Analysis
-
max time kernel
128s -
max time network
160s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
28/03/2025, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
WPS_Setup.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
WPS_Setup.exe
Resource
win11-20250313-en
General
-
Target
WPS_Setup.exe
-
Size
246.3MB
-
MD5
4b3226ecc1da133e846eebc9af9b915a
-
SHA1
46403afddb737e4d363446ff617475ae1bbfee21
-
SHA256
667b472a0672133a75304d8b64972ac18a14949a2fcdfc0fa7a56b319a06a31e
-
SHA512
4f9ee9d1d106cb3b02e150bd8a625b24cd5e486d62de843c00bd17009c6414c217a9f5c607530b2c88fbddfdea71ad7046634f592e37e9a7b7cdc7afd371bc4c
-
SSDEEP
6291456:LGDVFnDNs5uOY2MuZHl1aQgAxW/AZH97nlI7Ec:LkPD/3zubzgJsH9b+7b
Malware Config
Signatures
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 223.6.6.6 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 151 223.5.5.5 2820 WPS_Setup.exe Destination IP 223.6.6.6 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 230 119.29.29.29 2820 WPS_Setup.exe Destination IP 223.5.5.5 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 112 223.6.6.6 2820 WPS_Setup.exe Destination IP 223.6.6.6 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 183 119.29.29.29 2820 WPS_Setup.exe Destination IP 223.6.6.6 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 119.29.29.29 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.6.6.6 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.5.5.5 Process not Found Destination IP 223.6.6.6 Process not Found -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{783E484C-5E48-457B-A361-2DB2147CD2B4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{783E484C-5E48-457B-A361-2DB2147CD2B4}\ regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ksomisc.exe File opened for modification \??\PhysicalDrive0 WPS_Setup.exe File opened for modification \??\PhysicalDrive0 WPS_Setup.exe -
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation WPS_Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe Key value queried \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Control Panel\International\Geo\Nation ksomisc.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe WPS_Setup.exe -
Executes dropped EXE 42 IoCs
pid Process 2820 WPS_Setup.exe 3212 WPS_Setup.exe 344 ksomisc.exe 1568 ksomisc.exe 3604 ksomisc.exe 1720 wpscloudsvr.exe 4756 ksomisc.exe 1996 ksomisc.exe 5624 ksomisc.exe 4932 ksomisc.exe 2148 ksomisc.exe 1168 ksomisc.exe 5396 ksomisc.exe 2204 ksomisc.exe 324 ksomisc.exe 1992 ksomisc.exe 4776 ksomisc.exe 2464 ksomisc.exe 4048 ksomisc.exe 5624 pinTaskbar.exe 1548 ksomisc.exe 2888 ksomisc.exe 4368 ksomisc.exe 2664 ksomisc.exe 3076 wpsupdate.exe 3672 wpsupdate.exe 6032 wpsupdate.exe 2756 ksomisc.exe 4548 ksomisc.exe 2612 ksomisc.exe 4004 ksomisc.exe 4316 ksomisc.exe 2084 ksomisc.exe 2580 ksomisc.exe 2136 ksomisc.exe 4936 ksomisc.exe 6032 ksomisc.exe 5220 ksomisc.exe 2560 ksomisc.exe 5652 photolaunch.exe 1760 ksomisc.exe 2056 ksomisc.exe -
Loads dropped DLL 64 IoCs
pid Process 1248 WPS_Setup.exe 1248 WPS_Setup.exe 1248 WPS_Setup.exe 1248 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\lnkfile\ShellEx\ContextMenuHandlers\Open With qingshellext regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\lnkfile\shellex\ContextMenuHandlers\Open With qingshellext\ = "{67F4D210-BFC2-4ADD-9A2A-C9B9E1F42C4F}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\lnkfile\shellex\ContextMenuHandlers\QingNseContextMenu regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\lnkfile\shellex\ContextMenuHandlers\QingNseContextMenu\ = "{AA147FFB-0B1F-4BB1-9B1E-8D062B35C146}" regsvr32.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wpscloudsvr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language openwith.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpsupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WPS_Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpsupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpscloudsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpsupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language photolaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WPS_Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WPS_Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ksomisc.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x0007000000028212-5122.dat nsis_installer_1 behavioral1/files/0x0007000000028212-5122.dat nsis_installer_2 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{656BBED7-E82D-4B0A-8F97-EC742BA11FFA} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{91493453-5A91-11CF-8700-00AA0060263B}\ = "SlideShowWindow" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\KPDF.Document.9\protocol ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{914934C6-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000208D6-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{0002087A-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PowerPoint.Show\CurVer ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000209BA-0000-0000-C000-000000000046}\ProxyStubClsid32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{91493465-5A91-11CF-8700-00AA0060263B} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{0002441B-0000-0000-C000-000000000046}\ = "RefreshEvents" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000208AB-0000-0000-C000-000000000046}\TypeLib\ = "{45541000-5750-5300-4B49-4E47534F4655}" ksomisc.exe Key deleted \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_CLASSES\ET.XLS.6\SHELL\PRINT\COMMAND ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{0002093A-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000209C4-0000-0000-C000-000000000046} ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{914934DA-5A91-11CF-8700-00AA0060263B}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000208CF-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000209FE-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{0002446C-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000208D9-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{0002E165-0000-0000-C000-000000000046} ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000C0310-0000-0000-C000-000000000046} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000C0315-0000-0000-C000-000000000046}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000CDB0B-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{0002091E-0000-0000-C000-000000000046}\TypeLib\ = "{00020905-0000-4B30-A977-D214852036FF}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{6D3837A4-F05E-409F-9A65-0D22505A49C3}\ProxyStubClsid32 ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{914934C4-5A91-11CF-8700-00AA0060263B}\ = "Columns" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{1641E775-2277-46DE-A06D-8C49C3C5D5E7}\TypeLib\Version = "3.0" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{91493467-5A91-11CF-8700-00AA0060263B}\ = "Fonts" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{9149347D-5A91-11CF-8700-00AA0060263B}\TypeLib\Version = "3.0" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{0002447B-0000-0000-C000-000000000046}\TypeLib\Version = "3.0" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000244E0-0000-0000-C000-000000000046}\TypeLib\Version = "3.0" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WPP.POTM.6\shell\open ksomisc.exe Key deleted \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WPS.Docm.6\shell\print ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{E6AAEC05-E543-4085-BA92-9BF7D2474F51}\TypeLib\ = "{00020905-0000-4B30-A977-D214852036FF}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{00020885-0000-0000-C000-000000000046}\TypeLib\Version = "3.0" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000209DD-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WPS.Docx.6\ = "DOCX 文档" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\ET.Backup\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.1.0.18912\\office6\\wps.exe\" /prometheus /et \"%1\"" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000C1717-0000-0000-C000-000000000046} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{000CD903-0000-0000-C000-000000000046}\TypeLib\ = "{2DF8D04C-5BFA-101B-BDE5-00AA0044DE52}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\CLSID\{00020906-0000-4b30-A977-D214852036FE} ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{92D41A6A-F07E-4CA4-AF6F-BEF486AA4E6F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\CLSID\{45540003-5750-5300-4B49-4E47534F4654}\ProgID\ = "ET.Workbook.6" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{00020853-0000-0000-C000-000000000046}\TypeLib\ = "{45541000-5750-5300-4B49-4E47534F4655}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000C0312-0000-0000-C000-000000000046}\TypeLib\Version = "3.0" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{00024477-0000-0000-C000-000000000046}\TypeLib\ = "{45541000-5750-5300-4B49-4E47534F4655}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WPS.PIC.mrw\ = "MRW 图片文件" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000C03D7-0000-0000-C000-000000000046}\ = "IConverter" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{914934DF-5A91-11CF-8700-00AA0060263B}\ = "Effect" ksomisc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{00020813-0000-0000-C000-000000000046}\1.6\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Kingsoft\\WPS Office\\12.1.0.18912\\office6\\etapi.dll" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000C0361-0000-0000-C000-000000000046}\ = "AnswerWizardFiles" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000209EC-0000-0000-C000-000000000046}\TypeLib ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{30225CFC-5A71-4FE6-B527-90A52C54AE77}\ = "CoAuthUpdates" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{699E8713-0458-4E66-8146-087E64D8A482}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" ksomisc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{000208AB-0000-0000-C000-000000000046}\TypeLib\ = "{45541000-5750-5300-4B49-4E47534F4655}" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{00024411-0000-0000-C000-000000000046} ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{00020933-0000-0000-C000-000000000046}\ProxyStubClsid32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\.pot\WPP.POT.6 ksomisc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EEEEFCF7-867B-4FA2-9ABD-884CF531B602}\TileInfo = "prop:System.ItemAuthors" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{B9F1A4E2-0D0A-43B7-8495-139E7ACBD840}\ = "TaskPane" ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\Interface\{D37736A4-33D9-4AEA-8F4F-CFCE1674A3CC}\ProxyStubClsid32 ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\KWPP.SecPresentation.9\DefaultIcon ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{9149346E-5A91-11CF-8700-00AA0060263B} ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000_Classes\WOW6432Node\Interface\{9149346E-5A91-11CF-8700-00AA0060263B}\ProxyStubClsid32 ksomisc.exe -
Modifies system certificate store 2 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Microsoft\SystemCertificates\TestSignRoot ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Microsoft\SystemCertificates\TrustedAppRoot ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Microsoft\SystemCertificates\WindowsServerUpdateServices ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Microsoft\SystemCertificates\eSIM Certification Authorities ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Microsoft\SystemCertificates\FlightRoot ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TestSignRoot\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Microsoft\SystemCertificates\TrustedDevices ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\WindowsServerUpdateServices\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\FlightRoot\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedAppRoot\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\CRLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\TrustedDevices\CTLs ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\Software\Microsoft\SystemCertificates\Windows Live ID Token Issuer ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates ksomisc.exe Key created \REGISTRY\USER\S-1-5-21-2123103809-19148277-2527443841-1000\SOFTWARE\Microsoft\SystemCertificates\eSIM Certification Authorities\CRLs ksomisc.exe -
Suspicious behavior: AddClipboardFormatListener 35 IoCs
pid Process 2820 WPS_Setup.exe 344 ksomisc.exe 1568 ksomisc.exe 3604 ksomisc.exe 4756 ksomisc.exe 1996 ksomisc.exe 5624 ksomisc.exe 4932 ksomisc.exe 2148 ksomisc.exe 1168 ksomisc.exe 5396 ksomisc.exe 2204 ksomisc.exe 324 ksomisc.exe 1992 ksomisc.exe 4776 ksomisc.exe 2464 ksomisc.exe 4048 ksomisc.exe 1548 ksomisc.exe 2888 ksomisc.exe 4368 ksomisc.exe 2664 ksomisc.exe 2756 ksomisc.exe 4548 ksomisc.exe 2612 ksomisc.exe 4004 ksomisc.exe 4316 ksomisc.exe 2084 ksomisc.exe 2580 ksomisc.exe 2136 ksomisc.exe 4936 ksomisc.exe 2560 ksomisc.exe 6032 ksomisc.exe 5220 ksomisc.exe 1760 ksomisc.exe 2056 ksomisc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1248 WPS_Setup.exe 1248 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 3212 WPS_Setup.exe 3212 WPS_Setup.exe 3212 WPS_Setup.exe 3212 WPS_Setup.exe 3212 WPS_Setup.exe 3212 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 2820 WPS_Setup.exe 344 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 1568 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 1720 wpscloudsvr.exe 1720 wpscloudsvr.exe 4756 ksomisc.exe 4756 ksomisc.exe 4756 ksomisc.exe 4756 ksomisc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2820 WPS_Setup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2820 WPS_Setup.exe Token: SeRestorePrivilege 2820 WPS_Setup.exe Token: SeRestorePrivilege 2820 WPS_Setup.exe Token: SeRestorePrivilege 2820 WPS_Setup.exe Token: SeRestorePrivilege 2820 WPS_Setup.exe Token: SeDebugPrivilege 344 ksomisc.exe Token: SeDebugPrivilege 1568 ksomisc.exe Token: SeLockMemoryPrivilege 1568 ksomisc.exe Token: SeLockMemoryPrivilege 344 ksomisc.exe Token: SeDebugPrivilege 3604 ksomisc.exe Token: SeLockMemoryPrivilege 3604 ksomisc.exe Token: SeDebugPrivilege 4756 ksomisc.exe Token: SeLockMemoryPrivilege 4756 ksomisc.exe Token: SeDebugPrivilege 1996 ksomisc.exe Token: SeLockMemoryPrivilege 1996 ksomisc.exe Token: SeDebugPrivilege 5624 ksomisc.exe Token: SeLockMemoryPrivilege 5624 ksomisc.exe Token: SeDebugPrivilege 4932 ksomisc.exe Token: SeLockMemoryPrivilege 4932 ksomisc.exe Token: SeDebugPrivilege 2148 ksomisc.exe Token: SeLockMemoryPrivilege 2148 ksomisc.exe Token: SeDebugPrivilege 1168 ksomisc.exe Token: SeLockMemoryPrivilege 1168 ksomisc.exe Token: SeDebugPrivilege 5396 ksomisc.exe Token: SeLockMemoryPrivilege 5396 ksomisc.exe Token: SeDebugPrivilege 2204 ksomisc.exe Token: SeLockMemoryPrivilege 2204 ksomisc.exe Token: SeDebugPrivilege 324 ksomisc.exe Token: SeLockMemoryPrivilege 324 ksomisc.exe Token: SeDebugPrivilege 1992 ksomisc.exe Token: SeLockMemoryPrivilege 1992 ksomisc.exe Token: SeDebugPrivilege 4776 ksomisc.exe Token: SeLockMemoryPrivilege 4776 ksomisc.exe Token: SeDebugPrivilege 2464 ksomisc.exe Token: SeLockMemoryPrivilege 2464 ksomisc.exe Token: SeDebugPrivilege 4048 ksomisc.exe Token: SeLockMemoryPrivilege 4048 ksomisc.exe Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeDebugPrivilege 1548 ksomisc.exe Token: SeLockMemoryPrivilege 1548 ksomisc.exe Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeDebugPrivilege 2888 ksomisc.exe Token: SeLockMemoryPrivilege 2888 ksomisc.exe Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE Token: SeCreatePagefilePrivilege 3588 Explorer.EXE Token: SeShutdownPrivilege 3588 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2820 WPS_Setup.exe 3588 Explorer.EXE 3588 Explorer.EXE 3588 Explorer.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2820 WPS_Setup.exe 344 ksomisc.exe 1568 ksomisc.exe 344 ksomisc.exe 1568 ksomisc.exe 3604 ksomisc.exe 3604 ksomisc.exe 4756 ksomisc.exe 4756 ksomisc.exe 1996 ksomisc.exe 1996 ksomisc.exe 5624 ksomisc.exe 5624 ksomisc.exe 4932 ksomisc.exe 4932 ksomisc.exe 2148 ksomisc.exe 2148 ksomisc.exe 1168 ksomisc.exe 1168 ksomisc.exe 5396 ksomisc.exe 5396 ksomisc.exe 5396 ksomisc.exe 5396 ksomisc.exe 2204 ksomisc.exe 2204 ksomisc.exe 324 ksomisc.exe 324 ksomisc.exe 1992 ksomisc.exe 1992 ksomisc.exe 4776 ksomisc.exe 4776 ksomisc.exe 2464 ksomisc.exe 2464 ksomisc.exe 4048 ksomisc.exe 4048 ksomisc.exe 1548 ksomisc.exe 1548 ksomisc.exe 2888 ksomisc.exe 2888 ksomisc.exe 4368 ksomisc.exe 4368 ksomisc.exe 2664 ksomisc.exe 2664 ksomisc.exe 2756 ksomisc.exe 2756 ksomisc.exe 4548 ksomisc.exe 4548 ksomisc.exe 2612 ksomisc.exe 2612 ksomisc.exe 4004 ksomisc.exe 4004 ksomisc.exe 4316 ksomisc.exe 4316 ksomisc.exe 2084 ksomisc.exe 2084 ksomisc.exe 2580 ksomisc.exe 2580 ksomisc.exe 2136 ksomisc.exe 2136 ksomisc.exe 4936 ksomisc.exe 4936 ksomisc.exe 2560 ksomisc.exe 6032 ksomisc.exe 2560 ksomisc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2820 1248 WPS_Setup.exe 87 PID 1248 wrote to memory of 2820 1248 WPS_Setup.exe 87 PID 1248 wrote to memory of 2820 1248 WPS_Setup.exe 87 PID 2820 wrote to memory of 344 2820 WPS_Setup.exe 97 PID 2820 wrote to memory of 344 2820 WPS_Setup.exe 97 PID 2820 wrote to memory of 344 2820 WPS_Setup.exe 97 PID 3212 wrote to memory of 1568 3212 WPS_Setup.exe 98 PID 3212 wrote to memory of 1568 3212 WPS_Setup.exe 98 PID 3212 wrote to memory of 1568 3212 WPS_Setup.exe 98 PID 3212 wrote to memory of 3604 3212 WPS_Setup.exe 99 PID 3212 wrote to memory of 3604 3212 WPS_Setup.exe 99 PID 3212 wrote to memory of 3604 3212 WPS_Setup.exe 99 PID 2820 wrote to memory of 1720 2820 WPS_Setup.exe 100 PID 2820 wrote to memory of 1720 2820 WPS_Setup.exe 100 PID 2820 wrote to memory of 1720 2820 WPS_Setup.exe 100 PID 2820 wrote to memory of 4756 2820 WPS_Setup.exe 101 PID 2820 wrote to memory of 4756 2820 WPS_Setup.exe 101 PID 2820 wrote to memory of 4756 2820 WPS_Setup.exe 101 PID 3212 wrote to memory of 1996 3212 WPS_Setup.exe 102 PID 3212 wrote to memory of 1996 3212 WPS_Setup.exe 102 PID 3212 wrote to memory of 1996 3212 WPS_Setup.exe 102 PID 3212 wrote to memory of 5624 3212 WPS_Setup.exe 103 PID 3212 wrote to memory of 5624 3212 WPS_Setup.exe 103 PID 3212 wrote to memory of 5624 3212 WPS_Setup.exe 103 PID 2820 wrote to memory of 4932 2820 WPS_Setup.exe 104 PID 2820 wrote to memory of 4932 2820 WPS_Setup.exe 104 PID 2820 wrote to memory of 4932 2820 WPS_Setup.exe 104 PID 2820 wrote to memory of 2148 2820 WPS_Setup.exe 105 PID 2820 wrote to memory of 2148 2820 WPS_Setup.exe 105 PID 2820 wrote to memory of 2148 2820 WPS_Setup.exe 105 PID 3212 wrote to memory of 1168 3212 WPS_Setup.exe 106 PID 3212 wrote to memory of 1168 3212 WPS_Setup.exe 106 PID 3212 wrote to memory of 1168 3212 WPS_Setup.exe 106 PID 3212 wrote to memory of 5396 3212 WPS_Setup.exe 108 PID 3212 wrote to memory of 5396 3212 WPS_Setup.exe 108 PID 3212 wrote to memory of 5396 3212 WPS_Setup.exe 108 PID 3212 wrote to memory of 2204 3212 WPS_Setup.exe 109 PID 3212 wrote to memory of 2204 3212 WPS_Setup.exe 109 PID 3212 wrote to memory of 2204 3212 WPS_Setup.exe 109 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 2204 wrote to memory of 2076 2204 ksomisc.exe 110 PID 3212 wrote to memory of 324 3212 WPS_Setup.exe 111 PID 3212 wrote to memory of 324 3212 WPS_Setup.exe 111 PID 3212 wrote to memory of 324 3212 WPS_Setup.exe 111 PID 3212 wrote to memory of 1992 3212 WPS_Setup.exe 112 PID 3212 wrote to memory of 1992 3212 WPS_Setup.exe 112 PID 3212 wrote to memory of 1992 3212 WPS_Setup.exe 112 PID 3212 wrote to memory of 4776 3212 WPS_Setup.exe 113 PID 3212 wrote to memory of 4776 3212 WPS_Setup.exe 113 PID 3212 wrote to memory of 4776 3212 WPS_Setup.exe 113 PID 3212 wrote to memory of 2464 3212 WPS_Setup.exe 114 PID 3212 wrote to memory of 2464 3212 WPS_Setup.exe 114 PID 3212 wrote to memory of 2464 3212 WPS_Setup.exe 114 PID 3212 wrote to memory of 4048 3212 WPS_Setup.exe 115
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\WPS_Setup.exe"C:\Users\Admin\AppData\Local\Temp\WPS_Setup.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe"C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe" /ThemeIndex=#ThemeIndex#3⤵
- Unexpected DNS network traffic destination
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -kccmove C:\Users\Admin\AppData\Local\Temp\wps\~e579337\\CONTROL4⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:344
-
-
C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe"C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" InstallService4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -addFirewallRule4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regmtfont4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4932
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -setappcap4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2148
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -registerqingshellext 14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingshellext64.dll"5⤵
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\system32\regsvr32.exe/s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingshellext64.dll"6⤵
- Modifies system executable filetype association
PID:5912
-
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe" -createtask4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -setappcap4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4316
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -assoepub -source=14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -clearmso2pdfplugins4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:6032
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -cleardocermsoplugins4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:5220
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -assopic_setup4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -uninstalldatarecover4⤵PID:1564
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\Kvpins64.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\Kvpins64.exe" /i "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\Kvpins64.inf" /s4⤵PID:3132
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\kvpvbsext.dll",_X86ScriptHostEntry VBScript DE2B427E6C624B2FA5CEC25612458BFB 1 Uninstall /_X64Cast5⤵PID:2616
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\kvpvbsext.dll",_X86ScriptHostEntry VBScript 6E4340857A844530B269E655AC1F6B7A 1 Install /_X64Cast5⤵PID:8
-
-
C:\Windows\system32\spool\DRIVERS\x64\3\kvpet.exeC:\Windows\system32\spool\DRIVERS\x64\3\kvpet.exe pdf_virtualprinter_install 0x3e8, 0x685⤵PID:4084
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -defragment4⤵PID:3712
-
-
-
-
C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe"C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe" -downpower -ThemeIndex="#ThemeIndex#" -msgwndname=wpssetup_message_E57951C -curinstalltemppath=C:\Users\Admin\AppData\Local\Temp\wps\~e579337\2⤵
- Writes to the Master Boot Record (MBR)
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -setlng zh_CN3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -fixoldversionassostatus3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -setservers3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -register3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5624
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regprogid true3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1168
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assowordexcelpowerpnt 1 1 1 -source=13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5396
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -compatiblemso -source=13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\openwith.exe"C:\Windows\SysWOW64\openwith.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -checkcompatiblemso3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:324
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -saveas_mso3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -distsrc 12012.20193⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -sendinstalldyn 53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -updatetaskbarpin 2097152 -forceperusermode3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4048 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\pinTaskbar.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\pinTaskbar.exe" "C:\Users\Admin\AppData\Local\Temp\Kingsoft\WPS Office.lnk" 53864⤵
- Executes dropped EXE
PID:5624
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -addcontextmenushellnew3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regvascontextmenushellnew3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regkwpsshellext admin3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kwpsshellext64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kwpsshellext64.dll"5⤵PID:2776
-
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe" /from:setup3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -collectfileassoinfo -module=1;2;4;8 -daily -source=14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe" -createtask3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6032
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\kdesktopshellext\kdesktopshellext64.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Windows\system32\regsvr32.exe/s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\kdesktopshellext\kdesktopshellext64.dll"4⤵PID:5220
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regyunpanfornew -forceperusermode3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4548 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\system32\regsvr32.exe/s /u /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵PID:4432
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u /n /i:overlayicon "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\system32\regsvr32.exe/s /u /n /i:overlayicon "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵PID:1364
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u /n /i:contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\system32\regsvr32.exe/s /u /n /i:contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵PID:4416
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /u /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\system32\regsvr32.exe/s /u /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵PID:3184
-
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regqingdriveshellext_install -forceperusermode3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*install "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:5700 -
C:\Windows\system32\regsvr32.exe/s /n /i:qingdriveshellext*install "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵
- Modifies registry class
PID:2872
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*thumbnail "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Windows\system32\regsvr32.exe/s /n /i:qingdriveshellext*thumbnail "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵PID:1704
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*drivebho "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\system32\regsvr32.exe/s /n /i:qingdriveshellext*drivebho "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵
- Installs/modifies Browser Helper Object
PID:8
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\system32\regsvr32.exe/s /n /i:qingdriveshellext*contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵
- Modifies system executable filetype association
PID:2464
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\system32\regsvr32.exe/s /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵PID:5132
-
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*onlinefile "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"4⤵
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\system32\regsvr32.exe/s /n /i:qingdriveshellext*onlinefile "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"5⤵PID:5108
-
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -setup_assopdf -source=13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4004
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assofdf -source=13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -createsubmodulelink desktop prometheus3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -createsubmodulelink startmenu prometheus3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4936
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe" /photo /createlink /install3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5652
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assoofd -source=13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:1760
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assoopg -source=13⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:2056
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regcadfileasso3⤵PID:5352
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regarchivefileasso3⤵PID:4248
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -installbrowserextensionhost3⤵PID:780
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regvideoeditsetupfileasso3⤵PID:220
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regemmxfileasso3⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regeddxfileasso3⤵PID:3004
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -repair3rdlink3⤵PID:4788
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -createexternstartmenu "WPS Office"3⤵PID:6112
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -rebuildicon3⤵PID:3684
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -addJsapiCert3⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe" /prometheus /from=autostart_after_install3⤵PID:6008
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /qingbangong /start_from=qingipc /qingbangong /start_from=kstartpage silentautologin4⤵PID:4112
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /messagepush /PushType=mipush /From=Qing5⤵PID:4784
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /messagepush /PushType=mipush /From=Qing6⤵PID:564
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /krecentfile /init /From=Qing5⤵PID:4716
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /krecentfile /init /From=Qing6⤵PID:2648
-
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\promecefpluginhost.exe"C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=gpu-process --no-sandbox --log-severity=disable --lang=zh-CN --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --mojo-platform-channel-handle=772 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:24⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\promecefpluginhost.exe"C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=zh-CN --service-sandbox-type=none --no-sandbox --log-severity=disable --lang=zh-CN --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --mojo-platform-channel-handle=1028 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:84⤵PID:464
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=6008 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --js-flags=--expose-gc --lang=zh-CN --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=4904 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:14⤵PID:5348
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=6008 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --js-flags=--expose-gc --lang=zh-CN --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=4532 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:14⤵PID:2148
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe" /photo /checkasso2⤵PID:4088
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe" /photo /checkasso3⤵PID:2988
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /wpscloudlaunch /run_plugin /plugin_name=kfileassociate /plugin_type=dll /plugin_entry=EntryPoint /action=regassocall /src=auto4⤵PID:1364
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /wpscloudlaunch /run_plugin /plugin_name=kfileassociate /plugin_type=dll /plugin_entry=EntryPoint /action=regassocall /src=auto5⤵PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" Run addons/kpluginwrapper/kpluginwrapper.dll run_plugin -plugin_name=kmessagepushcenter -dll_name=kmessagepushcenter silentreg4⤵PID:5932
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe"C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe" Run addons/kpluginwrapper/kpluginwrapper.dll run_plugin -plugin_name=kmessagepushcenter -dll_name=kmessagepushcenter silentreg5⤵PID:2512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Browser Extensions
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fcabcea14f78b332e4abdeed9cd18d2e
SHA1ee11337ae6cbb169ac9617ea43a564334d0ebe55
SHA25640f6eccdfe1de78f5ef4f803ebb4f4d47e7cb6619d48eea6242197768be4a58b
SHA512abc881835fc61dc0f11b5acb8cd6d34215ca2365eb937040e757d93b6b8cc59aae375b160e55a3bdddbcfbe995c881cb4420f61fbe716dcfb3f34825611b43d9
-
Filesize
81KB
MD52f2e967a23a459de0f9ec166eedeb9f2
SHA120198b7f783fa0fec5931d7cfaaf7eccf0834ee1
SHA256b3058bec266f4310750d6ccd60fe0aa70e6ab7b2a998a10e14bf98606561044f
SHA512343745a31bcc78817e0fe6a27d0308cd7eb8c422acfcf8c676f2c1431b94092a2575f36993197440ebeda53bcd8a5f67b778fb1f0ffa4e84ccae732b2b3b8e31
-
Filesize
1.1MB
MD5597cf6fa94b9d03b72874dc22a840990
SHA148f7599074147cf06a0082227902496dfad9691b
SHA256665526fb362589d409da4a0da90cf19fccfbe26e8ce6e3b393ea0a10ec911035
SHA512c86b51853897bea67d696152e519b420fd91a67cd32d50a0763f8b752d68f87bd9e6af02f33b3b93ae8f90199ea41982cff780544c6118adbeea61e3e9ff2e43
-
Filesize
170KB
MD5928df087cecfde22330a8c3813091c25
SHA1dcda6ba1d5583a22eb2cd03eb7cb2ccc35697c2f
SHA25646f3ef62fc1aa886283552c051613df9395f426c513ae700ac069fcbf6629188
SHA51298747014979b913e2cc4767759d971f29f93eff89d3c26d4d68022619a51be2d37823acd036d0a7eeefd03db532139b9158f39529fafdf03afaef4485a8c4f82
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\StartScreenTile\ksolaunch\logo-small.png
Filesize6KB
MD58d650fe389e3665607fdbf938c1a1722
SHA12e545f9555ff22313e4ce113995d8aa694e5cab8
SHA2568bad76a7433cf4662c38a539c2429336d65feeeef1bb5c6435928a9574b216f8
SHA512f116621bfecb602d02919eb1ee9d7dc92e82b313b8b54cda42ab48c5e7ec60b02005edcad763fff6b497ca4bc46e83cb0c9a249be791f245bb9c599950fdf015
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\StartScreenTile\ksolaunch\logo.png
Filesize12KB
MD5d58510dca6b659c6e4ba7a454d5b75ce
SHA1e142de2dda3811a2e8bbbb2eb64d366e8eb9ea3c
SHA256ddfd8c3e15c7a4667e369546fd8be6e7dd24be632acba2692ffbfc4272eb6518
SHA51242409f9976ad08ecf1756d1c2915f3ffd17cdc78e9ff552c0a08bdfa2fda8960e408721bfc9de1a5ed9c9aca3e23b97adb721b3c51b6b3f0ed3ee4a4c780cf88
-
Filesize
171B
MD5b30cb271e143eace0f55ea2e562e1e9f
SHA19d97dbf24931cfc114384c3f4dbbae21c9e51be5
SHA2563ab7bb6175885fc6acbf5eed0062b0d00c059cb4c68bd2ef90149b2c8763e658
SHA512dc593185fa63b458024c3a913c558e5686806154181dea67eec786ada50595c53bab822833ad1e76c9acdf21be3eba50631391b7e575d7f1f6409ceccf966535
-
Filesize
226B
MD5abc3a6089b0ea76ffc960fbc9b6e66d1
SHA150ad0cb201c13799024de56cf45116cf65ff5569
SHA256c2fcf4d5d04350a76c4ce6b06db287d9e9c63b0f886fae500ac27b0627d38cc9
SHA512ec1e32b7bed882095b23e049a4e1a86acf0bf993e2f691105ffbd99d93ebf28faad4fbdd645ac1eefa74ede575854a3994c7c6d2bacc6f7a09a1991561b1a44b
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\qing\mui\zh_CN\res\qingaccount\ferrPage_timeout.html
Filesize7KB
MD59b7a36d32ed674b3cb4d247d17b71794
SHA1e756cff87d95360675b56b9ee4e2dd71bb96a852
SHA256eb5dc549d839abd9dd7fb725629198959c7e5b0322454cf3c3bac89c57f53ca9
SHA51297520f64605b0f2690a03b1bf42eaae8b3d4b10c0925081ac250ed6bdba190d16368fafa0ec11783dd21177becc4d945acfbb327fdab32ff6350dc3155f58721
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\wpsbox\mui\default\html\syncassistant\favicon.ico
Filesize4KB
MD51ba2ae710d927f13d483fd5d1e548c9b
SHA1c0605efed936ee2600284e6480521d06fa64f872
SHA256db74ab0b78338c1f778f8398c45f4103c99aea0e845a3118a7750b4eeafd3445
SHA512f933cd352eaba92f509b3863353ddfefadfada26a4152ecdc4727d450bbf35e7b10fb3038fe8db340d5c63d74e608c1560ec84d0f6ffc8ccd940c9e0d7533544
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\folderselector\dist\static\fonts\element-icons.ttf
Filesize54KB
MD5732389ded34cb9c52dd88271f1345af9
SHA18058fc55ef8432832d0b3033680c73702562de0f
SHA256a30f5b3ba6a48822eae041e0ca5412a289125e4ba661d047dae565ac43b4a6b2
SHA512e8971ae48f5287d252f5b0a2d0516091bef0d2febf7d01fd7b435e426d106fea251037439ec42c2937e934b66f38e5eb43d00a213cdf334f482f4a06b1817f9c
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\css\app.css
Filesize107KB
MD56c8e8b5a40bcaa65db2e23600ba58515
SHA1ed5f39576a2ee624a187a8ff09b7ad9f9bf5e1f8
SHA2569db4c6bc8ce25c712d19d676f2157e0fc401bdef21111e27317f89beb610b9ae
SHA51261aa411e3aa8f889bef7b89e0bdd154ad81872ce48fc8655687fc6ebec3e22e2d8ff641be26787a6ea714c8ac2c257fff5b064ffd7cc41e573d9a7beeaeeb472
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\css\chunk-vendors.css
Filesize279KB
MD5a3964e72421a1ef5fb60c6e17eb5d705
SHA15dd9584be5141e884a230c48746e1c88126b0a55
SHA25664a207f1e9e24bd26d83e1397dfb94a155b46e0589ba5f002f1557072f3c21db
SHA5124ce4119b7407b460969041809354c4ede587047ee643f2897eb0ecb9627608431f43fed27c54c70bacff3a6694eb32a85b535c7d6397ac22d7d28e260b0a5467
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\js\app.js
Filesize369KB
MD56ea825d75755278734ffd07e89867e6f
SHA1bbfb8d7b5a35d697681802e9360eae6291e44d8c
SHA256f1735c87cd85eab083c09f1b14806e09caea6c658eed0bcc1bbf18703563774a
SHA5120dcb7003d43696287283e3eafe9cca82a9201c020e33a6f6cad0731a98270b39add4e7f24ddbc2eb4e2fbb740233bf40a986f6ec2b34ba10ddff0a26d18f934a
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\js\chunk-vendors.js
Filesize425KB
MD581e2ef7adf3c6e9d46cad32276781716
SHA140c5689f4131ddb609f6dc31b4220fb3413f1636
SHA2561c877f69fa5fa07362ed4c0c7e6eeccde6afd4d67da9d38058cdc81809524e40
SHA512caa109ef1a804c6d9a4e9325602bfea6753260097b6a457b7dd0abd8dc4be85bc3454378ccaec966d215fd3f4bd08375e8ce3d893e9984477da360b944f3233a
-
Filesize
408B
MD5ec3e1071f236d7f0bd9d54ebfed18c71
SHA1c6ece074b4a75ed7f12be71761047b6fea77810f
SHA25635d0f05b9fc842146937ddf3fb17afe05af822a76675fdbc6ea64b70c925de44
SHA512b7e3c84f9dae7bfdea9eab501c18454d68ce2121ef6c569aa7c89b966e98d17d055ad9a6226cc35f9a9e1e2434f45b86b35d198adfda7a30319f91d275f73ac0
-
Filesize
177KB
MD56b7f68bd5266066a6569f15bbf1cb69e
SHA1c7a22e1be947551f7b0f2d308c9f75b1ce34c08e
SHA256b6795557aaf6aee42c715515c73e0a014b6ea39175fd23891c8d9b84c8600fc4
SHA5124a26e7927f3f6dd156ade32371ffe9434abd3922dc50bd3e0e45598ac0c6f802cac69d04bfe56d91417f1afabe565fbe6202712825eef2f75daa0cdff0f61bd1
-
Filesize
1.1MB
MD5339da30bbe05f7d0ee0b000c88c76fd9
SHA10c5a608fc342f8645008d6821ee0d2959247fec2
SHA256ba7dfb36ad9f9657340b9814c4ea44a3e2247565d73751fd3e433b1049ffc11b
SHA512cb0438d746de953a31a4baaa06b8069624a10b18eacddd5013586cf9d9477dca36f3e3468abd748fb8a836b9b0c0a93784c4865c617d87caa9162d785d03f621
-
Filesize
23.1MB
MD5ab5af1e05f6409e81950cd9e83d4a222
SHA113dd78eb2120e9ddf4220fc460126cee8f5edb3f
SHA25681fa80695baac177b6caac998b35088ffb829e159e19dffa24d9366ee33c1961
SHA5128223a102a7ba2205e0216d2484dd677ad88cf9a087560ed7cb64f785929fd6786aeec2ce59ddc052b7f9934af20f9216279b42a242cc34683e6a17bc82c64bf6
-
Filesize
24.8MB
MD5eefff9b8a4b745af6c3e340dfce18164
SHA1f21265e578dec02fc1b420370faf44be81550031
SHA25658700f755a8174054ad8a0984b77f3bbc34c72c3d4409f7fe41172a8a21e3250
SHA5120c4b0c98f8a9c11f3e2560a0ef99ffb8ae4a6ed6df96dd8bf2e9fefb033361cf9110fb01e97031904c5c98cacc60740ba1a00bba63c33f8cacec4498b9031980
-
Filesize
10.0MB
MD58bf61dce1196d5733871e2f2becfe7d1
SHA18d0579aa417f9fa580c1b8f57d6d1314f18eb967
SHA256f4cea14ea1545929415d91647c71794f6538a274ba027ff58b56d143f9734937
SHA51217b366c1d7143442a1239402f75968bec894822a102ab309eb8b261eea2f7ccd9e7de306f600355e82f0198e13a00bc4059c778234e2ced91c4d34bc34499534
-
Filesize
3.1MB
MD57cabafcec3b852222a2461a8d289d4b5
SHA18adee50735a967635bb75d82a7af01dc94b6e1b4
SHA2567a561952cf8c3f6a338da6bc65184c6e807553aba5e3101023f59abc8ef0d3ce
SHA5121580bbacf49ca435941456f435d696bcb6d756b6156b33cffa084b921dead672027bfb81bef57fea45ddcf0d3a604be9227c054d892fadfeb74ab7f402608097
-
Filesize
353KB
MD589497d9b3dea9f5a88c210ba64c371ac
SHA19aee01a76b4a82315f96a455862396307199e03f
SHA2567be0fe53389f96e4d5647b061da7a2e0f518ad621bc0ebe94978823224e74662
SHA5126e0662e1c8f278183b7f40d888adf03b5c6fdf5cc4a3c236a37c520b0682c66646c1020a1424c478169ea1bc335ae5b1cd69ad633a5ecd92d234d90b448b203a
-
Filesize
519KB
MD5a1f7be2df27b5df7b4c5ee5a9ca793cb
SHA1ddcce48683694db501b26ed0c143c8d14abb6e66
SHA2565e7b5d18430429bb83cc81567d19c1e4567bf1e329b73e41f4f1406e7d950e8d
SHA5120e4696a949b2c04dd31a371e6a65cff00833c1a5671e1017b0f334b92c094387e12fb427cec13701822c7f8ce9f4ca2529839d838fabaab308ba9b265142d26b
-
C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\mui\zh_CN\templates\Wpp Default Object\Preset Slide Layout\wideLayout\presetLayout_16.pptx
Filesize45KB
MD517ea9186a351ccf5bb9e8608077f40a4
SHA1713a1fa1031245c639080b5708f2c40abaa41f4e
SHA2560d83ba0a38951b5e06fd13020514c96bdb11688e7739b713b1d7a70ce4251101
SHA512af8f4c5d3a45038fe6bd8ac8632de5a21af9324d8f4be6cab8a2dc03fd3f38747983c7720798ce8e4ca1234cf8b13cb7d475de3446ce08f4f6e76af0ab64a40f
-
Filesize
904KB
MD5c5768ab883d310b72e3796d334a16269
SHA19b0c3e2f83c66112501b82b751498d74bcca8e2d
SHA2566d1cafd178007a0da59710a5c68a77eec389c00855e6e8b558facd4322d51c50
SHA5120611e9dce683c69fd4080aed2e29956f84ee2731809b22424522b65a2a559b24e3d454c4a992b39980310b77a0357f2487066929828aaa09c3ced5e49d7db7b1
-
Filesize
499B
MD5ff7f70f866e51eafa34e1a6e2c01a036
SHA1229dc211f6bf582a23e4b87dbf391fcccd618637
SHA256ec54e0b3d965e50566dd1b8fbfa85fe34c290a0fa535f01d4e750df48473a713
SHA51261b485f3da9d0cae630f977e61a020cb232b51d47fa9cc5edca4aefcfe7179be724b9205c4a531f3947e64455aa8b47c5be255853628b4ebc7fa99a837f48103
-
Filesize
625B
MD5c84a8715b6857bcbb59e3ee939044374
SHA1060d185e9953eff2f76e3ffdd913ef46fd1945e0
SHA2561f3132a30baa382d71f44cd04070407b78afdb9afabdaaa139e946aaf99d7eb4
SHA5128d121393bcdc0da70e00fd84be6d2b453af92b85bfed2fa0b821589ab499e87adef7e77e054c1493d511dfced5e2201ebbeace0b87fcf3d51189f1f7e4b1b680
-
Filesize
2KB
MD5e3d40136c39f02a2addb315c477d2346
SHA1bcdf274c3ff0e42ad3cce2e0b87b915de4080f04
SHA256391daedf80262f8ae93af5276e5d98d67d555f916d5d03623dd322dfc88e4b48
SHA512ba7a1e029eb506619126b7e8784c10ad61f87136630ae4ce201c539d550189ae8cd86ea4352d3c32337cecfb3fc816d640cc2bcf61e3ac371404aee45c3aaf66
-
Filesize
13KB
MD528c87a09fdb49060aa4ab558a2832109
SHA19213a24964cd479eac91d01ad54190f9c11d0c75
SHA256933cadcd3a463484bbb3c45077afda0edbb539dfbe988efad79a88cae63bf95f
SHA512413b3afe5a3b139a199f2a6954edc055eee3b312c3dffd568cfdbe1f740f07a7c27fbf7b2a0b6e3c3dd6ee358ce96cc1ca821883f055bf63ddebda854384700d
-
Filesize
11KB
MD50063d48afe5a0cdc02833145667b6641
SHA1e7eb614805d183ecb1127c62decb1a6be1b4f7a8
SHA256ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7
SHA51271cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0
-
Filesize
192KB
MD5500318167948bdd3ad42a40721e1a72b
SHA124134691693e6d78d6eb0a0c64833c12a0090968
SHA256d3378ee739debcaee8c715963403d96bf025db98bfbb55e54635429890db85c6
SHA5120a2d3b55528cc53cfce5b47158997300c562afd2c7bb5596532b218d3f482380887ee7c204b13d42425dc0c4cc439a7f9ed167f3767bda7b6e205e7e8f454863
-
Filesize
5.0MB
MD578fe966f7cf2fba8b747edbad9946d13
SHA1184c29513bfa6b32d4156162d6bda507fbe9fbff
SHA256915d10d462955a7d518f89cc745df971584603e43a360d8f51ac56ee2d2fb365
SHA512ed0f1f365d719e69fc1e04c40606ec09b706ba346491a21321062714865547f9103cac379a4cf2c9b2dc378ea0510d1e4cbea17d17c715e1dff6b9293583ad01
-
Filesize
5.3MB
MD5a35e999396ed122f3e0233440fab996f
SHA1a1802754a81d8c6bb69dbcec27b38d212d796f14
SHA256c972489efff452a167cfc91f5f38df2097607a3f4c040ed16b6e048c74e8cb29
SHA5120561c1975deda555610621c407637380dcde9219798e118676fa090e4f23aa5988383c548f96851d8262ad0f9b1a0421bb19c87e0821adcef6e3e3f63401e4b9
-
Filesize
392KB
MD5e3f21b8fff7a1352cb346b5197a02bf8
SHA10fd021bf2a1710edce1041d6a64c6553224d6409
SHA2563305d301ea5e30574bc572ce500e97993a691dc74d476032ef34267bc4828447
SHA512851b33d649c3e7a41d2c3cf550801f458f349ec7407eefabd2d7490d0e06a4ea55202f457987bc9e2f34f963de8640e705884f3e79fb42809172df819a0cd7c5
-
Filesize
4.5MB
MD51e8239fc7fc5fadc4282a6fccea81a96
SHA163d4d12344b3590c2c91b7a82438ffebb8adbef6
SHA25617fc9f28b4bf41f4b66bfbfe5b1546b50425b573ab448fdfeb6694d55e02129c
SHA5124e6e9ef83197ca8f9f1b54baaa5662a5b45f4401068522b25bc6a0bc2ce5535b4187736fe99a0254a8d4e51e329348d77de818fcfa07f89f4ae6d97d9cacd2ac
-
Filesize
217KB
MD57b828f73ad6cf42453bb51beb6986bdf
SHA1e59fc400ea2788dd7706abc3ca642b6eb57f9c04
SHA2565c61dd388ed746ea4b00c885e7f2bd5bbec5d2fc76733d7c264e4e6937cffe52
SHA512de8292e41930165df87ba1556724980369c9f74932f48157b5007da313000d3aa5744f8025d8c7ba90f060b9fb99b9915613e2481fd928d1b2d495c399202011
-
Filesize
1.9MB
MD52ab0200912ffa7d8a6c1b68c2e38cd2e
SHA144cad0fa714c9a4ecbe8081382a7c6b033f5c635
SHA2564c7a2886fc4664a97534afc99f3a439a085ac2784660ddfa79dd7b55769a3dcd
SHA512e82523f0f74f2eca9e49456dd3bfc644bd75efb80a8b8e0c90815f41ef6b87720f530e1739768661a83bac7f8c5878f7b45eb684ba7ea2db04b370c4d88b7e58
-
Filesize
427KB
MD5db1e9807b717b91ac6df6262141bd99f
SHA1f55b0a6b2142c210bbfeebf1bac78134acc383b2
SHA2565a6dfa5e1ffb6c1e7fc76bd121c6c91305e10dd75fc2124f79fee291a9dd9e86
SHA512f0621977d20989d21ae14b66c1a7a6c752bfd6d7ccc2c4c4ec1c70ba6756e642fb7f9b1c6a94afadd0f8a05d3c377792e4aa4c1a771d833c40a6f46b90cbe7c3
-
Filesize
61KB
MD5bca06db91a82a5ec364bd16699305a51
SHA14ec7cc816dde8f133f04245042b9ef33d048e668
SHA256a51b9ea43708101a94da0c703d932bca9dbf116ac16ff9a8158b0ed5c594cc75
SHA51217a78b74ad1c10a450004763a39d23e0984cfc5a1443544a2016c655a7aec22c3b0ecdce7c35d6cf9d0f7082f1f2b4b10affcb7cfd474bab49ebf1869fbcf8eb
-
Filesize
41KB
MD5afc29e1baea327510f5922a6c739dc25
SHA121548f69ff63221247d445f14b2d76f3b152d098
SHA256039d1a856bc9ab91242b30de33d58ef031ea519dede44d9f69a94177691f4bb6
SHA512c63e48e1b9388505b21027c5e0ba3cf0933d4007b5b19d90ce48c84253ba569658f94b4c0437b592f4d08900127f86713a12607aa14aff73e3ea59cacda714a5
-
Filesize
1.3MB
MD563f417b05fda561286a55247ff9e69c7
SHA155d7ce68b362df5783e64c70bfc5670fcedc26a7
SHA2563a84a253b230fe3e2d957dc19803d51b7c68b062de6a9e5b187900d42d7eb1b9
SHA512094c29702c6085d2af447565c976fcd52497d878a70912fed85b3a41f94c2ffb6bb3085bdd766b10e27443a82066102ff8bf074175b3bc7ee44c7d5eec4ec92f
-
C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\qt\plugins\styles\qwindowsvistastyle.dll
Filesize145KB
MD54aac3b6bc8ddf0fb8d0f2b5cdcfff5ad
SHA1e4ac73f45ca6ce08c4e02741a20ff86c7cbb0b07
SHA25678d9cf2832cc261fbcc8467691ad947363b66927788bf3a90fdabb448999bb96
SHA5127befa3bffe3220efff1723574ef14fc8d778754900393b77a0aa207bbc42e39b85d79ff6d6e460541d970a1c98c3dbf26ef00156299ae8d3ad63f57e8bab448d
-
Filesize
1.1MB
MD52040cdcd779bbebad36d36035c675d99
SHA1918bc19f55e656f6d6b1e4713604483eb997ea15
SHA2562ad9a105a9caa24f41e7b1a6f303c07e6faeceaf3aaf43ebd644d9d5746a4359
SHA51283dc3c7e35f0f83e1224505d04cdbaee12b7ea37a2c3367cb4fccc4fff3e5923cf8a79dd513c33a667d8231b1cc6cfb1e33f957d92e195892060a22f53c7532f
-
Filesize
75KB
MD58fdb26199d64ae926509f5606460f573
SHA17d7d8849e7c77af3042a6f54bdf2bb303d7cd678
SHA256f1fd5f6ec1cfe0cc3b66b5322ac97568bc63b19c1e415b99aad7c69ddbafa33c
SHA512f56bf11d4259dbf5d4d1f9fc2ad60ff609cddb21278999e9fa55fe5d74552e8a01ddc55cfdc9bf4b09b3e3130a1356142a24a7db8ec5ea19344de617dc9fa99f
-
Filesize
101KB
MD5f6e9f1463fe638ab89b015d80066f0f0
SHA1420ab30d4ea3a099dfe322a65607943ef2ee80e6
SHA25682e478a56b0af1a925117eff4c55c41b672831a45ab1f18d53fe361c5ddd1707
SHA512a178552396124d037223502e02f25406dffe4b6893c46835f9b606a60adb2324a7bf200511adaf2aba89c04742c3fa4497c1999655f5b94358aa000a5ca3d841
-
Filesize
382B
MD56a5eea749583001de63b993fc66496ba
SHA1fd41691ec4751e85be89917d46454f8533800b4e
SHA256bca613688e735ccd1fae7164550bd8ae90862028cd0bf31534c149ea0d7c9f60
SHA5126a5b9b863bf139c87b5734d6e8310c7231a1015d8eceb15f76ccf7676d36f9107fd5d817a6f04ed47c3ee45be409073c837beee3c079abde5bc38233c98b9712
-
Filesize
428B
MD55e1b68b67986b1588301c0135f19fc7c
SHA1957ea47285f7d903cce7530ee34852435de5b5b4
SHA25623456d8ce681d1a5a31bf06262e088f4feb8d0e8fdc1d37afa4aa02830ffacdc
SHA512268ec437c5971552dacca1e9ef6850543614d5a7f05ac34b41bf05f73e97e4c694d59e4f0618a57660ffad4f2faee653b4c0c824f97a6e9fddc48d22c52739af
-
Filesize
5KB
MD5fc6298b6b03699f66a11412f9dfbeef3
SHA16b748d60251ffa2f27baf0e87916bf016929640b
SHA2565ee2c94b9141db6fadcd2ac70619d464b74e8e783608aed172e29e95ec9c1e50
SHA512f67b6b526815785b2419b585e34c906e090fe0478b2ce6ed8650c1b4760f98e49099270060b1cddc688de7f1babeb5c057e50650be9e0f04527d871f19b6e987
-
Filesize
7KB
MD58e056f3aefbacf5d7431bd35603990ea
SHA17697d08a5c36345dd30783573dd2f142dad8bbf7
SHA25611379297a654b22a86605008e008c7995299cdbccf36ed9f99739a08fea28d5c
SHA51211e60b988ae0045e86668683c0c1ddcc8b6dede35fb8e156a588f06d78eb140aca611c39002e0cb1a784e2b337673abb7703fccdb5dbde22a10bcb367374381f
-
Filesize
8KB
MD5f66039a69d84ec7647f1c88be2c0f671
SHA1b5fa727b8444f0db1778b3f573cdf21d6deba14b
SHA25612a65c74be8086763514025e43a4f0409494e27fe3040ee2f707562d9d3dbebe
SHA512b057c687ca60616b989050ee6826439f70020982e35ff76e1ea1d1ae35cc8a5b524c845dcb65221934d740a8a09bc14e766bed223a9c7e20b02fecb74685403d
-
Filesize
26KB
MD545c10ad6b80d1a381d3b0a2286e7b05b
SHA1aa474fbac53b3b95e13608991cdd5ebd352402e1
SHA25620ff520b5a0358ed25be8fc157342b10d24e795fc44d34c291e77caf2bcc0956
SHA512e3af91d7be4f4ff6e3c77703799b16fed7d9cf26a08d0650943ea56a19bb07f51f4193e1f9df078f3f527d40afa7be9e8c346e8ec1755a624ec3166f5ed94c02
-
Filesize
48KB
MD55fa5a4a55fb620a54d8dcc91b69e2d23
SHA15a82c9496766722eaa6848a0dbee441f002a487b
SHA256c3d76d48e395c49630ab5a2557c91c4af8b250c16bbc06c1d97ba49ac17d18bb
SHA5123f23405cec14b8964b93d0cbfe31811ac6e0e83a1a6aa64853dc191c4eefa8e32aa6a7e3a79fffbc7d312399fd5acd174ca15d4dd6c93823c7c69543a81417c5
-
Filesize
58KB
MD5a83beafca54bed49c2dc844f28d8ea4c
SHA18815c6111ca99ea164b877ac9d410f97321f78fd
SHA2566bd4ccc186c298ba2d5c3862a0122d14cf6fa50ab868834f573c5b2beb881749
SHA512d17d79433ee61d14722b0c749342751d816475df3aada051bd4566d543dc8f3f545e303a10e38de25ff5b4fa81c6367464a93919b2c2586b0b1d2913fd6549f2
-
Filesize
2KB
MD5a435d065a8f7ff1a13f601033a46afe9
SHA1af3608e229062b081a0bf0e66e2e44615d4b81e8
SHA256dea505ae2e4555f4189bc24a3d1bae0ac61f99320db957b73e9c2847b83ceaa6
SHA5122b747c349d3fa81424d9892c0a5feddd24a9de373035e642ddc1452a9395edbe00262edcbee8021aec6b20360aae3db79d6cc59e9411e4e749db83b44d5f76f0
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\kconfigcenter\kccsdkdb\kccsdkpriortydb\mdbx.dat
Filesize64KB
MD5b081f361b492775d86550029a4860b16
SHA160f3566fe46db274792308b1f5965697b09761fd
SHA256b2e68029a40a7e729e256a76cfb7160ada44f8a49fa89d670fe3e7aa20677726
SHA512d78c8a84f69ee7465f86b989cc7a58ea9547e22be7450117b16c1195e7335cfd1294a7cf5bb3b5edb6853ca4177969efdde11efed57cf2fde727708d93ca925b
-
C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\kconfigcenter\kccsdkdb\kccsdkpriortydb\mdbx.dat
Filesize64KB
MD5c21d89255a95cedc2e7098dfc9b18d75
SHA14862506faf0b42a087cfd0797700f5e06b258b9d
SHA25682bd1c0833eba35fa4121c20118556228aa774a988219854d640a3e8f07fc7f3
SHA5127b5eff5049b6d38a50382e142acabbbe0fc2796417c9bc8c59e2b536d669bd4a37cceb1b2fabdd70cc028ec6c01301d17534fe09ecbdc9ef731363fdb5ffe1c7