000015F000-memory.dmpFilesize
188KB
-
memory/1188-145-0x00000000003A0000-0x0000000000411000-memory.dmpFilesize
452KB
-
memory/1188-164-0x0000000000F40000-0x0000000000F54000-memory.dmpFilesize
80KB
-
memory/1188-161-0x00000000036EF000-0x0000000003737000-memory.dmpFilesize
288KB
-
memory/1188-160-0x00000000035F0000-0x00000000036F3000-memory.dmpFilesize
1.0MB
-
memory/1188-158-0x0000000003200000-0x00000000032BF000-memory.dmpFilesize
764KB
-
memory/1188-149-0x0000000000160000-0x0000000000170000-memory.dmpFilesize
64KB
-
memory/1188-155-0x00000000013C0000-0x00000000013D2000-memory.dmpFilesize
72KB
-
memory/1188-154-0x0000000000F40000-0x0000000000F54000-memory.dmpFilesize
80KB
-
memory/1188-152-0x00000000001E0000-0x00000000001EE000-memory.dmpFilesize
56KB
-
memory/1228-68-0x0000000000000000-mapping.dmp
-
memory/1268-188-0x00000000029D0000-0x00000000029D1000-memory.dmpFilesize
4KB
-
memory/1268-186-0x00000000029D0000-0x00000000029D1000-memory.dmpFilesize
4KB
-
memory/1368-122-0x0000000000590000-0x0000000000601000-memory.dmpFilesize
452KB
-
memory/1368-105-0x0000000000180000-0x00000000001B7000-memory.dmpFilesize
220KB
-
memory/1368-109-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/1368-113-0x00000000001F0000-0x000000000021A000-memory.dmpFilesize
168KB
-
memory/1368-89-0x0000000000000000-mapping.dmp
-
memory/1384-285-0x0000000000000000-mapping.dmp
-
memory/1536-275-0x0000000000000000-mapping.dmp
-
memory/1588-58-0x0000000000000000-mapping.dmp
-
memory/1620-283-0x0000000000000000-mapping.dmp
-
memory/1624-279-0x0000000000000000-mapping.dmp
-
memory/1716-278-0x0000000000000000-mapping.dmp
-
memory/1728-166-0x00000000028D0000-0x0000000002E90000-memory.dmpFilesize
5.8MB
-
memory/1728-174-0x0000000004030000-0x00000000040D0000-memory.dmpFilesize
640KB
-
memory/1728-176-0x0000000000320000-0x000000000032E000-memory.dmpFilesize
56KB
-
memory/1728-177-0x00000000040D0000-0x0000000004107000-memory.dmpFilesize
220KB
-
memory/1728-179-0x0000000003870000-0x000000000389F000-memory.dmpFilesize
188KB
-
memory/1728-181-0x0000000004780000-0x00000000048B6000-memory.dmpFilesize
1.2MB
-
memory/1728-183-0x0000000004640000-0x0000000004684000-memory.dmpFilesize
272KB
-
memory/1728-86-0x0000000000000000-mapping.dmp
-
memory/1728-170-0x0000000002E91000-0x000000000303C000-memory.dmpFilesize
1.7MB
-
memory/1728-162-0x00000000028B0000-0x00000000028C8000-memory.dmpFilesize
96KB
-
memory/1728-171-0x0000000002E90000-0x00000000030F8000-memory.dmpFilesize
2.4MB
-
memory/1748-271-0x0000000000000000-mapping.dmp
-
memory/1988-118-0x0000000002700000-0x000000000271A000-memory.dmpFilesize
104KB
-
memory/1988-126-0x0000000002970000-0x0000000002A63000-memory.dmpFilesize
972KB
-
memory/1988-93-0x0000000000000000-mapping.dmp
-
memory/1992-54-0x0000000075DB1000-0x0000000075DB3000-memory.dmpFilesize
8KB
-
memory/1992-64-0x00000000040D1000-0x00000000040E6000-memory.dmpFilesize
84KB
-
memory/1992-65-0x00000000040D0000-0x00000000040FC000-memory.dmpFilesize
176KB
-
memory/2084-288-0x0000000000000000-mapping.dmp
-
memory/2104-290-0x0000000000000000-mapping.dmp
-
memory/2120-292-0x0000000000000000-mapping.dmp
-
memory/2140-293-0x0000000000000000-mapping.dmp