Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 04:54
Static task
static1
Behavioral task
behavioral1
Sample
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe
Resource
win7-20230220-en
General
-
Target
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe
-
Size
2.8MB
-
MD5
3d5296fdc54537f00ad5c4d13413135f
-
SHA1
374021fc54737ec0b3aaac03803b35511f01584c
-
SHA256
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b
-
SHA512
d446ea63e6d3828fb7eb71d6940b638f632e58bd8909b72ce67927735cbd0b40eb3c877a030b473237ec8700ba41e981bbff320b62bc9b8a4c37cca083e768b3
-
SSDEEP
49152:vPgSCgaih1zKkD8zGqpZEDSF4wHF016k4xIUESmlwdib2c:vPgSCgaihRKkD8zGqpZEOF3uFJYGb2c
Malware Config
Signatures
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 19 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exekxescore.exedescription ioc process File created C:\Windows\system32\drivers\ksapi_ev.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\ksskrpr.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisnetmxp.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisnetm_ev.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\ksapi64.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\ksapi.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\ksapi64_ev.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File opened for modification C:\Windows\system32\drivers\kisknl.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisknl64_ev.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisnetm64_ev.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisnetm.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File opened for modification C:\Windows\SysWOW64\drivers\kisknl.sys kxescore.exe File created C:\Windows\system32\drivers\kisknl.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisknl64.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisknl_ev.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisknl.sys kxescore.exe File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created C:\Windows\system32\drivers\kisnetm64.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File opened for modification C:\Windows\system32\drivers\kisknl.sys kxescore.exe -
Sets file execution options in registry 2 TTPs 28 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksetupwiz.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SCOMREGSVRV8.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uninst.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSIGNSP.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlog2.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kdrvmgr.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krecycle.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksignsp.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kismain.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KXETRAY.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UNINST.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVLOG2.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KDRVMGR.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kisaddin.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSETUPWIZ.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxescore.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kiscall.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISCALL.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KRECYCLE.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISADDIN.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISMAIN.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxetray.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kislive.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kscan.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scomregsvrv8.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISLIVE.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSCAN.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KXESCORE.EXE be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Sets service image path in registry 2 TTPs 10 IoCs
Processes:
kxescore.exekxetray.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet004\services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\kxescore\ImagePath = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxescore.exe\" /service kxescore" kxetray.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet004\services\kxescore\ImagePath = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxescore.exe\" /service kxescore" kxetray.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxetray.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxetray.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\kxescore\ImagePath = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxescore.exe\" /service kxescore" kxetray.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\services\kxescore\ImagePath = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxescore.exe\" /service kxescore" kxetray.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kdb_semrjgj.dll acprotect C:\Users\Admin\AppData\Local\Temp\kdb_semrjgj.dll acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
kxetray.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation kxetray.exe -
Executes dropped EXE 23 IoCs
Processes:
KDbCIHelper.exekavlog2.exeksoftmgr.exekxetray.exekxescore.exekislive.exekxescore.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exercmdhelper.exekwsprotect64.exepid process 1864 KDbCIHelper.exe 2676 kavlog2.exe 4204 ksoftmgr.exe 3924 kxetray.exe 208 kxescore.exe 224 kislive.exe 464 kxescore.exe 924 rcmdhelper.exe 4012 rcmdhelper.exe 4576 rcmdhelper.exe 3632 rcmdhelper.exe 2724 rcmdhelper.exe 4408 rcmdhelper.exe 2700 rcmdhelper.exe 968 rcmdhelper.exe 3724 rcmdhelper.exe 4784 rcmdhelper.exe 2020 rcmdhelper.exe 1188 rcmdhelper.exe 5224 rcmdhelper.exe 5128 kwsprotect64.exe 2444 2332 -
Loads dropped DLL 64 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exekavlog2.exeksoftmgr.exekxetray.exekislive.exekxescore.exekxescore.exepid process 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 2676 kavlog2.exe 2676 kavlog2.exe 4204 ksoftmgr.exe 4204 ksoftmgr.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 224 kislive.exe 224 kislive.exe 224 kislive.exe 3924 kxetray.exe 3924 kxetray.exe 224 kislive.exe 224 kislive.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 208 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 224 kislive.exe 224 kislive.exe 464 kxescore.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\kdb_semrjgj.dll upx C:\Users\Admin\AppData\Local\Temp\kdb_semrjgj.dll upx behavioral2/memory/4120-164-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-206-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-210-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-211-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-212-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-220-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-866-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-1161-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-1167-0x0000000010000000-0x0000000010328000-memory.dmp upx behavioral2/memory/4120-1212-0x0000000010000000-0x0000000010328000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kxesc = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxetray.exe\" -autorun" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kxetray.exedescription ioc process File opened (read-only) \??\E: kxetray.exe File opened (read-only) \??\H: kxetray.exe File opened (read-only) \??\T: kxetray.exe File opened (read-only) \??\U: kxetray.exe File opened (read-only) \??\W: kxetray.exe File opened (read-only) \??\X: kxetray.exe File opened (read-only) \??\D: kxetray.exe File opened (read-only) \??\J: kxetray.exe File opened (read-only) \??\O: kxetray.exe File opened (read-only) \??\S: kxetray.exe File opened (read-only) \??\V: kxetray.exe File opened (read-only) \??\Q: kxetray.exe File opened (read-only) \??\G: kxetray.exe File opened (read-only) \??\K: kxetray.exe File opened (read-only) \??\N: kxetray.exe File opened (read-only) \??\P: kxetray.exe File opened (read-only) \??\R: kxetray.exe File opened (read-only) \??\Y: kxetray.exe File opened (read-only) \??\Z: kxetray.exe File opened (read-only) \??\F: kxetray.exe File opened (read-only) \??\I: kxetray.exe File opened (read-only) \??\L: kxetray.exe File opened (read-only) \??\M: kxetray.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exedescription ioc process File opened for modification \??\PhysicalDrive0 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Drops file in System32 directory 1 IoCs
Processes:
kavlog2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\KAVEventLog.EVT kavlog2.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
kxetray.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN kxetray.exe -
Drops file in Program Files directory 64 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exekxetray.exekxescore.exekislive.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\scan_virus.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\wifi_icon.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kvmpid2.kid be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kadblock\kadblockcfg.ini kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kadblock\InterRecodr.db kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\procinfo.dat kxescore.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\update\kav\kcom_khackfix\index.txt kislive.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_realtimeopt_green_btn.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_tianmao_icon0415.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\bredirect.dat be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\delaydownloader.dat be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksbwdet2.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatwinsetting.ini kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kincomingsoftpurifystate.dat kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\phonehelper_subicon.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\uninstall\trash_scan.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\skin\theme\sea.dubatheme be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\msvcp80.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\91000004.png kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmd_new_qq_music.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\speedtest.xml be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsu.dat be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kismain.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\lbhelper.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksnetm\kisnetm64_ev.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kfloatwin.log kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kseutil.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksskrpr.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ktool_update\kdownload\kav\ksoftmgrproxy.exe.z kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_bobo.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\scom.xml be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\deswitch.dat be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\se.dat be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kqsccfg.dat be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\skin\theme\space.dubatheme be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kcleaner.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\extendimg\4.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ktool_update\kdownload\kav\xlmodule\download\msvcp71.dll kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\pic\rcmdv2_roundicon_orange_btn.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\keasyipcn.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\knetworkpanel.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksreng3.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\update\kav\indexkav.datx kislive.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\skinicon\kfxspring_skin_img.png be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ks3rdhmpg32.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kfloatwin.log kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kclearak.dat_t kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ktool_update\kdownload\kav\xlmodule\download\download_engine.dll kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\gamemode\floatwingamemode.ini be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kismain.ini be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\kswitchlist.ini be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftpurifyengine.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\cfg\krcmddata.dat be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\denyip.krf be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kupdatesp.dll be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksnetm\kisnetm.sys be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kfc_dsu.dat-journal kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\softicon\softicon48\61000068.png kxetray.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kinstalledsoftpurifyrecord.dat kxetray.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\liectrl.config be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\broplugver.ini be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kis2live.exe.bak be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
kxetray.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kxetray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kxetray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz kxetray.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
kxetray.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName kxetray.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS kxetray.exe -
Processes:
ksoftmgr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" ksoftmgr.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\IESettingSync ksoftmgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" ksoftmgr.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch ksoftmgr.exe -
Modifies data under HKEY_USERS 42 IoCs
Processes:
kxescore.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates kxescore.exe -
Modifies registry class 57 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exekxescore.exekxetray.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}\PacketPath_0_0_1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kdb_semrjgj.dll" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\Shellex\ContextMenuHandlers\duba_64bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "2034698874" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shellex\ContextMenuHandlers\duba_64bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Shellex\ContextMenuHandlers\duba_64bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} kxescore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (int) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "2034698874" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA9B93A4-E208-4d8d-AC1D-BB8F00940D26} kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu.dll" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ThreadingModel = "Apartment" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4E1A90C5-52A6-494c-A81F-F38C632C77A2}\Test = "0" kxetray.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "v5uchytslfpsswfgf49xtnqj2kbk" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\ = "CKavMenuShell Class" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6F795A-6457-4603-A561-684CF512AC68} kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE82F604-65FC-4692-9D6E-3014CA28B8D6} kxetray.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4E1A90C5-52A6-494c-A81F-F38C632C77A2} kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "d5b4a58779425fa75aaf556d44eaed8f" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "v5uchytslfpsswfgf49xtnqj2kbk" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79B5BC47-CEA1-4772-B433-7D1B3139F278}\Implemented Categories\{607568DD-B059-434b-B7E7-38EC51998F8E}\did = "B98858A98A3DFC5118276DBD47849799" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} kxetray.exe -
Processes:
kxetray.exekxescore.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B94294BF91EA8FB64BE61097C7FB001359B676CB\Blob = 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 kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 kxetray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 kxetray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 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 kxescore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B94294BF91EA8FB64BE61097C7FB001359B676CB kxetray.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B94294BF91EA8FB64BE61097C7FB001359B676CB\Blob = 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 kxetray.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exekxetray.exekxescore.exekxescore.exercmdhelper.exepid process 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 3924 kxetray.exe 3924 kxetray.exe 208 kxescore.exe 208 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 464 kxescore.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 5224 rcmdhelper.exe 5224 rcmdhelper.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 3924 kxetray.exe 464 kxescore.exe 464 kxescore.exe -
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
pid process 652 652 652 652 652 -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exekislive.exekxetray.exekxescore.exedescription pid process Token: SeDebugPrivilege 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Token: SeDebugPrivilege 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Token: SeDebugPrivilege 224 kislive.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 464 kxescore.exe Token: SeDebugPrivilege 464 kxescore.exe Token: SeDebugPrivilege 464 kxescore.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeIncreaseQuotaPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 464 kxescore.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: 33 464 kxescore.exe Token: SeIncBasePriorityPrivilege 464 kxescore.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: 33 3924 kxetray.exe Token: SeIncBasePriorityPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe Token: SeDebugPrivilege 3924 kxetray.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exepid process 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exepid process 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
ksoftmgr.exekwsprotect64.exekxetray.exepid process 4204 ksoftmgr.exe 4204 ksoftmgr.exe 5128 kwsprotect64.exe 5128 kwsprotect64.exe 3924 kxetray.exe 3924 kxetray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exekxetray.exedescription pid process target process PID 4120 wrote to memory of 1864 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe KDbCIHelper.exe PID 4120 wrote to memory of 1864 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe KDbCIHelper.exe PID 4120 wrote to memory of 1864 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe KDbCIHelper.exe PID 4120 wrote to memory of 2676 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kavlog2.exe PID 4120 wrote to memory of 2676 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kavlog2.exe PID 4120 wrote to memory of 2676 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kavlog2.exe PID 4120 wrote to memory of 4204 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe ksoftmgr.exe PID 4120 wrote to memory of 4204 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe ksoftmgr.exe PID 4120 wrote to memory of 4204 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe ksoftmgr.exe PID 4120 wrote to memory of 3924 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kxetray.exe PID 4120 wrote to memory of 3924 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kxetray.exe PID 4120 wrote to memory of 3924 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kxetray.exe PID 4120 wrote to memory of 208 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kxescore.exe PID 4120 wrote to memory of 208 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kxescore.exe PID 4120 wrote to memory of 208 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kxescore.exe PID 4120 wrote to memory of 224 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kislive.exe PID 4120 wrote to memory of 224 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kislive.exe PID 4120 wrote to memory of 224 4120 be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe kislive.exe PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE PID 3924 wrote to memory of 2416 3924 kxetray.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe"C:\Users\Admin\AppData\Local\Temp\be6a0c38db27a1c66132519bc9f99317e50a8edc8676307e53d8827e9f6abd5b.exe"2⤵
- Drops file in Drivers directory
- Sets file execution options in registry
- Loads dropped DLL
- Registers COM server for autorun
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\KDbCIHelper.exe"C:\Users\Admin\AppData\Local\Temp\KDbCIHelper.exe" -release3⤵
- Executes dropped EXE
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe" -install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exe" -preload3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /autorun /hidefloatwin /silentinstrcmd3⤵
- Sets service image path in registry
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updateliebaowifi4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -updatetaguser4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskcanrcmd4⤵
- Executes dropped EXE
-
C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe"C:\program files (x86)\kingsoft\kingsoft antivirus\rcmdhelper.exe" -kdeskreport4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe"kwsprotect64.exe" (null)4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe" /autorun /std /skipcs33⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /start kxescore3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescore1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\bdmisc.datFilesize
58B
MD5c24f18806b761335f45bd4a3091b63e6
SHA156edd686af56e0c2937eab46af0beda35ff73e77
SHA25674d59cd6703f2fbe43b7a8eca6d1c58e8d68647a420916bc0957285502251ecf
SHA5128a502d26eec81a4c9c2d299cdcae2b2d2b013f8c81871f7dee3fffb2fb2a3c0ca7b73cc007fd3673ef27cfc9a5812c2a074503d8ab30676db6e25329e01a04f1
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\calendar\kcalendarsetting.iniFilesize
68B
MD5f02f0697dbe4ff406396e2f8993fa238
SHA1529ece07f46a23a8afca53103718239690b3aced
SHA2569366579a29cb11c991a44cfc60c1fdb10af802020315a4d2f2ec9ff71e7671c7
SHA51285fa218f130250df57ea8cc1edc430aa6af4a89752498116f8b8747c9946091bade9211831c4623913496bf0031e6e26a3b93e1c34c4855c89ba9e0d28b75ace
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\floatskin\user.iniFilesize
87B
MD5c9318f08636e02a4087b2f55f0e1001b
SHA158e41be9123f11ded38175314d8646f73db56d4a
SHA2560a3846d0b8365846b1588911278b86e31f2d029a65935d712f2f61c1d2b70251
SHA512764f8b97e6fc8c047490a81d573b08ec6c201ece34949ade7c95c4a4252b8e5f20bd47e46e831c3a10a905d7a4dd351f4122ecd25fc1d8edc49b8dcb22bfad70
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\floatwinsetting.iniFilesize
35B
MD5feeac5d6fbee0b26a583bb2e0e4df453
SHA1bacdddb967627db6a37dcf13299ca36fcb7e1a61
SHA2569291a221a60ecc514b128cc063612599a29b939221dc16c0641c25739c0a4c8c
SHA5127fd897d734b64517c0e450f3ad659c630759797d20c425a731add8752acfa4f9315b80036d9d05319fa589aabdd978112815584ae5ab00cd4641cd276bd27266
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\kinstalledsoft.datFilesize
3KB
MD5b90fa7bc91d1e16f5848e0b2f4cf2a8a
SHA168ab11aff796605048fd9210a79384927043f677
SHA2560af92749663d03d91b5c09df94cf1c6dbe3ac5daf2b8d6e5ac9bdeb7082a09ca
SHA5126deada2012da796fdb13b5a63acd29392d44252f37f5d750d7751cf498414f40206b0d080f68c66250ba8d1176fa604e66133211aa90d084bffb2792ddfee399
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\krcmdmon\index.datFilesize
3KB
MD5bd8a5bd45acb4f4232e3024e8f6708b6
SHA1f5eae1fae697923a824411ada631571c9ea5bfeb
SHA2569b4d725de88c45bcc61b8061a5696319226e89edf07485b56c7a5b6d8accc605
SHA512342295b4151adbb2f7bcf46913ff03a013614a1ed7bbf00caf950cfdb885961d3ea8e46bd1086829d1ba8d2d23d5a2ad7a083e9bb94b95a5655ec02db92eebb0
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\krcmdmon\pack\tip_2016_0920.datFilesize
91KB
MD5e40e4575ac7d74112cbcaa931c58cc2d
SHA1e711e264fdaa6e01e8447cbf49d2c76b3b466145
SHA25608df25aaaa521640f6e6c678f6e991c05fef327c4e9d82fcb09c3acc2c3be0c5
SHA512ae1322453dbac4f01998af6f993925a4a6799d3af34f6051d2f6ef0d776f1f91a8c14cbb4134b69419e6d8232143ce9b5b7ee6767b1a90ee11f3d5b581e85ad7
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\ksofticondownloader.datFilesize
26B
MD56565a7227042d878a6f35019de3c35c4
SHA1964b048d29f09f92c5882b3194b622f6312bf672
SHA256294b9aaf2e3bcd5e4694d164f30e727d5653301887f8f63de5c9e4232115a011
SHA51230d143a73529099b1e76a0630ca8e2798a6379ebcfc822b31617ba03e679ce969a14ee0e58e8a16c489238f059f20217f29014a59eece45de4b9fd9f5e34b085
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\rcmdlocal.datFilesize
146B
MD5adf6ce53718b3313dcfcf877e6db76f5
SHA1ef6e21ecb905edff93c920096b55b09d96aad04e
SHA256bc00f18c6234455df951c6cb0d19a175db5217679bafef53d29d987e46aedcf6
SHA51292a55fb93f6964eed499cc0ec5aba0ee37c92329dc99eab55158c06dea9171af95c7ad573378887a4fa333d1b2603eec399e2a4787e750a28ce3f5dbc562a552
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\push_type_record.datFilesize
128B
MD5e571e1128d9551bb0e56a984ad7dcd52
SHA1402547b5b148b7701ab1380974886cf4ca48c406
SHA2566b6903103bb98866f0861652578d7d3c59cf38056883382ef69a70e7c3d47b41
SHA512dfdffc10af4a19bc5ccdd23d96d6733c34b7c7f49ed212ff41adfabe9626a1f9a0911b47c300da9574d7fe09cc2e9854f79281807f7e3d99940ac2018abac61d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\data\rcmdv2sp01\push_type_record.datFilesize
270B
MD5b7d740a131ae693592a5d4a152029ec6
SHA188d84b81c6206bb7773d72ae93392d630b02c28d
SHA256f1d278a51be012804fe64bc1c89fff0384c45da6c42046f832a587447d50e67d
SHA5127ddec82d95e15e86bcdc3f671142e7ef878d9ba1732aa071a20a2d02229bc2155c674252f38c2aa3a69a98f475dcd795c86a4488c6f253ee9dface2e463b1f5d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kadblock\kadblockcfg.iniFilesize
225B
MD5df7a7f09e6efc85054458a312474d692
SHA141727cf523dd7979ff49dba2ca85c9b568ff4855
SHA256fbee6526cdfc3a098c136bbe68f5b7c16142e123dba02ea66ff8063056acca09
SHA512a79ff7f0264e76396eec73fd751d90f0c9a9a1ba111bb2e87a4d15057b48a0bf341bdefc4085b70ddfe4d7625ae18eddb62264b642282066f0dcd4199dd6f4be
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavevent.dllFilesize
90KB
MD580f899ca024ddcf5218a4fadeacaec54
SHA12756821bde2d8eb44b04da63afbf5496565ddf71
SHA2562a0d8c0778ef91c5e9f7ffac47a0e49a4055d50556895822d84adcbce9375c17
SHA512ae871718f3eb2bcdd4bc6d41a691e9684a98a022d0db9d9444470820847e648e369a5f0c7887dc31d6ffa51572634345fe2448c1defe8535eb79c30f8202f41f
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavevent.dllFilesize
90KB
MD580f899ca024ddcf5218a4fadeacaec54
SHA12756821bde2d8eb44b04da63afbf5496565ddf71
SHA2562a0d8c0778ef91c5e9f7ffac47a0e49a4055d50556895822d84adcbce9375c17
SHA512ae871718f3eb2bcdd4bc6d41a691e9684a98a022d0db9d9444470820847e648e369a5f0c7887dc31d6ffa51572634345fe2448c1defe8535eb79c30f8202f41f
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
522KB
MD5c7256e3f7702a3848f0259b3cbaf712d
SHA1d268660245346fc92c2832a47e84ae03e6f9ecda
SHA256009d63fbb8f3ab13c0a1a6559c83a493dffa1fbd63c1f243d0ca3f188e489bac
SHA512e9a8e458c82aab1b71618d2391df7a60809d0a711f35e7b45609c3335ab39ec13ff1ec67043781210503ac0f7cd5a836c96d422405b7e3b073ec19463eb2f91f
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavmenu.dllFilesize
181KB
MD5afe49a8d1f66320acd18cdf54ae11423
SHA144f2cd0a68c659f90d371b54deae0de41ddde98d
SHA25654b370fc596fe4bc32d4b71d371e2c077dd040f520e13d6722a254c95ae98d1a
SHA512f0a5e0f08af38d92d3adbae80c19be6e51e739f674a39d4a1aa9e460d8cfedcc9a2373575c83055b26688bf9196560d71cf9d8b5dee595a82b8f892e80a788dc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavmenu.dllFilesize
181KB
MD5afe49a8d1f66320acd18cdf54ae11423
SHA144f2cd0a68c659f90d371b54deae0de41ddde98d
SHA25654b370fc596fe4bc32d4b71d371e2c077dd040f520e13d6722a254c95ae98d1a
SHA512f0a5e0f08af38d92d3adbae80c19be6e51e739f674a39d4a1aa9e460d8cfedcc9a2373575c83055b26688bf9196560d71cf9d8b5dee595a82b8f892e80a788dc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kavmenu.dllFilesize
181KB
MD5afe49a8d1f66320acd18cdf54ae11423
SHA144f2cd0a68c659f90d371b54deae0de41ddde98d
SHA25654b370fc596fe4bc32d4b71d371e2c077dd040f520e13d6722a254c95ae98d1a
SHA512f0a5e0f08af38d92d3adbae80c19be6e51e739f674a39d4a1aa9e460d8cfedcc9a2373575c83055b26688bf9196560d71cf9d8b5dee595a82b8f892e80a788dc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kcmppinvoker.dllFilesize
180KB
MD59f70191eae1688db0d18f8d956a88383
SHA146c96305f5f33c1162609dc82f383db538cf428b
SHA2561f39d69c8efb14b77795c139ee76ecc5cb3d2bd16ef587efd996814c9151b664
SHA512017fb06d89268b5c6abb67890497e7edda46077da3dc3cfff322eb5e0ea475ca5796eea287e81fa3b01aa730dda8e705c8cb0e9a198ad419ac48287d29888f4f
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kcmppinvoker.dllFilesize
180KB
MD59f70191eae1688db0d18f8d956a88383
SHA146c96305f5f33c1162609dc82f383db538cf428b
SHA2561f39d69c8efb14b77795c139ee76ecc5cb3d2bd16ef587efd996814c9151b664
SHA512017fb06d89268b5c6abb67890497e7edda46077da3dc3cfff322eb5e0ea475ca5796eea287e81fa3b01aa730dda8e705c8cb0e9a198ad419ac48287d29888f4f
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\keasyipcn.dllFilesize
103KB
MD593743861a54413c1454845b3b6f50f4d
SHA1b0be47cde5aa95b5d911107bf1af98109a7bef74
SHA25663e3807a73157f64db94e975569597665ece35f7234137adc21fa62a85eaa5a0
SHA512a02707c680ddb5c1645fde212fc75e11b687d8dafddc83f7ae7824f8c425d2c13b1af0e3adb079de904e46d6f9477a6fc09fd6662643c1bc139cb496e873e83b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\keasyipcn.dllFilesize
103KB
MD593743861a54413c1454845b3b6f50f4d
SHA1b0be47cde5aa95b5d911107bf1af98109a7bef74
SHA25663e3807a73157f64db94e975569597665ece35f7234137adc21fa62a85eaa5a0
SHA512a02707c680ddb5c1645fde212fc75e11b687d8dafddc83f7ae7824f8c425d2c13b1af0e3adb079de904e46d6f9477a6fc09fd6662643c1bc139cb496e873e83b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.exeFilesize
1.2MB
MD56a001678ac0bee54a27191a7c72b0f56
SHA155bf2ad857a80ca60782c0c524e25c0963747788
SHA2567bad0cbcf9679723fdc5663ea20ff4d0c37a1bd292177ab40329ebcb0163dfcd
SHA5127873a235125288d83a617bc05b77d807e03558fba1f10d6efd5c02e10c256d2d6e7b56b40adadf50879ee40847454edf59afbdb9e640a52c6112d0abf6367a3b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.exeFilesize
1.2MB
MD56a001678ac0bee54a27191a7c72b0f56
SHA155bf2ad857a80ca60782c0c524e25c0963747788
SHA2567bad0cbcf9679723fdc5663ea20ff4d0c37a1bd292177ab40329ebcb0163dfcd
SHA5127873a235125288d83a617bc05b77d807e03558fba1f10d6efd5c02e10c256d2d6e7b56b40adadf50879ee40847454edf59afbdb9e640a52c6112d0abf6367a3b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.logFilesize
1KB
MD544296db606de2936b73f7bc6d1062ce0
SHA146b1d4f2b71230cb20128bcf655053fa3ee1bfc4
SHA256a249b751585dc539b9bf428403cd7d51f578de2432e0284602ea2c9166aa174e
SHA512eb85c71b016084836689770c58217b0243075fcf2b949b83112dadcdb5603280296398bb3274599b83921f9d55137b0993d6ff02469f448794a990838628c94b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kislive.logFilesize
8KB
MD55867c4f5f7d4f927a82eede0998a32cb
SHA1168ec87f8927ca0d1d90a1e41c27bef8f20d6a49
SHA256b8e79dab25329d7446ab290ce5a330e2551c6094bf4dc9c333dddba437b589df
SHA512546197bd3c3b4d68008989e8c9b8fc234e83231fa07125b2d1d7e8dca690c41a142818f6579a1c8d8f70964612e818cdc053ec3de9f67a2f4ffb01fbb48e8eff
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kpopclt.dllFilesize
213KB
MD51dd2c3ecae68a35cde2d586aa24e0f25
SHA1600f6a6af5b43a00c5ddd040a79afbeadba053cf
SHA256905fbcb0f93015941e884bd37b5d196788bc4422919fead4be12fbfd42fb5440
SHA512237f5623042dfab544458847cebe1a5f95bf83165d6155086378976b1082d7709b0fe8379ba15fff8ea39664ffe67546719983d27ce3e82cec6ac667e0f78145
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\krcmddown.dllFilesize
839KB
MD563360a028bf1d86ea9d2c1672ac589b8
SHA116f65a3584994c3cc6a090c19730f48867a199a2
SHA2566e6dc5e7f22804c4b08c02ba3ed11f1e4e948180728340a2e89e16743d01aafc
SHA512bb2fad365e7e66cbaab18f5d26a2cacf5043f68d32787037756bf5d01de0e689afd66b132784ba453c323729eecdca679e7c9885b02968a1000a089c72dd7bea
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\krcmdmon.dllFilesize
3.0MB
MD524f59f1f237405e05379d3a78495d0ab
SHA13120ba8fea94473abb7fd0b53b81089cb03d5e6b
SHA2564285af9a3b8473071dc6718678f2c4b1d2af447001b0bcb1b1395310c6d3718b
SHA512eb8261336a72caf5d794b4e13062c8b71bfcb0fdd326581667cb285608983849cb52f551340e9bc2202ced5a6f016adc8e4729d4449e62bf439b5845dca65594
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi64.dllFilesize
193KB
MD52e67447a0b7f3192d09290503b96b738
SHA1fccdb3ed95f71304e40b54c38c0d1a44b083c2e3
SHA2567441b31adbe9c1cdb5af51569b7b32218def2d691f7fad07d1e6be60a3a48041
SHA5121381828c17b1448b8321c2be0509e90742a9235063183bea850bbf940c133eda1b4e67a382750de44dc5a8afe28de05e2047c13ba21c286f9c29e184b2b58b9e
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi64.dllFilesize
193KB
MD52e67447a0b7f3192d09290503b96b738
SHA1fccdb3ed95f71304e40b54c38c0d1a44b083c2e3
SHA2567441b31adbe9c1cdb5af51569b7b32218def2d691f7fad07d1e6be60a3a48041
SHA5121381828c17b1448b8321c2be0509e90742a9235063183bea850bbf940c133eda1b4e67a382750de44dc5a8afe28de05e2047c13ba21c286f9c29e184b2b58b9e
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksapi64.dllFilesize
193KB
MD52e67447a0b7f3192d09290503b96b738
SHA1fccdb3ed95f71304e40b54c38c0d1a44b083c2e3
SHA2567441b31adbe9c1cdb5af51569b7b32218def2d691f7fad07d1e6be60a3a48041
SHA5121381828c17b1448b8321c2be0509e90742a9235063183bea850bbf940c133eda1b4e67a382750de44dc5a8afe28de05e2047c13ba21c286f9c29e184b2b58b9e
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kskinmgr.dllFilesize
975KB
MD59152c4b02a92bdc24dc63efc86fcbc4e
SHA13e0c9f8406e4ae94b10eab6ce0e66a46bd6e380a
SHA256aaa1aeab64e409bedc751009a8a55d9a081dfade787c6dc9d7272ac2a7489093
SHA512c42cd9deeaafbedd8782f870ece90fcfb8b84bc06e04be4c615d622533b7ec809b93029985f703dfe1c196bd4f8054b9b79180ccf59f7039f2834bcf84bf8de4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kskinmgr.dllFilesize
975KB
MD59152c4b02a92bdc24dc63efc86fcbc4e
SHA13e0c9f8406e4ae94b10eab6ce0e66a46bd6e380a
SHA256aaa1aeab64e409bedc751009a8a55d9a081dfade787c6dc9d7272ac2a7489093
SHA512c42cd9deeaafbedd8782f870ece90fcfb8b84bc06e04be4c615d622533b7ec809b93029985f703dfe1c196bd4f8054b9b79180ccf59f7039f2834bcf84bf8de4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exeFilesize
3.6MB
MD5ec97eb619fd07ba0aee6783eac3bcb47
SHA17f5788269192c59ad8cda179cbf3e5a4cc490972
SHA256699605488bf15f37a167d105f8550c43225ac309bc1b4321e42172e32f70fb42
SHA512e4f923235474b8df81ad407bc9a4e21e6ac6aaa0ae8f3fb3de13f4eb080d60d566035b52175214d416001caf7cf5c1484111799c43dea900aea9df3a87d4f272
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ktool_update\kdownload\indexkav.txtFilesize
286B
MD579e551281a25eab54d3ca4db9b9fc4bb
SHA14203fb44067678ee9cde0c075ee623cc2fff8156
SHA2561ac0d7af1391c35e97f9034277d3ad51bc59a015c93767d3660506eedde212fc
SHA5124a00c46f16d3ff45fb582ca1da81b216f309ae851fa7b070734d27769cf225b7b3bf81a93d882597ca2e1836398822c14f3ed8c69d8e377ece64209479e4ece3
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ktool_update\kdownload\kav\index.datFilesize
80KB
MD5155d5b2cc479531b451a3cd8257b26a2
SHA1b925730f446359016a387e134b22bc5ded1e63d7
SHA256ba39e3c3aab95dec44c266f05979ddaec128a5d03422a03ff296d37459c56f12
SHA5127a2730ddbd42219dd33bf1e9f0671cc375fc42cb02897aab4d89ac23525fbcbb2bde243626ceb90c781342e39c9d37a7d71194232b9f58354034fecd66c9e922
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ktool_update\kdownload\kav\index.txtFilesize
253KB
MD5eb6e86f61097a1599ad0954597f8efbf
SHA1ec56cf68b2718e494794489472693df7ece064db
SHA256c77dbab36ec7b62dcb5f4c67d58a200842eebce60ee88c4e72e21990ef1aa881
SHA512a745758abc01b2a4cd1d86f8b59b158fc905ac0299c969e62cb63e0b53234ba9f80c8a7e3a999c55b6514f04c3d0c72fa9c25631a7d988c7ba40238ff720879a
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kuidsrv.dllFilesize
461KB
MD5665ba4f0adcec026db80a191cbb92618
SHA17162645603079e9a1a2b77b7c48daec8ae180299
SHA256bf088cc30af2d93728726f668511cfcb38c609b8b4771f599a4ad747ae61e7e8
SHA512fb4a924dc2b4bd145e364a024c47bbbbab188d4a9b2c0d630894b971fa556d5fc600b1482ab95be1f7e8be2715ad4528602a5c020c355f755362f09eefba146b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kuidsrv.dllFilesize
461KB
MD5665ba4f0adcec026db80a191cbb92618
SHA17162645603079e9a1a2b77b7c48daec8ae180299
SHA256bf088cc30af2d93728726f668511cfcb38c609b8b4771f599a4ad747ae61e7e8
SHA512fb4a924dc2b4bd145e364a024c47bbbbab188d4a9b2c0d630894b971fa556d5fc600b1482ab95be1f7e8be2715ad4528602a5c020c355f755362f09eefba146b
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kwhrequestor.dllFilesize
617KB
MD5a7405a1e67e65e1fc8b6bff36d9626ab
SHA122284f802c417afd111e54d33dc1b738a3fd767c
SHA256e4484073cc318675a35b21f84ded98ce96a9bec1b084ea207fe31c531bf8d162
SHA512ad8136ac4d395967d7b8d9f0fbd5222e1bf3c815d6a0c9f7541a59e5b29ed4120d6831d381fff020d6862a72547e78a355d830f251360aa267b89f9f54a17254
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kwhrequestor.dllFilesize
617KB
MD5a7405a1e67e65e1fc8b6bff36d9626ab
SHA122284f802c417afd111e54d33dc1b738a3fd767c
SHA256e4484073cc318675a35b21f84ded98ce96a9bec1b084ea207fe31c531bf8d162
SHA512ad8136ac4d395967d7b8d9f0fbd5222e1bf3c815d6a0c9f7541a59e5b29ed4120d6831d381fff020d6862a72547e78a355d830f251360aa267b89f9f54a17254
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exeFilesize
516KB
MD5cf2e53f8dbaa17134f2e7845bf832cb2
SHA1cbcdbc2b9885538306cd1bbf0e286d0e25ee232b
SHA2560e537552420beca4c120cabd4ac63ef28b41d292441c40485b43bb35b407f94f
SHA51282ff9fb649734f0fd071aa3208caeb2977dc5cb8f9548f2fa71aecbce74124707bbe6f866eab61a89d15b9358c184f8618b9d431cf3011cdb036757c3ea99e5c
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.logFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.8MB
MD5da752173d2f6e37fc7826144e12383da
SHA192c4b3f3ec780bd8651886623373ccc3b31c4b05
SHA2568a0f744e1702d7e0867d0fbf2242a88aa686d8987af3fe67c62bdb97d6dd6234
SHA512fe3dd83732c598d513bd2d5dde118f19111a3fa290591708057d9dbbde75d62460975e0016cf91da2199c71b00145d535bc3046118ca4b56d2cd89f73ef1c0b3
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.8MB
MD5da752173d2f6e37fc7826144e12383da
SHA192c4b3f3ec780bd8651886623373ccc3b31c4b05
SHA2568a0f744e1702d7e0867d0fbf2242a88aa686d8987af3fe67c62bdb97d6dd6234
SHA512fe3dd83732c598d513bd2d5dde118f19111a3fa290591708057d9dbbde75d62460975e0016cf91da2199c71b00145d535bc3046118ca4b56d2cd89f73ef1c0b3
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcp80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\msvcr80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\operation\cas\kinfoc.dllFilesize
181KB
MD50f3a1b91f220cd35ca291575d155ae18
SHA1621febf42c26d8976c2a75bc9e1e3895fe49fcce
SHA256067659e0a2123b7e28faa1be70c4f2a93f21e38877d4ede61edd56a9bf61d103
SHA51207ae5032bf51f7d1db27e1aca8f468906c614d62b18598a68d54eea633d4410003db2ab976d8248dd5061b081d28082abd8774388f80944baf1c1c90cfb1fb8e
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\ktoolcommon.iniFilesize
472B
MD5163e003ead1f9d508ba1402084d5de6e
SHA100ae221a72f2a9c5e2397224eb10ffbc23e4248f
SHA256df1b25321ddc912500243100a9fd0abaab58a38cd619f3855debbfe8942de409
SHA512517ce862b732a5dbc936a7ebb24465a2102783cded3a2f465e70e01157405b01571cc6a52f97bd66484c06be21b08788dc3e4f58163354964ae3ad5195d9b5aa
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\security\ksde\kisknl.sysFilesize
307KB
MD5614b51a2e2558f62222f36f378ee4773
SHA1d6ed7e99e034c63e4b5226d64fdf387299d16919
SHA256aa1daa14ae9a90c5dc1a1ce00ae844c4e02980a5d451295941eb4d075f6dda2d
SHA5127af759f6569cc87c01fc1f4ce3982be94a08b8354066602046cf14b5f857a7afd0edc3b5010826391c61ec62aff2cb721b9450fc001a8d0cfc48db7c3fabf63d
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\update\kav\data\index.txtFilesize
1KB
MD5a4185a63fe9960a3a1542f1a6e6a7c30
SHA14c5c9cec2f061b345556be4c2a8c6aa134fce64b
SHA256047859dbd189f567d4f0f790f4d8f00503a01cadd65a5b3fc1c76ddf6556580c
SHA5120108dfa18c3761541760cd7a8dba081e5c439f6786cbc71664d98f974723a029079813341a287c3af74c5d4516b33ca12f74d39fa0d488c2ffce53b00b9428e5
-
C:\Program Files (x86)\kingsoft\kingsoft antivirus\update\kav\indexdata.txtFilesize
94B
MD57942118bcb07d9603fc1840f886a1322
SHA1824062e6ced40abc7f22d1ec224f3d904f2db3c2
SHA25695897476ffc95d483e647b955dec6d2b5ec1709216bf744fe86408f2e60651a8
SHA51276bb87254ce474dccc0af72d526989d9f0f53d926d2670382a862da5f194298d91b1e6eef5eff60e29412d172740d92350ae741868b0850b475de29968893e5e
-
C:\ProgramData\Kingsoft\KIS\hg.datFilesize
53B
MD55ce7034fbe012732c2fc805697e4485c
SHA1fdc0dd64c166289b164483950636ca4b1660dc20
SHA256dc007b95d0d63af980ed2a7e446498036278bd834228acba82f849d592a48235
SHA512a84c466c0a608d0a238b171e19584acfe5ebb2f4adb3b9107181f0d565677d05a723c433509d654be1e6bb0bcafb0c19eebed7c1e83c6c975cf1e272074164eb
-
C:\ProgramData\dbazdk02.datFilesize
26KB
MD5f56fe50182a8ebb41a4278e251427f9a
SHA1805119920a31fbbb164a2ef6e082917cec9fac75
SHA2564627d340c5c5f115d9288a9c45aa8e482615214a9360c7735dd6c43fd2c3cdcd
SHA512a21e92a5f3685f50b0fd04e997836267669c8b4bac465cb7ab89c0a73b73fb890ed7974b09f0b3d315838a8c0fc4347e7b72711e7f90163f12a7c212d11c0db8
-
C:\ProgramData\nmlist.iniFilesize
4KB
MD5cc62ff21f145d667d8239adadab5de57
SHA10a6299e6c5dab347effc8ce1cbacb5447377d8fa
SHA256c647c6bfd183bc5bdbb7f92639c3ef066aa227afa5fc65a23a289ee49d644ee6
SHA512eea3c3678989d602515a79bccfa70c9ffd27a6491a4cf053cd737ce0415c37aa28dc9fd782792bcbbd5f703250c4ee0f17a915de4259ad34a71144265c4e6faa
-
C:\Users\Admin\AppData\Local\Temp\KDbCIHelper.exeFilesize
270KB
MD56a0416c9d15d5bbfa03c85a96eadad90
SHA1ec383f7104112d92f95c31d0e365db6dd2cd4462
SHA25672e1f20807ed445c506d264d9da2e3687a8b2f4b503f352f1d363d7a5dce73ea
SHA512dfbca32f535b9a39576c653ff731ce5bff087d625dfb2e4498aade783ed1faf9784dd06266a582d4e9d8218b13cf5b9bb4057e4cc3dace05646e1a26d865f3dc
-
C:\Users\Admin\AppData\Local\Temp\KDbCIHelper.exeFilesize
270KB
MD56a0416c9d15d5bbfa03c85a96eadad90
SHA1ec383f7104112d92f95c31d0e365db6dd2cd4462
SHA25672e1f20807ed445c506d264d9da2e3687a8b2f4b503f352f1d363d7a5dce73ea
SHA512dfbca32f535b9a39576c653ff731ce5bff087d625dfb2e4498aade783ed1faf9784dd06266a582d4e9d8218b13cf5b9bb4057e4cc3dace05646e1a26d865f3dc
-
C:\Users\Admin\AppData\Local\Temp\kantivirus\~e56f755\install_res\1.jpgFilesize
11KB
MD5bce3d32bc31d8866c7ae6001a0b7f2b2
SHA14564373090ec0406346d006c7c37391c5101ddc0
SHA2566e992e0c2fcb0b6def7f0c371f20837be7539db17a3aa76732b2225650c5595f
SHA512cc9f4cd6fb326f1a49157b085ea9755bee05068b4c08ae61a15fb911c292cb821215aeab63e15ba66a99ea9b060957aab6c5f6e44f96be05b33522a90dc9453d
-
C:\Users\Admin\AppData\Local\Temp\kantivirus\~e56f755\install_res\2.jpgFilesize
24KB
MD5d2fe241b32b67b67aea896867054bfa3
SHA152e69af3d5c32863442451f6476d12ca9e3f0806
SHA256287187541b240f6a4a9b504d0d9fc21f49bc7c2ce6a474a5c84489984c61b147
SHA512eb703838490a3902022edd9d9b1b475d47d39bb08089e4fb1e307c7ffcef53a6adad0c26b7ea07226f6396c4818a14d9baa6b94010ac8e63e1c01d26301c6788
-
C:\Users\Admin\AppData\Local\Temp\kantivirus\~e56f755\install_res\3.jpgFilesize
7KB
MD5f3b9632b84ae1b2686aa35df23b505ef
SHA1e560f43ba0c332ff9e11d8ae7ac79f6ff230d104
SHA25610dbbb8367d847eb97f33e48d6227c33e6845c64d3309354f71cd55405481852
SHA512ead8834ec05757670dc1e79d49c3077e6a926a504116d88c3814fdf89ddffb59f18e0162a64bab72c0cf2dad8893a573106fda537161828f8d6f019e687200a7
-
C:\Users\Admin\AppData\Local\Temp\kantivirus\~e56f755\install_res\4.pngFilesize
246B
MD5567412defa6ff8c0a22b6741903d5bd6
SHA16b01daf205a7881483b04a6717302940c03fcaea
SHA256ec47be1c0109fe07fd41b5c8133ce17d3fbafd003369ff6a0adc616c9297205b
SHA512fcce488e36d7707f4d3f651efb050677cc7fe681c657828643a9f1e354200a5937c908c96a8cb694028db11eb02387a7315e0bbcf8992b1f5890457206108a5b
-
C:\Users\Admin\AppData\Local\Temp\kantivirus\~e56f755\install_res\5.pngFilesize
460B
MD5a9d6e9863117c07204aca39eab5b994a
SHA1d3e0633d705f878c9d67be23c1eb150ef3f33f6d
SHA256908b09757f56bdcfd2bc8d53dff95e62159d2ba448fc41dbfa135db87be5e608
SHA512ae0b20aa2f4729a75768ce5fa8e31f3610c16212a78027a4b05a4d96c29eb54a1560a00a309275cfb5d23c3cf86ec3808719546223890f2e453b02a224a12650
-
C:\Users\Admin\AppData\Local\Temp\kdb_semrjgj.dllFilesize
36.6MB
MD5cf20e3f69ae844fd027ce759f0aa560c
SHA12d5079bf74c4cdc226c605a9e82bd803ff577648
SHA256f9cce6e4026f7be00fbf665bdc9e433baf0932ddf8bf660bcacbc61a4b44748a
SHA51249dae81fe0b2a47c548674ec2dea8c4a9a956308daf6ee6a7448ec373ca07094e0d04cd9dc88c527778d91aa8b13ecd6045eddf60d79a8c061f9530ac1b70015
-
C:\Users\Admin\AppData\Local\Temp\kdb_semrjgj.dllFilesize
36.6MB
MD5cf20e3f69ae844fd027ce759f0aa560c
SHA12d5079bf74c4cdc226c605a9e82bd803ff577648
SHA256f9cce6e4026f7be00fbf665bdc9e433baf0932ddf8bf660bcacbc61a4b44748a
SHA51249dae81fe0b2a47c548674ec2dea8c4a9a956308daf6ee6a7448ec373ca07094e0d04cd9dc88c527778d91aa8b13ecd6045eddf60d79a8c061f9530ac1b70015
-
C:\Windows\System32\drivers\kisknl.sysFilesize
315KB
MD5b8e308671eb267e42ab167711da8b04e
SHA1b16ed643cca235e9ccfc2c26e3d33f2a146fbee4
SHA2567afb2e070e4bea5e81b3ab2d5af5e438fa6a96f717c79fd85ff4cf3a8bf7fd03
SHA512b6e6df8fc78672728bbe5580b45151bc1295e7748262562241a85aee6b5a032b9c3c22eb6bfbc6998db76b1626e0efdac1d2400175c447e2895b52a5ff9fd9e3
-
C:\Windows\System32\drivers\kisknl64.sysFilesize
310KB
MD561d525b60a8e63abca86872300050213
SHA1a0e9ec67705c1aed2d9ed9b04c7b9645960d40a4
SHA2562a0e605ee09c573a7fcc872325534efed5f5742bdb7bdf33e054b3617c8eb530
SHA512049351d8c86b4c14153936d18e7f915e3fead2c480e4c238fe94145d19c5539f05f75e33f06b2759370904f46c24c9be26108561fa23dc75873b15b4b0ec5b5d
-
C:\Windows\System32\drivers\ksapi.sysFilesize
119KB
MD5d69077366e510ceb9459290c2fba482f
SHA1dcb75e9a913d9b8ac4c859134ec27dd6d2f7a3b7
SHA25632e5a80115e9cde5ea0c514b81eb05fc0894ed51008bff500e4347190881e8ac
SHA512ce9b7c776b00cb47ac311b8d00048d77d81c97e325761452cc7ac4064a10564562dd98d47bffd12c3ac7ae3344a6cd540451d5a168f03a3997e945a3ea6b16d4
-
C:\Windows\System32\drivers\ksapi64.sysFilesize
78KB
MD5f1a015644e5ca4b484c15d960e9532b8
SHA16352e61f5c37a658cb38a392d159185cf41cb511
SHA256f4e584f55281edbcea19dedc4e43b4ce0ef9b5d6bcfda7673c0f19601b588a8f
SHA51254f7d4bf8cbbf728bd546d8aaec557c98ceae38a1929b8e00901e326470bfee55fbb5505b72850cb514e08875136466a232d6485a84230bafff0ac6f92722e1d
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\KCmppInvoker.dllFilesize
180KB
MD59f70191eae1688db0d18f8d956a88383
SHA146c96305f5f33c1162609dc82f383db538cf428b
SHA2561f39d69c8efb14b77795c139ee76ecc5cb3d2bd16ef587efd996814c9151b664
SHA512017fb06d89268b5c6abb67890497e7edda46077da3dc3cfff322eb5e0ea475ca5796eea287e81fa3b01aa730dda8e705c8cb0e9a198ad419ac48287d29888f4f
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\MSVCP80.dllFilesize
536KB
MD54c8a880eabc0b4d462cc4b2472116ea1
SHA1d0a27f553c0fe0e507c7df079485b601d5b592e6
SHA2562026f3c4f830dff6883b88e2647272a52a132f25eb42c0d423e36b3f65a94d08
SHA5126a6cce8c232f46dab9b02d29be5e0675cc1e968e9c2d64d0abc008d20c0a7baeb103a5b1d9b348fa1c4b3af9797dbcb6e168b14b545fb15c2ccd926c3098c31c
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\MSVCR80.dllFilesize
612KB
MD5e4fece18310e23b1d8fee993e35e7a6f
SHA19fd3a7f0522d36c2bf0e64fc510c6eea3603b564
SHA25602bdde38e4c6bd795a092d496b8d6060cdbe71e22ef4d7a204e3050c1be44fa9
SHA5122fb5f8d63a39ba5e93505df3a643d14e286fe34b11984cbed4b88e8a07517c03efb3a7bf9d61cf1ec73b0a20d83f9e6068e61950a61d649b8d36082bb034ddfc
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\kswitch.datFilesize
10KB
MD51d88beff2208819ae7a5b3bc6256421b
SHA101fe8e493f4415fa593922aa9948afe5631b7684
SHA256348e78a8005c0f4e917fbbff9be2df9eaaf2f36174a05ce4032d20b25501a4da
SHA512a8ec37254eb5b70dc1efdb21fd32d7feaa7bce5400b0f61fa0c457827cf964dfc321de5072185959200d82183522adf0c859937f623bf3a43d577fc0788b87ce
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavevent.dllFilesize
90KB
MD580f899ca024ddcf5218a4fadeacaec54
SHA12756821bde2d8eb44b04da63afbf5496565ddf71
SHA2562a0d8c0778ef91c5e9f7ffac47a0e49a4055d50556895822d84adcbce9375c17
SHA512ae871718f3eb2bcdd4bc6d41a691e9684a98a022d0db9d9444470820847e648e369a5f0c7887dc31d6ffa51572634345fe2448c1defe8535eb79c30f8202f41f
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exeFilesize
522KB
MD5c7256e3f7702a3848f0259b3cbaf712d
SHA1d268660245346fc92c2832a47e84ae03e6f9ecda
SHA256009d63fbb8f3ab13c0a1a6559c83a493dffa1fbd63c1f243d0ca3f188e489bac
SHA512e9a8e458c82aab1b71618d2391df7a60809d0a711f35e7b45609c3335ab39ec13ff1ec67043781210503ac0f7cd5a836c96d422405b7e3b073ec19463eb2f91f
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\keasyipcn.dllFilesize
103KB
MD593743861a54413c1454845b3b6f50f4d
SHA1b0be47cde5aa95b5d911107bf1af98109a7bef74
SHA25663e3807a73157f64db94e975569597665ece35f7234137adc21fa62a85eaa5a0
SHA512a02707c680ddb5c1645fde212fc75e11b687d8dafddc83f7ae7824f8c425d2c13b1af0e3adb079de904e46d6f9477a6fc09fd6662643c1bc139cb496e873e83b
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exeFilesize
1.2MB
MD56a001678ac0bee54a27191a7c72b0f56
SHA155bf2ad857a80ca60782c0c524e25c0963747788
SHA2567bad0cbcf9679723fdc5663ea20ff4d0c37a1bd292177ab40329ebcb0163dfcd
SHA5127873a235125288d83a617bc05b77d807e03558fba1f10d6efd5c02e10c256d2d6e7b56b40adadf50879ee40847454edf59afbdb9e640a52c6112d0abf6367a3b
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kpopclt.dllFilesize
213KB
MD51dd2c3ecae68a35cde2d586aa24e0f25
SHA1600f6a6af5b43a00c5ddd040a79afbeadba053cf
SHA256905fbcb0f93015941e884bd37b5d196788bc4422919fead4be12fbfd42fb5440
SHA512237f5623042dfab544458847cebe1a5f95bf83165d6155086378976b1082d7709b0fe8379ba15fff8ea39664ffe67546719983d27ce3e82cec6ac667e0f78145
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksapi.dllFilesize
225KB
MD553d5bd1f2c298d0cb238a7704abe92c4
SHA10dca1f642ba188724d29f434ce305c07ca776747
SHA256ee25855e8b89b7ae673f29bac9fd864615d769776393ba890cbb9549614be6bb
SHA512da70ab26e77a1f8b28ea8bdbc242fd9bbdd1aed6f058b9f4a83f58df57f292fafc35a469bfe1eda700767694dcffa577262aa033da439482aaa412de9033fc3d
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksapi64.dllFilesize
193KB
MD52e67447a0b7f3192d09290503b96b738
SHA1fccdb3ed95f71304e40b54c38c0d1a44b083c2e3
SHA2567441b31adbe9c1cdb5af51569b7b32218def2d691f7fad07d1e6be60a3a48041
SHA5121381828c17b1448b8321c2be0509e90742a9235063183bea850bbf940c133eda1b4e67a382750de44dc5a8afe28de05e2047c13ba21c286f9c29e184b2b58b9e
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kskinmgr.dllFilesize
975KB
MD59152c4b02a92bdc24dc63efc86fcbc4e
SHA13e0c9f8406e4ae94b10eab6ce0e66a46bd6e380a
SHA256aaa1aeab64e409bedc751009a8a55d9a081dfade787c6dc9d7272ac2a7489093
SHA512c42cd9deeaafbedd8782f870ece90fcfb8b84bc06e04be4c615d622533b7ec809b93029985f703dfe1c196bd4f8054b9b79180ccf59f7039f2834bcf84bf8de4
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ksoftmgr.exeFilesize
3.6MB
MD5ec97eb619fd07ba0aee6783eac3bcb47
SHA17f5788269192c59ad8cda179cbf3e5a4cc490972
SHA256699605488bf15f37a167d105f8550c43225ac309bc1b4321e42172e32f70fb42
SHA512e4f923235474b8df81ad407bc9a4e21e6ac6aaa0ae8f3fb3de13f4eb080d60d566035b52175214d416001caf7cf5c1484111799c43dea900aea9df3a87d4f272
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kuidsrv.dllFilesize
461KB
MD5665ba4f0adcec026db80a191cbb92618
SHA17162645603079e9a1a2b77b7c48daec8ae180299
SHA256bf088cc30af2d93728726f668511cfcb38c609b8b4771f599a4ad747ae61e7e8
SHA512fb4a924dc2b4bd145e364a024c47bbbbab188d4a9b2c0d630894b971fa556d5fc600b1482ab95be1f7e8be2715ad4528602a5c020c355f755362f09eefba146b
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwhrequestor.dllFilesize
617KB
MD5a7405a1e67e65e1fc8b6bff36d9626ab
SHA122284f802c417afd111e54d33dc1b738a3fd767c
SHA256e4484073cc318675a35b21f84ded98ce96a9bec1b084ea207fe31c531bf8d162
SHA512ad8136ac4d395967d7b8d9f0fbd5222e1bf3c815d6a0c9f7541a59e5b29ed4120d6831d381fff020d6862a72547e78a355d830f251360aa267b89f9f54a17254
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exeFilesize
318KB
MD57dacf31d3906c42de3529bba7f4f43cb
SHA16dccd65e7a19d5896fb33c12cbf3e54f01e992c3
SHA256ae516a5ec2e01334edb329c4268186a8810f31cbdcb8eda9b8f4a3a393816bb9
SHA512f05525c372a18fdca8439f79920ce1701d60862b576efd138f0427c7b32ae48aa466cceccc17d0f445ece1e50fc75a5848ad46795370d3bcfc7242d56c9c8da4
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore_sp.xcfFilesize
87B
MD547f61d0f7bd830f5bfe72c3b65941fde
SHA1d7f440877e23679fd2c480dff2b8f3219702d681
SHA256eb09cf1094904f0d3038ce1e981fd4366eba4000c8b6f13a3dbbaefea4797e37
SHA512d234f17af1440aba1a4f6c2b24d04fdeb3a685f25f391cdc1ac048dfed1b470689bed5b21d7b3db94f9186445932982f462bbee8af919c1a957ab89bd69e68f5
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exeFilesize
1.8MB
MD5da752173d2f6e37fc7826144e12383da
SHA192c4b3f3ec780bd8651886623373ccc3b31c4b05
SHA2568a0f744e1702d7e0867d0fbf2242a88aa686d8987af3fe67c62bdb97d6dd6234
SHA512fe3dd83732c598d513bd2d5dde118f19111a3fa290591708057d9dbbde75d62460975e0016cf91da2199c71b00145d535bc3046118ca4b56d2cd89f73ef1c0b3
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\operation\cas\kctrl.datFilesize
3KB
MD5887ed679698117d421b8ac9d636db34e
SHA13d39c3f6cca90b385b05bb55e9886da4e216095d
SHA25663db532c2d893da092fd4cd495c1fffda792c9034f1b5d2996116c584acd702b
SHA51230aef737b4efbaa3bee0b93b693fdbdb9b4a30468ade5f050edfccb950a897e686385546cda78c3e992073fb4ca34ecfb37435ed99130c52f52035bdb1f4ee38
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\operation\cas\kfmt.datxFilesize
194KB
MD53850d6e5f931b015c8cf1ada958db446
SHA1c7e1059efd4360c14fe8b4ef33ebc1071fccbec3
SHA25653baa280450af2d1a02fd7a484d3f06e0f46cce6794af194e10f2998fb6693e8
SHA51251a28ccd6fb44fb902355ada39886a8fee9161d221e5338a063771f755d4f07c9cae954f11e5bf4bf4939a020c05b1319eb48e54f789b3ca472b3bfbb504f20f
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\operation\cas\kinfoc.dllFilesize
181KB
MD50f3a1b91f220cd35ca291575d155ae18
SHA1621febf42c26d8976c2a75bc9e1e3895fe49fcce
SHA256067659e0a2123b7e28faa1be70c4f2a93f21e38877d4ede61edd56a9bf61d103
SHA51207ae5032bf51f7d1db27e1aca8f468906c614d62b18598a68d54eea633d4410003db2ab976d8248dd5061b081d28082abd8774388f80944baf1c1c90cfb1fb8e
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\ressrc\chs\uplive.svrFilesize
9KB
MD50ff4535960c3d5864b2341ae71d4e5c1
SHA18a48f6390dba08aec7879ba27e0fd11f7e215a5d
SHA2562f5696ebc343b65b284a2e3d37d1bc91c12dc09d42145c86e4ec795f9972d8cf
SHA512d1fcfd4cc6ff094cd0be1f7270ceb11bcd648d763504fc80c3908655fd0bad659e9082e3bd2686e3f9f983544bf0a748bd152028ee5bd31d067af7d354a7cfb0
-
memory/208-1278-0x0000000002CC0000-0x0000000002CEF000-memory.dmpFilesize
188KB
-
memory/208-1271-0x0000000002D00000-0x0000000002D37000-memory.dmpFilesize
220KB
-
memory/208-1290-0x0000000002FA0000-0x0000000003011000-memory.dmpFilesize
452KB
-
memory/208-1283-0x0000000002D40000-0x0000000002D6A000-memory.dmpFilesize
168KB
-
memory/224-1246-0x0000000002850000-0x000000000286A000-memory.dmpFilesize
104KB
-
memory/224-1259-0x0000000002A60000-0x0000000002B53000-memory.dmpFilesize
972KB
-
memory/224-1393-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/464-1307-0x0000000001200000-0x0000000001271000-memory.dmpFilesize
452KB
-
memory/464-1301-0x0000000000FF0000-0x000000000101F000-memory.dmpFilesize
188KB
-
memory/464-1337-0x0000000003FF0000-0x000000000401D000-memory.dmpFilesize
180KB
-
memory/464-1312-0x0000000001030000-0x000000000103E000-memory.dmpFilesize
56KB
-
memory/464-1340-0x0000000004260000-0x00000000042C2000-memory.dmpFilesize
392KB
-
memory/464-1354-0x0000000004410000-0x0000000004424000-memory.dmpFilesize
80KB
-
memory/464-1358-0x0000000004450000-0x000000000446A000-memory.dmpFilesize
104KB
-
memory/464-1311-0x0000000000EE0000-0x0000000000EF0000-memory.dmpFilesize
64KB
-
memory/464-1383-0x0000000007360000-0x0000000007496000-memory.dmpFilesize
1.2MB
-
memory/464-1298-0x0000000001050000-0x0000000001087000-memory.dmpFilesize
220KB
-
memory/464-1305-0x00000000011D0000-0x00000000011FA000-memory.dmpFilesize
168KB
-
memory/464-1356-0x0000000004430000-0x0000000004442000-memory.dmpFilesize
72KB
-
memory/464-1317-0x0000000003670000-0x000000000372F000-memory.dmpFilesize
764KB
-
memory/464-1322-0x0000000003650000-0x0000000003668000-memory.dmpFilesize
96KB
-
memory/464-1319-0x0000000003830000-0x000000000399E000-memory.dmpFilesize
1.4MB
-
memory/464-1313-0x0000000001900000-0x0000000001914000-memory.dmpFilesize
80KB
-
memory/464-1314-0x0000000001920000-0x0000000001932000-memory.dmpFilesize
72KB
-
memory/3924-1366-0x0000000003D70000-0x0000000003E10000-memory.dmpFilesize
640KB
-
memory/3924-1342-0x0000000002B90000-0x0000000003150000-memory.dmpFilesize
5.8MB
-
memory/3924-1380-0x0000000003CC0000-0x0000000003CEF000-memory.dmpFilesize
188KB
-
memory/3924-1375-0x0000000003F80000-0x0000000003FB7000-memory.dmpFilesize
220KB
-
memory/3924-1372-0x0000000002340000-0x000000000234E000-memory.dmpFilesize
56KB
-
memory/3924-1390-0x00000000043C0000-0x00000000044F6000-memory.dmpFilesize
1.2MB
-
memory/3924-1355-0x0000000003150000-0x00000000033B8000-memory.dmpFilesize
2.4MB
-
memory/3924-1253-0x0000000002A70000-0x0000000002A88000-memory.dmpFilesize
96KB
-
memory/3924-1339-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/3924-2404-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/4120-866-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-1161-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-149-0x0000000002890000-0x0000000002891000-memory.dmpFilesize
4KB
-
memory/4120-139-0x0000000002890000-0x0000000002891000-memory.dmpFilesize
4KB
-
memory/4120-1212-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-1167-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-164-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-2688-0x0000000010000000-0x0000000010089000-memory.dmpFilesize
548KB
-
memory/4120-1174-0x0000000000820000-0x000000000084C000-memory.dmpFilesize
176KB
-
memory/4120-220-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-212-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-211-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-210-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4120-206-0x0000000010000000-0x0000000010328000-memory.dmpFilesize
3.2MB
-
memory/4204-1203-0x0000000002280000-0x0000000002281000-memory.dmpFilesize
4KB
-
memory/5128-2405-0x00000000023E0000-0x00000000023E1000-memory.dmpFilesize
4KB