Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/05/2024, 13:42

General

  • Target

    2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe

  • Size

    5.5MB

  • MD5

    5a04ccc69dcb6542a6205cb8b0f2637c

  • SHA1

    a23f6b826b876884625a668611e1c9f817f26f46

  • SHA256

    50a0e8a5715aae63bcb3826943d098fa4452bbbb5c25ec1c89e80197c0c1444a

  • SHA512

    8f6685102bf72678b1d1caae479d92db329cbfce2149f76bbbe1b4dbbda57cec6aa526ec5a88b787161a0bb707f3526f576a146cc0b13799513fb9c1bea0ee58

  • SSDEEP

    98304:P3stJARnrlGCG8z1Anqn4UHw//4ENvIPpHdVorLu4TK/O4FsO:kjQnRT1MEzH4vItor64SD

Malware Config

Signatures

  • Brute Ratel C4

    A customized command and control framework for red teaming and adversary simulation.

  • Blocklisted process makes network request 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks computer location settings 2 TTPs 15 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Executes dropped EXE 38 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe
      C:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -curlangofinstalledproduct=en_US -D="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office"
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Checks computer location settings
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe
        "C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" InstallService
        3⤵
        • Checks whether UAC is enabled
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1952
      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -installregister sharedMemory_message_E580A6B
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Registers COM server for autorun
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins.dll"
          4⤵
            PID:3764
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3944
            • C:\Windows\system32\regsvr32.exe
              /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"
              5⤵
              • Registers COM server for autorun
              PID:2544
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -sendinstalldyn 5
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4940
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\html2pdf\html2pdf.dll"
          3⤵
            PID:4384
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\\office6\ksomisc.exe" -defragment
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4596
      • C:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe
        "C:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe" -downpower -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -curlangofinstalledproduct="en_US" -D="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office" -msgwndname=wpssetup_message_E5798F4 -curinstalltemppath=C:\Users\Admin\AppData\Local\Temp\wps\~e579616\
        1⤵
        • Writes to the Master Boot Record (MBR)
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -updatetaskbarpin 2097152 -forceperusermode
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          PID:2112
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kwpsmenushellext64.dll"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4432
          • C:\Windows\system32\regsvr32.exe
            /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kwpsmenushellext64.dll"
            3⤵
            • Modifies system executable filetype association
            • Registers COM server for autorun
            PID:1164
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe" /from:setup
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3360
          • C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe
            "C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" CheckService
            3⤵
            • Executes dropped EXE
            PID:4544
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe" -createtask
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1808
          • C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe
            "C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" CheckService
            3⤵
            • Executes dropped EXE
            PID:5092
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" /prometheus /download_lang_on_start /lang=en_US /from=autostart_after_install_onlinesetup
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1272
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe" /qingbangong /start_from=qingipc /qingbangong /start_from=kstartpage silentautologin
            3⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2716
            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -getabtest -forceperusermode
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2316
            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -getonlineparam -forceperusermode
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:2832
            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe
              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /krecentfile /init /From=Qing
              4⤵
              • Executes dropped EXE
              PID:2960
              • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe
                "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe" /krecentfile /init /From=Qing
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:3376
            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe
              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /messagepush /PushType=mipush /From=Qing
              4⤵
              • Executes dropped EXE
              PID:3100
              • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe
                "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe" /messagepush /PushType=mipush /From=Qing
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:3960
            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe
              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe" Run /InstanceId=wpsdesktop -Entry=EntryPoint C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386/kwpsbubble_1.0.2024.3/kwpsbubble_xa.dll
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1056
              • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe
                "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=gpu-process --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=2024 --field-trial-handle=2148,i,14182422460521513072,5583797877759660170,131072 --disable-features=TSFImeSupport /prefetch:2
                5⤵
                • Executes dropped EXE
                PID:4292
              • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe
                "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=2052 --field-trial-handle=2148,i,14182422460521513072,5583797877759660170,131072 --disable-features=TSFImeSupport /prefetch:8
                5⤵
                • Executes dropped EXE
                PID:5640
              • C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe
                "C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1056 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3068 --field-trial-handle=2148,i,14182422460521513072,5583797877759660170,131072 --disable-features=TSFImeSupport /prefetch:1
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                PID:5788
            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe
              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe" Run -Entry=EntryPoint C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386/kdocreminder_1.1.2021.136/kdocreminder.dll
              4⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of AdjustPrivilegeToken
              PID:5532
            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe
              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" Run -User=Admin "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -regpdfwspv
              4⤵
              • Executes dropped EXE
              PID:1908
            • C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\chromelauncher.exe
              C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\chromelauncher.exe install
              4⤵
              • Executes dropped EXE
              PID:2352
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe
            "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=gpu-process --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=3332 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:2
            3⤵
            • Executes dropped EXE
            PID:2592
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe
            "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:8
            3⤵
            • Executes dropped EXE
            PID:4912
          • C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1272 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3872 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:1
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:1120
          • C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1272 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=4140 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:1
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:1128
          • C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1272 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=4184 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:1
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:1344
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe" Run -Entry=EntryPoint C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386/kdocreminder_1.1.2021.136/kdocreminder.dll
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of AdjustPrivilegeToken
            PID:6016
      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -installregister sharedMemory_message_E57EDEA -forceperusermode
        1⤵
        • Writes to the Master Boot Record (MBR)
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins.dll"
          2⤵
          • Loads dropped DLL
          PID:2728
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:432
          • C:\Windows\system32\regsvr32.exe
            /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"
            3⤵
            • Loads dropped DLL
            PID:3180
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" Run "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\ktaskschdtool\ktaskschdtool.dll" /task=wpsexternal /createtask
          2⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2360
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" CheckService
            3⤵
            • Executes dropped EXE
            PID:4508
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" Run -User=Admin -Entry=EntryPoint "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6/addons/ktaskschdtool/ktaskschdtool.dll" /user=Admin /task=wpsexternal /cleantask /pid=2360 /prv
            3⤵
            • Executes dropped EXE
            PID:2604
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\SysWOW64\cmd.exe"
          2⤵
          • Blocklisted process makes network request
          PID:1952
      • C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe
        "C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" LocalService
        1⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        PID:1204
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -regpdfwspv
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          PID:2832
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386\pdfwspv_1.0.2024.3\pdfwspv.dll"
            3⤵
            • Registers COM server for autorun
            PID:5144

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\Qt5NetworkKso.dll

        Filesize

        1.1MB

        MD5

        890a5bf085167cf3aee0f4d57b7e05b6

        SHA1

        1bbfe7ca2cf0678b433790289cdc7db57d68e36f

        SHA256

        7d16714b843343e370ec36bda4a058280ba3528636c57a085b168c979f1f48c5

        SHA512

        e44385e82c2a85a63d3860f590003d9d42d2343a78e9501541208363e3ff9c76f46bc25f36fb7f326b13143fd259dfaac71e49caa7f0edf02c35d1f479627c4f

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\Qt5XmlKso.dll

        Filesize

        169KB

        MD5

        2e98c97ebf1a60c666d5052f33df4e35

        SHA1

        f09d55a5658e5b549378af28d698364663091101

        SHA256

        56b9e2981c0bdb628bb9b69c2266724695bdfcbbc0903528fbc6e7f415b1cf9b

        SHA512

        7687f06c3450b45d1c278b1630c00fb3a16f064ee1abc5a4026ccb90e19f2f2a61ec338653ae8b4a5629f2572dbe1c18a612628c71a81875cabe565aae2c3421

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\kpluginconfigcenter\kpluginconfigcenter.dll

        Filesize

        2.4MB

        MD5

        e61c28b9cebd28c9475ca197f5ce818a

        SHA1

        cdff3381444f178a1c42ec289cf72673f62c71d3

        SHA256

        37ba2b6d32180ecd7bda9859e1c0b333e23f013f51d8da9cc89aa42a33335729

        SHA512

        e52007a4f5770553760511578ebdb7ad99d76484ec91005d00c03405197570b50c40537fcfcd30a7a0ba709e620fc499177d8b8578b80106df70fb096f8651ab

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\kwpsaigc\mui\pt_BR\kwpsaigc.qm

        Filesize

        334B

        MD5

        2b42be10ddde43a0b6c2e461beae293a

        SHA1

        53888c4798bc04fdfc5a266587b8dc1c4e0103f3

        SHA256

        984ebeef80f6f50907afb92e5b5ae72df49fce045552c118a77a8887cc98e19b

        SHA512

        be3ebd02d37de367200696351fb5f9cd0ec4c206c3a33f281cb8b62386457a30a899322798c63a0d495577393e47258994feb7f8e2445645f552c2b7a2de6778

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\qing\mui\default_xa\res\clouddiskhomepage\static\js\pt_PT\history.js

        Filesize

        198KB

        MD5

        b4b4c703bf5c6c0b5e9c57f05012d234

        SHA1

        929aee49e800e88b4b01f4a449fa86715d882e42

        SHA256

        910eada285d4900ea8e36faf305f731cfb200b317ea866839f5f4864a9dfc09b

        SHA512

        2afa881ee2f47e97249904b506cf88d68a34c166d9dc0a603f68369e640336f2c0b424ecb7b23d4631a96e175b965478bfa4ebc0224b0410551e55ac4c8ad0ec

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\cfgs\oem.ini

        Filesize

        67B

        MD5

        223673e5e8d77083765b70ddf7a0f7f6

        SHA1

        3b5c4d6304ed6ada0ec607f44a2aace24ec16126

        SHA256

        9089b4fee2d7596812c52f11dbc9855ca5b2b1ff0a9dc237fe630722b10ddc82

        SHA512

        62f5a40fc698de593bf29c3ab4d278d798bdc6e65693ca30f85506c95f408f17a00da048e42a23dd5702fe322066a87374cfeb0942d15f3fc791639aab924f52

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\cfgs\setup.cfg

        Filesize

        433B

        MD5

        7d78a2449b45fc839f125b47b637bed0

        SHA1

        29528d84082fe773bbd0570629437ce66d9125d7

        SHA256

        45cff35c455d94d3832155bd0f7725d7f2734818e688258f033576d0e54cd5b5

        SHA512

        06b74bf4c906c029b3005ba600d02bd7815b4b14e4795548a89ead1669cd87a83ad00a4f4adbdb5414f73db1ebd0697b0f91029fb07ed6894e9bcbf833263a03

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kbase.dll

        Filesize

        55KB

        MD5

        313c37e93083938c611b550fd2eb0c84

        SHA1

        a6fae473ab22d163feadd942f1e91bbb41c7e4f1

        SHA256

        502e848bed07fb2d9d8588cd0bfd38e349c6043f9bc44d23cf01e566db46066c

        SHA512

        c5239971b447e2a4fc63c10f542c9927c1a72af2809d48a09ca9dafeb50d9f1a736c208dd187b34b5415640819594f4599b06c5a93f7815ca6e6c2fc668e01ec

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\krpt.dll

        Filesize

        86KB

        MD5

        f5f21888065a3972afd5758c74ee54e6

        SHA1

        e4e96da5b12d2e5576500659e9196439b08f5140

        SHA256

        2ba88cdca118999fa1f2e119de77d6324b16a0bd22997512d079d400cc6ef84a

        SHA512

        620120e00807775b1e3169389dd9baf26c48d3646f927594543055bebb00c81b81d4527549351ef7e7cccf8111d350feeeabbfe44ca434dd0ef57a7b2fb861b6

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\krt.dll

        Filesize

        953KB

        MD5

        8074812fd986ca2116c219e35f1c62dc

        SHA1

        e9f72fad47ce94f3306d685a76483b013530916a

        SHA256

        bd346ef9c4f0118b841e9d7d0eb49749cb81bd2b549365c9be394046d956be71

        SHA512

        39332fd5084e497cd4998f6e18b3706f324d7b7f16eef7afecee126bdde28edb8d4897ffd204f4e40539001717bea2b08073fa2298dc3ef03f0fba6919cc24e8

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksolite.dll

        Filesize

        9.3MB

        MD5

        469c2a814a3bc35c804764de29d30a84

        SHA1

        743c41835dd57a8ddf31ad0066ee07a541e21c27

        SHA256

        a04c4ebecf0dfe46bcd113726edb3ccb46575d655318283a88c02f75da6c1c32

        SHA512

        d08a0c990eb34fc58421e8f48c98d3c9a047814c73e46d71165e8beb5243191d56afa2179fac62da7ffd5555bcc22b447a4f6fb7595c6c66a8f80910b64439c2

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksolog.dll

        Filesize

        211KB

        MD5

        0a684b21acb673e7e7e4f62a12698458

        SHA1

        01d1240b399bf556abf8f8f50f7d94447013d063

        SHA256

        3bdce9ad8bbf953217a8f5968deb12a056e04f351029d3a6288cf4d31e4c5302

        SHA512

        d049f53cef514c1ea5513fbd5174a7019d1e9f058ccc9d246ff1d1fd93a2bb577978c38ffa798a0ed3bb395556daf850c7be0784755c0236ddb0d5cc9e1fbc28

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe

        Filesize

        3.0MB

        MD5

        75742bbf10df9fa3be5b48a5aa0b7a0f

        SHA1

        431d42986fd9d198c0edd3555991ad8b7be68822

        SHA256

        de198d6174ec79954964fbc1cf758e4e42f323615492540cce90d1f4432da226

        SHA512

        e5219a3ca7b4c9eb791128ca905b653cebfad4df751282ca1f0f28b5d026d5b24c420b4ee00c09e53106c6059e20ac9c2581e4997674accd892f5a76d05bc3ac

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\mui\ja_JP\resource\splash\hdpi\2x\ent_background_2019_wpsoffice.png

        Filesize

        236KB

        MD5

        c5ad1903526a9ca4c2f55cfea1e22778

        SHA1

        9c7b9ba9100a919cad272fb85ff95c4cde45de9f

        SHA256

        5e7ba996d2331f37b9799767c0fa806cab9a39fea434796ab08dcaf39096e334

        SHA512

        e482142e81fbe71666b40f7a2c53702b4278436a0240e0f56200443cf4235d9942cccc3545cc01486d53a0972be553cbf93442e8b05de7b4fcd1fe8a4ec16bb4

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\qt.conf

        Filesize

        271B

        MD5

        351fdc16f8e5ec3105aeb289397a06bc

        SHA1

        115bcf3e66703597ef4fb42acbdf3be37fff221b

        SHA256

        b54bcf83fa006bf38dc845507e31dd5ae559ed68d45acc12ae1561142661a7d8

        SHA512

        4cb802df20b51b5bac7ac78f983c191c9c81541204b7ee30683ff55f65694926d144b8003cc504e9c8f16da92ef5d17d5d904050e7915a6615f7c62abec38cae

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\qt\plugins\platforms\qdirect2d.dll

        Filesize

        1.4MB

        MD5

        b120a3c32571f1ea2da38aa7bc3fb65f

        SHA1

        652d1cc2759e96df7c668b78501a609af5a6a045

        SHA256

        23168a629ec4bd8ab76ef93d32318d70643b0b7714f5be9534190075232fce49

        SHA512

        29283cc3be5f7609f921ef721366f55238456c8c0f574af30c65f6fb266ef699e09316aff5ec6d14b31090ad7f0e6d516d18f9a144df8317b0df0d71e81e7dbf

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe

        Filesize

        957KB

        MD5

        144c48713c3dcf8961602bc008bc0fa3

        SHA1

        47fe6c8e5d35cda6092d2aa1ca119b3b097858e2

        SHA256

        9ab28c6f66d8900a2f3b3d78c0f1ea6cc1abd55e86c17422c0632997800ac846

        SHA512

        0209e683ca66750e9ba44e47da08a67017bf460e669e7d36998e5504ab8114c8004760457a503c447eb890a0e05fc82cc69b713cab4062a815176be3fb3721a8

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\utility\install.ini

        Filesize

        499B

        MD5

        183330feb3b9701fec096dcbfd8e67e4

        SHA1

        2f43379fefa868319a2baae7998cc62dc2fc201d

        SHA256

        ac4f26a184114522200169c5f57a0af4498a20d19b7ec6def14dd2c6413eb475

        SHA512

        643cc197456f15da6ddd6eb904f2b25ad4236a24310d575958c0c8e457a33167e748d21184162502a295fa466c031a837511d4d5348fd67499ede1b60065c471

      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\utility\install.ini

        Filesize

        675B

        MD5

        80874ee5694f7c6b0319cf021cd384ab

        SHA1

        0121d759b81d39b06ce8f8b0cea8f4377c2b874c

        SHA256

        3b55564dbd0a88cafd3a201300999d24f955f71dc06471fb6fbf3271de1c3fc7

        SHA512

        9cbcb728aedf9304176b093d51b66e003904a9449cc87546236248c30424c09343029b33edfb10628fb09f2201793bdacd84774ac0d0f215b39636eb60d602a2

      • C:\Users\Admin\AppData\Local\Temp\Kingsoft\WPS Office.lnk

        Filesize

        2KB

        MD5

        137c700e017be0c658b79fafc8973068

        SHA1

        d47766dd3a287b480b6e058e7f2c2b9f6709cfaf

        SHA256

        58c9af8d094db4160f39f008dc3183c7cd072e5c8376824818dcfc91621ade36

        SHA512

        a76f6585c3c87b316d0f772f8b6d4774961bc629bce316d776b86725cf0c3f82b41ad25998ba753cc475f59dfe050a57f361214146984b0221e116cc6b7f9da2

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\Qt5CoreKso.dll

        Filesize

        5.0MB

        MD5

        8104fdcc2caa3b42b140d8498eae6cfe

        SHA1

        1413352da713c786d1ff9be2eddda36a8245a8e5

        SHA256

        5a3ea2eee0535589b0de2c1468891c2285570136257261eb50c2744bf5d8fc9e

        SHA512

        20f83309437afc57bd4ef58d48c54c229482fd10e3b0e7e93bc8ec637dabb6ce7b6ab67942d97a35b0ff7c8694d054fa3f87a0050c04678509be99cddfaaf675

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\Qt5GuiKso.dll

        Filesize

        5.3MB

        MD5

        cd71405fd88a13daeaadc9122878f294

        SHA1

        2eb6ca95ede0507b7fd0fae164b34cebb61dd639

        SHA256

        39963edad28df386ae535070b20371a5ba4de445912df1b1cabff915c82364cf

        SHA512

        d573962fd3f15f6701477b328d3395a5e4c78fd847e5e7123ab7d58d5e3d51d959765f16e6848fd879e0c527ccdb115aa312074905380a3ac4881dbaca316fe6

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\Qt5SvgKso.dll

        Filesize

        378KB

        MD5

        74f1aae0ad9c77088879f0f068603b14

        SHA1

        4dc66aca99fca616801e7e1e08eb61e87ad65ef0

        SHA256

        6bf93e0575acec1c1bccf7e4d33a4c9a4f12c51811c41ed695115bcc60081d4f

        SHA512

        dcabee00b11db242552827663bd8eaba89bb94e4ed2f02793467c21630124074acdd1d55682a56d9b5875b3626ccff99cbab666ebdc8820d1bd4d058ce1ca029

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\Qt5WidgetsKso.dll

        Filesize

        4.4MB

        MD5

        4cf25152e7fdc3863d35ab01ed7e5f95

        SHA1

        bcf5d327cbd6d6b3903d47c63516d81f56361229

        SHA256

        c70e1ad07aa161eb6dd42fe5109c910ea358935c653c0082654f6810df844b5f

        SHA512

        706d2edb3c9f4a32554cf07d5faeaa2b7aa8d22f0f0c0076541efd73e093387dd264026dcbae7b790cafd260257288449048df7b277f8407278bf127da669a14

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\Qt5WinExtrasKso.dll

        Filesize

        445KB

        MD5

        b3843e058782a993918045cb73d84e25

        SHA1

        dbbc24f2da2e5b9b94a00aa41c08935be184c12d

        SHA256

        aa696dc9058ed7987675837be2601edd28306a42153d5112dacc9b156a1fceb1

        SHA512

        3c237aa06409d774f6bbd3aa1116677a39f5f8f166dfcfa2fecab9d266f5b247bb9d2d623ce780631f857366059ce204912c039c7b5352cd2d5a7cbfb748a10e

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\dbghelp.dll

        Filesize

        1.2MB

        MD5

        3579da0e10644a74953f6158456b7793

        SHA1

        75007a9ac779d65dab95aeb8166b328d7f542af2

        SHA256

        520279e5806416e7f64809eaf0c6570d04e5c4d2e9ba912b53f7288639a5dc19

        SHA512

        8f46bf067495ea812ba515b820537dc39878e1486259365a414ed05fb47e28473b13cc2c2a939c772c1ef34f551d9b003445b6bd0210621a8d1dd8aeaa16df80

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\kpacketui.dll

        Filesize

        2.9MB

        MD5

        74db79ac13ed0fff6188bc715c885d1f

        SHA1

        550dc1e295285ff5b9f0af44bdf7df6504c08de2

        SHA256

        ea52c2e5a544634cb9c3af20eb4ef25cc6d572d606e88c7427bfbfc7f3706aa2

        SHA512

        dd7a2d90bfe6103e0aa72eac8e5669fb6a18d0b88fb5da5ec42002ff2f5bdcc7bf733f1d3ed6b64e74f109eeb8463cc6a176cff30520f899729ce0e0bfe9f52b

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\msvcp140.dll

        Filesize

        439KB

        MD5

        5fd0772c30a923159055e87395f96d86

        SHA1

        4a20f687c84eb327e3cb7a4a60fe597666607cf3

        SHA256

        02c7259456eac8cbadfb460377ba68e98282400c7a4a9d0bf49b3313ef6d554d

        SHA512

        132a9b969104c0a214bde3f8c6e8f754d116cecdad55224bbea7a40cffd98f4e4de503d83d92cca0aaab9ed51c9efa00ad5caed69a9eda71013598a43b161c3a

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\qt\plugins\iconengines\qsvgicon.dll

        Filesize

        61KB

        MD5

        d2a04dc52ea4ffcadb4881c9c120b9b3

        SHA1

        5ff9b4de60e3868697d81fb910b373c7c0a7c4a5

        SHA256

        271815def5e81d60dce20a982ad9cec1dc08fb43bf37a29c1266a5a367e5f3fc

        SHA512

        3ef40bf306275ff0202d24209274f7a00acf268763ff3e7d5abd81c84b2a398701a2b317aa00e67316b74aef734e11edaeb3e08fa2adeada77e6663cf143bf2c

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\qt\plugins\imageformats\qsvg.dll

        Filesize

        41KB

        MD5

        6dd89155cc60c5daf2bec34971d45f56

        SHA1

        5c550dcaa072296d7697947e15daa629b78fae6f

        SHA256

        e32f73979f372cb76088df4ca8ee621ff9f853352d5236ee14854868212b601b

        SHA512

        9896a47418e15b13902cf5300f9331d818d94708f76949f56c28bbecc241e1c0aa153473bde30aa723381045decd01bc375ccdee9b07e00a31dbafa1f51cc961

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\qt\plugins\platforms\qwindows.dll

        Filesize

        1.3MB

        MD5

        9f471c987bb028f30b5a51ca83fc5586

        SHA1

        d91252f67c70e1b17138133c0d31463da1184176

        SHA256

        555c000fdbddab11c017da8055f58169a55f8772dbac78ca8e4572a6553db071

        SHA512

        cc42fdb7ff0d20f485e9d5bcf7df5bf3b79e626ef44c3cae23e9179cf97b197564cb73fa4f2521495f95a3e337c1f0d533f6d3f2c36900a84dc2f546ef5e9474

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\qt\plugins\printsupport\windowsprintersupport.dll

        Filesize

        70KB

        MD5

        ec662568b9acfc2930375dc40935823c

        SHA1

        d055469955e8c947cdba8063be36524ef29f78d0

        SHA256

        4c51ba181dff507f1b495e0a2c8ccad469b5a4eb51523e18ddb3a0b886f2300c

        SHA512

        ff9898df75781f91a443460161ac591f04e23f566ca85628ea9ce56a2ba15761ef4e6c23e8952371529efb9e96e4ac4aa16733ea710d1cb65fa2f450171f8f0b

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\qt\plugins\styles\qwindowsvistastyle.dll

        Filesize

        146KB

        MD5

        e128074d836e990fa6e8c20c16598f6a

        SHA1

        16c786082777f3f80a486d2303360e06f63ed599

        SHA256

        88910fcdc54e2a80a7ec124920cf0af8ee1221480c2ebfd181555ec6e6a9088d

        SHA512

        82e95748595102467b0248a7981137e269b8c6123f5383eef40017a0fe41141d59156a6b48bf6d574ed60d8d7929a9a9f34ccb8e07e5089af4ca100a9b765526

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\ucrtbase.dll

        Filesize

        1.1MB

        MD5

        2040cdcd779bbebad36d36035c675d99

        SHA1

        918bc19f55e656f6d6b1e4713604483eb997ea15

        SHA256

        2ad9a105a9caa24f41e7b1a6f303c07e6faeceaf3aaf43ebd644d9d5746a4359

        SHA512

        83dc3c7e35f0f83e1224505d04cdbaee12b7ea37a2c3367cb4fccc4fff3e5923cf8a79dd513c33a667d8231b1cc6cfb1e33f957d92e195892060a22f53c7532f

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\vcruntime140.dll

        Filesize

        81KB

        MD5

        e51018e4985943c51ff91471f8906504

        SHA1

        5899aaccdb692dbdffdaa35436c47d17c130cfd0

        SHA256

        ff9c1123cff493a8f5eacb91115611b6c1c808b30c82af9b6f388c0ef1f6b46d

        SHA512

        2fe5ddad2100aeaea35398384a440ba0be169ef429f7e0b69687bc0f8865df41bc93fc80d3a8f0ddd9df54fc2f2d76b1056a1d1962d37432704c818128ffbd74

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\pl_PL\style.xml

        Filesize

        3KB

        MD5

        034f37e6536c1430d55f64168b7e9f05

        SHA1

        dd08c0ef0d086dfbe59797990a74dab14fc850e2

        SHA256

        183a140011774d955e9de189e7a1d53cb4128d6abed61c7bfd5994268ee5f384

        SHA512

        0e1911c882152a4e1059a3ce1880d7fb2aed1e1e36cbd37055de2e2a1333acb2a0233ba2a4d969ccebbef1e77809aa5e78807aa9239545beae8c548c0f8f35c0

      • C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\product.dat

        Filesize

        112KB

        MD5

        e568b6577db690b099db51338853f0be

        SHA1

        2d24319c334b6319bb19c580f537e6339de48bc5

        SHA256

        257f1947e656eced86713f72deea7261afe30bb07e9c4f109ea29a6c2df63f16

        SHA512

        16cf5f031bd8a3e1998b350913d7963140c95ef75e8cac2a5f878a9d3c80691fae24463ad9af64a426fe97dc78a0f51edf75b4a92429191c0809bfcd0f0aefac

      • C:\Users\Admin\AppData\Local\tempinstall.ini

        Filesize

        387B

        MD5

        c38481658f9149eba0b9b8fcbcb16708

        SHA1

        f16a40af74c0a04a331f7833251e3958d033d4da

        SHA256

        d0d73f49bc21b62fe05c47024d69406a3227da0f6b4ffe237726e6a031f188d2

        SHA512

        8f98d62f88442b8ef94aa10074e35aa8d9494f3c76ce8b143ca0bf7fa0d917f3175212fbcd6e7b0597fd0ec0e1b2827f157135512fb01c88218d36e2f7dd73ce

      • C:\Users\Admin\AppData\Local\tempinstall.ini

        Filesize

        433B

        MD5

        a9519168ca6299588edf9bd39c10828a

        SHA1

        9f0635e39d50d15af39f5e2c52ad240a428b5636

        SHA256

        9e87b2ff306efedf7bf1074749b4602c332bc825aed80721eba19d5f544d2ec3

        SHA512

        0607eb1f5598320961fbd8ef75beeb1b6dc1af3cae7eeb5ba352f3e2a2edb25e1d9e68fb46c24e4299957352c0c906314c889c2d1092437eccc1d1a0485f3557

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CGO8HY13TCNNGG45A2SJ.temp

        Filesize

        8KB

        MD5

        520d47101fd385d21ca49280fa027381

        SHA1

        4de0f81036b9269dca64e0b294b450d706db87bd

        SHA256

        771e06db825dcbfc3d4b12c7e2d40a2a1dedc6bb7bea475be236256f0e40484d

        SHA512

        61f9399fed86cbe6ad837ce8fdba2afa64e45fca8efa3cb66d64b3157b4c70913b1da215be75ee1ee94f2566926d08bce09146c6ab80d7338c3eba06805c7ab8

      • C:\Users\Admin\AppData\Roaming\kingsoft\office6\cfg\onlineconfig.data

        Filesize

        905KB

        MD5

        7a00128dcd5836bcb83c87c095c5c55a

        SHA1

        994f8b3628b1dd2cbbea70c5a63c0badb292ccb4

        SHA256

        d7ca5e9cfcd2d72c0ab33eba5ec89ed7c4e9fd7d5136f877d50ba7e35b32a4f3

        SHA512

        4f2a55152cb288b4f80051c0964bf784bc794c147385d8e5bcde0de358546b3d7d22707964f94e291beb5ec06609de527fdbb3f64f95907f52b415aa4fd79222

      • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\ksomisc\ksomisc_2024_05_18.log

        Filesize

        4KB

        MD5

        2e395b6edcfd9ff478c651f0b54645ac

        SHA1

        536b8049006d5ff35416fa92d466fb336f9c9786

        SHA256

        0b48faa78c106b8e04e5d498655544480cdb7714fe9621c3e50bac6b9480dd9b

        SHA512

        865a5528e28d30ced69b6d3df87078e517588edf81dcde353e0199e33c46edbeb6819ccada8d541263c4afbc641fc7a87749d2e3ad5875955329329f22f4cd0a

      • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

        Filesize

        11KB

        MD5

        fd51bfb9d1c5d581ff356e5ee2188e51

        SHA1

        c4c1ecff6b3ed645df37072e515b6d92a51f5943

        SHA256

        7bfb5935a24859fcc0f74cfcd87007314bf86869ad35405caec907ed3ece5374

        SHA512

        a8745770854367ddd4a81a4ae8918951d778a9dd99d3a1bdef0017f1b905627dbf0187e77cb71e679892085f9f674368ee626ddc43dc5b73ec8f61ae604bff12

      • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

        Filesize

        13KB

        MD5

        2e8f1b31306fe53785450af6b93a11d4

        SHA1

        b1fd86570735318a8be3106fc8521ca327780a9d

        SHA256

        40152cb4a8561dba6a801d18d12c1222eea7a348a6229e49ea3f76752eb45ad6

        SHA512

        530b02d4194e0f0c7e6f87482df104972cbdfce0358020e0d9ee24bd65e83edce33e31475b94565957f621a3ff03a5337822f5b261ea77b9c91e21b17a3f14e2

      • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

        Filesize

        29KB

        MD5

        c09d4b1c73cc6860082f818d03028da5

        SHA1

        f03b57d142094ff38cbd8121e1fb495f11ee5abb

        SHA256

        3f9216332eb50aff4eb092fba99c8a0fe1133dc84c04fac1b455b80df25c4c99

        SHA512

        13e277b985989722610099155cb676bfa2859b64676514e3c9929e5f4947abc4e38f2d8489456efc63d949b9add56ee7f3d7dc1ab38fe421dff435abea7e18cc

      • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

        Filesize

        48KB

        MD5

        8d1ac5f96fc82002b1d8f71832c18a8c

        SHA1

        6559670313ac5927cec7ef9ca556cab09c19373f

        SHA256

        e8f5faf13a56c6f3314b4e9448f7d92e10742150eac9ee1f8fc1410a1e8f9a47

        SHA512

        608fea45d2d40a82a6d2379ba3746a11170be85cf561928d0986e435ac199dba209a57cc8a4f641de72128a32f931cf1aff53d2944101e51e339ec6bcd27f8fd

      • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

        Filesize

        48KB

        MD5

        956b9f4ab07d42bec6fb720ba577f214

        SHA1

        dcbcc6bd5265a71e1f9a6aa067e4c3190f584521

        SHA256

        c3ba54590e2f3e76d9a5363f30d6411759f36faaf867d3d7749072d724c1ed6a

        SHA512

        df8206993c70629c25bf0ea06849c82943519a6886f60a18762cca50b61ffe06cd80f7e822d7bd70a845a0af332cc0fd4ad173e68dd69ca19806cd70a5cf37c6

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Code Cache\js\index-dir\the-real-index

        Filesize

        168B

        MD5

        b25ca583298164c4331f7c092733b58b

        SHA1

        7a14cd642dfc08384634c72130b071ca8e80131c

        SHA256

        12087dcd761a9238c10e95551b7594b84c476008e5ad73100d665e0c944c7bbb

        SHA512

        1c8a78c2406a2b9c7a5aec39e2d83bc2af9adbe719ab83d22367799deeff0182f2d0438956c0bdd8bf5a6fc86e4a29ddfc782c4cbe8af25f5468331575bcb6b5

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Code Cache\js\index-dir\the-real-index~RFe591b9c.TMP

        Filesize

        48B

        MD5

        ef7bcc32338de1ef3673432bef6937f0

        SHA1

        8e6700bbb8226ed647240783732a872cc0764611

        SHA256

        04308b68455c54990447ede41b72c862ae95535c923a14901b1594d869a13a07

        SHA512

        5b9ea6d4d8caeac84bfe5b9817e960209ca62dd66e167abf45ef27f77118d8133971a34b1c00411a6e92d60c6192786188d527ba47c7b9132dab648c051b879e

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Local Storage\leveldb\CURRENT

        Filesize

        16B

        MD5

        46295cac801e5d4857d09837238a6394

        SHA1

        44e0fa1b517dbf802b18faf0785eeea6ac51594b

        SHA256

        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

        SHA512

        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Network\TransportSecurity

        Filesize

        370B

        MD5

        ec31d14e8c3bcc35cd6c4dbbdba9cf61

        SHA1

        9dbb839b85d3c01ee8136f980ba504558817f0fd

        SHA256

        3cba255491d218a0e022fd4a4d8b7bb4cab14bc9606cc0430295dd73cd2a1782

        SHA512

        5f1955b9012628ab953d9ebde7eb28a7bed03e8086adaf0b771645df99aa7b19f2a6b3f818f0386532a6293d423b8403bf2acac58b0cf8ed9bac8777ca03b199

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Network\TransportSecurity~RFe58f509.TMP

        Filesize

        370B

        MD5

        2ceb914f3859e5cc4ed58b010a199566

        SHA1

        4e04ef98a22c9c3a52738e4ce0f2e4b4de3c9ee1

        SHA256

        d1db34e891ccbab71b4d800d5c9a0ce9c02a4b4a0c94e6d4f50d4afd20b1d383

        SHA512

        dbcb51d6a58c83debded4806bd1bffc56d1df3d4f3aff4522cd63b33c3d282b615e5a00280887a32536d113daf259eb37d2b96c6c0043d4321d0b6c625a5815e

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Session Storage\MANIFEST-000001

        Filesize

        41B

        MD5

        5af87dfd673ba2115e2fcf5cfdb727ab

        SHA1

        d5b5bbf396dc291274584ef71f444f420b6056f1

        SHA256

        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

        SHA512

        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\chromeguide\plugin.plg

        Filesize

        720B

        MD5

        6af57b8623702b7f92a6ace7a00e2c7c

        SHA1

        d48b17a1fec2e5ad9dd51fcfa259e3c5191e66ec

        SHA256

        2b459473c2c63fb5d9fcd1f8ffcf7994cc6b4d15a85bd7ef4a0ff7e450580a22

        SHA512

        7607acc3b3de3cd1cb26e5e71952036396813fbd25f03aeeebdb9d596a74bbee8c20e509818c9b1f8e9d9bd476f53e2f20406b5efdd17cef0612e5dbc7459817

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\et\plugin.plg

        Filesize

        14KB

        MD5

        f30cc2dfc402cbbc189a31d2b923948c

        SHA1

        e571f00bb69b6dd8e93c6eb9beed9d7af5018118

        SHA256

        32dc7ac26d69df582b29bbfa5058c4bc1b96b3019d506efd2ad8aaebac2f6192

        SHA512

        6768dd66e8e3cc9c837c82235064b5394fc59ea7cb87eb10f3d9755057940bd60c1d4490bd44b9185e8987cad40ac0f1d1a86b4e2b459cca7f53229073a8f4c2

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\kappframework\plugin.plg

        Filesize

        1KB

        MD5

        0da1755dea1fa0008a4c830b62bf1de5

        SHA1

        dd3ca88bbd8d03cfef28973b8c71f45d245affc4

        SHA256

        f61b999d4f563010a4e973f1300ad27e72c2abb1044916bb2512c95c3af3d72c

        SHA512

        8d5f8933a5f08d63d23f6baf71471ff7bfba87be93105ca46efab68a1cf7020aeaee4bda1052d35de80df9135862b3723f5153fceb7e4641a6bdeb43e43724b3

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\pdf2word\plugin.plg

        Filesize

        744B

        MD5

        6aa6bf8d533b836af93e892ddff11514

        SHA1

        335a6a6ff40d1ca0913a9f76e60ebc46f686b3a1

        SHA256

        e339d3549b8331a89a1d4ed4dbba246250130e47c5b62b93b87d93975e28f382

        SHA512

        04f40987aa9c35da5000cb8068c01ce2054778201756488b5ed4c88a5705e4996d8cea15ef3de21867fdb335a8000965a37c95da210cfd652d3d96f6b009516a

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\pdf\plugin.plg

        Filesize

        8KB

        MD5

        314105a1c9caca5bd7f97e30e73953aa

        SHA1

        8e759c1daf0b8230adacedf276e0f40a7f9dde24

        SHA256

        7474e7f00e58e485530e6ee085a6a014bbd5d40590f58e51021af87250efa1ef

        SHA512

        7f96ad0857ce1b7a088007c0f2504c4ef4fd81f60deba53eba62a5e80b14b5c9faec34c31dab851d060b13028a113e264bd73d8999a7451483e52fd27483b06e

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\photo\plugin.plg

        Filesize

        2KB

        MD5

        eb073eab41d0f05c5969beaf95fe4442

        SHA1

        f455b8245376eda259cdb2135d0c336e88faab73

        SHA256

        74aaf9c01b5ecb4bb497db031001f18a7657119bf3fbc0e856cc9e98b2fea6b2

        SHA512

        68b14179f4b73f3fc2d762f026996103531e57c51cb55b379ac27cf04bbee35cdbcb4ab8ea5691627cf15ee1bfd6fb7bc83ce8e138d030225b5fc6239d720da4

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\plgpack.plgx

        Filesize

        5KB

        MD5

        79467768f8e67b9ecfc2a69c57b37d5e

        SHA1

        7980308f4d33d36a2741734c500c15c690e1167f

        SHA256

        bbb216615156aef19eeb94a015d5321785897b14a59bb29f9f37abe9c24e7593

        SHA512

        53403ffa67fc2a0b0200b53c96d5417c288c9b31e5681096fedb736684e54aafc9faba377646df5d4b568ab922cb5185112b8e0b0ed70ddac48b0c165144471d

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\qing\plugin.plg

        Filesize

        8KB

        MD5

        8dafaf3acac2c764dd7fc93327d78d92

        SHA1

        c458c8574850dae5270e1216b7455f0715dc4d54

        SHA256

        4745f8a00288b347a556ebf5260dd5ac486b660841b78988c4d9b863b1695a08

        SHA512

        1d06d82bb8add22897cce9dc13cada08284679751fff0a376974e38d06fe53ff3563703bf293e9a6489f00f4d4e72076174f35d4fd444134580ef7add7493f13

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\wpp\plugin.plg

        Filesize

        14KB

        MD5

        dd898c4aaa520d6818f81ad4d29a0c40

        SHA1

        dc5e02e487c662ac2d5d477a7d7e8c77d10dd91e

        SHA256

        32e1d123dd81416a4c204cb6a495e27ade0d44d95addc670b0e98d8f46a590fa

        SHA512

        efd2103678c2af0d8d2081ffc54bfc70c8d1552a1994825cee45539fc49a0b5fa07da9526f30d18252788a3dcb2bbfbd93d4284331aaa023a3013bc2fffd386d

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\wps\plugin.plg

        Filesize

        14KB

        MD5

        0f6cf0de4e4e3983a9c4178419b8b35d

        SHA1

        7dd54230694d06b6689a39777cb7b45089931402

        SHA256

        29fe0b57492f7341d624dba85b2bb0d37a860def1711c8089ef2133ef3722fdb

        SHA512

        979198bd8d3cd8db66a2f3eae81a0ed45235d31ba5178bf9281def7c3ec9401d846f2a003c267fde893b638d3d34bc41116798ad82aab05f73007d42aeeede5e

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\wpsbox\plugin.plg

        Filesize

        776B

        MD5

        09de07ef39096abe1ff1393c79c61aa8

        SHA1

        264c4af132256ebb9aa9c116616e3049d8232040

        SHA256

        cec66902608943329bb1ef1e4feeeba88ffa03dc608a8c862edb4eedccdb14fa

        SHA512

        604b13c97db3b43d03968e640ea9f7b2961b64068624ac8f0daba1d82c07ee7297a0970ab49a91a1d28036bffd30ea11da1c4f155ccfaf7e517ba77dc2e47978

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\wpsoffice\plugin.plg

        Filesize

        7KB

        MD5

        ff27ef23340f1641e4ee8ea45acd5329

        SHA1

        b6cff5b913ddfc7808791240f9cb2edc98b2fd6f

        SHA256

        77c8454463329ba8fff2f8e0bed3c37e444ef57fa2f0bbabe3e2997dc0b5893d

        SHA512

        1d76f33b0ec224735bafbd04b4e50ffc857008c9d4b7264568839d46c23789fa2d5ed96aeafedf6ff1dbd16266b19ecda43ba3e711ed2b2eb4bf27443c72716f

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\chromelauncher.exe

        Filesize

        110KB

        MD5

        171b5f7b065e6fbbcc5913112701d902

        SHA1

        0d7e11dd212cdc8e1864bab08450f0ec14941bdc

        SHA256

        8bb50578ce904020146d7f0bda4a56c1f50fb428c8ca611f5647383507806d65

        SHA512

        675529df23235581ab2bd789ba0bff1863a96480c47b46ba44115a7e8675fd54fd2de3e52251c94560716841282d75d9b0345f98693783a8b027c4dca7fc8240

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\download.7z

        Filesize

        2.2MB

        MD5

        23dfb30abc2b062edc251b1235804a41

        SHA1

        402ef99a0a3c68af625c28970756fbd039e72ea6

        SHA256

        49ace3f33d1d70b683bcc954af12578565f869cc6af421fb8e9e7e8b7ab1a0b5

        SHA512

        37160c2277794c2c383c9cf0a7273b6f74e9b2c84a98e3cbae90ff74abe273508ea1f97763836a0f7eb6b96febe183bb1c992c8b9abdb9a735dfa9e5d84caf54

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\run.ini

        Filesize

        443B

        MD5

        4e1aecfb8f941521e3a16cbbcf1e3418

        SHA1

        d61831a61049424ce80f5076e91be965d764e32e

        SHA256

        bbc30b97c2d501333061f4f77439a2da8e8454b8cf5602467af260c9bebb6b18

        SHA512

        ee74b3eba02b80ca9032d1c1afc5b436031e57ac4a7a52924185b2c8eabae81f3309a089fb9f23864b43363d9d3587a7338da2c4e1c33991d5648ec361c9a9ef

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdiagnostictool_1.1.2022.118\download.7z

        Filesize

        275KB

        MD5

        422a47b49c81c94a1f10078e376096da

        SHA1

        b2454a1d09f83138c903d9502c32124d6360904d

        SHA256

        9b9eb4c2cec67ed2aa307ed978701ddc86f0b63ab63fdf9b3430a91237a5f59c

        SHA512

        2803ae66ca2a6b2e4a4881a1266c02048d8d4a86a9ffcd01696b4463d3a18846261877933fa4cff503ca984d59976effde7de0db830b96fa4267c4d41ebcfdab

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdiagnostictool_1.1.2022.118\mui\es_MX\kdiagnostictool.qm

        Filesize

        3KB

        MD5

        5afc7d8ba894df59c2b3f44726cfc2db

        SHA1

        a21a7a8fd943455fa47cc5d950603bf1bc5a145a

        SHA256

        4824e414e29358d0011ad1195059bda195a90cedfbd4c0f07f8cdeb0e84dc2be

        SHA512

        a9a040e0f3555f61094b42202581a262d29377d414dc6a87596a2bbe4daea8fa3bf2eb10ac52fa6d94a522d54f404e247ee7b272cb41acda898ed6734c8ed639

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdiagnostictool_1.1.2022.118\mui\fr_FR\kdiagnostictool.qm

        Filesize

        3KB

        MD5

        62f3720e184f094c874fe0eab7f0f598

        SHA1

        cdd858a80bbd1268e7c5278ebe19c35659871d2b

        SHA256

        bdf3b27cc070b3cd9deb9a5e2bea450382d6851723c266eb0d5f3db4798f5a14

        SHA512

        14f532053b0272fe0c614de9b56bfd9ac85aee11e878e099531250b00f667d2428789e81b5ded64cbe51dc8e3e8e19d7cea8dc08314b1c0274de15fca17b92b6

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdocreminder_1.1.2021.136\download.7z

        Filesize

        103KB

        MD5

        31bdb9137432706b904e8dfcdccde030

        SHA1

        d26fd902b9bc1048731983854ac605e894075130

        SHA256

        af28e7d61a9b2467a78098341ca188626a90acfa0df4b8f81587d1c35f89a55a

        SHA512

        119341029755a087f45a32d3d94dc320fbbc7f599ba9ab20dad4479e1a08d24eb7799cdefcb47051ba835e7fe2c220e4e153a3d660b9a22e2a56cf82910e0280

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdocreminder_1.1.2021.136\run.ini

        Filesize

        292B

        MD5

        da4b75c3d70c08be415e7b25abdc11cf

        SHA1

        c84dfbb528a3c8ce94d068dfc5fbdf7d621d0225

        SHA256

        e93c62beee030970bf56bf0a3aa372ab0b155c1c3436173617c8c735024e8f36

        SHA512

        0fa811055deed42a6cbc0f16f93da173718f4169ebf8d4ea125276c6225ba033c7644a68ee010250379b67a057e17e5cba6351deca067850ab318c505f49e491

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kguidestartuppane_xa_1.0.2024.13\download.7z

        Filesize

        543KB

        MD5

        fa94183af39197b82a107533bdb0a610

        SHA1

        0f9544703170d7318bc49a042e2480a476619055

        SHA256

        193b61e14e9f4cc13ec7262ab2433e009c897af0a64c1a188c21f4bcf3d65b0a

        SHA512

        c39fc25a3b72ca18b662af5d1d2279a355c13c772bef8b465cbeb2bb80691337feb70a223ca787d393f4844bc2626d3e2ee32262fd51e7706ba41c0a1f06b159

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kguidestartuppane_xa_1.0.2024.13\mui\default\icons_svg.data

        Filesize

        39KB

        MD5

        e824781565af44e6bb0f6449e58109d9

        SHA1

        e7de21c809c17618ca8e8e1330f0ef93b6c94478

        SHA256

        a387033e51aac2002992fa43626d78f68f68af3193b57d905c7af9cf9c7884f4

        SHA512

        43de1016628cd7ac15d2be41a986914877e7a987801c6ebf6292e43e9ea23a3a6f4584435f0556085417af18b87cb113fdf8f8cfa3cddd5e1db7163d7183de88

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kheaderupgradenotice_1.1.2024.4\download.7z

        Filesize

        202KB

        MD5

        ded028d22792f4a299acbd2d410e5f0d

        SHA1

        940944738e557237c0099117c635da874cf78263

        SHA256

        20d84711493557b73f42b31171cc6840a8079248209768ddc75d10da46ab6bc4

        SHA512

        28ff645f3e78ca9a88cbdaeebb47504178385627d1fbdf68b099901e8db3afc470251413a453c82e7633c232a7c4400789819213fe79e7e3518791775f8d54a9

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kheaderupgradenotice_1.1.2024.4\res\index.html

        Filesize

        1KB

        MD5

        66bbeb8733bee0c788685880cc46acc5

        SHA1

        07d104aa23fd4ad765095ea771667e1440ac6bca

        SHA256

        faf96f1472b09c6eed78da690151b5b57133733e2f562dc6678602746a79342b

        SHA512

        2d919a92b2c425d0f08d609fd825de151c5ce54cd31d83405054fa84194c85568ba512af4f1b38136c12152764ae0ae34441f36b4f23ed5ae74438502b0d1558

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kheaderupgradenotice_1.1.2024.4\res\static\js\manifest.js

        Filesize

        1KB

        MD5

        af5a4ff62384fe67791d8cde9176ac0d

        SHA1

        cf5aa9528fe795b75a569352466ad944652185c8

        SHA256

        5d1122539ce1ae98804e216cbfcada9f2603fe4f86454b2b29e7d7448da97891

        SHA512

        f78a72b7ba06b257fec3a97bb62d20f7562212e995d62438bfe3d8181fe7f56c3e14194e9203e64b0e259a7cbdd900125f5f185bc8d736c881f8ca0e2920273d

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\knewstylewebwidget_1.0.2024.2\download.7z

        Filesize

        26KB

        MD5

        d376efaf6d854b1bee45900c41ddf638

        SHA1

        e003e35e78e5b47295e0e24b941307557d0138b2

        SHA256

        8554d69d55cda9d3ce258b51cdbc891090de8d2e74b25790de8e4538bd9c78a3

        SHA512

        ea297acb09fb0c2b18f08751345087b5a5a301861e162bd25646f551ea5a4c0dcb09e27b33aa7604720eb326e21fe04ea0e047a5dcdbaae41a1c1086ac8ceb4d

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\download.7z

        Filesize

        3.6MB

        MD5

        fe5071e1c0de55db2399450162fabc08

        SHA1

        ca5565179714f1cb7a04a2900196df74881bec32

        SHA256

        535a8b166811e2e231a1ce3c2bcfc310e5987877e8dfd40cc8d7d5034cdfbbc3

        SHA512

        b72cf4f7722943646c8b6f4521b270c7d691e49b475f55ecab0bc44237f7115dc4a4de8a72c6539e745b2bd864179ea77ceb6326a4e320e0be7d4d2c7a40a2dd

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\premiumcode\element-icons.ttf

        Filesize

        54KB

        MD5

        732389ded34cb9c52dd88271f1345af9

        SHA1

        8058fc55ef8432832d0b3033680c73702562de0f

        SHA256

        a30f5b3ba6a48822eae041e0ca5412a289125e4ba661d047dae565ac43b4a6b2

        SHA512

        e8971ae48f5287d252f5b0a2d0516091bef0d2febf7d01fd7b435e426d106fea251037439ec42c2937e934b66f38e5eb43d00a213cdf334f482f4a06b1817f9c

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\premiumcode\element-icons.woff

        Filesize

        27KB

        MD5

        535877f50039c0cb49a6196a5b7517cd

        SHA1

        0000c4e27d38f9f8bbe4e58b5ce2477e589507a7

        SHA256

        ab40a58972be2ceab32e7e35dab3131b959aae63835d7bda1a79ae51f9a73c17

        SHA512

        da269b20f13fb5b0bb4628b75ec29e69bb2d36999e94b61a846cb58db679287a13d0aa38cdf64b2893558d183c4cc5df8da770e5a5b2a3288622cd4bd0e1c87b

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\vippayment\assist\base64.js

        Filesize

        6KB

        MD5

        12477cb6bc99f90086f05e54ea7dcbe8

        SHA1

        4009eefda873514a6579830888d5f12c50d7b3de

        SHA256

        6520eca957e8a4d7e68e0dfe17f1cea9d42c6378962f454e7a911ff32e5e6248

        SHA512

        a7a16f935d71f60bb382622ff781a3cef234865efbaef62ee268163a416bdd9ea285f33c843fb729cf8b8eb6d18a81de5311b01d19b48c998b08d79f29e59d13

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\vippayment\main\img\loading.svg

        Filesize

        1KB

        MD5

        544223e85768fd134633a1af9d5bf536

        SHA1

        5536a0023ddbfb2ab67e9ad8ca4d38c60f413b9a

        SHA256

        a3df9710c7e09fd8cffc14bfe45f5a1576deb1846ced44e5050b34caf5527049

        SHA512

        a5cacba054d41af8efd607074c02f36ab731b5d6bc9ffd3bd7ce6b09a4af09b31e29359eb965728d2a00849467b1af66e16186a0c07b4415b3b423a5ea4f68ca

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\krpt_1.0.0.107\download.7z

        Filesize

        703B

        MD5

        0edafbd62638a75ae8b4debc9fd0b3db

        SHA1

        814e953384ee2771bfcde0584b0f6f5691217ede

        SHA256

        3332953a07daf624094590bc8d2bf9d4ff1ec12c53a43a7310efa11c7cfb71e8

        SHA512

        ab42c6b7922f7137779417bdb5246ff660133f8d566a54fd067ecf787d27ffaee1d65704a4b9574a6fffede9b497b93638f558ff2689d375017d5b074ec88120

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kscreengrabapp_1.0.2020.193\download.7z

        Filesize

        22KB

        MD5

        3b91ab7795510566a0cb254022445a1b

        SHA1

        2894a929aaa08aafc6bc74278a1511cec2204223

        SHA256

        223f4d92777f385e8ac9f8055ce1362bbbcfa525e36933605481abfdf8f48c79

        SHA512

        53ac22c66f8883781d2904ddbc40d72fcbe9bfa586b5f4e1c083dc7ea45076ad1d2bfa9de2ce5e04b3c8bc9770f633249103761d7874e56662644d07cd502db2

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kvipupgradepage_xa_1.1.2024.1\download.7z

        Filesize

        30KB

        MD5

        d791a4c5021c3934aa216b9bf5b447d0

        SHA1

        f954fe837a9fda1f8172280beb2fe9b578a71a51

        SHA256

        1af1948f4c1f6f753b3a920a787552a072d88c060b7fd3a834343f0dc9f2fbfe

        SHA512

        32b91c12d8922ab3dbb9735770e8533c3de84c9562c3725606d42d50b3acb97891eb65660c7bdd36684c7fabca07e054aa8b4b667b6f701213e33f08a187bdf2

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kwebfissionactivity_1.1.2024.0\download.7z

        Filesize

        148KB

        MD5

        cc52c7912e7c1f213f6a2d79ba1760ef

        SHA1

        c41c1e31bb134869bb89a16e9bb8f67fa42a61d5

        SHA256

        7cec7edec74ddcf9c233cc440985149545b65597b965704022ff7677d8d15876

        SHA512

        58efb87a6f2c518d3450426ac1f6cb68f9e4b84ca987b3ea5bb1197f9cf0c17ff3d456cc5cacb2107ad86d63399ae29b67c1096f3b83cc627128cae3ce1fb280

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kwpsbubble_1.0.2024.3\download.7z

        Filesize

        56KB

        MD5

        54079bd7a79b895706cb6ad73cc4c627

        SHA1

        45068e27f84dcd16044f4628a020629d0360d8b7

        SHA256

        355d005cf859c66b298bf475fd646c67ba5fc952c9f670f1b964714b24f197df

        SHA512

        94d65c7336e0e8597a83c633dd734157ed17d03f9317b9857141724af6b5948c20f82180b4127dfac6da3dadbb4d8aea7ecf5d23d92e87ed719a480a5b1a6c68

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kwpsbubble_1.0.2024.3\run.ini

        Filesize

        312B

        MD5

        ad3a68e7d8c8bf2470282567d8ca7ded

        SHA1

        addb5ab04165b4743ffb985918c08ba0a76a6eae

        SHA256

        27e743bc78f9a2862d822fc171789160905ee26545466f93052f8565aebd523f

        SHA512

        c8e4b63fb79c365cb48a0ee0c4351f6f94da9ba8ce62f0b14d8ed45726ebaa478f581efb37e254e75e1c561f5ffa1d8985e867957c68c04b8eaaa2945e838505

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\pdfwspv_1.0.2024.3\download.7z

        Filesize

        5.1MB

        MD5

        3303884fbf771d8e3dd645bbc8bd76cc

        SHA1

        cef8fe59d3161645cec87eae5d8d426604e4f2a2

        SHA256

        77756cc9c3fa51ec2bd20a39f9c3ffabfb152ac4dd285bf8befae228971f7cf1

        SHA512

        053abe0567cf8e99c49b9bf3395dd5e8db1c360dd4805c516c9c97ebe0532b0a9090e6fc2f41fbaa910fae21e594d2850729dd527b72dfbbceb53e479f874b62

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\pdfwspv_1.0.2024.3\pdfwspv.dll

        Filesize

        165KB

        MD5

        4c6221b526433ba802635e2fa0d53ff2

        SHA1

        059bf2b126ee3b901b7a9dee8b53c7e648cc5ebf

        SHA256

        300994947e4af25ddcea546e285f9d35131e7efa0070d9855d873646d4a73177

        SHA512

        b1bdfd321ca6b788948383902b9f317bb46a8abfffc4fda29bfd51381f96be9af35274ff7d62c761fb83b09a05e2bb179df6817fc631e67a315787b86f4b31f0

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\pdfwspvreg_1.0.2024.3\download.7z

        Filesize

        21KB

        MD5

        87eddda6cfc1c6e1c86e1b3b371f369d

        SHA1

        7910a432cc964bc1e1be51e0cef2e986cf54eec2

        SHA256

        4cdfc143513060130052f306c0a7cb93731967dabbbfa22cf892518bfb0a6d5f

        SHA512

        c7bd1162cd851672e9f5ed21e8fb88d734232360be0433e98a82a9f04a4f35e2f59ced11716244f3f30ca021eebe111ef9b6e7df5eaa1c356ddc75f99445cdc8

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\pdfwspvreg_1.0.2024.3\pdfwspvreg.dll

        Filesize

        50KB

        MD5

        ccd17aaa7644b6979f661e7c72fa077d

        SHA1

        9cfb25754ac4a4ed487ce6c4655ccc78b5aef975

        SHA256

        b5245881da869ea02155d4052eda1390339c87496da055f85c3985a912e0401e

        SHA512

        2199d618af0d3fc948f4c39700cc8cefa07ed75db29ec348c71c013678a9ec3befcdcc5c3cb1d804abca5df4c3e6aec10caddb29188f28fc27313d6609dc2a49

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\pdfwspvreg_1.0.2024.3\run.ini

        Filesize

        253B

        MD5

        0d914e316c8fc542e5685b1598899979

        SHA1

        52e575fc0c66b60cd79d29ae4486944cf06995b0

        SHA256

        484e6146403c96eaeead06a97a8ed86d67334a9185bf009a44f7b1cbe5402e2a

        SHA512

        77ca461895bc65f31dd8fc5182dbed383804b4d3315e210bf65195776510bf9c09c11d87589796ec1bd272f67762e5ba28be4d64b8a58f2577cb6da79dbd7319

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\photo_1.1.2024.14\download.7z

        Filesize

        6.8MB

        MD5

        62fe07e2c5ef404cea0b023c590799be

        SHA1

        a2668640fc716a4de95286061988a1699c376cae

        SHA256

        4daee09248f3382f64d1bcefae6743e4ebed813fdfa5c1d43ed1638893809e3b

        SHA512

        e2a29a1cdd6a6de42bbfa2ea558e1b0c4af9e72666eba8f93e4fab92d41991c9eba4ff192f7ffae4070b3e5be4acbbbc6af077b19ba3e0c92c55df09c948fae8

      • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\wpsbox_1.1.2020.213\download.7z

        Filesize

        503KB

        MD5

        f3ff3c47ae68b0e6234b72d354ac191b

        SHA1

        26c380b44ad61b258a6de56c75c7f568d8c0f876

        SHA256

        cbac9ef94e6c6dd11019653c64bec6a3e6970779604555f5f77974258c214333

        SHA512

        43f892f5172b03e4e7d8f3f3632012ca62a7cb104f26d7d746005abf94472eeff881087c1ca73483f1079f21befe321af7372c6e17b26bd77f8fd9a03935ed95

      • memory/920-4205-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/920-4209-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/1056-4916-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/1272-4741-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/1272-4917-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/1272-4775-0x0000000072390000-0x0000000072F3F000-memory.dmp

        Filesize

        11.7MB

      • memory/1808-4581-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/1808-4580-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/2112-4360-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/2112-4368-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/2316-4791-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/2316-4797-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/2360-4454-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/2360-4455-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/2544-4601-0x00007FF870B10000-0x00007FF870B20000-memory.dmp

        Filesize

        64KB

      • memory/2564-4767-0x0000000071F50000-0x00000000724A7000-memory.dmp

        Filesize

        5.3MB

      • memory/2564-4770-0x0000000071EE0000-0x0000000071F4F000-memory.dmp

        Filesize

        444KB

      • memory/2564-4773-0x0000000071760000-0x000000007176A000-memory.dmp

        Filesize

        40KB

      • memory/2564-4772-0x0000000071770000-0x0000000071793000-memory.dmp

        Filesize

        140KB

      • memory/2564-4771-0x0000000071810000-0x0000000071959000-memory.dmp

        Filesize

        1.3MB

      • memory/2564-4768-0x00000000719D0000-0x0000000071ED3000-memory.dmp

        Filesize

        5.0MB

      • memory/2564-4769-0x00000000719B0000-0x00000000719C4000-memory.dmp

        Filesize

        80KB

      • memory/2564-4774-0x0000000071750000-0x000000007175F000-memory.dmp

        Filesize

        60KB

      • memory/2564-4766-0x00000000724B0000-0x0000000072921000-memory.dmp

        Filesize

        4.4MB

      • memory/2564-4765-0x0000000072930000-0x000000007298E000-memory.dmp

        Filesize

        376KB

      • memory/2564-4764-0x0000000072990000-0x0000000072A11000-memory.dmp

        Filesize

        516KB

      • memory/2564-4763-0x0000000072A20000-0x0000000072D0A000-memory.dmp

        Filesize

        2.9MB

      • memory/2564-4762-0x0000000072D10000-0x0000000072E2F000-memory.dmp

        Filesize

        1.1MB

      • memory/2604-4456-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/2604-4457-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/2716-4777-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/2716-4784-0x0000000061D90000-0x0000000063945000-memory.dmp

        Filesize

        27.7MB

      • memory/2716-4776-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/2728-4194-0x000000006E280000-0x000000006E290000-memory.dmp

        Filesize

        64KB

      • memory/2728-4193-0x000000006E1F0000-0x000000006E200000-memory.dmp

        Filesize

        64KB

      • memory/2832-4804-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/2832-4795-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/2984-4089-0x0000000037520000-0x0000000037530000-memory.dmp

        Filesize

        64KB

      • memory/2984-4111-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/2984-4097-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/3180-4195-0x00007FF870A70000-0x00007FF870A80000-memory.dmp

        Filesize

        64KB

      • memory/3180-4196-0x00007FF870B10000-0x00007FF870B20000-memory.dmp

        Filesize

        64KB

      • memory/3360-4564-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/3360-4565-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/3376-4819-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/3376-4820-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/3376-4821-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/3764-4599-0x000000006E280000-0x000000006E290000-memory.dmp

        Filesize

        64KB

      • memory/3960-4806-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/3960-4805-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/3960-4815-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/4596-4749-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/4596-4740-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/4940-4365-0x000000006BB70000-0x000000006EB98000-memory.dmp

        Filesize

        48.2MB

      • memory/4940-4344-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB

      • memory/5532-5184-0x000000006F0B0000-0x000000006FA06000-memory.dmp

        Filesize

        9.3MB