Analysis
-
max time kernel
150s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 23:02
Static task
static1
Behavioral task
behavioral1
Sample
2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe
Resource
win10v2004-20221111-en
General
-
Target
2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe
-
Size
532KB
-
MD5
74c6e0df472160ebb8482729aaa1baee
-
SHA1
6e1634bb00213a7e557591c3d451baf56291e9de
-
SHA256
2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3
-
SHA512
05e403abe730dbc7079e3e3cce5d9e6a797542aaec81c917ed84445e324421c725dc208d1af286234e72241a725b0e89e0e224cdfc67d813861422516835d345
-
SSDEEP
12288:+K2mhAMJ/cPlizen8lwBx7EshSpwreE+/8gfxsdjY9NhEi7D:v2O/Gliquw4P5E+/8gfxsFAEo
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 20 IoCs
Processes:
KINSTALLERS_66_4538.exekxescore.exedescription ioc process File created C:\Windows\system32\drivers\bc.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kavbootc64.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kisknl64.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kisnetmxp.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kusbquery.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\ksapi.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\ksskrpr.sys KINSTALLERS_66_4538.exe File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys KINSTALLERS_66_4538.exe File opened for modification C:\Windows\system32\drivers\bc.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kavbootc.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kisknl.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kisnetm.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kisnetm64.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kdhacker.sys KINSTALLERS_66_4538.exe File opened for modification C:\Windows\SysWOW64\drivers\kisknl.sys kxescore.exe File opened for modification C:\Windows\system32\drivers\kisknl.sys kxescore.exe File created C:\Windows\system32\drivers\kisknl.sys kxescore.exe File created C:\Windows\system32\drivers\kdhacker64.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\ksapi64.sys KINSTALLERS_66_4538.exe File created C:\Windows\system32\drivers\kusbquery64.sys KINSTALLERS_66_4538.exe -
Executes dropped EXE 13 IoCs
Processes:
手机验证码接收系统.exeKINSTALLERS_66_4538.exe官方.exe淘宝客PID劫持器.exeKINSTALLERS_66_4538.exekavlog2.exekxetray.exekxescore.exekislive.exekxescore.exekwsprotect64.exepid process 860 手机验证码接收系统.exe 628 KINSTALLERS_66_4538.exe 1512 官方.exe 1592 淘宝客PID劫持器.exe 2044 KINSTALLERS_66_4538.exe 1160 kavlog2.exe 1100 kxetray.exe 400 kxescore.exe 1476 kislive.exe 1996 kxescore.exe 540 kwsprotect64.exe 1300 1404 -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
KINSTALLERS_66_4538.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" KINSTALLERS_66_4538.exe -
Sets file execution options in registry 2 TTPs 28 IoCs
Processes:
KINSTALLERS_66_4538.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UNINST.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlog2.exe KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISMAIN.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksignsp.exe KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KXESCORE.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uninst.exe KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KDRVMGR.EXE KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSIGNSP.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxetray.exe KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scomregsvrv8.exe KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCOMREGSVRV8.EXE KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLIVE.EXE KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRECYCLE.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kscan.exe KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KXETRAY.EXE KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVLOG2.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kisaddin.exe KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kiscall.exe KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxescore.exe KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kdrvmgr.exe KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kislive.exe KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSCAN.EXE KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSETUPWIZ.EXE KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISADDIN.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kismain.exe KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksetupwiz.exe KINSTALLERS_66_4538.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISCALL.EXE KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krecycle.exe KINSTALLERS_66_4538.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
kxescore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\KDHacker\ImagePath = "\\??\\c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\security\\kxescan\\kdhacker64.sys" kxescore.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\官方.exe upx \Users\Admin\AppData\Local\Temp\官方.exe upx \Users\Admin\AppData\Local\Temp\官方.exe upx \Users\Admin\AppData\Local\Temp\官方.exe upx C:\Users\Admin\AppData\Local\Temp\官方.exe upx behavioral1/memory/1512-99-0x0000000000400000-0x0000000000410000-memory.dmp upx \Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exe upx C:\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exe upx \Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exe upx C:\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exe upx \Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exe upx behavioral1/memory/2044-113-0x0000000000400000-0x0000000000575000-memory.dmp upx behavioral1/memory/1512-115-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/2044-204-0x0000000000400000-0x0000000000575000-memory.dmp upx -
Loads dropped DLL 64 IoCs
Processes:
2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exeKINSTALLERS_66_4538.exe手机验证码接收系统.exeKINSTALLERS_66_4538.exekavlog2.exekxescore.exekxetray.exekislive.exekxescore.exepid process 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 628 KINSTALLERS_66_4538.exe 628 KINSTALLERS_66_4538.exe 628 KINSTALLERS_66_4538.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 860 手机验证码接收系统.exe 628 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 1160 kavlog2.exe 400 kxescore.exe 400 kxescore.exe 1100 kxetray.exe 1160 kavlog2.exe 400 kxescore.exe 400 kxescore.exe 1160 kavlog2.exe 1160 kavlog2.exe 1100 kxetray.exe 1100 kxetray.exe 1100 kxetray.exe 1476 kislive.exe 1476 kislive.exe 1476 kislive.exe 1476 kislive.exe 1996 kxescore.exe 1996 kxescore.exe 1100 kxetray.exe 1996 kxescore.exe 1476 kislive.exe 1476 kislive.exe 1996 kxescore.exe 1996 kxescore.exe 1100 kxetray.exe 1100 kxetray.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
KINSTALLERS_66_4538.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kxesc = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxetray.exe\" -autorun" KINSTALLERS_66_4538.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
KINSTALLERS_66_4538.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini KINSTALLERS_66_4538.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini KINSTALLERS_66_4538.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kxetray.exedescription ioc process File opened (read-only) \??\P: kxetray.exe File opened (read-only) \??\R: kxetray.exe File opened (read-only) \??\T: kxetray.exe File opened (read-only) \??\Z: kxetray.exe File opened (read-only) \??\E: kxetray.exe File opened (read-only) \??\G: kxetray.exe File opened (read-only) \??\J: kxetray.exe File opened (read-only) \??\Q: kxetray.exe File opened (read-only) \??\S: kxetray.exe File opened (read-only) \??\F: kxetray.exe File opened (read-only) \??\L: kxetray.exe File opened (read-only) \??\M: kxetray.exe File opened (read-only) \??\U: kxetray.exe File opened (read-only) \??\X: kxetray.exe File opened (read-only) \??\H: kxetray.exe File opened (read-only) \??\K: kxetray.exe File opened (read-only) \??\O: kxetray.exe File opened (read-only) \??\W: kxetray.exe File opened (read-only) \??\Y: kxetray.exe File opened (read-only) \??\D: kxetray.exe File opened (read-only) \??\I: kxetray.exe File opened (read-only) \??\N: kxetray.exe File opened (read-only) \??\V: kxetray.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
KINSTALLERS_66_4538.exedescription ioc process File opened for modification \??\PhysicalDrive0 KINSTALLERS_66_4538.exe -
Drops file in System32 directory 1 IoCs
Processes:
kavlog2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\KAVEventLog.EVT kavlog2.exe -
Drops file in Program Files directory 64 IoCs
Processes:
KINSTALLERS_66_4538.exekxetray.exekislive.exekxescore.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxecore\kxelog.dll KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\alibaba.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\do93.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\metroimg\metro_blue.png KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kavcfg.ini KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kisfdpro64.dll KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kspcore.dll KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\18_263yx.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\ips.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\qunar.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\deswitch.dat KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kstools.dll KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwssp.dll KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\09tomyx.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\360buy.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\camel.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\justonline.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsshop.dat KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\ksdecs.dll KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\update\kav\indexkav.dat kislive.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\02xunlei.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kminitray.dll KINSTALLERS_66_4538.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kusernetwhitelist.dat kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\08_178.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\shouxinyi.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kws\icon\kws_adult.gif KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksafetips.xml KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\iglist.dat KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavmenu.dll KINSTALLERS_66_4538.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\knetwhitelist.dat-journal kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\jingdong.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\ksdmalwarez.dat KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksinst.dll KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\99bill.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\guomei.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\lbhelper.dll KINSTALLERS_66_4538.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kdehuser.ini kxescore.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\procinfo.dat kxescore.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\option.ini kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\01vs.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kws\icon\kws_safe.gif KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kpld.dat KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksoles.dat KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\sougouext.sext KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\uzai.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kws\icon\commentbt.gif KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\guangfa.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\03qqyx.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\tccb.png kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\switch.dat kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\03yidong.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\gzcb.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\masamaso.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kws\icon\commentbgsafetrb.gif KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kws\icon\kws_adult_no.gif KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\quarantine.ini KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\shoujizhushou\sjkuplive.svr KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\webui\icon\defpolicy.gif KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\microsoft.vc80.mfc.manifest KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\config\ksesysfiles.dat KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\12xunyou.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyImgs\psbc.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe KINSTALLERS_66_4538.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\bittransport.dll KINSTALLERS_66_4538.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 50 IoCs
Processes:
kxetray.exeKINSTALLERS_66_4538.exekxescore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4} KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ThreadingModel = "Apartment" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" kxescore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "69bcb7b9feaba6db1eefb4c1bcbee8cc" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{372B851C-71B6-4fd3-9A23-30A4D1FFF178} kxetray.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "knlu4khydyaxj2dtxo8om58l4ev8" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Shellex\ContextMenuHandlers\duba_64bit KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32 KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu.dll" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit KINSTALLERS_66_4538.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} KINSTALLERS_66_4538.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "3036973682" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\ = "CKavMenuShell Class" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51} KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shellex\ContextMenuHandlers\duba_64bit KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "knlu4khydyaxj2dtxo8om58l4ev8" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\Shellex\ContextMenuHandlers\duba_64bit KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} KINSTALLERS_66_4538.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "69bcb7b9feaba6db1eefb4c1bcbee8cc" kxescore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "0" KINSTALLERS_66_4538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "3036973682" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} kxescore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex KINSTALLERS_66_4538.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit KINSTALLERS_66_4538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories KINSTALLERS_66_4538.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} KINSTALLERS_66_4538.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
KINSTALLERS_66_4538.exekxetray.exepid process 2044 KINSTALLERS_66_4538.exe 2044 KINSTALLERS_66_4538.exe 1100 kxetray.exe 1100 kxetray.exe 1100 kxetray.exe 1100 kxetray.exe 1100 kxetray.exe 1100 kxetray.exe -
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
pid process 460 460 460 460 460 -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
KINSTALLERS_66_4538.exekislive.exekxescore.exekxetray.exedescription pid process Token: SeDebugPrivilege 2044 KINSTALLERS_66_4538.exe Token: SeDebugPrivilege 1476 kislive.exe Token: SeDebugPrivilege 2044 KINSTALLERS_66_4538.exe Token: SeDebugPrivilege 1996 kxescore.exe Token: 33 1996 kxescore.exe Token: SeIncBasePriorityPrivilege 1996 kxescore.exe Token: SeDebugPrivilege 1100 kxetray.exe Token: SeDebugPrivilege 1100 kxetray.exe Token: SeDebugPrivilege 1100 kxetray.exe Token: SeDebugPrivilege 1100 kxetray.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
kxetray.exepid process 1100 kxetray.exe 1100 kxetray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
kxetray.exepid process 1100 kxetray.exe 1100 kxetray.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
淘宝客PID劫持器.exekwsprotect64.exekxetray.exepid process 1592 淘宝客PID劫持器.exe 1592 淘宝客PID劫持器.exe 540 kwsprotect64.exe 540 kwsprotect64.exe 1100 kxetray.exe 1100 kxetray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe手机验证码接收系统.exe官方.execmd.exeKINSTALLERS_66_4538.exeKINSTALLERS_66_4538.exedescription pid process target process PID 1248 wrote to memory of 860 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 手机验证码接收系统.exe PID 1248 wrote to memory of 860 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 手机验证码接收系统.exe PID 1248 wrote to memory of 860 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 手机验证码接收系统.exe PID 1248 wrote to memory of 860 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 手机验证码接收系统.exe PID 1248 wrote to memory of 860 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 手机验证码接收系统.exe PID 1248 wrote to memory of 860 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 手机验证码接收系统.exe PID 1248 wrote to memory of 860 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe 手机验证码接收系统.exe PID 1248 wrote to memory of 628 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe KINSTALLERS_66_4538.exe PID 1248 wrote to memory of 628 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe KINSTALLERS_66_4538.exe PID 1248 wrote to memory of 628 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe KINSTALLERS_66_4538.exe PID 1248 wrote to memory of 628 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe KINSTALLERS_66_4538.exe PID 1248 wrote to memory of 628 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe KINSTALLERS_66_4538.exe PID 1248 wrote to memory of 628 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe KINSTALLERS_66_4538.exe PID 1248 wrote to memory of 628 1248 2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe KINSTALLERS_66_4538.exe PID 860 wrote to memory of 1512 860 手机验证码接收系统.exe 官方.exe PID 860 wrote to memory of 1512 860 手机验证码接收系统.exe 官方.exe PID 860 wrote to memory of 1512 860 手机验证码接收系统.exe 官方.exe PID 860 wrote to memory of 1512 860 手机验证码接收系统.exe 官方.exe PID 860 wrote to memory of 1512 860 手机验证码接收系统.exe 官方.exe PID 860 wrote to memory of 1512 860 手机验证码接收系统.exe 官方.exe PID 860 wrote to memory of 1512 860 手机验证码接收系统.exe 官方.exe PID 860 wrote to memory of 1592 860 手机验证码接收系统.exe 淘宝客PID劫持器.exe PID 860 wrote to memory of 1592 860 手机验证码接收系统.exe 淘宝客PID劫持器.exe PID 860 wrote to memory of 1592 860 手机验证码接收系统.exe 淘宝客PID劫持器.exe PID 860 wrote to memory of 1592 860 手机验证码接收系统.exe 淘宝客PID劫持器.exe PID 860 wrote to memory of 1592 860 手机验证码接收系统.exe 淘宝客PID劫持器.exe PID 860 wrote to memory of 1592 860 手机验证码接收系统.exe 淘宝客PID劫持器.exe PID 860 wrote to memory of 1592 860 手机验证码接收系统.exe 淘宝客PID劫持器.exe PID 1512 wrote to memory of 1264 1512 官方.exe cmd.exe PID 1512 wrote to memory of 1264 1512 官方.exe cmd.exe PID 1512 wrote to memory of 1264 1512 官方.exe cmd.exe PID 1512 wrote to memory of 1264 1512 官方.exe cmd.exe PID 1512 wrote to memory of 1264 1512 官方.exe cmd.exe PID 1512 wrote to memory of 1264 1512 官方.exe cmd.exe PID 1512 wrote to memory of 1264 1512 官方.exe cmd.exe PID 860 wrote to memory of 800 860 手机验证码接收系统.exe WScript.exe PID 860 wrote to memory of 800 860 手机验证码接收系统.exe WScript.exe PID 860 wrote to memory of 800 860 手机验证码接收系统.exe WScript.exe PID 860 wrote to memory of 800 860 手机验证码接收系统.exe WScript.exe PID 860 wrote to memory of 800 860 手机验证码接收系统.exe WScript.exe PID 860 wrote to memory of 800 860 手机验证码接收系统.exe WScript.exe PID 860 wrote to memory of 800 860 手机验证码接收系统.exe WScript.exe PID 1264 wrote to memory of 636 1264 cmd.exe PING.EXE PID 1264 wrote to memory of 636 1264 cmd.exe PING.EXE PID 1264 wrote to memory of 636 1264 cmd.exe PING.EXE PID 1264 wrote to memory of 636 1264 cmd.exe PING.EXE PID 1264 wrote to memory of 636 1264 cmd.exe PING.EXE PID 1264 wrote to memory of 636 1264 cmd.exe PING.EXE PID 1264 wrote to memory of 636 1264 cmd.exe PING.EXE PID 1264 wrote to memory of 1656 1264 cmd.exe WScript.exe PID 1264 wrote to memory of 1656 1264 cmd.exe WScript.exe PID 1264 wrote to memory of 1656 1264 cmd.exe WScript.exe PID 1264 wrote to memory of 1656 1264 cmd.exe WScript.exe PID 1264 wrote to memory of 1656 1264 cmd.exe WScript.exe PID 1264 wrote to memory of 1656 1264 cmd.exe WScript.exe PID 1264 wrote to memory of 1656 1264 cmd.exe WScript.exe PID 628 wrote to memory of 2044 628 KINSTALLERS_66_4538.exe KINSTALLERS_66_4538.exe PID 628 wrote to memory of 2044 628 KINSTALLERS_66_4538.exe KINSTALLERS_66_4538.exe PID 628 wrote to memory of 2044 628 KINSTALLERS_66_4538.exe KINSTALLERS_66_4538.exe PID 628 wrote to memory of 2044 628 KINSTALLERS_66_4538.exe KINSTALLERS_66_4538.exe PID 628 wrote to memory of 2044 628 KINSTALLERS_66_4538.exe KINSTALLERS_66_4538.exe PID 628 wrote to memory of 2044 628 KINSTALLERS_66_4538.exe KINSTALLERS_66_4538.exe PID 628 wrote to memory of 2044 628 KINSTALLERS_66_4538.exe KINSTALLERS_66_4538.exe PID 2044 wrote to memory of 1160 2044 KINSTALLERS_66_4538.exe kavlog2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe"C:\Users\Admin\AppData\Local\Temp\2da1a40d86c8dc33f6851b1614b522cd2ca2f54f7d5f3ccf8fa38908db9271f3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\手机验证码接收系统.exe"C:\Users\Admin\AppData\Local\Temp\手机验证码接收系统.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\官方.exe"C:\Users\Admin\AppData\Local\Temp\官方.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\6C99.tmp\setup.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.15⤵
- Runs ping.exe
PID:636 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\123.VBS"5⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exe"C:\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\123.VBS"3⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exe"C:\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exe"C:\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exe" /s3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Registers COM server for autorun
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe" -install4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1160 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /autorun4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1100 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe"kwsprotect64.exe" (null)5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe" /autorun /std /skipcs34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /start kxescore4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:400
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescore1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
490KB
MD5290838609c8642c2abf090d3da761c55
SHA1098f842d4b153d0b88a52697a3e59015a27abc44
SHA256e7c1f57b2b2fe87141179f1ebd37029b55eeaf29935e83c029905adfbe86720b
SHA5128b364176192fd1c2b127044edea2fa1c9be1ba0973956ca534919ee88e2b56c92ad5ed8015569b22456a3b84be853d99bdc92cfd425b65b19009d709833ea5c7
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.exeFilesize
810KB
MD54734dad5ce705d7923b3f0c9f25063cd
SHA114f4526686f3eaa70754bd063478e7af23837995
SHA25631e09d3c1167df0aeb39db6be9e73dc4436902db0cd9add12278b562eea90f2e
SHA51259853710e47d0e99796c7cf0329758374f330aa5851e6110147d339fff4bc11b4986e712d5657824aee529dad49afd7602131ae6ad0d9c674c68cd157bbe9ac4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
257KB
MD53e58822b8ccc8de14a55ad7c47282f64
SHA1a5a8fc030d8e77226bd38253739e673a39c1361c
SHA25611be2f6ed17ab6a81add3928a1a86a1dca574b6b719b2b8c5b178f6e78735050
SHA512072f1ef77238658bfad844d0b848751646749bc7354ba795d1c5ed6b0bc82c2949b6c161e830903f719a52ca9065c4f9f017cb8eb2866307dd3b85d516e6576d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.5MB
MD5c01e1651e1fc4e519267294ceef9e3b9
SHA164ea52712fa6ba6e5722f6e2736ee75677ad83b2
SHA256d4163162cea8cbb759c0a5eed9491c6a71f3aa2bd988faca66288b919e0788ff
SHA512a0ed4aaf25ee6a286f0a3a201253472f4699f80521f4c888dcfcc451b593d2e990d53b9beefa10170cd1aacfff3f883f195de55c3cedcf974c1a678cec26331e
-
C:\Users\Admin\AppData\Local\Temp\123.VBSFilesize
398B
MD5b3515d5ceabbcf4ae352adf668e4aa26
SHA1cef8001c51225008419dcf98553ce4c8e693bb48
SHA256220776a333307c6f3ae27222bf5b916b3628647cbbe2b539c934423a6c6c4ecf
SHA51259db9b37e46220a9437bbbec5d8f977a02ca2c1430d3b3a6262fbf5792ea7dea8575396b0dfa6ea889d902f3439049ebd3dd1bca6efb89a690b4d105572237d5
-
C:\Users\Admin\AppData\Local\Temp\123.VBSFilesize
398B
MD5b3515d5ceabbcf4ae352adf668e4aa26
SHA1cef8001c51225008419dcf98553ce4c8e693bb48
SHA256220776a333307c6f3ae27222bf5b916b3628647cbbe2b539c934423a6c6c4ecf
SHA51259db9b37e46220a9437bbbec5d8f977a02ca2c1430d3b3a6262fbf5792ea7dea8575396b0dfa6ea889d902f3439049ebd3dd1bca6efb89a690b4d105572237d5
-
C:\Users\Admin\AppData\Local\Temp\6C99.tmp\setup.batFilesize
34B
MD5e1b9eb7f7d775d0d49d8ace123a88fc7
SHA1a97bd323f7ba1d85fa53360e85137fc16a4de204
SHA25611d81cc1aeebb5ef06dcf2b90bfdbec35d689a4776838882410f2aca3b00b101
SHA51250ab4c7295ece4f6712bc488fffea83fa24a296c6d6538a554a4bedc2a90f54f359e304f3bf3975a27157c41cb45132b839e1efcb1e930e7fbd2fe16d21b65b2
-
C:\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
C:\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
C:\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exeFilesize
30.1MB
MD5cc8ff25a6404a2a99af9c515850ab0d6
SHA19b1b235cf30cf848c257cb3a0199ae6be3f968c5
SHA256336493f13f3b205c1ec7898a0393cfe2765305dfedf1e90366cef185be1d9d03
SHA5122db0f4dada8fd8294ce12b9c795593a8da5a69507114650f5c8c2ec070c00b849bbb89e13976b8f52e544877b424c191cd87321ca7e31700d8e5471f571b6f93
-
C:\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exeFilesize
30.1MB
MD5cc8ff25a6404a2a99af9c515850ab0d6
SHA19b1b235cf30cf848c257cb3a0199ae6be3f968c5
SHA256336493f13f3b205c1ec7898a0393cfe2765305dfedf1e90366cef185be1d9d03
SHA5122db0f4dada8fd8294ce12b9c795593a8da5a69507114650f5c8c2ec070c00b849bbb89e13976b8f52e544877b424c191cd87321ca7e31700d8e5471f571b6f93
-
C:\Users\Admin\AppData\Local\Temp\官方.exeFilesize
21KB
MD55a76883d66f3d880ca3e6a69ad693013
SHA1d8f8177aedeb1e9779b88ff464251e2fb2e0b3f6
SHA25668d447639d7a0588c7ac29506ae66a41006c3922ef32adc6bb2da43556a6b3e5
SHA512dd93083e312768a3efa630734f53eb3180552a882095cda8ab4115a91c836e4b3e5a24412de4f53a9ab064f8dc64002079a8ae6556df1980881c68475d3bde02
-
C:\Users\Admin\AppData\Local\Temp\手机验证码接收系统.exeFilesize
456KB
MD5653564b090dac7f2896856c54dc17312
SHA17d1c31329d59ceb766e45c340b21985ea8d149b5
SHA256d04412c4cbcc986ccfd847bda6de2dedf97c1ac5da8a9318048e14a4f62f45dc
SHA512c7c17866a9d0f10aea21a66efade0e9c419eaf0ccccfb3826e736101691ed07c06e18b186db06cdaf2402f15ab9b428c9e18cd4ab0157a82d246858bb1f24f0a
-
C:\Users\Admin\AppData\Local\Temp\手机验证码接收系统.exeFilesize
456KB
MD5653564b090dac7f2896856c54dc17312
SHA17d1c31329d59ceb766e45c340b21985ea8d149b5
SHA256d04412c4cbcc986ccfd847bda6de2dedf97c1ac5da8a9318048e14a4f62f45dc
SHA512c7c17866a9d0f10aea21a66efade0e9c419eaf0ccccfb3826e736101691ed07c06e18b186db06cdaf2402f15ab9b428c9e18cd4ab0157a82d246858bb1f24f0a
-
C:\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exeFilesize
772KB
MD513e8c8ed061b041e160c496fe8eb4ff2
SHA1cf65914ea3c6743b4d1c916c402c0f95f21498f4
SHA25652a5fb7bbc26d536cad0ff7a9474aa27f9f4ad039f9489fb6fe8ce44a315fc25
SHA512c590dbfd6c6b13c1057d6fa8f981a233d2cdb1e775f037ba23127234d8d677dacc8582adf8d50051b2b2aba214e31cb6c430797372b49ff59605253e5068c1de
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\MSVCP80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\MSVCR80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
490KB
MD5290838609c8642c2abf090d3da761c55
SHA1098f842d4b153d0b88a52697a3e59015a27abc44
SHA256e7c1f57b2b2fe87141179f1ebd37029b55eeaf29935e83c029905adfbe86720b
SHA5128b364176192fd1c2b127044edea2fa1c9be1ba0973956ca534919ee88e2b56c92ad5ed8015569b22456a3b84be853d99bdc92cfd425b65b19009d709833ea5c7
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
257KB
MD53e58822b8ccc8de14a55ad7c47282f64
SHA1a5a8fc030d8e77226bd38253739e673a39c1361c
SHA25611be2f6ed17ab6a81add3928a1a86a1dca574b6b719b2b8c5b178f6e78735050
SHA512072f1ef77238658bfad844d0b848751646749bc7354ba795d1c5ed6b0bc82c2949b6c161e830903f719a52ca9065c4f9f017cb8eb2866307dd3b85d516e6576d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
490KB
MD5290838609c8642c2abf090d3da761c55
SHA1098f842d4b153d0b88a52697a3e59015a27abc44
SHA256e7c1f57b2b2fe87141179f1ebd37029b55eeaf29935e83c029905adfbe86720b
SHA5128b364176192fd1c2b127044edea2fa1c9be1ba0973956ca534919ee88e2b56c92ad5ed8015569b22456a3b84be853d99bdc92cfd425b65b19009d709833ea5c7
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
490KB
MD5290838609c8642c2abf090d3da761c55
SHA1098f842d4b153d0b88a52697a3e59015a27abc44
SHA256e7c1f57b2b2fe87141179f1ebd37029b55eeaf29935e83c029905adfbe86720b
SHA5128b364176192fd1c2b127044edea2fa1c9be1ba0973956ca534919ee88e2b56c92ad5ed8015569b22456a3b84be853d99bdc92cfd425b65b19009d709833ea5c7
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kavmenu.dllFilesize
42KB
MD58d9f203a21f2763e51ed097286bf34fa
SHA13f19728df55fd05a72b12941b6f530cfaafc1a30
SHA25605e2a3fa3506b8e6d66adbb9841672de18e7ea93fda41c6b7bc2cff78b5ebb36
SHA5124fecd387165d3b83eed70778943c7e9eca27a9fe04b969b2d8e8946b1e20148d523d1f1ad33ce9d0eead21f3b395906d493ad7a76c87e87e41c070a63916f963
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.exeFilesize
810KB
MD54734dad5ce705d7923b3f0c9f25063cd
SHA114f4526686f3eaa70754bd063478e7af23837995
SHA25631e09d3c1167df0aeb39db6be9e73dc4436902db0cd9add12278b562eea90f2e
SHA51259853710e47d0e99796c7cf0329758374f330aa5851e6110147d339fff4bc11b4986e712d5657824aee529dad49afd7602131ae6ad0d9c674c68cd157bbe9ac4
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kismain.exeFilesize
48KB
MD5e548600f13852b8e4129aa4374b0e63a
SHA1b1fef095037036563b7efe84c8eefd4bccc6d28a
SHA2561535653c46a634da3fa6b81ad22a1f879e0182db77008780de066e19e5cefdb8
SHA5121434905f06f53a87e9ef4b8b9fc6f4d06316cb3d5ae8473fe6a33949418678065c276b19988de30a230c397dd86a7bc61c267ad777ae1cc666a003d061b0d85c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kismain.exeFilesize
48KB
MD5e548600f13852b8e4129aa4374b0e63a
SHA1b1fef095037036563b7efe84c8eefd4bccc6d28a
SHA2561535653c46a634da3fa6b81ad22a1f879e0182db77008780de066e19e5cefdb8
SHA5121434905f06f53a87e9ef4b8b9fc6f4d06316cb3d5ae8473fe6a33949418678065c276b19988de30a230c397dd86a7bc61c267ad777ae1cc666a003d061b0d85c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\krecycle.exeFilesize
488KB
MD5c998909a8982c328a18f84e140665373
SHA187313728230bd13335dfccf005d48786ac81f2b3
SHA2568278d11df7336ec5e8e73e4ea2b738ac39f0aefe1c2bad280eb7bd7d359beb0d
SHA5128d73a38a93816f2520306af07e60f16bcf6de22d8c11e21c6267ec689c99a731023206a0ebf900650174a569d51711ec503b1eed29acd4856c9197ee4cdc740c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
257KB
MD53e58822b8ccc8de14a55ad7c47282f64
SHA1a5a8fc030d8e77226bd38253739e673a39c1361c
SHA25611be2f6ed17ab6a81add3928a1a86a1dca574b6b719b2b8c5b178f6e78735050
SHA512072f1ef77238658bfad844d0b848751646749bc7354ba795d1c5ed6b0bc82c2949b6c161e830903f719a52ca9065c4f9f017cb8eb2866307dd3b85d516e6576d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
257KB
MD53e58822b8ccc8de14a55ad7c47282f64
SHA1a5a8fc030d8e77226bd38253739e673a39c1361c
SHA25611be2f6ed17ab6a81add3928a1a86a1dca574b6b719b2b8c5b178f6e78735050
SHA512072f1ef77238658bfad844d0b848751646749bc7354ba795d1c5ed6b0bc82c2949b6c161e830903f719a52ca9065c4f9f017cb8eb2866307dd3b85d516e6576d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
257KB
MD53e58822b8ccc8de14a55ad7c47282f64
SHA1a5a8fc030d8e77226bd38253739e673a39c1361c
SHA25611be2f6ed17ab6a81add3928a1a86a1dca574b6b719b2b8c5b178f6e78735050
SHA512072f1ef77238658bfad844d0b848751646749bc7354ba795d1c5ed6b0bc82c2949b6c161e830903f719a52ca9065c4f9f017cb8eb2866307dd3b85d516e6576d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
257KB
MD53e58822b8ccc8de14a55ad7c47282f64
SHA1a5a8fc030d8e77226bd38253739e673a39c1361c
SHA25611be2f6ed17ab6a81add3928a1a86a1dca574b6b719b2b8c5b178f6e78735050
SHA512072f1ef77238658bfad844d0b848751646749bc7354ba795d1c5ed6b0bc82c2949b6c161e830903f719a52ca9065c4f9f017cb8eb2866307dd3b85d516e6576d
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.5MB
MD5c01e1651e1fc4e519267294ceef9e3b9
SHA164ea52712fa6ba6e5722f6e2736ee75677ad83b2
SHA256d4163162cea8cbb759c0a5eed9491c6a71f3aa2bd988faca66288b919e0788ff
SHA512a0ed4aaf25ee6a286f0a3a201253472f4699f80521f4c888dcfcc451b593d2e990d53b9beefa10170cd1aacfff3f883f195de55c3cedcf974c1a678cec26331e
-
\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.5MB
MD5c01e1651e1fc4e519267294ceef9e3b9
SHA164ea52712fa6ba6e5722f6e2736ee75677ad83b2
SHA256d4163162cea8cbb759c0a5eed9491c6a71f3aa2bd988faca66288b919e0788ff
SHA512a0ed4aaf25ee6a286f0a3a201253472f4699f80521f4c888dcfcc451b593d2e990d53b9beefa10170cd1aacfff3f883f195de55c3cedcf974c1a678cec26331e
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\Program Files (x86)\kingsoft\kingsoft antivirus\security\kavbootc.sysFilesize
27KB
MD5725d897352ec1bb8ea219282b343e5af
SHA15f4e986d09cc211f916be0b89d0199077010c178
SHA256fbb90272c9a4cf87eb0495edcf38c922e9a71c12ea2b197d8011c309ff12477e
SHA5122b2962a869605dfeb2f20252f4dceb31a5e09c377440174079d7f50639eb4bed5a68f26420c73d28494d41ceb06581a9952543aeff13b2822040e55c6ad2cb7f
-
\Program Files (x86)\kingsoft\kingsoft antivirus\security\kavbootc.sysFilesize
27KB
MD5725d897352ec1bb8ea219282b343e5af
SHA15f4e986d09cc211f916be0b89d0199077010c178
SHA256fbb90272c9a4cf87eb0495edcf38c922e9a71c12ea2b197d8011c309ff12477e
SHA5122b2962a869605dfeb2f20252f4dceb31a5e09c377440174079d7f50639eb4bed5a68f26420c73d28494d41ceb06581a9952543aeff13b2822040e55c6ad2cb7f
-
\Program Files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sysFilesize
207KB
MD55386705763928234bbf1e9ec8fb2f185
SHA19654babee332cd26c5d4d63134f638217a2378af
SHA256fb065a5a3a9d003d6493a5a7fc596088fbb5fdff7da479d4d62b7aeb77b62c6a
SHA51238bf550aebffd3c909f85ca7b0d08239e4f418e1811f71a564ade22712b36c44162164e16b28c0178f40b5fbc79fc34cafcd292a7d355de0533fd6b80e231753
-
\Program Files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sysFilesize
207KB
MD55386705763928234bbf1e9ec8fb2f185
SHA19654babee332cd26c5d4d63134f638217a2378af
SHA256fb065a5a3a9d003d6493a5a7fc596088fbb5fdff7da479d4d62b7aeb77b62c6a
SHA51238bf550aebffd3c909f85ca7b0d08239e4f418e1811f71a564ade22712b36c44162164e16b28c0178f40b5fbc79fc34cafcd292a7d355de0533fd6b80e231753
-
\Program Files (x86)\kingsoft\kingsoft antivirus\uni0nst.exeFilesize
928KB
MD54f25cf6214541a226aeb769754dcb54b
SHA1a3ad738d23e04408cbc0187074319d86b7cd13e5
SHA256b280c3af39070195b1808ed89c36ddcd837f0f261434ceac1285ad21abca0966
SHA51261ca019a6bf146adf9ac48b9c959b247e00788dfa017e083ec01a3008f19d9173beb6327e0ef96fdcf89c41e68cb4df6f4d7995ed7c1909b80dcda6600f86861
-
\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
\Users\Admin\AppData\Local\Temp\KINSTALLERS_66_4538.exeFilesize
58KB
MD5f729d886356835c780a1ec4486f60576
SHA140fafe8a61965919a4cc32a079ec5747fdddcd3e
SHA2567ae1beac54fb6511a53be696006ed0fbe1e0bfb76dd9b68f135e97ccf0ccde2e
SHA512fcacc65d9154e262fcc790945becc673d8eb98410231d521249257e9c3e4c2dfc01854e7c7a86e39e68fa7024859f888cdf3f2cbb820dc068998fc5b506996c8
-
\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exeFilesize
30.1MB
MD5cc8ff25a6404a2a99af9c515850ab0d6
SHA19b1b235cf30cf848c257cb3a0199ae6be3f968c5
SHA256336493f13f3b205c1ec7898a0393cfe2765305dfedf1e90366cef185be1d9d03
SHA5122db0f4dada8fd8294ce12b9c795593a8da5a69507114650f5c8c2ec070c00b849bbb89e13976b8f52e544877b424c191cd87321ca7e31700d8e5471f571b6f93
-
\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exeFilesize
30.1MB
MD5cc8ff25a6404a2a99af9c515850ab0d6
SHA19b1b235cf30cf848c257cb3a0199ae6be3f968c5
SHA256336493f13f3b205c1ec7898a0393cfe2765305dfedf1e90366cef185be1d9d03
SHA5122db0f4dada8fd8294ce12b9c795593a8da5a69507114650f5c8c2ec070c00b849bbb89e13976b8f52e544877b424c191cd87321ca7e31700d8e5471f571b6f93
-
\Users\Admin\AppData\Local\Temp\kingsoftkonline\KINSTALLERS_66_4538.exeFilesize
30.1MB
MD5cc8ff25a6404a2a99af9c515850ab0d6
SHA19b1b235cf30cf848c257cb3a0199ae6be3f968c5
SHA256336493f13f3b205c1ec7898a0393cfe2765305dfedf1e90366cef185be1d9d03
SHA5122db0f4dada8fd8294ce12b9c795593a8da5a69507114650f5c8c2ec070c00b849bbb89e13976b8f52e544877b424c191cd87321ca7e31700d8e5471f571b6f93
-
\Users\Admin\AppData\Local\Temp\官方.exeFilesize
21KB
MD55a76883d66f3d880ca3e6a69ad693013
SHA1d8f8177aedeb1e9779b88ff464251e2fb2e0b3f6
SHA25668d447639d7a0588c7ac29506ae66a41006c3922ef32adc6bb2da43556a6b3e5
SHA512dd93083e312768a3efa630734f53eb3180552a882095cda8ab4115a91c836e4b3e5a24412de4f53a9ab064f8dc64002079a8ae6556df1980881c68475d3bde02
-
\Users\Admin\AppData\Local\Temp\官方.exeFilesize
21KB
MD55a76883d66f3d880ca3e6a69ad693013
SHA1d8f8177aedeb1e9779b88ff464251e2fb2e0b3f6
SHA25668d447639d7a0588c7ac29506ae66a41006c3922ef32adc6bb2da43556a6b3e5
SHA512dd93083e312768a3efa630734f53eb3180552a882095cda8ab4115a91c836e4b3e5a24412de4f53a9ab064f8dc64002079a8ae6556df1980881c68475d3bde02
-
\Users\Admin\AppData\Local\Temp\官方.exeFilesize
21KB
MD55a76883d66f3d880ca3e6a69ad693013
SHA1d8f8177aedeb1e9779b88ff464251e2fb2e0b3f6
SHA25668d447639d7a0588c7ac29506ae66a41006c3922ef32adc6bb2da43556a6b3e5
SHA512dd93083e312768a3efa630734f53eb3180552a882095cda8ab4115a91c836e4b3e5a24412de4f53a9ab064f8dc64002079a8ae6556df1980881c68475d3bde02
-
\Users\Admin\AppData\Local\Temp\官方.exeFilesize
21KB
MD55a76883d66f3d880ca3e6a69ad693013
SHA1d8f8177aedeb1e9779b88ff464251e2fb2e0b3f6
SHA25668d447639d7a0588c7ac29506ae66a41006c3922ef32adc6bb2da43556a6b3e5
SHA512dd93083e312768a3efa630734f53eb3180552a882095cda8ab4115a91c836e4b3e5a24412de4f53a9ab064f8dc64002079a8ae6556df1980881c68475d3bde02
-
\Users\Admin\AppData\Local\Temp\手机验证码接收系统.exeFilesize
456KB
MD5653564b090dac7f2896856c54dc17312
SHA17d1c31329d59ceb766e45c340b21985ea8d149b5
SHA256d04412c4cbcc986ccfd847bda6de2dedf97c1ac5da8a9318048e14a4f62f45dc
SHA512c7c17866a9d0f10aea21a66efade0e9c419eaf0ccccfb3826e736101691ed07c06e18b186db06cdaf2402f15ab9b428c9e18cd4ab0157a82d246858bb1f24f0a
-
\Users\Admin\AppData\Local\Temp\手机验证码接收系统.exeFilesize
456KB
MD5653564b090dac7f2896856c54dc17312
SHA17d1c31329d59ceb766e45c340b21985ea8d149b5
SHA256d04412c4cbcc986ccfd847bda6de2dedf97c1ac5da8a9318048e14a4f62f45dc
SHA512c7c17866a9d0f10aea21a66efade0e9c419eaf0ccccfb3826e736101691ed07c06e18b186db06cdaf2402f15ab9b428c9e18cd4ab0157a82d246858bb1f24f0a
-
\Users\Admin\AppData\Local\Temp\手机验证码接收系统.exeFilesize
456KB
MD5653564b090dac7f2896856c54dc17312
SHA17d1c31329d59ceb766e45c340b21985ea8d149b5
SHA256d04412c4cbcc986ccfd847bda6de2dedf97c1ac5da8a9318048e14a4f62f45dc
SHA512c7c17866a9d0f10aea21a66efade0e9c419eaf0ccccfb3826e736101691ed07c06e18b186db06cdaf2402f15ab9b428c9e18cd4ab0157a82d246858bb1f24f0a
-
\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exeFilesize
772KB
MD513e8c8ed061b041e160c496fe8eb4ff2
SHA1cf65914ea3c6743b4d1c916c402c0f95f21498f4
SHA25652a5fb7bbc26d536cad0ff7a9474aa27f9f4ad039f9489fb6fe8ce44a315fc25
SHA512c590dbfd6c6b13c1057d6fa8f981a233d2cdb1e775f037ba23127234d8d677dacc8582adf8d50051b2b2aba214e31cb6c430797372b49ff59605253e5068c1de
-
\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exeFilesize
772KB
MD513e8c8ed061b041e160c496fe8eb4ff2
SHA1cf65914ea3c6743b4d1c916c402c0f95f21498f4
SHA25652a5fb7bbc26d536cad0ff7a9474aa27f9f4ad039f9489fb6fe8ce44a315fc25
SHA512c590dbfd6c6b13c1057d6fa8f981a233d2cdb1e775f037ba23127234d8d677dacc8582adf8d50051b2b2aba214e31cb6c430797372b49ff59605253e5068c1de
-
\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exeFilesize
772KB
MD513e8c8ed061b041e160c496fe8eb4ff2
SHA1cf65914ea3c6743b4d1c916c402c0f95f21498f4
SHA25652a5fb7bbc26d536cad0ff7a9474aa27f9f4ad039f9489fb6fe8ce44a315fc25
SHA512c590dbfd6c6b13c1057d6fa8f981a233d2cdb1e775f037ba23127234d8d677dacc8582adf8d50051b2b2aba214e31cb6c430797372b49ff59605253e5068c1de
-
\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exeFilesize
772KB
MD513e8c8ed061b041e160c496fe8eb4ff2
SHA1cf65914ea3c6743b4d1c916c402c0f95f21498f4
SHA25652a5fb7bbc26d536cad0ff7a9474aa27f9f4ad039f9489fb6fe8ce44a315fc25
SHA512c590dbfd6c6b13c1057d6fa8f981a233d2cdb1e775f037ba23127234d8d677dacc8582adf8d50051b2b2aba214e31cb6c430797372b49ff59605253e5068c1de
-
\Users\Admin\AppData\Local\Temp\淘宝客PID劫持器.exeFilesize
772KB
MD513e8c8ed061b041e160c496fe8eb4ff2
SHA1cf65914ea3c6743b4d1c916c402c0f95f21498f4
SHA25652a5fb7bbc26d536cad0ff7a9474aa27f9f4ad039f9489fb6fe8ce44a315fc25
SHA512c590dbfd6c6b13c1057d6fa8f981a233d2cdb1e775f037ba23127234d8d677dacc8582adf8d50051b2b2aba214e31cb6c430797372b49ff59605253e5068c1de
-
memory/400-135-0x0000000000000000-mapping.dmp
-
memory/540-207-0x0000000000000000-mapping.dmp
-
memory/628-65-0x0000000000000000-mapping.dmp
-
memory/636-93-0x0000000000000000-mapping.dmp
-
memory/800-94-0x0000000000000000-mapping.dmp
-
memory/860-98-0x00000000022A0000-0x00000000022B0000-memory.dmpFilesize
64KB
-
memory/860-58-0x0000000000000000-mapping.dmp
-
memory/860-96-0x0000000000A50000-0x0000000000A60000-memory.dmpFilesize
64KB
-
memory/860-101-0x0000000003150000-0x0000000003221000-memory.dmpFilesize
836KB
-
memory/860-97-0x0000000000A50000-0x0000000000A60000-memory.dmpFilesize
64KB
-
memory/1100-159-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/1100-190-0x00000000047D0000-0x0000000004918000-memory.dmpFilesize
1.3MB
-
memory/1100-177-0x0000000003D10000-0x0000000003F42000-memory.dmpFilesize
2.2MB
-
memory/1100-181-0x0000000002240000-0x0000000002251000-memory.dmpFilesize
68KB
-
memory/1100-168-0x00000000024B0000-0x00000000025F3000-memory.dmpFilesize
1.3MB
-
memory/1100-213-0x0000000002240000-0x0000000002251000-memory.dmpFilesize
68KB
-
memory/1100-130-0x0000000000000000-mapping.dmp
-
memory/1100-182-0x000000000224F000-0x0000000002254000-memory.dmpFilesize
20KB
-
memory/1100-164-0x0000000002210000-0x000000000223A000-memory.dmpFilesize
168KB
-
memory/1100-175-0x0000000003480000-0x0000000003D08000-memory.dmpFilesize
8.5MB
-
memory/1100-161-0x00000000021A0000-0x00000000021CA000-memory.dmpFilesize
168KB
-
memory/1100-158-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/1100-197-0x0000000004EC0000-0x0000000004F16000-memory.dmpFilesize
344KB
-
memory/1100-194-0x0000000004BF0000-0x0000000004CA7000-memory.dmpFilesize
732KB
-
memory/1100-192-0x0000000004920000-0x0000000004961000-memory.dmpFilesize
260KB
-
memory/1160-127-0x0000000000000000-mapping.dmp
-
memory/1248-54-0x0000000075351000-0x0000000075353000-memory.dmpFilesize
8KB
-
memory/1264-88-0x0000000000000000-mapping.dmp
-
memory/1476-156-0x0000000002170000-0x000000000218A000-memory.dmpFilesize
104KB
-
memory/1476-170-0x0000000002980000-0x0000000002AC3000-memory.dmpFilesize
1.3MB
-
memory/1476-141-0x0000000000000000-mapping.dmp
-
memory/1512-77-0x0000000000000000-mapping.dmp
-
memory/1512-115-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1512-99-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1592-86-0x0000000000000000-mapping.dmp
-
memory/1592-102-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/1656-103-0x0000000000000000-mapping.dmp
-
memory/1996-188-0x0000000002A60000-0x0000000002B12000-memory.dmpFilesize
712KB
-
memory/1996-157-0x00000000002F0000-0x0000000000300000-memory.dmpFilesize
64KB
-
memory/1996-179-0x0000000002DB0000-0x0000000002EEF000-memory.dmpFilesize
1.2MB
-
memory/1996-171-0x0000000001050000-0x0000000001061000-memory.dmpFilesize
68KB
-
memory/1996-169-0x0000000000380000-0x000000000038E000-memory.dmpFilesize
56KB
-
memory/1996-185-0x0000000001C10000-0x0000000001C66000-memory.dmpFilesize
344KB
-
memory/1996-187-0x00000000010F0000-0x000000000110A000-memory.dmpFilesize
104KB
-
memory/1996-166-0x0000000001020000-0x000000000104A000-memory.dmpFilesize
168KB
-
memory/1996-160-0x0000000000AF0000-0x0000000000B1A000-memory.dmpFilesize
168KB
-
memory/1996-172-0x0000000001090000-0x00000000010A2000-memory.dmpFilesize
72KB
-
memory/1996-212-0x0000000001050000-0x0000000001061000-memory.dmpFilesize
68KB
-
memory/1996-205-0x00000000030E0000-0x000000000312D000-memory.dmpFilesize
308KB
-
memory/1996-196-0x0000000003420000-0x0000000003476000-memory.dmpFilesize
344KB
-
memory/1996-200-0x0000000003EA0000-0x0000000003F1D000-memory.dmpFilesize
500KB
-
memory/2044-113-0x0000000000400000-0x0000000000575000-memory.dmpFilesize
1.5MB
-
memory/2044-204-0x0000000000400000-0x0000000000575000-memory.dmpFilesize
1.5MB
-
memory/2044-112-0x0000000000580000-0x00000000006F5000-memory.dmpFilesize
1.5MB
-
memory/2044-106-0x0000000000000000-mapping.dmp
-
memory/2044-114-0x0000000000580000-0x00000000006F5000-memory.dmpFilesize
1.5MB