Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe
-
Size
5.5MB
-
MD5
5a04ccc69dcb6542a6205cb8b0f2637c
-
SHA1
a23f6b826b876884625a668611e1c9f817f26f46
-
SHA256
50a0e8a5715aae63bcb3826943d098fa4452bbbb5c25ec1c89e80197c0c1444a
-
SHA512
8f6685102bf72678b1d1caae479d92db329cbfce2149f76bbbe1b4dbbda57cec6aa526ec5a88b787161a0bb707f3526f576a146cc0b13799513fb9c1bea0ee58
-
SSDEEP
98304:P3stJARnrlGCG8z1Anqn4UHw//4ENvIPpHdVorLu4TK/O4FsO:kjQnRT1MEzH4vItor64SD
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 72 1952 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wpscloudsvr.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe File opened for modification \??\PhysicalDrive0 ksomisc.exe File opened for modification \??\PhysicalDrive0 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe File opened for modification \??\PhysicalDrive0 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wpsupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wps.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wps.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wps.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wps.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wpscenter.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wpsupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wps.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation ksomisc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe -
Executes dropped EXE 38 IoCs
pid Process 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2984 ksomisc.exe 1952 wpscloudsvr.exe 920 ksomisc.exe 4940 ksomisc.exe 2112 ksomisc.exe 2360 wps.exe 4508 wps.exe 2604 wps.exe 3360 wpsupdate.exe 4544 wpscloudsvr.exe 1808 wpsupdate.exe 5092 wpscloudsvr.exe 4596 ksomisc.exe 1272 wps.exe 2716 wpscloudsvr.exe 2316 ksomisc.exe 2832 ksomisc.exe 3100 ksolaunch.exe 2960 ksolaunch.exe 3960 wpscloudsvr.exe 3376 wpscloudsvr.exe 2592 promecefpluginhost.exe 4912 promecefpluginhost.exe 1120 wps.exe 1128 wps.exe 1344 wps.exe 1056 wpscenter.exe 4292 promecefpluginhost.exe 5532 wpscenter.exe 5640 promecefpluginhost.exe 5788 wps.exe 6016 wpscenter.exe 1908 wps.exe 1204 wpscloudsvr.exe 2832 ksomisc.exe 2352 chromelauncher.exe -
Loads dropped DLL 64 IoCs
pid Process 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2728 regsvr32.exe 432 regsvr32.exe 3180 regsvr32.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ kwpsshellext\ = "{28A80003-18FD-411D-B0A3-3C81F618E22B}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\lnkfile\ShellEx\ContextMenuHandlers\ kwpsshellext regsvr32.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{048EB43E-2059-422F-95E0-557DA96038AF}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /wpp" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{91493443-94BF-4940-926D-4F38FECF2A48}\InprocServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{8A624388-AA27-43E0-89F8-2A12BFF7BCCD}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /wps" ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209FE-0000-0000-C000-000000000046}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f004100750074006f006d006100740069006f006e0000000000 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{DC020317-E6E2-4A62-B9FA-B3EFE16626F4}\LocalServer32\.ksobak ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{3C18EAE4-BC25-4134-B7DF-1ECA1337DDDC}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f00700072006f006d0065007400680065007500730020002f0077007000700000000000 ksomisc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7C360CF9-D475-44FC-8163-AD6C95CF5F5D}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\kmso2pdfplugins64.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00024512-0000-0000-C000-000000000046}\InprocServer32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209FF-0000-0000-C000-000000000046}\LocalServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020820-0000-0000-C000-000000000046}\LocalServer32\.ksobak ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{91493441-5A91-11CF-8700-00AA0060263B}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700070002e0065007800650020002f004100750074006f006d006100740069006f006e0000000000 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209FE-0000-0000-C000-000000000046}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /Automation" ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020832-0000-0000-C000-000000000046}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f00700072006f006d0065007400680065007500730020002f006500740000000000 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{64818D10-4F9B-11CF-86EA-00AA00B929E8}\LocalServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209F0-0000-4b30-A977-D214852036FF}\InprocServer32\ ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{F4754C9B-64F5-4B40-8AF4-679732AC0607}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /wps" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{D5A42435-00FB-427E-ADE7-B753DEF2E9D7}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Kingsoft\\wps\\addons\\pool\\win-i386\\pdfwspv_1.0.2024.3\\pdfwspv.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{75D01070-1234-44E9-82F6-DB5B39A47C13}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /wpp" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{75D01070-1234-44E9-82F6-DB5B39A47C13}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020906-0000-4b30-A977-D214852036FF}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\wps.exe\" /prometheus /wps" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{912ABC52-36E2-4714-8E62-A8B73CA5E390}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /wps" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020812-0000-0000-C000-000000000046}\LocalServer32 ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{18A06B6B-2F3F-4E2B-A611-52BE631B2D22}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f00700072006f006d0065007400680065007500730020002f0077007000730000000000 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{CF4F55F4-8F87-4D47-80BB-5808164BB3F8}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{3C18EAE4-BC25-4134-B7DF-1ECA1337DDDC}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{44720444-94BF-4940-926D-4F38FECF2A48}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\wps.exe\" /prometheus /wpp" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00024512-0000-0000-C000-000000000046}\InprocServer32\InprocServer32 = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\refedit.dll" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020900-0000-0000-C000-000000000046}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{A1BBCFD9-B54C-443D-BC56-0BC3840120DB}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\wps.exe\" /prometheus /wpp /Preview" ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209FF-0000-0000-C000-000000000046}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f004100750074006f006d006100740069006f006e0000000000 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{AA14F9C9-62B5-4637-8AC4-8F25BF29D5A7}\LocalServer32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{E260F96C-8EF4-4C24-A2B9-455F1D116531}\LocalServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{64818D11-4F9B-11CF-86EA-00AA00B929E8}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{D5A42435-00FB-427E-ADE7-B753DEF2E9D7}\LocalServer32\ServerExecutable = "C:\\Users\\Admin\\AppData\\Roaming\\Kingsoft\\wps\\addons\\pool\\win-i386\\pdfwspv_1.0.2024.3\\pdfwspv.dll" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{91493443-94BF-4940-926D-4F38FECF2A48}\InprocServer32\ ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{18A06B6B-2F3F-4E2B-A611-52BE631B2D22}\LocalServer32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{DC020317-E6E2-4A62-B9FA-B3EFE16626F4}\LocalServer32 ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020906-0000-0000-C000-000000000046}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f00700072006f006d0065007400680065007500730020002f0077007000730000000000 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209FE-0000-0000-C000-000000000046}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{91493443-94BF-4940-926D-4F38FECF2A48}\InprocServer32\Class\ = "WPS.Office.Interop.Wpp.GlobalClass" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020906-0000-0000-C000-000000000046}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /wps" ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00024500-0000-0000-C000-000000000046}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c00650074002e0065007800650020002f004100750074006f006d006100740069006f006e0000000000 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{F4754C9B-64F5-4B40-8AF4-679732AC0607}\LocalServer32\.ksobak ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209FE-0000-0000-C000-000000000046}\LocalServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{048EB43E-2059-422F-95E0-557DA96038AF}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28A80003-18FD-411D-B0A3-3C81F618E22B}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\kwpsmenushellext64.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{45540086-5750-5300-4B49-4E47534F4655}\InprocServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{45540086-5750-5300-4B49-4E47534F4655}\InprocServer32\Class\ = "WPS.Office.Interop.Et.GlobalClass" ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020900-0000-0000-C000-000000000046}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f00700072006f006d0065007400680065007500730020002f0077007000730000000000 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209FF-0000-0000-C000-000000000046}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /Automation" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{91493441-5A91-11CF-8700-00AA0060263B}\LocalServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020821-0000-0000-C000-000000000046}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /et" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{0002CE21-0000-0000-C000-000000000046}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\mui\\default\\resource\\ksee\\EqnEdit.exe" ksomisc.exe Set value (data) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{8A624388-AA27-43E0-89F8-2A12BFF7BCCD}\LocalServer32\LocalServer32 = 43003a005c00550073006500720073005c00410064006d0069006e005c0041007000700044006100740061005c004c006f00630061006c005c004b0069006e00670073006f00660074005c005700500053004f00460046007e0031005c0031003200320030007e0031002e003100360039005c006f006600660069006300650036005c007700700073002e0065007800650020002f00700072006f006d0065007400680065007500730020002f0077007000730000000000 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020820-0000-0000-C000-000000000046}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\wps.exe /prometheus /et" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{18A06B6B-2F3F-4E2B-A611-52BE631B2D22}\LocalServer32\.ksobak ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020830-0000-0000-C000-000000000046}\LocalServer32\.ksobak ksomisc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{28A80003-18FD-411D-B0A3-3C81F618E22B}\InprocServer32 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{000209F0-0000-4b30-A977-D214852036FF}\InprocServer32\Class ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020906-0000-4b30-A977-D214852036FF}\LocalServer32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{45540086-5750-5300-4B49-4E47534F4655}\LocalServer32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00020830-0000-0000-C000-000000000046}\LocalServer32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00024500-0000-0000-C000-000000000046}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPSOFF~1\\1220~1.169\\office6\\et.exe /Automation" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{00024500-0000-0000-C000-000000000046}\LocalServer32\.ksobak ksomisc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{AC0714F7-3D04-11D1-AE7D-00A0C90F26F4} ksomisc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{AC0714F7-3D04-11D1-AE7D-00A0C90F26F4}\Compatibility Flags = "1024" ksomisc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{AC0714F7-3D04-11D1-AE7D-00A0C90F26F4}\AlternateCLSID = "{AB5357A7-3179-47F9-A705-966B8B936D5E}" ksomisc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{AC0714F6-3D04-11D1-AE7D-00A0C90F26F4} ksomisc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{AC0714F6-3D04-11D1-AE7D-00A0C90F26F4}\Compatibility Flags = "1024" ksomisc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{AC0714F6-3D04-11D1-AE7D-00A0C90F26F4}\AlternateCLSID = "{E436987E-F427-4AD7-8738-6D0895A3E93F}" ksomisc.exe -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates wpscloudsvr.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{54B7061A-D56C-40E5-B85B-58146446C782}\TypeLib\Version = "3.0" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{914934F3-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{0002E103-0000-0000-C000-000000000046}\TypeLib\ = "{0002E157-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{B923FDE0-F08C-11D3-91B0-00105A0A19FD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{00020967-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{E6AAEC05-E543-4085-BA92-9BF7D2474F5C}\TypeLib\Version = "3.0" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.potx\WPP.POTX.6 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WPP.PPSM.6\shell\open ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\PowerPoint.Template.12\DefaultIcon ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000C031E-0000-0000-C000-000000000046}\ProxyStubClsid32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{DD8F80B8-9B80-4E89-9BEC-F12DF35E43B3}\ = "ChartColorFormat" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{00020925-0000-0000-C000-000000000046}\ = "DropDown" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000244E6-0000-0000-C000-000000000046} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000C0318-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{0002094C-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{E6AAEC05-E543-4085-BA92-9BF7D2474F51}\ = "Research" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{B6511068-70BF-4751-A741-55C1D41AD96F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000C0392-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\SystemFileAssociations\.dpt\ShellEx ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000244D5-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{00024480-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000244B9-0000-0000-C000-000000000046}\ = "Sparkline" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000CDB07-0000-0000-C000-000000000046}\ = "_CustomXMLPartEvents" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{E3124493-7D6A-410F-9A48-CC822C033CEC}\ = "XSLTransform" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{00024466-0000-0000-C000-000000000046}\TypeLib\ = "{45541000-5750-5300-4B49-4E47534F4655}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{0002E118-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{55F88890-7708-11D1-ACEB-006008961DA5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{F1F37152-1DB1-4901-AD9A-C740F99464B4}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{00020996-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{766FBB6D-7576-4C00-8CE7-C548751812B3}\ProxyStubClsid32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{AB04DCB2-BB2F-441A-BDDB-ACE2F408C1FB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{92D41A71-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\KET.OutwardWorkbook.9\ = "WPS Spreadsheets Outward Workbook" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{0002088A-0000-0000-C000-000000000046} ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{D68E8AB1-7E81-4516-A396-76BB93712973}\ProxyStubClsid32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{0002E18C-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{0002443F-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000CDB03-0000-0000-C000-000000000046}\ = "CustomXMLNodes" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000CDB0F-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{A5F471DB-2318-4F94-97E4-12608CB7A153}\TypeLib ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\KWPP.Template.12\shell\open ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000244D1-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{00024411-0000-0000-C000-000000000046}\TypeLib\ = "{45541000-5750-5300-4B49-4E47534F4655}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000244B1-0000-0000-C000-000000000046} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000C03B9-0000-0000-C000-000000000046}\TypeLib\Version = "63.1" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{91493490-5A91-11CF-8700-00AA0060263B}\TypeLib ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000244D4-0000-0000-C000-000000000046}\ProxyStubClsid32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000244AB-0000-0000-C000-000000000046}\ = "Sort" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{00020935-0000-0000-C000-000000000046}\TypeLib\Version = "3.0" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.xlam\ET.AddInMacroEnabled ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\.xlam\ = "ET.AddInMacroEnabled" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{194F8476-B79D-4572-A609-294207DE77C1}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{914934C8-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{914934E6-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{000244A6-0000-0000-C000-000000000046}\ = "TableStyleElements" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000244A5-0000-0000-C000-000000000046} ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{000244E9-0000-0000-C000-000000000046} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{7D0F7985-68D9-4D93-91CB-8109280E76CC}\TypeLib\Version = "3.0" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\CLSID\{44720444-94BF-4940-926D-4F38FECF2A47}\ProgID ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{00024486-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Interface\{00024448-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{0002E131-0000-0000-C000-000000000046}\ = "_dispCommandBarControlEvents" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\ET.Xls.6\shell\print\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.2.0.16909\\office6\\wps.exe\" /prometheus /et /n /p \"%1\"" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\WOW6432Node\Interface\{00020917-0000-0000-C000-000000000046}\TypeLib ksomisc.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\Certificates wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\Certificates wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CRLs wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\TrustedDevices wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\Certificates wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\Certificates 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\Windows Live ID Token Issuer ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CRLs wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\FlightRoot ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\Certificates wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\Certificates wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\Certificates 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CTLs 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\Certificates wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CRLs wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\FlightRoot wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\CRLs wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\eSIM Certification Authorities 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CTLs 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\Certificates wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\TestSignRoot wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\Windows Live ID Token Issuer wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\CRLs wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CTLs wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\eSIM Certification Authorities wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\TrustedDevices wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\CTLs 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\CTLs 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\Certificates 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\CRLs wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\Windows Live ID Token Issuer wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\FlightRoot wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\eSIM Certification Authorities wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\eSIM Certification Authorities wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CTLs wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\CTLs wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\Certificates wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CTLs wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\CRLs wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CTLs wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CRLs wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\CTLs wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\Certificates wps.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Software\Microsoft\SystemCertificates\eSIM Certification Authorities wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CTLs wpscloudsvr.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\Certificates wpscenter.exe Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\Certificates wpscenter.exe -
Suspicious behavior: AddClipboardFormatListener 18 IoCs
pid Process 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2984 ksomisc.exe 920 ksomisc.exe 4940 ksomisc.exe 2112 ksomisc.exe 3360 wpsupdate.exe 1808 wpsupdate.exe 1272 wps.exe 4596 ksomisc.exe 2716 wpscloudsvr.exe 2316 ksomisc.exe 2832 ksomisc.exe 3960 wpscloudsvr.exe 3376 wpscloudsvr.exe 1056 wpscenter.exe 5532 wpscenter.exe 6016 wpscenter.exe 2832 ksomisc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 1952 wpscloudsvr.exe 1952 wpscloudsvr.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 1272 wps.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe Token: SeRestorePrivilege 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe Token: SeRestorePrivilege 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe Token: SeRestorePrivilege 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe Token: SeRestorePrivilege 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe Token: SeDebugPrivilege 2984 ksomisc.exe Token: SeLockMemoryPrivilege 2984 ksomisc.exe Token: SeDebugPrivilege 920 ksomisc.exe Token: SeLockMemoryPrivilege 920 ksomisc.exe Token: SeDebugPrivilege 4940 ksomisc.exe Token: SeDebugPrivilege 2112 ksomisc.exe Token: SeLockMemoryPrivilege 4940 ksomisc.exe Token: SeLockMemoryPrivilege 2112 ksomisc.exe Token: SeLockMemoryPrivilege 3360 wpsupdate.exe Token: SeLockMemoryPrivilege 1808 wpsupdate.exe Token: SeDebugPrivilege 4596 ksomisc.exe Token: SeLockMemoryPrivilege 1272 wps.exe Token: SeLockMemoryPrivilege 4596 ksomisc.exe Token: SeLockMemoryPrivilege 2716 wpscloudsvr.exe Token: SeDebugPrivilege 2832 ksomisc.exe Token: SeDebugPrivilege 2316 ksomisc.exe Token: SeLockMemoryPrivilege 2316 ksomisc.exe Token: SeLockMemoryPrivilege 2832 ksomisc.exe Token: SeLockMemoryPrivilege 3960 wpscloudsvr.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeLockMemoryPrivilege 3376 wpscloudsvr.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeLockMemoryPrivilege 1056 wpscenter.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1056 wpscenter.exe Token: SeCreatePagefilePrivilege 1056 wpscenter.exe Token: SeLockMemoryPrivilege 5532 wpscenter.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1056 wpscenter.exe Token: SeCreatePagefilePrivilege 1056 wpscenter.exe Token: SeLockMemoryPrivilege 6016 wpscenter.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1056 wpscenter.exe Token: SeCreatePagefilePrivilege 1056 wpscenter.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1056 wpscenter.exe Token: SeCreatePagefilePrivilege 1056 wpscenter.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe Token: SeShutdownPrivilege 1056 wpscenter.exe Token: SeCreatePagefilePrivilege 1056 wpscenter.exe Token: SeShutdownPrivilege 1272 wps.exe Token: SeCreatePagefilePrivilege 1272 wps.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2112 ksomisc.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 2984 ksomisc.exe 4940 ksomisc.exe 2112 ksomisc.exe 4940 ksomisc.exe 2112 ksomisc.exe 3360 wpsupdate.exe 3360 wpsupdate.exe 1808 wpsupdate.exe 1808 wpsupdate.exe 920 ksomisc.exe 920 ksomisc.exe 920 ksomisc.exe 1272 wps.exe 4596 ksomisc.exe 1272 wps.exe 4596 ksomisc.exe 1272 wps.exe 1272 wps.exe 1272 wps.exe 1272 wps.exe 1272 wps.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 1272 wps.exe 1272 wps.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2316 ksomisc.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2832 ksomisc.exe 2316 ksomisc.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2832 ksomisc.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 3960 wpscloudsvr.exe 3376 wpscloudsvr.exe 3960 wpscloudsvr.exe 3376 wpscloudsvr.exe 2716 wpscloudsvr.exe 3376 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 2716 wpscloudsvr.exe 1056 wpscenter.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2564 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 87 PID 2328 wrote to memory of 2564 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 87 PID 2328 wrote to memory of 2564 2328 2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe 87 PID 2564 wrote to memory of 1952 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 103 PID 2564 wrote to memory of 1952 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 103 PID 2564 wrote to memory of 1952 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 103 PID 2984 wrote to memory of 2728 2984 ksomisc.exe 104 PID 2984 wrote to memory of 2728 2984 ksomisc.exe 104 PID 2984 wrote to memory of 2728 2984 ksomisc.exe 104 PID 2984 wrote to memory of 432 2984 ksomisc.exe 105 PID 2984 wrote to memory of 432 2984 ksomisc.exe 105 PID 2984 wrote to memory of 432 2984 ksomisc.exe 105 PID 432 wrote to memory of 3180 432 regsvr32.exe 106 PID 432 wrote to memory of 3180 432 regsvr32.exe 106 PID 2564 wrote to memory of 920 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 107 PID 2564 wrote to memory of 920 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 107 PID 2564 wrote to memory of 920 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 107 PID 2564 wrote to memory of 4940 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 108 PID 2564 wrote to memory of 4940 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 108 PID 2564 wrote to memory of 4940 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 108 PID 1932 wrote to memory of 2112 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 109 PID 1932 wrote to memory of 2112 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 109 PID 1932 wrote to memory of 2112 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 109 PID 2984 wrote to memory of 2360 2984 ksomisc.exe 111 PID 2984 wrote to memory of 2360 2984 ksomisc.exe 111 PID 2984 wrote to memory of 2360 2984 ksomisc.exe 111 PID 2360 wrote to memory of 4508 2360 wps.exe 112 PID 2360 wrote to memory of 4508 2360 wps.exe 112 PID 2360 wrote to memory of 4508 2360 wps.exe 112 PID 2360 wrote to memory of 2604 2360 wps.exe 113 PID 2360 wrote to memory of 2604 2360 wps.exe 113 PID 2360 wrote to memory of 2604 2360 wps.exe 113 PID 1932 wrote to memory of 4432 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 114 PID 1932 wrote to memory of 4432 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 114 PID 1932 wrote to memory of 4432 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 114 PID 4432 wrote to memory of 1164 4432 regsvr32.exe 115 PID 4432 wrote to memory of 1164 4432 regsvr32.exe 115 PID 2984 wrote to memory of 1952 2984 ksomisc.exe 116 PID 2984 wrote to memory of 1952 2984 ksomisc.exe 116 PID 2984 wrote to memory of 1952 2984 ksomisc.exe 116 PID 2984 wrote to memory of 1952 2984 ksomisc.exe 116 PID 1932 wrote to memory of 3360 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 118 PID 1932 wrote to memory of 3360 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 118 PID 1932 wrote to memory of 3360 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 118 PID 3360 wrote to memory of 4544 3360 wpsupdate.exe 119 PID 3360 wrote to memory of 4544 3360 wpsupdate.exe 119 PID 3360 wrote to memory of 4544 3360 wpsupdate.exe 119 PID 1932 wrote to memory of 1808 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 120 PID 1932 wrote to memory of 1808 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 120 PID 1932 wrote to memory of 1808 1932 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 120 PID 1808 wrote to memory of 5092 1808 wpsupdate.exe 121 PID 1808 wrote to memory of 5092 1808 wpsupdate.exe 121 PID 1808 wrote to memory of 5092 1808 wpsupdate.exe 121 PID 2564 wrote to memory of 4384 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 122 PID 2564 wrote to memory of 4384 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 122 PID 2564 wrote to memory of 4384 2564 ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe 122 PID 920 wrote to memory of 3764 920 ksomisc.exe 123 PID 920 wrote to memory of 3764 920 ksomisc.exe 123 PID 920 wrote to memory of 3764 920 ksomisc.exe 123 PID 920 wrote to memory of 3944 920 ksomisc.exe 124 PID 920 wrote to memory of 3944 920 ksomisc.exe 124 PID 920 wrote to memory of 3944 920 ksomisc.exe 124 PID 3944 wrote to memory of 2544 3944 regsvr32.exe 125 PID 3944 wrote to memory of 2544 3944 regsvr32.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-18_5a04ccc69dcb6542a6205cb8b0f2637c_avoslocker_magniber_revil.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Checks computer location settings
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exeC:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -curlangofinstalledproduct=en_US -D="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office"2⤵
- Writes to the Master Boot Record (MBR)
- Checks computer location settings
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe"C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" InstallService3⤵
- Checks whether UAC is enabled
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -installregister sharedMemory_message_E580A6B3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins.dll"4⤵PID:3764
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"4⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"5⤵
- Registers COM server for autorun
PID:2544
-
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -sendinstalldyn 53⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\html2pdf\html2pdf.dll"3⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\\office6\ksomisc.exe" -defragment3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe"C:\Users\Admin\AppData\Local\Temp\wps_download\ca53b1e390dcdc2ae376a28532674862-14_setup_XA_mui_Free.exe.601.1115.exe" -downpower -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -curlangofinstalledproduct="en_US" -D="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office" -msgwndname=wpssetup_message_E5798F4 -curinstalltemppath=C:\Users\Admin\AppData\Local\Temp\wps\~e579616\1⤵
- Writes to the Master Boot Record (MBR)
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -updatetaskbarpin 2097152 -forceperusermode2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kwpsmenushellext64.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\regsvr32.exe/s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kwpsmenushellext64.dll"3⤵
- Modifies system executable filetype association
- Registers COM server for autorun
PID:1164
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe" /from:setup2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe"C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" CheckService3⤵
- Executes dropped EXE
PID:4544
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpsupdate.exe" -createtask2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe"C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" CheckService3⤵
- Executes dropped EXE
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" /prometheus /download_lang_on_start /lang=en_US /from=autostart_after_install_onlinesetup2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1272 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe" /qingbangong /start_from=qingipc /qingbangong /start_from=kstartpage silentautologin3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -getabtest -forceperusermode4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -getonlineparam -forceperusermode4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /krecentfile /init /From=Qing4⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe" /krecentfile /init /From=Qing5⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3376
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /messagepush /PushType=mipush /From=Qing4⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscloudsvr.exe" /messagepush /PushType=mipush /From=Qing5⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3960
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe" Run /InstanceId=wpsdesktop -Entry=EntryPoint C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386/kwpsbubble_1.0.2024.3/kwpsbubble_xa.dll4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe"C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=gpu-process --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=2024 --field-trial-handle=2148,i,14182422460521513072,5583797877759660170,131072 --disable-features=TSFImeSupport /prefetch:25⤵
- Executes dropped EXE
PID:4292
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe"C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=2052 --field-trial-handle=2148,i,14182422460521513072,5583797877759660170,131072 --disable-features=TSFImeSupport /prefetch:85⤵
- Executes dropped EXE
PID:5640
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1056 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3068 --field-trial-handle=2148,i,14182422460521513072,5583797877759660170,131072 --disable-features=TSFImeSupport /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5788
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe" Run -Entry=EntryPoint C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386/kdocreminder_1.1.2021.136/kdocreminder.dll4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:5532
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" Run -User=Admin "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -regpdfwspv4⤵
- Executes dropped EXE
PID:1908
-
-
C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\chromelauncher.exeC:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\chromelauncher.exe install4⤵
- Executes dropped EXE
PID:2352
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe"C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=gpu-process --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=3332 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:23⤵
- Executes dropped EXE
PID:2592
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\promecefpluginhost.exe"C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --log-severity=disable --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --mojo-platform-channel-handle=3692 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:83⤵
- Executes dropped EXE
PID:4912
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1272 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3872 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:1120
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1272 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=4140 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:1128
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1220~1.169\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjIuMC4xNjkwOVxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=1272 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --enable-speech-input --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\debug.log" --js-flags=--expose-gc --lang=en-US --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=4184 --field-trial-handle=3472,i,16006949045494664143,2984595395382406450,131072 --disable-features=TSFImeSupport /prefetch:13⤵
- Checks computer location settings
- Executes dropped EXE
PID:1344
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wpscenter.exe" Run -Entry=EntryPoint C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386/kdocreminder_1.1.2021.136/kdocreminder.dll3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:6016
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -installregister sharedMemory_message_E57EDEA -forceperusermode1⤵
- Writes to the Master Boot Record (MBR)
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins.dll"2⤵
- Loads dropped DLL
PID:2728
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\kmso2pdfplugins64.dll"3⤵
- Loads dropped DLL
PID:3180
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" Run "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\ktaskschdtool\ktaskschdtool.dll" /task=wpsexternal /createtask2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" CheckService3⤵
- Executes dropped EXE
PID:4508
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\wps.exe" Run -User=Admin -Entry=EntryPoint "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.2.0.16909/office6/addons/ktaskschdtool/ktaskschdtool.dll" /user=Admin /task=wpsexternal /cleantask /pid=2360 /prv3⤵
- Executes dropped EXE
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
PID:1952
-
-
C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe"C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" LocalService1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1204 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\ksomisc.exe" -regpdfwspv2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2832 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\Kingsoft\wps\addons\pool\win-i386\pdfwspv_1.0.2024.3\pdfwspv.dll"3⤵
- Registers COM server for autorun
PID:5144
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5890a5bf085167cf3aee0f4d57b7e05b6
SHA11bbfe7ca2cf0678b433790289cdc7db57d68e36f
SHA2567d16714b843343e370ec36bda4a058280ba3528636c57a085b168c979f1f48c5
SHA512e44385e82c2a85a63d3860f590003d9d42d2343a78e9501541208363e3ff9c76f46bc25f36fb7f326b13143fd259dfaac71e49caa7f0edf02c35d1f479627c4f
-
Filesize
169KB
MD52e98c97ebf1a60c666d5052f33df4e35
SHA1f09d55a5658e5b549378af28d698364663091101
SHA25656b9e2981c0bdb628bb9b69c2266724695bdfcbbc0903528fbc6e7f415b1cf9b
SHA5127687f06c3450b45d1c278b1630c00fb3a16f064ee1abc5a4026ccb90e19f2f2a61ec338653ae8b4a5629f2572dbe1c18a612628c71a81875cabe565aae2c3421
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\kpluginconfigcenter\kpluginconfigcenter.dll
Filesize2.4MB
MD5e61c28b9cebd28c9475ca197f5ce818a
SHA1cdff3381444f178a1c42ec289cf72673f62c71d3
SHA25637ba2b6d32180ecd7bda9859e1c0b333e23f013f51d8da9cc89aa42a33335729
SHA512e52007a4f5770553760511578ebdb7ad99d76484ec91005d00c03405197570b50c40537fcfcd30a7a0ba709e620fc499177d8b8578b80106df70fb096f8651ab
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\kwpsaigc\mui\pt_BR\kwpsaigc.qm
Filesize334B
MD52b42be10ddde43a0b6c2e461beae293a
SHA153888c4798bc04fdfc5a266587b8dc1c4e0103f3
SHA256984ebeef80f6f50907afb92e5b5ae72df49fce045552c118a77a8887cc98e19b
SHA512be3ebd02d37de367200696351fb5f9cd0ec4c206c3a33f281cb8b62386457a30a899322798c63a0d495577393e47258994feb7f8e2445645f552c2b7a2de6778
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\addons\qing\mui\default_xa\res\clouddiskhomepage\static\js\pt_PT\history.js
Filesize198KB
MD5b4b4c703bf5c6c0b5e9c57f05012d234
SHA1929aee49e800e88b4b01f4a449fa86715d882e42
SHA256910eada285d4900ea8e36faf305f731cfb200b317ea866839f5f4864a9dfc09b
SHA5122afa881ee2f47e97249904b506cf88d68a34c166d9dc0a603f68369e640336f2c0b424ecb7b23d4631a96e175b965478bfa4ebc0224b0410551e55ac4c8ad0ec
-
Filesize
67B
MD5223673e5e8d77083765b70ddf7a0f7f6
SHA13b5c4d6304ed6ada0ec607f44a2aace24ec16126
SHA2569089b4fee2d7596812c52f11dbc9855ca5b2b1ff0a9dc237fe630722b10ddc82
SHA51262f5a40fc698de593bf29c3ab4d278d798bdc6e65693ca30f85506c95f408f17a00da048e42a23dd5702fe322066a87374cfeb0942d15f3fc791639aab924f52
-
Filesize
433B
MD57d78a2449b45fc839f125b47b637bed0
SHA129528d84082fe773bbd0570629437ce66d9125d7
SHA25645cff35c455d94d3832155bd0f7725d7f2734818e688258f033576d0e54cd5b5
SHA51206b74bf4c906c029b3005ba600d02bd7815b4b14e4795548a89ead1669cd87a83ad00a4f4adbdb5414f73db1ebd0697b0f91029fb07ed6894e9bcbf833263a03
-
Filesize
55KB
MD5313c37e93083938c611b550fd2eb0c84
SHA1a6fae473ab22d163feadd942f1e91bbb41c7e4f1
SHA256502e848bed07fb2d9d8588cd0bfd38e349c6043f9bc44d23cf01e566db46066c
SHA512c5239971b447e2a4fc63c10f542c9927c1a72af2809d48a09ca9dafeb50d9f1a736c208dd187b34b5415640819594f4599b06c5a93f7815ca6e6c2fc668e01ec
-
Filesize
86KB
MD5f5f21888065a3972afd5758c74ee54e6
SHA1e4e96da5b12d2e5576500659e9196439b08f5140
SHA2562ba88cdca118999fa1f2e119de77d6324b16a0bd22997512d079d400cc6ef84a
SHA512620120e00807775b1e3169389dd9baf26c48d3646f927594543055bebb00c81b81d4527549351ef7e7cccf8111d350feeeabbfe44ca434dd0ef57a7b2fb861b6
-
Filesize
953KB
MD58074812fd986ca2116c219e35f1c62dc
SHA1e9f72fad47ce94f3306d685a76483b013530916a
SHA256bd346ef9c4f0118b841e9d7d0eb49749cb81bd2b549365c9be394046d956be71
SHA51239332fd5084e497cd4998f6e18b3706f324d7b7f16eef7afecee126bdde28edb8d4897ffd204f4e40539001717bea2b08073fa2298dc3ef03f0fba6919cc24e8
-
Filesize
9.3MB
MD5469c2a814a3bc35c804764de29d30a84
SHA1743c41835dd57a8ddf31ad0066ee07a541e21c27
SHA256a04c4ebecf0dfe46bcd113726edb3ccb46575d655318283a88c02f75da6c1c32
SHA512d08a0c990eb34fc58421e8f48c98d3c9a047814c73e46d71165e8beb5243191d56afa2179fac62da7ffd5555bcc22b447a4f6fb7595c6c66a8f80910b64439c2
-
Filesize
211KB
MD50a684b21acb673e7e7e4f62a12698458
SHA101d1240b399bf556abf8f8f50f7d94447013d063
SHA2563bdce9ad8bbf953217a8f5968deb12a056e04f351029d3a6288cf4d31e4c5302
SHA512d049f53cef514c1ea5513fbd5174a7019d1e9f058ccc9d246ff1d1fd93a2bb577978c38ffa798a0ed3bb395556daf850c7be0784755c0236ddb0d5cc9e1fbc28
-
Filesize
3.0MB
MD575742bbf10df9fa3be5b48a5aa0b7a0f
SHA1431d42986fd9d198c0edd3555991ad8b7be68822
SHA256de198d6174ec79954964fbc1cf758e4e42f323615492540cce90d1f4432da226
SHA512e5219a3ca7b4c9eb791128ca905b653cebfad4df751282ca1f0f28b5d026d5b24c420b4ee00c09e53106c6059e20ac9c2581e4997674accd892f5a76d05bc3ac
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\mui\ja_JP\resource\splash\hdpi\2x\ent_background_2019_wpsoffice.png
Filesize236KB
MD5c5ad1903526a9ca4c2f55cfea1e22778
SHA19c7b9ba9100a919cad272fb85ff95c4cde45de9f
SHA2565e7ba996d2331f37b9799767c0fa806cab9a39fea434796ab08dcaf39096e334
SHA512e482142e81fbe71666b40f7a2c53702b4278436a0240e0f56200443cf4235d9942cccc3545cc01486d53a0972be553cbf93442e8b05de7b4fcd1fe8a4ec16bb4
-
Filesize
271B
MD5351fdc16f8e5ec3105aeb289397a06bc
SHA1115bcf3e66703597ef4fb42acbdf3be37fff221b
SHA256b54bcf83fa006bf38dc845507e31dd5ae559ed68d45acc12ae1561142661a7d8
SHA5124cb802df20b51b5bac7ac78f983c191c9c81541204b7ee30683ff55f65694926d144b8003cc504e9c8f16da92ef5d17d5d904050e7915a6615f7c62abec38cae
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.2.0.16909\office6\qt\plugins\platforms\qdirect2d.dll
Filesize1.4MB
MD5b120a3c32571f1ea2da38aa7bc3fb65f
SHA1652d1cc2759e96df7c668b78501a609af5a6a045
SHA25623168a629ec4bd8ab76ef93d32318d70643b0b7714f5be9534190075232fce49
SHA51229283cc3be5f7609f921ef721366f55238456c8c0f574af30c65f6fb266ef699e09316aff5ec6d14b31090ad7f0e6d516d18f9a144df8317b0df0d71e81e7dbf
-
Filesize
957KB
MD5144c48713c3dcf8961602bc008bc0fa3
SHA147fe6c8e5d35cda6092d2aa1ca119b3b097858e2
SHA2569ab28c6f66d8900a2f3b3d78c0f1ea6cc1abd55e86c17422c0632997800ac846
SHA5120209e683ca66750e9ba44e47da08a67017bf460e669e7d36998e5504ab8114c8004760457a503c447eb890a0e05fc82cc69b713cab4062a815176be3fb3721a8
-
Filesize
499B
MD5183330feb3b9701fec096dcbfd8e67e4
SHA12f43379fefa868319a2baae7998cc62dc2fc201d
SHA256ac4f26a184114522200169c5f57a0af4498a20d19b7ec6def14dd2c6413eb475
SHA512643cc197456f15da6ddd6eb904f2b25ad4236a24310d575958c0c8e457a33167e748d21184162502a295fa466c031a837511d4d5348fd67499ede1b60065c471
-
Filesize
675B
MD580874ee5694f7c6b0319cf021cd384ab
SHA10121d759b81d39b06ce8f8b0cea8f4377c2b874c
SHA2563b55564dbd0a88cafd3a201300999d24f955f71dc06471fb6fbf3271de1c3fc7
SHA5129cbcb728aedf9304176b093d51b66e003904a9449cc87546236248c30424c09343029b33edfb10628fb09f2201793bdacd84774ac0d0f215b39636eb60d602a2
-
Filesize
2KB
MD5137c700e017be0c658b79fafc8973068
SHA1d47766dd3a287b480b6e058e7f2c2b9f6709cfaf
SHA25658c9af8d094db4160f39f008dc3183c7cd072e5c8376824818dcfc91621ade36
SHA512a76f6585c3c87b316d0f772f8b6d4774961bc629bce316d776b86725cf0c3f82b41ad25998ba753cc475f59dfe050a57f361214146984b0221e116cc6b7f9da2
-
Filesize
5.0MB
MD58104fdcc2caa3b42b140d8498eae6cfe
SHA11413352da713c786d1ff9be2eddda36a8245a8e5
SHA2565a3ea2eee0535589b0de2c1468891c2285570136257261eb50c2744bf5d8fc9e
SHA51220f83309437afc57bd4ef58d48c54c229482fd10e3b0e7e93bc8ec637dabb6ce7b6ab67942d97a35b0ff7c8694d054fa3f87a0050c04678509be99cddfaaf675
-
Filesize
5.3MB
MD5cd71405fd88a13daeaadc9122878f294
SHA12eb6ca95ede0507b7fd0fae164b34cebb61dd639
SHA25639963edad28df386ae535070b20371a5ba4de445912df1b1cabff915c82364cf
SHA512d573962fd3f15f6701477b328d3395a5e4c78fd847e5e7123ab7d58d5e3d51d959765f16e6848fd879e0c527ccdb115aa312074905380a3ac4881dbaca316fe6
-
Filesize
378KB
MD574f1aae0ad9c77088879f0f068603b14
SHA14dc66aca99fca616801e7e1e08eb61e87ad65ef0
SHA2566bf93e0575acec1c1bccf7e4d33a4c9a4f12c51811c41ed695115bcc60081d4f
SHA512dcabee00b11db242552827663bd8eaba89bb94e4ed2f02793467c21630124074acdd1d55682a56d9b5875b3626ccff99cbab666ebdc8820d1bd4d058ce1ca029
-
Filesize
4.4MB
MD54cf25152e7fdc3863d35ab01ed7e5f95
SHA1bcf5d327cbd6d6b3903d47c63516d81f56361229
SHA256c70e1ad07aa161eb6dd42fe5109c910ea358935c653c0082654f6810df844b5f
SHA512706d2edb3c9f4a32554cf07d5faeaa2b7aa8d22f0f0c0076541efd73e093387dd264026dcbae7b790cafd260257288449048df7b277f8407278bf127da669a14
-
Filesize
445KB
MD5b3843e058782a993918045cb73d84e25
SHA1dbbc24f2da2e5b9b94a00aa41c08935be184c12d
SHA256aa696dc9058ed7987675837be2601edd28306a42153d5112dacc9b156a1fceb1
SHA5123c237aa06409d774f6bbd3aa1116677a39f5f8f166dfcfa2fecab9d266f5b247bb9d2d623ce780631f857366059ce204912c039c7b5352cd2d5a7cbfb748a10e
-
Filesize
1.2MB
MD53579da0e10644a74953f6158456b7793
SHA175007a9ac779d65dab95aeb8166b328d7f542af2
SHA256520279e5806416e7f64809eaf0c6570d04e5c4d2e9ba912b53f7288639a5dc19
SHA5128f46bf067495ea812ba515b820537dc39878e1486259365a414ed05fb47e28473b13cc2c2a939c772c1ef34f551d9b003445b6bd0210621a8d1dd8aeaa16df80
-
Filesize
2.9MB
MD574db79ac13ed0fff6188bc715c885d1f
SHA1550dc1e295285ff5b9f0af44bdf7df6504c08de2
SHA256ea52c2e5a544634cb9c3af20eb4ef25cc6d572d606e88c7427bfbfc7f3706aa2
SHA512dd7a2d90bfe6103e0aa72eac8e5669fb6a18d0b88fb5da5ec42002ff2f5bdcc7bf733f1d3ed6b64e74f109eeb8463cc6a176cff30520f899729ce0e0bfe9f52b
-
Filesize
439KB
MD55fd0772c30a923159055e87395f96d86
SHA14a20f687c84eb327e3cb7a4a60fe597666607cf3
SHA25602c7259456eac8cbadfb460377ba68e98282400c7a4a9d0bf49b3313ef6d554d
SHA512132a9b969104c0a214bde3f8c6e8f754d116cecdad55224bbea7a40cffd98f4e4de503d83d92cca0aaab9ed51c9efa00ad5caed69a9eda71013598a43b161c3a
-
Filesize
61KB
MD5d2a04dc52ea4ffcadb4881c9c120b9b3
SHA15ff9b4de60e3868697d81fb910b373c7c0a7c4a5
SHA256271815def5e81d60dce20a982ad9cec1dc08fb43bf37a29c1266a5a367e5f3fc
SHA5123ef40bf306275ff0202d24209274f7a00acf268763ff3e7d5abd81c84b2a398701a2b317aa00e67316b74aef734e11edaeb3e08fa2adeada77e6663cf143bf2c
-
Filesize
41KB
MD56dd89155cc60c5daf2bec34971d45f56
SHA15c550dcaa072296d7697947e15daa629b78fae6f
SHA256e32f73979f372cb76088df4ca8ee621ff9f853352d5236ee14854868212b601b
SHA5129896a47418e15b13902cf5300f9331d818d94708f76949f56c28bbecc241e1c0aa153473bde30aa723381045decd01bc375ccdee9b07e00a31dbafa1f51cc961
-
Filesize
1.3MB
MD59f471c987bb028f30b5a51ca83fc5586
SHA1d91252f67c70e1b17138133c0d31463da1184176
SHA256555c000fdbddab11c017da8055f58169a55f8772dbac78ca8e4572a6553db071
SHA512cc42fdb7ff0d20f485e9d5bcf7df5bf3b79e626ef44c3cae23e9179cf97b197564cb73fa4f2521495f95a3e337c1f0d533f6d3f2c36900a84dc2f546ef5e9474
-
C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\qt\plugins\printsupport\windowsprintersupport.dll
Filesize70KB
MD5ec662568b9acfc2930375dc40935823c
SHA1d055469955e8c947cdba8063be36524ef29f78d0
SHA2564c51ba181dff507f1b495e0a2c8ccad469b5a4eb51523e18ddb3a0b886f2300c
SHA512ff9898df75781f91a443460161ac591f04e23f566ca85628ea9ce56a2ba15761ef4e6c23e8952371529efb9e96e4ac4aa16733ea710d1cb65fa2f450171f8f0b
-
C:\Users\Admin\AppData\Local\Temp\wps\~e579616\CONTROL\office6\qt\plugins\styles\qwindowsvistastyle.dll
Filesize146KB
MD5e128074d836e990fa6e8c20c16598f6a
SHA116c786082777f3f80a486d2303360e06f63ed599
SHA25688910fcdc54e2a80a7ec124920cf0af8ee1221480c2ebfd181555ec6e6a9088d
SHA51282e95748595102467b0248a7981137e269b8c6123f5383eef40017a0fe41141d59156a6b48bf6d574ed60d8d7929a9a9f34ccb8e07e5089af4ca100a9b765526
-
Filesize
1.1MB
MD52040cdcd779bbebad36d36035c675d99
SHA1918bc19f55e656f6d6b1e4713604483eb997ea15
SHA2562ad9a105a9caa24f41e7b1a6f303c07e6faeceaf3aaf43ebd644d9d5746a4359
SHA51283dc3c7e35f0f83e1224505d04cdbaee12b7ea37a2c3367cb4fccc4fff3e5923cf8a79dd513c33a667d8231b1cc6cfb1e33f957d92e195892060a22f53c7532f
-
Filesize
81KB
MD5e51018e4985943c51ff91471f8906504
SHA15899aaccdb692dbdffdaa35436c47d17c130cfd0
SHA256ff9c1123cff493a8f5eacb91115611b6c1c808b30c82af9b6f388c0ef1f6b46d
SHA5122fe5ddad2100aeaea35398384a440ba0be169ef429f7e0b69687bc0f8865df41bc93fc80d3a8f0ddd9df54fc2f2d76b1056a1d1962d37432704c818128ffbd74
-
Filesize
3KB
MD5034f37e6536c1430d55f64168b7e9f05
SHA1dd08c0ef0d086dfbe59797990a74dab14fc850e2
SHA256183a140011774d955e9de189e7a1d53cb4128d6abed61c7bfd5994268ee5f384
SHA5120e1911c882152a4e1059a3ce1880d7fb2aed1e1e36cbd37055de2e2a1333acb2a0233ba2a4d969ccebbef1e77809aa5e78807aa9239545beae8c548c0f8f35c0
-
Filesize
112KB
MD5e568b6577db690b099db51338853f0be
SHA12d24319c334b6319bb19c580f537e6339de48bc5
SHA256257f1947e656eced86713f72deea7261afe30bb07e9c4f109ea29a6c2df63f16
SHA51216cf5f031bd8a3e1998b350913d7963140c95ef75e8cac2a5f878a9d3c80691fae24463ad9af64a426fe97dc78a0f51edf75b4a92429191c0809bfcd0f0aefac
-
Filesize
387B
MD5c38481658f9149eba0b9b8fcbcb16708
SHA1f16a40af74c0a04a331f7833251e3958d033d4da
SHA256d0d73f49bc21b62fe05c47024d69406a3227da0f6b4ffe237726e6a031f188d2
SHA5128f98d62f88442b8ef94aa10074e35aa8d9494f3c76ce8b143ca0bf7fa0d917f3175212fbcd6e7b0597fd0ec0e1b2827f157135512fb01c88218d36e2f7dd73ce
-
Filesize
433B
MD5a9519168ca6299588edf9bd39c10828a
SHA19f0635e39d50d15af39f5e2c52ad240a428b5636
SHA2569e87b2ff306efedf7bf1074749b4602c332bc825aed80721eba19d5f544d2ec3
SHA5120607eb1f5598320961fbd8ef75beeb1b6dc1af3cae7eeb5ba352f3e2a2edb25e1d9e68fb46c24e4299957352c0c906314c889c2d1092437eccc1d1a0485f3557
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CGO8HY13TCNNGG45A2SJ.temp
Filesize8KB
MD5520d47101fd385d21ca49280fa027381
SHA14de0f81036b9269dca64e0b294b450d706db87bd
SHA256771e06db825dcbfc3d4b12c7e2d40a2a1dedc6bb7bea475be236256f0e40484d
SHA51261f9399fed86cbe6ad837ce8fdba2afa64e45fca8efa3cb66d64b3157b4c70913b1da215be75ee1ee94f2566926d08bce09146c6ab80d7338c3eba06805c7ab8
-
Filesize
905KB
MD57a00128dcd5836bcb83c87c095c5c55a
SHA1994f8b3628b1dd2cbbea70c5a63c0badb292ccb4
SHA256d7ca5e9cfcd2d72c0ab33eba5ec89ed7c4e9fd7d5136f877d50ba7e35b32a4f3
SHA5124f2a55152cb288b4f80051c0964bf784bc794c147385d8e5bcde0de358546b3d7d22707964f94e291beb5ec06609de527fdbb3f64f95907f52b415aa4fd79222
-
Filesize
4KB
MD52e395b6edcfd9ff478c651f0b54645ac
SHA1536b8049006d5ff35416fa92d466fb336f9c9786
SHA2560b48faa78c106b8e04e5d498655544480cdb7714fe9621c3e50bac6b9480dd9b
SHA512865a5528e28d30ced69b6d3df87078e517588edf81dcde353e0199e33c46edbeb6819ccada8d541263c4afbc641fc7a87749d2e3ad5875955329329f22f4cd0a
-
Filesize
11KB
MD5fd51bfb9d1c5d581ff356e5ee2188e51
SHA1c4c1ecff6b3ed645df37072e515b6d92a51f5943
SHA2567bfb5935a24859fcc0f74cfcd87007314bf86869ad35405caec907ed3ece5374
SHA512a8745770854367ddd4a81a4ae8918951d778a9dd99d3a1bdef0017f1b905627dbf0187e77cb71e679892085f9f674368ee626ddc43dc5b73ec8f61ae604bff12
-
Filesize
13KB
MD52e8f1b31306fe53785450af6b93a11d4
SHA1b1fd86570735318a8be3106fc8521ca327780a9d
SHA25640152cb4a8561dba6a801d18d12c1222eea7a348a6229e49ea3f76752eb45ad6
SHA512530b02d4194e0f0c7e6f87482df104972cbdfce0358020e0d9ee24bd65e83edce33e31475b94565957f621a3ff03a5337822f5b261ea77b9c91e21b17a3f14e2
-
Filesize
29KB
MD5c09d4b1c73cc6860082f818d03028da5
SHA1f03b57d142094ff38cbd8121e1fb495f11ee5abb
SHA2563f9216332eb50aff4eb092fba99c8a0fe1133dc84c04fac1b455b80df25c4c99
SHA51213e277b985989722610099155cb676bfa2859b64676514e3c9929e5f4947abc4e38f2d8489456efc63d949b9add56ee7f3d7dc1ab38fe421dff435abea7e18cc
-
Filesize
48KB
MD58d1ac5f96fc82002b1d8f71832c18a8c
SHA16559670313ac5927cec7ef9ca556cab09c19373f
SHA256e8f5faf13a56c6f3314b4e9448f7d92e10742150eac9ee1f8fc1410a1e8f9a47
SHA512608fea45d2d40a82a6d2379ba3746a11170be85cf561928d0986e435ac199dba209a57cc8a4f641de72128a32f931cf1aff53d2944101e51e339ec6bcd27f8fd
-
Filesize
48KB
MD5956b9f4ab07d42bec6fb720ba577f214
SHA1dcbcc6bd5265a71e1f9a6aa067e4c3190f584521
SHA256c3ba54590e2f3e76d9a5363f30d6411759f36faaf867d3d7749072d724c1ed6a
SHA512df8206993c70629c25bf0ea06849c82943519a6886f60a18762cca50b61ffe06cd80f7e822d7bd70a845a0af332cc0fd4ad173e68dd69ca19806cd70a5cf37c6
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5b25ca583298164c4331f7c092733b58b
SHA17a14cd642dfc08384634c72130b071ca8e80131c
SHA25612087dcd761a9238c10e95551b7594b84c476008e5ad73100d665e0c944c7bbb
SHA5121c8a78c2406a2b9c7a5aec39e2d83bc2af9adbe719ab83d22367799deeff0182f2d0438956c0bdd8bf5a6fc86e4a29ddfc782c4cbe8af25f5468331575bcb6b5
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Code Cache\js\index-dir\the-real-index~RFe591b9c.TMP
Filesize48B
MD5ef7bcc32338de1ef3673432bef6937f0
SHA18e6700bbb8226ed647240783732a872cc0764611
SHA25604308b68455c54990447ede41b72c862ae95535c923a14901b1594d869a13a07
SHA5125b9ea6d4d8caeac84bfe5b9817e960209ca62dd66e167abf45ef27f77118d8133971a34b1c00411a6e92d60c6192786188d527ba47c7b9132dab648c051b879e
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Local Storage\leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Network\TransportSecurity
Filesize370B
MD5ec31d14e8c3bcc35cd6c4dbbdba9cf61
SHA19dbb839b85d3c01ee8136f980ba504558817f0fd
SHA2563cba255491d218a0e022fd4a4d8b7bb4cab14bc9606cc0430295dd73cd2a1782
SHA5125f1955b9012628ab953d9ebde7eb28a7bed03e8086adaf0b771645df99aa7b19f2a6b3f818f0386532a6293d423b8403bf2acac58b0cf8ed9bac8777ca03b199
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Network\TransportSecurity~RFe58f509.TMP
Filesize370B
MD52ceb914f3859e5cc4ed58b010a199566
SHA14e04ef98a22c9c3a52738e4ce0f2e4b4de3c9ee1
SHA256d1db34e891ccbab71b4d800d5c9a0ce9c02a4b4a0c94e6d4f50d4afd20b1d383
SHA512dbcb51d6a58c83debded4806bd1bffc56d1df3d4f3aff4522cd63b33c3d282b615e5a00280887a32536d113daf259eb37d2b96c6c0043d4321d0b6c625a5815e
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\cef\cache\KWPSBubble\Session Storage\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\chromeguide\plugin.plg
Filesize720B
MD56af57b8623702b7f92a6ace7a00e2c7c
SHA1d48b17a1fec2e5ad9dd51fcfa259e3c5191e66ec
SHA2562b459473c2c63fb5d9fcd1f8ffcf7994cc6b4d15a85bd7ef4a0ff7e450580a22
SHA5127607acc3b3de3cd1cb26e5e71952036396813fbd25f03aeeebdb9d596a74bbee8c20e509818c9b1f8e9d9bd476f53e2f20406b5efdd17cef0612e5dbc7459817
-
Filesize
14KB
MD5f30cc2dfc402cbbc189a31d2b923948c
SHA1e571f00bb69b6dd8e93c6eb9beed9d7af5018118
SHA25632dc7ac26d69df582b29bbfa5058c4bc1b96b3019d506efd2ad8aaebac2f6192
SHA5126768dd66e8e3cc9c837c82235064b5394fc59ea7cb87eb10f3d9755057940bd60c1d4490bd44b9185e8987cad40ac0f1d1a86b4e2b459cca7f53229073a8f4c2
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\list\win-i386\12.2.0.16909\kappframework\plugin.plg
Filesize1KB
MD50da1755dea1fa0008a4c830b62bf1de5
SHA1dd3ca88bbd8d03cfef28973b8c71f45d245affc4
SHA256f61b999d4f563010a4e973f1300ad27e72c2abb1044916bb2512c95c3af3d72c
SHA5128d5f8933a5f08d63d23f6baf71471ff7bfba87be93105ca46efab68a1cf7020aeaee4bda1052d35de80df9135862b3723f5153fceb7e4641a6bdeb43e43724b3
-
Filesize
744B
MD56aa6bf8d533b836af93e892ddff11514
SHA1335a6a6ff40d1ca0913a9f76e60ebc46f686b3a1
SHA256e339d3549b8331a89a1d4ed4dbba246250130e47c5b62b93b87d93975e28f382
SHA51204f40987aa9c35da5000cb8068c01ce2054778201756488b5ed4c88a5705e4996d8cea15ef3de21867fdb335a8000965a37c95da210cfd652d3d96f6b009516a
-
Filesize
8KB
MD5314105a1c9caca5bd7f97e30e73953aa
SHA18e759c1daf0b8230adacedf276e0f40a7f9dde24
SHA2567474e7f00e58e485530e6ee085a6a014bbd5d40590f58e51021af87250efa1ef
SHA5127f96ad0857ce1b7a088007c0f2504c4ef4fd81f60deba53eba62a5e80b14b5c9faec34c31dab851d060b13028a113e264bd73d8999a7451483e52fd27483b06e
-
Filesize
2KB
MD5eb073eab41d0f05c5969beaf95fe4442
SHA1f455b8245376eda259cdb2135d0c336e88faab73
SHA25674aaf9c01b5ecb4bb497db031001f18a7657119bf3fbc0e856cc9e98b2fea6b2
SHA51268b14179f4b73f3fc2d762f026996103531e57c51cb55b379ac27cf04bbee35cdbcb4ab8ea5691627cf15ee1bfd6fb7bc83ce8e138d030225b5fc6239d720da4
-
Filesize
5KB
MD579467768f8e67b9ecfc2a69c57b37d5e
SHA17980308f4d33d36a2741734c500c15c690e1167f
SHA256bbb216615156aef19eeb94a015d5321785897b14a59bb29f9f37abe9c24e7593
SHA51253403ffa67fc2a0b0200b53c96d5417c288c9b31e5681096fedb736684e54aafc9faba377646df5d4b568ab922cb5185112b8e0b0ed70ddac48b0c165144471d
-
Filesize
8KB
MD58dafaf3acac2c764dd7fc93327d78d92
SHA1c458c8574850dae5270e1216b7455f0715dc4d54
SHA2564745f8a00288b347a556ebf5260dd5ac486b660841b78988c4d9b863b1695a08
SHA5121d06d82bb8add22897cce9dc13cada08284679751fff0a376974e38d06fe53ff3563703bf293e9a6489f00f4d4e72076174f35d4fd444134580ef7add7493f13
-
Filesize
14KB
MD5dd898c4aaa520d6818f81ad4d29a0c40
SHA1dc5e02e487c662ac2d5d477a7d7e8c77d10dd91e
SHA25632e1d123dd81416a4c204cb6a495e27ade0d44d95addc670b0e98d8f46a590fa
SHA512efd2103678c2af0d8d2081ffc54bfc70c8d1552a1994825cee45539fc49a0b5fa07da9526f30d18252788a3dcb2bbfbd93d4284331aaa023a3013bc2fffd386d
-
Filesize
14KB
MD50f6cf0de4e4e3983a9c4178419b8b35d
SHA17dd54230694d06b6689a39777cb7b45089931402
SHA25629fe0b57492f7341d624dba85b2bb0d37a860def1711c8089ef2133ef3722fdb
SHA512979198bd8d3cd8db66a2f3eae81a0ed45235d31ba5178bf9281def7c3ec9401d846f2a003c267fde893b638d3d34bc41116798ad82aab05f73007d42aeeede5e
-
Filesize
776B
MD509de07ef39096abe1ff1393c79c61aa8
SHA1264c4af132256ebb9aa9c116616e3049d8232040
SHA256cec66902608943329bb1ef1e4feeeba88ffa03dc608a8c862edb4eedccdb14fa
SHA512604b13c97db3b43d03968e640ea9f7b2961b64068624ac8f0daba1d82c07ee7297a0970ab49a91a1d28036bffd30ea11da1c4f155ccfaf7e517ba77dc2e47978
-
Filesize
7KB
MD5ff27ef23340f1641e4ee8ea45acd5329
SHA1b6cff5b913ddfc7808791240f9cb2edc98b2fd6f
SHA25677c8454463329ba8fff2f8e0bed3c37e444ef57fa2f0bbabe3e2997dc0b5893d
SHA5121d76f33b0ec224735bafbd04b4e50ffc857008c9d4b7264568839d46c23789fa2d5ed96aeafedf6ff1dbd16266b19ecda43ba3e711ed2b2eb4bf27443c72716f
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\chromehost_1.0.2024.9\chromelauncher.exe
Filesize110KB
MD5171b5f7b065e6fbbcc5913112701d902
SHA10d7e11dd212cdc8e1864bab08450f0ec14941bdc
SHA2568bb50578ce904020146d7f0bda4a56c1f50fb428c8ca611f5647383507806d65
SHA512675529df23235581ab2bd789ba0bff1863a96480c47b46ba44115a7e8675fd54fd2de3e52251c94560716841282d75d9b0345f98693783a8b027c4dca7fc8240
-
Filesize
2.2MB
MD523dfb30abc2b062edc251b1235804a41
SHA1402ef99a0a3c68af625c28970756fbd039e72ea6
SHA25649ace3f33d1d70b683bcc954af12578565f869cc6af421fb8e9e7e8b7ab1a0b5
SHA51237160c2277794c2c383c9cf0a7273b6f74e9b2c84a98e3cbae90ff74abe273508ea1f97763836a0f7eb6b96febe183bb1c992c8b9abdb9a735dfa9e5d84caf54
-
Filesize
443B
MD54e1aecfb8f941521e3a16cbbcf1e3418
SHA1d61831a61049424ce80f5076e91be965d764e32e
SHA256bbc30b97c2d501333061f4f77439a2da8e8454b8cf5602467af260c9bebb6b18
SHA512ee74b3eba02b80ca9032d1c1afc5b436031e57ac4a7a52924185b2c8eabae81f3309a089fb9f23864b43363d9d3587a7338da2c4e1c33991d5648ec361c9a9ef
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdiagnostictool_1.1.2022.118\download.7z
Filesize275KB
MD5422a47b49c81c94a1f10078e376096da
SHA1b2454a1d09f83138c903d9502c32124d6360904d
SHA2569b9eb4c2cec67ed2aa307ed978701ddc86f0b63ab63fdf9b3430a91237a5f59c
SHA5122803ae66ca2a6b2e4a4881a1266c02048d8d4a86a9ffcd01696b4463d3a18846261877933fa4cff503ca984d59976effde7de0db830b96fa4267c4d41ebcfdab
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdiagnostictool_1.1.2022.118\mui\es_MX\kdiagnostictool.qm
Filesize3KB
MD55afc7d8ba894df59c2b3f44726cfc2db
SHA1a21a7a8fd943455fa47cc5d950603bf1bc5a145a
SHA2564824e414e29358d0011ad1195059bda195a90cedfbd4c0f07f8cdeb0e84dc2be
SHA512a9a040e0f3555f61094b42202581a262d29377d414dc6a87596a2bbe4daea8fa3bf2eb10ac52fa6d94a522d54f404e247ee7b272cb41acda898ed6734c8ed639
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdiagnostictool_1.1.2022.118\mui\fr_FR\kdiagnostictool.qm
Filesize3KB
MD562f3720e184f094c874fe0eab7f0f598
SHA1cdd858a80bbd1268e7c5278ebe19c35659871d2b
SHA256bdf3b27cc070b3cd9deb9a5e2bea450382d6851723c266eb0d5f3db4798f5a14
SHA51214f532053b0272fe0c614de9b56bfd9ac85aee11e878e099531250b00f667d2428789e81b5ded64cbe51dc8e3e8e19d7cea8dc08314b1c0274de15fca17b92b6
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kdocreminder_1.1.2021.136\download.7z
Filesize103KB
MD531bdb9137432706b904e8dfcdccde030
SHA1d26fd902b9bc1048731983854ac605e894075130
SHA256af28e7d61a9b2467a78098341ca188626a90acfa0df4b8f81587d1c35f89a55a
SHA512119341029755a087f45a32d3d94dc320fbbc7f599ba9ab20dad4479e1a08d24eb7799cdefcb47051ba835e7fe2c220e4e153a3d660b9a22e2a56cf82910e0280
-
Filesize
292B
MD5da4b75c3d70c08be415e7b25abdc11cf
SHA1c84dfbb528a3c8ce94d068dfc5fbdf7d621d0225
SHA256e93c62beee030970bf56bf0a3aa372ab0b155c1c3436173617c8c735024e8f36
SHA5120fa811055deed42a6cbc0f16f93da173718f4169ebf8d4ea125276c6225ba033c7644a68ee010250379b67a057e17e5cba6351deca067850ab318c505f49e491
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kguidestartuppane_xa_1.0.2024.13\download.7z
Filesize543KB
MD5fa94183af39197b82a107533bdb0a610
SHA10f9544703170d7318bc49a042e2480a476619055
SHA256193b61e14e9f4cc13ec7262ab2433e009c897af0a64c1a188c21f4bcf3d65b0a
SHA512c39fc25a3b72ca18b662af5d1d2279a355c13c772bef8b465cbeb2bb80691337feb70a223ca787d393f4844bc2626d3e2ee32262fd51e7706ba41c0a1f06b159
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kguidestartuppane_xa_1.0.2024.13\mui\default\icons_svg.data
Filesize39KB
MD5e824781565af44e6bb0f6449e58109d9
SHA1e7de21c809c17618ca8e8e1330f0ef93b6c94478
SHA256a387033e51aac2002992fa43626d78f68f68af3193b57d905c7af9cf9c7884f4
SHA51243de1016628cd7ac15d2be41a986914877e7a987801c6ebf6292e43e9ea23a3a6f4584435f0556085417af18b87cb113fdf8f8cfa3cddd5e1db7163d7183de88
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kheaderupgradenotice_1.1.2024.4\download.7z
Filesize202KB
MD5ded028d22792f4a299acbd2d410e5f0d
SHA1940944738e557237c0099117c635da874cf78263
SHA25620d84711493557b73f42b31171cc6840a8079248209768ddc75d10da46ab6bc4
SHA51228ff645f3e78ca9a88cbdaeebb47504178385627d1fbdf68b099901e8db3afc470251413a453c82e7633c232a7c4400789819213fe79e7e3518791775f8d54a9
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kheaderupgradenotice_1.1.2024.4\res\index.html
Filesize1KB
MD566bbeb8733bee0c788685880cc46acc5
SHA107d104aa23fd4ad765095ea771667e1440ac6bca
SHA256faf96f1472b09c6eed78da690151b5b57133733e2f562dc6678602746a79342b
SHA5122d919a92b2c425d0f08d609fd825de151c5ce54cd31d83405054fa84194c85568ba512af4f1b38136c12152764ae0ae34441f36b4f23ed5ae74438502b0d1558
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kheaderupgradenotice_1.1.2024.4\res\static\js\manifest.js
Filesize1KB
MD5af5a4ff62384fe67791d8cde9176ac0d
SHA1cf5aa9528fe795b75a569352466ad944652185c8
SHA2565d1122539ce1ae98804e216cbfcada9f2603fe4f86454b2b29e7d7448da97891
SHA512f78a72b7ba06b257fec3a97bb62d20f7562212e995d62438bfe3d8181fe7f56c3e14194e9203e64b0e259a7cbdd900125f5f185bc8d736c881f8ca0e2920273d
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\knewstylewebwidget_1.0.2024.2\download.7z
Filesize26KB
MD5d376efaf6d854b1bee45900c41ddf638
SHA1e003e35e78e5b47295e0e24b941307557d0138b2
SHA2568554d69d55cda9d3ce258b51cdbc891090de8d2e74b25790de8e4538bd9c78a3
SHA512ea297acb09fb0c2b18f08751345087b5a5a301861e162bd25646f551ea5a4c0dcb09e27b33aa7604720eb326e21fe04ea0e047a5dcdbaae41a1c1086ac8ceb4d
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\download.7z
Filesize3.6MB
MD5fe5071e1c0de55db2399450162fabc08
SHA1ca5565179714f1cb7a04a2900196df74881bec32
SHA256535a8b166811e2e231a1ce3c2bcfc310e5987877e8dfd40cc8d7d5034cdfbbc3
SHA512b72cf4f7722943646c8b6f4521b270c7d691e49b475f55ecab0bc44237f7115dc4a4de8a72c6539e745b2bd864179ea77ceb6326a4e320e0be7d4d2c7a40a2dd
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\premiumcode\element-icons.ttf
Filesize54KB
MD5732389ded34cb9c52dd88271f1345af9
SHA18058fc55ef8432832d0b3033680c73702562de0f
SHA256a30f5b3ba6a48822eae041e0ca5412a289125e4ba661d047dae565ac43b4a6b2
SHA512e8971ae48f5287d252f5b0a2d0516091bef0d2febf7d01fd7b435e426d106fea251037439ec42c2937e934b66f38e5eb43d00a213cdf334f482f4a06b1817f9c
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\premiumcode\element-icons.woff
Filesize27KB
MD5535877f50039c0cb49a6196a5b7517cd
SHA10000c4e27d38f9f8bbe4e58b5ce2477e589507a7
SHA256ab40a58972be2ceab32e7e35dab3131b959aae63835d7bda1a79ae51f9a73c17
SHA512da269b20f13fb5b0bb4628b75ec29e69bb2d36999e94b61a846cb58db679287a13d0aa38cdf64b2893558d183c4cc5df8da770e5a5b2a3288622cd4bd0e1c87b
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\vippayment\assist\base64.js
Filesize6KB
MD512477cb6bc99f90086f05e54ea7dcbe8
SHA14009eefda873514a6579830888d5f12c50d7b3de
SHA2566520eca957e8a4d7e68e0dfe17f1cea9d42c6378962f454e7a911ff32e5e6248
SHA512a7a16f935d71f60bb382622ff781a3cef234865efbaef62ee268163a416bdd9ea285f33c843fb729cf8b8eb6d18a81de5311b01d19b48c998b08d79f29e59d13
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kqingaccountsdk_1.1.2024.5\resource\vippayment\main\img\loading.svg
Filesize1KB
MD5544223e85768fd134633a1af9d5bf536
SHA15536a0023ddbfb2ab67e9ad8ca4d38c60f413b9a
SHA256a3df9710c7e09fd8cffc14bfe45f5a1576deb1846ced44e5050b34caf5527049
SHA512a5cacba054d41af8efd607074c02f36ab731b5d6bc9ffd3bd7ce6b09a4af09b31e29359eb965728d2a00849467b1af66e16186a0c07b4415b3b423a5ea4f68ca
-
Filesize
703B
MD50edafbd62638a75ae8b4debc9fd0b3db
SHA1814e953384ee2771bfcde0584b0f6f5691217ede
SHA2563332953a07daf624094590bc8d2bf9d4ff1ec12c53a43a7310efa11c7cfb71e8
SHA512ab42c6b7922f7137779417bdb5246ff660133f8d566a54fd067ecf787d27ffaee1d65704a4b9574a6fffede9b497b93638f558ff2689d375017d5b074ec88120
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kscreengrabapp_1.0.2020.193\download.7z
Filesize22KB
MD53b91ab7795510566a0cb254022445a1b
SHA12894a929aaa08aafc6bc74278a1511cec2204223
SHA256223f4d92777f385e8ac9f8055ce1362bbbcfa525e36933605481abfdf8f48c79
SHA51253ac22c66f8883781d2904ddbc40d72fcbe9bfa586b5f4e1c083dc7ea45076ad1d2bfa9de2ce5e04b3c8bc9770f633249103761d7874e56662644d07cd502db2
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kvipupgradepage_xa_1.1.2024.1\download.7z
Filesize30KB
MD5d791a4c5021c3934aa216b9bf5b447d0
SHA1f954fe837a9fda1f8172280beb2fe9b578a71a51
SHA2561af1948f4c1f6f753b3a920a787552a072d88c060b7fd3a834343f0dc9f2fbfe
SHA51232b91c12d8922ab3dbb9735770e8533c3de84c9562c3725606d42d50b3acb97891eb65660c7bdd36684c7fabca07e054aa8b4b667b6f701213e33f08a187bdf2
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\kwebfissionactivity_1.1.2024.0\download.7z
Filesize148KB
MD5cc52c7912e7c1f213f6a2d79ba1760ef
SHA1c41c1e31bb134869bb89a16e9bb8f67fa42a61d5
SHA2567cec7edec74ddcf9c233cc440985149545b65597b965704022ff7677d8d15876
SHA51258efb87a6f2c518d3450426ac1f6cb68f9e4b84ca987b3ea5bb1197f9cf0c17ff3d456cc5cacb2107ad86d63399ae29b67c1096f3b83cc627128cae3ce1fb280
-
Filesize
56KB
MD554079bd7a79b895706cb6ad73cc4c627
SHA145068e27f84dcd16044f4628a020629d0360d8b7
SHA256355d005cf859c66b298bf475fd646c67ba5fc952c9f670f1b964714b24f197df
SHA51294d65c7336e0e8597a83c633dd734157ed17d03f9317b9857141724af6b5948c20f82180b4127dfac6da3dadbb4d8aea7ecf5d23d92e87ed719a480a5b1a6c68
-
Filesize
312B
MD5ad3a68e7d8c8bf2470282567d8ca7ded
SHA1addb5ab04165b4743ffb985918c08ba0a76a6eae
SHA25627e743bc78f9a2862d822fc171789160905ee26545466f93052f8565aebd523f
SHA512c8e4b63fb79c365cb48a0ee0c4351f6f94da9ba8ce62f0b14d8ed45726ebaa478f581efb37e254e75e1c561f5ffa1d8985e867957c68c04b8eaaa2945e838505
-
Filesize
5.1MB
MD53303884fbf771d8e3dd645bbc8bd76cc
SHA1cef8fe59d3161645cec87eae5d8d426604e4f2a2
SHA25677756cc9c3fa51ec2bd20a39f9c3ffabfb152ac4dd285bf8befae228971f7cf1
SHA512053abe0567cf8e99c49b9bf3395dd5e8db1c360dd4805c516c9c97ebe0532b0a9090e6fc2f41fbaa910fae21e594d2850729dd527b72dfbbceb53e479f874b62
-
Filesize
165KB
MD54c6221b526433ba802635e2fa0d53ff2
SHA1059bf2b126ee3b901b7a9dee8b53c7e648cc5ebf
SHA256300994947e4af25ddcea546e285f9d35131e7efa0070d9855d873646d4a73177
SHA512b1bdfd321ca6b788948383902b9f317bb46a8abfffc4fda29bfd51381f96be9af35274ff7d62c761fb83b09a05e2bb179df6817fc631e67a315787b86f4b31f0
-
Filesize
21KB
MD587eddda6cfc1c6e1c86e1b3b371f369d
SHA17910a432cc964bc1e1be51e0cef2e986cf54eec2
SHA2564cdfc143513060130052f306c0a7cb93731967dabbbfa22cf892518bfb0a6d5f
SHA512c7bd1162cd851672e9f5ed21e8fb88d734232360be0433e98a82a9f04a4f35e2f59ced11716244f3f30ca021eebe111ef9b6e7df5eaa1c356ddc75f99445cdc8
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\pool\win-i386\pdfwspvreg_1.0.2024.3\pdfwspvreg.dll
Filesize50KB
MD5ccd17aaa7644b6979f661e7c72fa077d
SHA19cfb25754ac4a4ed487ce6c4655ccc78b5aef975
SHA256b5245881da869ea02155d4052eda1390339c87496da055f85c3985a912e0401e
SHA5122199d618af0d3fc948f4c39700cc8cefa07ed75db29ec348c71c013678a9ec3befcdcc5c3cb1d804abca5df4c3e6aec10caddb29188f28fc27313d6609dc2a49
-
Filesize
253B
MD50d914e316c8fc542e5685b1598899979
SHA152e575fc0c66b60cd79d29ae4486944cf06995b0
SHA256484e6146403c96eaeead06a97a8ed86d67334a9185bf009a44f7b1cbe5402e2a
SHA51277ca461895bc65f31dd8fc5182dbed383804b4d3315e210bf65195776510bf9c09c11d87589796ec1bd272f67762e5ba28be4d64b8a58f2577cb6da79dbd7319
-
Filesize
6.8MB
MD562fe07e2c5ef404cea0b023c590799be
SHA1a2668640fc716a4de95286061988a1699c376cae
SHA2564daee09248f3382f64d1bcefae6743e4ebed813fdfa5c1d43ed1638893809e3b
SHA512e2a29a1cdd6a6de42bbfa2ea558e1b0c4af9e72666eba8f93e4fab92d41991c9eba4ff192f7ffae4070b3e5be4acbbbc6af077b19ba3e0c92c55df09c948fae8
-
Filesize
503KB
MD5f3ff3c47ae68b0e6234b72d354ac191b
SHA126c380b44ad61b258a6de56c75c7f568d8c0f876
SHA256cbac9ef94e6c6dd11019653c64bec6a3e6970779604555f5f77974258c214333
SHA51243f892f5172b03e4e7d8f3f3632012ca62a7cb104f26d7d746005abf94472eeff881087c1ca73483f1079f21befe321af7372c6e17b26bd77f8fd9a03935ed95