Analysis

  • max time kernel
    128s
  • max time network
    160s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    28/03/2025, 15:25

General

  • Target

    WPS_Setup.exe

  • Size

    246.3MB

  • MD5

    4b3226ecc1da133e846eebc9af9b915a

  • SHA1

    46403afddb737e4d363446ff617475ae1bbfee21

  • SHA256

    667b472a0672133a75304d8b64972ac18a14949a2fcdfc0fa7a56b319a06a31e

  • SHA512

    4f9ee9d1d106cb3b02e150bd8a625b24cd5e486d62de843c00bd17009c6414c217a9f5c607530b2c88fbddfdea71ad7046634f592e37e9a7b7cdc7afd371bc4c

  • SSDEEP

    6291456:LGDVFnDNs5uOY2MuZHl1aQgAxW/AZH97nlI7Ec:LkPD/3zubzgJsH9b+7b

Malware Config

Signatures

  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Executes dropped EXE 42 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 56 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 28 IoCs
  • Suspicious behavior: AddClipboardFormatListener 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\WPS_Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\WPS_Setup.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe
        "C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe" /ThemeIndex=#ThemeIndex#
        3⤵
        • Unexpected DNS network traffic destination
        • Writes to the Master Boot Record (MBR)
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -kccmove C:\Users\Admin\AppData\Local\Temp\wps\~e579337\\CONTROL
          4⤵
          • Writes to the Master Boot Record (MBR)
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:344
        • C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe
          "C:\Program Files (x86)\Kingsoft\office6\wpscloudsvr.exe" InstallService
          4⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1720
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -addFirewallRule
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4756
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regmtfont
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4932
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -setappcap
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2148
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -registerqingshellext 1
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:4368
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingshellext64.dll"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3676
            • C:\Windows\system32\regsvr32.exe
              /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingshellext64.dll"
              6⤵
              • Modifies system executable filetype association
              PID:5912
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe" -createtask
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3672
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -setappcap
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:4316
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -assoepub -source=1
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:2084
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -clearmso2pdfplugins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:6032
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -cleardocermsoplugins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          PID:5220
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -assopic_setup
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:2560
        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -uninstalldatarecover
          4⤵
            PID:1564
          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\Kvpins64.exe
            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\Kvpins64.exe" /i "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\Kvpins64.inf" /s
            4⤵
              PID:3132
              • C:\Windows\SysWOW64\rundll32.exe
                C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\kvpvbsext.dll",_X86ScriptHostEntry VBScript DE2B427E6C624B2FA5CEC25612458BFB 1 Uninstall /_X64Cast
                5⤵
                  PID:2616
                • C:\Windows\SysWOW64\rundll32.exe
                  C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\kvpvbsext.dll",_X86ScriptHostEntry VBScript 6E4340857A844530B269E655AC1F6B7A 1 Install /_X64Cast
                  5⤵
                    PID:8
                  • C:\Windows\system32\spool\DRIVERS\x64\3\kvpet.exe
                    C:\Windows\system32\spool\DRIVERS\x64\3\kvpet.exe pdf_virtualprinter_install 0x3e8, 0x68
                    5⤵
                      PID:4084
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\\office6\ksomisc.exe" -defragment
                    4⤵
                      PID:3712
                • C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe
                  "C:\ProgramData\kingsoft\20250328_152806\WPS_Setup.exe" -downpower -ThemeIndex="#ThemeIndex#" -msgwndname=wpssetup_message_E57951C -curinstalltemppath=C:\Users\Admin\AppData\Local\Temp\wps\~e579337\
                  2⤵
                  • Writes to the Master Boot Record (MBR)
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3212
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -setlng zh_CN
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1568
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -fixoldversionassostatus
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:3604
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -setservers
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1996
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -register
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:5624
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regprogid true
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1168
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assowordexcelpowerpnt 1 1 1 -source=1
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:5396
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -compatiblemso -source=1
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2204
                    • C:\Windows\SysWOW64\openwith.exe
                      "C:\Windows\SysWOW64\openwith.exe"
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2076
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -checkcompatiblemso
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:324
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -saveas_mso
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1992
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -distsrc 12012.2019
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:4776
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -sendinstalldyn 5
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2464
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -updatetaskbarpin 2097152 -forceperusermode
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:4048
                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\pinTaskbar.exe
                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\pinTaskbar.exe" "C:\Users\Admin\AppData\Local\Temp\Kingsoft\WPS Office.lnk" 5386
                      4⤵
                      • Executes dropped EXE
                      PID:5624
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -addcontextmenushellnew
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:1548
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regvascontextmenushellnew
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2888
                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regkwpsshellext admin
                    3⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of SetWindowsHookEx
                    PID:2664
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kwpsshellext64.dll"
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:3520
                      • C:\Windows\system32\regsvr32.exe
                        /s "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kwpsshellext64.dll"
                        5⤵
                          PID:2776
                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe
                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe" /from:setup
                      3⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:3076
                      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -collectfileassoinfo -module=1;2;4;8 -daily -source=1
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: AddClipboardFormatListener
                        • Suspicious use of SetWindowsHookEx
                        PID:2756
                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe
                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\wtoolex\wpsupdate.exe" -createtask
                      3⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:6032
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\system32\regsvr32.exe" /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\kdesktopshellext\kdesktopshellext64.dll"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2560
                      • C:\Windows\system32\regsvr32.exe
                        /s /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\kdesktopshellext\kdesktopshellext64.dll"
                        4⤵
                          PID:5220
                      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regyunpanfornew -forceperusermode
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: AddClipboardFormatListener
                        • Suspicious use of SetWindowsHookEx
                        PID:4548
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "C:\Windows\system32\regsvr32.exe" /s /u /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4288
                          • C:\Windows\system32\regsvr32.exe
                            /s /u /n /i:user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                            5⤵
                              PID:4432
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\system32\regsvr32.exe" /s /u /n /i:overlayicon "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:3604
                            • C:\Windows\system32\regsvr32.exe
                              /s /u /n /i:overlayicon "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                              5⤵
                                PID:1364
                            • C:\Windows\SysWOW64\regsvr32.exe
                              "C:\Windows\system32\regsvr32.exe" /s /u /n /i:contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4940
                              • C:\Windows\system32\regsvr32.exe
                                /s /u /n /i:contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                5⤵
                                  PID:4416
                              • C:\Windows\SysWOW64\regsvr32.exe
                                "C:\Windows\system32\regsvr32.exe" /s /u /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:2264
                                • C:\Windows\system32\regsvr32.exe
                                  /s /u /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                  5⤵
                                    PID:3184
                              • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regqingdriveshellext_install -forceperusermode
                                3⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: AddClipboardFormatListener
                                • Suspicious use of SetWindowsHookEx
                                PID:2612
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  "C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*install "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5700
                                  • C:\Windows\system32\regsvr32.exe
                                    /s /n /i:qingdriveshellext*install "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                    5⤵
                                    • Modifies registry class
                                    PID:2872
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  "C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*thumbnail "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4220
                                  • C:\Windows\system32\regsvr32.exe
                                    /s /n /i:qingdriveshellext*thumbnail "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                    5⤵
                                      PID:1704
                                  • C:\Windows\SysWOW64\regsvr32.exe
                                    "C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*drivebho "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:640
                                    • C:\Windows\system32\regsvr32.exe
                                      /s /n /i:qingdriveshellext*drivebho "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                      5⤵
                                      • Installs/modifies Browser Helper Object
                                      PID:8
                                  • C:\Windows\SysWOW64\regsvr32.exe
                                    "C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2008
                                    • C:\Windows\system32\regsvr32.exe
                                      /s /n /i:qingdriveshellext*contextmenu "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                      5⤵
                                      • Modifies system executable filetype association
                                      PID:2464
                                  • C:\Windows\SysWOW64\regsvr32.exe
                                    "C:\Windows\system32\regsvr32.exe" /s /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5056
                                    • C:\Windows\system32\regsvr32.exe
                                      /s /n /i:nsemenu*user "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                      5⤵
                                        PID:5132
                                    • C:\Windows\SysWOW64\regsvr32.exe
                                      "C:\Windows\system32\regsvr32.exe" /s /n /i:qingdriveshellext*onlinefile "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4524
                                      • C:\Windows\system32\regsvr32.exe
                                        /s /n /i:qingdriveshellext*onlinefile "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\qingnse64.dll"
                                        5⤵
                                          PID:5108
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -setup_assopdf -source=1
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4004
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assofdf -source=1
                                      3⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2580
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -createsubmodulelink desktop prometheus
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2136
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -createsubmodulelink startmenu prometheus
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4936
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe" /photo /createlink /install
                                      3⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:5652
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assoofd -source=1
                                      3⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      PID:1760
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -assoopg -source=1
                                      3⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      PID:2056
                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regcadfileasso
                                      3⤵
                                        PID:5352
                                      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regarchivefileasso
                                        3⤵
                                          PID:4248
                                        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -installbrowserextensionhost
                                          3⤵
                                            PID:780
                                          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regvideoeditsetupfileasso
                                            3⤵
                                              PID:220
                                            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regemmxfileasso
                                              3⤵
                                                PID:2628
                                              • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                                "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -regeddxfileasso
                                                3⤵
                                                  PID:3004
                                                • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                                  "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -repair3rdlink
                                                  3⤵
                                                    PID:4788
                                                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -createexternstartmenu "WPS Office"
                                                    3⤵
                                                      PID:6112
                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -rebuildicon
                                                      3⤵
                                                        PID:3684
                                                      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe
                                                        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe" -addJsapiCert
                                                        3⤵
                                                          PID:1128
                                                        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe
                                                          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe" /prometheus /from=autostart_after_install
                                                          3⤵
                                                            PID:6008
                                                            • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe
                                                              "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /qingbangong /start_from=qingipc /qingbangong /start_from=kstartpage silentautologin
                                                              4⤵
                                                                PID:4112
                                                                • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe
                                                                  "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /messagepush /PushType=mipush /From=Qing
                                                                  5⤵
                                                                    PID:4784
                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe
                                                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /messagepush /PushType=mipush /From=Qing
                                                                      6⤵
                                                                        PID:564
                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe
                                                                      "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /krecentfile /init /From=Qing
                                                                      5⤵
                                                                        PID:4716
                                                                        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe
                                                                          "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /krecentfile /init /From=Qing
                                                                          6⤵
                                                                            PID:2648
                                                                      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\promecefpluginhost.exe
                                                                        "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=gpu-process --no-sandbox --log-severity=disable --lang=zh-CN --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --mojo-platform-channel-handle=772 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:2
                                                                        4⤵
                                                                          PID:2240
                                                                        • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\promecefpluginhost.exe
                                                                          "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=zh-CN --service-sandbox-type=none --no-sandbox --log-severity=disable --lang=zh-CN --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --mojo-platform-channel-handle=1028 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:8
                                                                          4⤵
                                                                            PID:464
                                                                          • C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe
                                                                            "C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=6008 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --js-flags=--expose-gc --lang=zh-CN --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=4904 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:1
                                                                            4⤵
                                                                              PID:5348
                                                                            • C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe
                                                                              "C:\Users\Admin\AppData\Local\Kingsoft\WPSOFF~1\1210~1.189\office6\wps.exe" Run /AppUserModelID=Kingsoft.Office.cefhomepage -Entry=CefRenderEntryPoint -EncodePathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -EncodePath QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGtzb2pzY29yZS5kbGw= -CefPluginPathU8=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -CefPluginPath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xjZWY= -JSCefServicePath=QzpcVXNlcnNcQWRtaW5cQXBwRGF0YVxMb2NhbFxLaW5nc29mdFxXUFMgT2ZmaWNlXDEyLjEuMC4xODkxMlxvZmZpY2U2XGFkZG9uc1xrY2VmXGpzY2Vmc2VydmljZS5kbGw= -CefParentID=6008 "C:/Users/Admin/AppData/Local/Kingsoft/WPS Office/12.1.0.18912/office6\promecefpluginhost.exe" --type=renderer --log-severity=disable --disable-pdf-extension --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\debug.log" --js-flags=--expose-gc --lang=zh-CN --no-zygote --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=4532 --field-trial-handle=3856,i,7544767808937077953,4040799953708709649,131072 --disable-features=TSFImeSupport /prefetch:1
                                                                              4⤵
                                                                                PID:2148
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe" /photo /checkasso
                                                                            2⤵
                                                                              PID:4088
                                                                              • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe
                                                                                "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\photolaunch.exe" /photo /checkasso
                                                                                3⤵
                                                                                  PID:2988
                                                                                  • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe
                                                                                    "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" /wpscloudlaunch /run_plugin /plugin_name=kfileassociate /plugin_type=dll /plugin_entry=EntryPoint /action=regassocall /src=auto
                                                                                    4⤵
                                                                                      PID:1364
                                                                                      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe
                                                                                        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe" /wpscloudlaunch /run_plugin /plugin_name=kfileassociate /plugin_type=dll /plugin_entry=EntryPoint /action=regassocall /src=auto
                                                                                        5⤵
                                                                                          PID:2020
                                                                                      • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe
                                                                                        "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\ksolaunch.exe" Run addons/kpluginwrapper/kpluginwrapper.dll run_plugin -plugin_name=kmessagepushcenter -dll_name=kmessagepushcenter silentreg
                                                                                        4⤵
                                                                                          PID:5932
                                                                                          • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe
                                                                                            "C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wps.exe" Run addons/kpluginwrapper/kpluginwrapper.dll run_plugin -plugin_name=kmessagepushcenter -dll_name=kmessagepushcenter silentreg
                                                                                            5⤵
                                                                                              PID:2512

                                                                                    Network

                                                                                    MITRE ATT&CK Enterprise v15

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\ProgramData\kingsoft\20250328_152806\oem.ini

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      fcabcea14f78b332e4abdeed9cd18d2e

                                                                                      SHA1

                                                                                      ee11337ae6cbb169ac9617ea43a564334d0ebe55

                                                                                      SHA256

                                                                                      40f6eccdfe1de78f5ef4f803ebb4f4d47e7cb6619d48eea6242197768be4a58b

                                                                                      SHA512

                                                                                      abc881835fc61dc0f11b5acb8cd6d34215ca2365eb937040e757d93b6b8cc59aae375b160e55a3bdddbcfbe995c881cb4420f61fbe716dcfb3f34825611b43d9

                                                                                    • C:\ProgramData\kingsoft\20250328_152806\oeminfo\oem.exe

                                                                                      Filesize

                                                                                      81KB

                                                                                      MD5

                                                                                      2f2e967a23a459de0f9ec166eedeb9f2

                                                                                      SHA1

                                                                                      20198b7f783fa0fec5931d7cfaaf7eccf0834ee1

                                                                                      SHA256

                                                                                      b3058bec266f4310750d6ccd60fe0aa70e6ab7b2a998a10e14bf98606561044f

                                                                                      SHA512

                                                                                      343745a31bcc78817e0fe6a27d0308cd7eb8c422acfcf8c676f2c1431b94092a2575f36993197440ebeda53bcd8a5f67b778fb1f0ffa4e84ccae732b2b3b8e31

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\Qt5NetworkKso.dll

                                                                                      Filesize

                                                                                      1.1MB

                                                                                      MD5

                                                                                      597cf6fa94b9d03b72874dc22a840990

                                                                                      SHA1

                                                                                      48f7599074147cf06a0082227902496dfad9691b

                                                                                      SHA256

                                                                                      665526fb362589d409da4a0da90cf19fccfbe26e8ce6e3b393ea0a10ec911035

                                                                                      SHA512

                                                                                      c86b51853897bea67d696152e519b420fd91a67cd32d50a0763f8b752d68f87bd9e6af02f33b3b93ae8f90199ea41982cff780544c6118adbeea61e3e9ff2e43

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\Qt5XmlKso.dll

                                                                                      Filesize

                                                                                      170KB

                                                                                      MD5

                                                                                      928df087cecfde22330a8c3813091c25

                                                                                      SHA1

                                                                                      dcda6ba1d5583a22eb2cd03eb7cb2ccc35697c2f

                                                                                      SHA256

                                                                                      46f3ef62fc1aa886283552c051613df9395f426c513ae700ac069fcbf6629188

                                                                                      SHA512

                                                                                      98747014979b913e2cc4767759d971f29f93eff89d3c26d4d68022619a51be2d37823acd036d0a7eeefd03db532139b9158f39529fafdf03afaef4485a8c4f82

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\StartScreenTile\ksolaunch\logo-small.png

                                                                                      Filesize

                                                                                      6KB

                                                                                      MD5

                                                                                      8d650fe389e3665607fdbf938c1a1722

                                                                                      SHA1

                                                                                      2e545f9555ff22313e4ce113995d8aa694e5cab8

                                                                                      SHA256

                                                                                      8bad76a7433cf4662c38a539c2429336d65feeeef1bb5c6435928a9574b216f8

                                                                                      SHA512

                                                                                      f116621bfecb602d02919eb1ee9d7dc92e82b313b8b54cda42ab48c5e7ec60b02005edcad763fff6b497ca4bc46e83cb0c9a249be791f245bb9c599950fdf015

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\StartScreenTile\ksolaunch\logo.png

                                                                                      Filesize

                                                                                      12KB

                                                                                      MD5

                                                                                      d58510dca6b659c6e4ba7a454d5b75ce

                                                                                      SHA1

                                                                                      e142de2dda3811a2e8bbbb2eb64d366e8eb9ea3c

                                                                                      SHA256

                                                                                      ddfd8c3e15c7a4667e369546fd8be6e7dd24be632acba2692ffbfc4272eb6518

                                                                                      SHA512

                                                                                      42409f9976ad08ecf1756d1c2915f3ffd17cdc78e9ff552c0a08bdfa2fda8960e408721bfc9de1a5ed9c9aca3e23b97adb721b3c51b6b3f0ed3ee4a4c780cf88

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\ketaitoolbox\run.ini

                                                                                      Filesize

                                                                                      171B

                                                                                      MD5

                                                                                      b30cb271e143eace0f55ea2e562e1e9f

                                                                                      SHA1

                                                                                      9d97dbf24931cfc114384c3f4dbbae21c9e51be5

                                                                                      SHA256

                                                                                      3ab7bb6175885fc6acbf5eed0062b0d00c059cb4c68bd2ef90149b2c8763e658

                                                                                      SHA512

                                                                                      dc593185fa63b458024c3a913c558e5686806154181dea67eec786ada50595c53bab822833ad1e76c9acdf21be3eba50631391b7e575d7f1f6409ceccf966535

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\kwebpromehelp\run.ini

                                                                                      Filesize

                                                                                      226B

                                                                                      MD5

                                                                                      abc3a6089b0ea76ffc960fbc9b6e66d1

                                                                                      SHA1

                                                                                      50ad0cb201c13799024de56cf45116cf65ff5569

                                                                                      SHA256

                                                                                      c2fcf4d5d04350a76c4ce6b06db287d9e9c63b0f886fae500ac27b0627d38cc9

                                                                                      SHA512

                                                                                      ec1e32b7bed882095b23e049a4e1a86acf0bf993e2f691105ffbd99d93ebf28faad4fbdd645ac1eefa74ede575854a3994c7c6d2bacc6f7a09a1991561b1a44b

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\qing\mui\zh_CN\res\qingaccount\ferrPage_timeout.html

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      9b7a36d32ed674b3cb4d247d17b71794

                                                                                      SHA1

                                                                                      e756cff87d95360675b56b9ee4e2dd71bb96a852

                                                                                      SHA256

                                                                                      eb5dc549d839abd9dd7fb725629198959c7e5b0322454cf3c3bac89c57f53ca9

                                                                                      SHA512

                                                                                      97520f64605b0f2690a03b1bf42eaae8b3d4b10c0925081ac250ed6bdba190d16368fafa0ec11783dd21177becc4d945acfbb327fdab32ff6350dc3155f58721

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\wpsbox\mui\default\html\syncassistant\favicon.ico

                                                                                      Filesize

                                                                                      4KB

                                                                                      MD5

                                                                                      1ba2ae710d927f13d483fd5d1e548c9b

                                                                                      SHA1

                                                                                      c0605efed936ee2600284e6480521d06fa64f872

                                                                                      SHA256

                                                                                      db74ab0b78338c1f778f8398c45f4103c99aea0e845a3118a7750b4eeafd3445

                                                                                      SHA512

                                                                                      f933cd352eaba92f509b3863353ddfefadfada26a4152ecdc4727d450bbf35e7b10fb3038fe8db340d5c63d74e608c1560ec84d0f6ffc8ccd940c9e0d7533544

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\folderselector\dist\static\fonts\element-icons.ttf

                                                                                      Filesize

                                                                                      54KB

                                                                                      MD5

                                                                                      732389ded34cb9c52dd88271f1345af9

                                                                                      SHA1

                                                                                      8058fc55ef8432832d0b3033680c73702562de0f

                                                                                      SHA256

                                                                                      a30f5b3ba6a48822eae041e0ca5412a289125e4ba661d047dae565ac43b4a6b2

                                                                                      SHA512

                                                                                      e8971ae48f5287d252f5b0a2d0516091bef0d2febf7d01fd7b435e426d106fea251037439ec42c2937e934b66f38e5eb43d00a213cdf334f482f4a06b1817f9c

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\css\app.css

                                                                                      Filesize

                                                                                      107KB

                                                                                      MD5

                                                                                      6c8e8b5a40bcaa65db2e23600ba58515

                                                                                      SHA1

                                                                                      ed5f39576a2ee624a187a8ff09b7ad9f9bf5e1f8

                                                                                      SHA256

                                                                                      9db4c6bc8ce25c712d19d676f2157e0fc401bdef21111e27317f89beb610b9ae

                                                                                      SHA512

                                                                                      61aa411e3aa8f889bef7b89e0bdd154ad81872ce48fc8655687fc6ebec3e22e2d8ff641be26787a6ea714c8ac2c257fff5b064ffd7cc41e573d9a7beeaeeb472

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\css\chunk-vendors.css

                                                                                      Filesize

                                                                                      279KB

                                                                                      MD5

                                                                                      a3964e72421a1ef5fb60c6e17eb5d705

                                                                                      SHA1

                                                                                      5dd9584be5141e884a230c48746e1c88126b0a55

                                                                                      SHA256

                                                                                      64a207f1e9e24bd26d83e1397dfb94a155b46e0589ba5f002f1557072f3c21db

                                                                                      SHA512

                                                                                      4ce4119b7407b460969041809354c4ede587047ee643f2897eb0ecb9627608431f43fed27c54c70bacff3a6694eb32a85b535c7d6397ac22d7d28e260b0a5467

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\js\app.js

                                                                                      Filesize

                                                                                      369KB

                                                                                      MD5

                                                                                      6ea825d75755278734ffd07e89867e6f

                                                                                      SHA1

                                                                                      bbfb8d7b5a35d697681802e9360eae6291e44d8c

                                                                                      SHA256

                                                                                      f1735c87cd85eab083c09f1b14806e09caea6c658eed0bcc1bbf18703563774a

                                                                                      SHA512

                                                                                      0dcb7003d43696287283e3eafe9cca82a9201c020e33a6f6cad0731a98270b39add4e7f24ddbc2eb4e2fbb740233bf40a986f6ec2b34ba10ddff0a26d18f934a

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\addons\yunbox\mui\default\html\syncfolder\static\js\chunk-vendors.js

                                                                                      Filesize

                                                                                      425KB

                                                                                      MD5

                                                                                      81e2ef7adf3c6e9d46cad32276781716

                                                                                      SHA1

                                                                                      40c5689f4131ddb609f6dc31b4220fb3413f1636

                                                                                      SHA256

                                                                                      1c877f69fa5fa07362ed4c0c7e6eeccde6afd4d67da9d38058cdc81809524e40

                                                                                      SHA512

                                                                                      caa109ef1a804c6d9a4e9325602bfea6753260097b6a457b7dd0abd8dc4be85bc3454378ccaec966d215fd3f4bd08375e8ce3d893e9984477da360b944f3233a

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\cfgs\setup.cfg

                                                                                      Filesize

                                                                                      408B

                                                                                      MD5

                                                                                      ec3e1071f236d7f0bd9d54ebfed18c71

                                                                                      SHA1

                                                                                      c6ece074b4a75ed7f12be71761047b6fea77810f

                                                                                      SHA256

                                                                                      35d0f05b9fc842146937ddf3fb17afe05af822a76675fdbc6ea64b70c925de44

                                                                                      SHA512

                                                                                      b7e3c84f9dae7bfdea9eab501c18454d68ce2121ef6c569aa7c89b966e98d17d055ad9a6226cc35f9a9e1e2434f45b86b35d198adfda7a30319f91d275f73ac0

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kbase.dll

                                                                                      Filesize

                                                                                      177KB

                                                                                      MD5

                                                                                      6b7f68bd5266066a6569f15bbf1cb69e

                                                                                      SHA1

                                                                                      c7a22e1be947551f7b0f2d308c9f75b1ce34c08e

                                                                                      SHA256

                                                                                      b6795557aaf6aee42c715515c73e0a014b6ea39175fd23891c8d9b84c8600fc4

                                                                                      SHA512

                                                                                      4a26e7927f3f6dd156ade32371ffe9434abd3922dc50bd3e0e45598ac0c6f802cac69d04bfe56d91417f1afabe565fbe6202712825eef2f75daa0cdff0f61bd1

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\krt.dll

                                                                                      Filesize

                                                                                      1.1MB

                                                                                      MD5

                                                                                      339da30bbe05f7d0ee0b000c88c76fd9

                                                                                      SHA1

                                                                                      0c5a608fc342f8645008d6821ee0d2959247fec2

                                                                                      SHA256

                                                                                      ba7dfb36ad9f9657340b9814c4ea44a3e2247565d73751fd3e433b1049ffc11b

                                                                                      SHA512

                                                                                      cb0438d746de953a31a4baaa06b8069624a10b18eacddd5013586cf9d9477dca36f3e3468abd748fb8a836b9b0c0a93784c4865c617d87caa9162d785d03f621

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kshell.dll

                                                                                      Filesize

                                                                                      23.1MB

                                                                                      MD5

                                                                                      ab5af1e05f6409e81950cd9e83d4a222

                                                                                      SHA1

                                                                                      13dd78eb2120e9ddf4220fc460126cee8f5edb3f

                                                                                      SHA256

                                                                                      81fa80695baac177b6caac998b35088ffb829e159e19dffa24d9366ee33c1961

                                                                                      SHA512

                                                                                      8223a102a7ba2205e0216d2484dd677ad88cf9a087560ed7cb64f785929fd6786aeec2ce59ddc052b7f9934af20f9216279b42a242cc34683e6a17bc82c64bf6

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kso.dll

                                                                                      Filesize

                                                                                      24.8MB

                                                                                      MD5

                                                                                      eefff9b8a4b745af6c3e340dfce18164

                                                                                      SHA1

                                                                                      f21265e578dec02fc1b420370faf44be81550031

                                                                                      SHA256

                                                                                      58700f755a8174054ad8a0984b77f3bbc34c72c3d4409f7fe41172a8a21e3250

                                                                                      SHA512

                                                                                      0c4b0c98f8a9c11f3e2560a0ef99ffb8ae4a6ed6df96dd8bf2e9fefb033361cf9110fb01e97031904c5c98cacc60740ba1a00bba63c33f8cacec4498b9031980

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksolite.dll

                                                                                      Filesize

                                                                                      10.0MB

                                                                                      MD5

                                                                                      8bf61dce1196d5733871e2f2becfe7d1

                                                                                      SHA1

                                                                                      8d0579aa417f9fa580c1b8f57d6d1314f18eb967

                                                                                      SHA256

                                                                                      f4cea14ea1545929415d91647c71794f6538a274ba027ff58b56d143f9734937

                                                                                      SHA512

                                                                                      17b366c1d7143442a1239402f75968bec894822a102ab309eb8b261eea2f7ccd9e7de306f600355e82f0198e13a00bc4059c778234e2ced91c4d34bc34499534

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\ksomisc.exe

                                                                                      Filesize

                                                                                      3.1MB

                                                                                      MD5

                                                                                      7cabafcec3b852222a2461a8d289d4b5

                                                                                      SHA1

                                                                                      8adee50735a967635bb75d82a7af01dc94b6e1b4

                                                                                      SHA256

                                                                                      7a561952cf8c3f6a338da6bc65184c6e807553aba5e3101023f59abc8ef0d3ce

                                                                                      SHA512

                                                                                      1580bbacf49ca435941456f435d696bcb6d756b6156b33cffa084b921dead672027bfb81bef57fea45ddcf0d3a604be9227c054d892fadfeb74ab7f402608097

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\kvprinter\kvpins64.exe

                                                                                      Filesize

                                                                                      353KB

                                                                                      MD5

                                                                                      89497d9b3dea9f5a88c210ba64c371ac

                                                                                      SHA1

                                                                                      9aee01a76b4a82315f96a455862396307199e03f

                                                                                      SHA256

                                                                                      7be0fe53389f96e4d5647b061da7a2e0f518ad621bc0ebe94978823224e74662

                                                                                      SHA512

                                                                                      6e0662e1c8f278183b7f40d888adf03b5c6fdf5cc4a3c236a37c520b0682c66646c1020a1424c478169ea1bc335ae5b1cd69ad633a5ecd92d234d90b448b203a

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\libcurl.dll

                                                                                      Filesize

                                                                                      519KB

                                                                                      MD5

                                                                                      a1f7be2df27b5df7b4c5ee5a9ca793cb

                                                                                      SHA1

                                                                                      ddcce48683694db501b26ed0c143c8d14abb6e66

                                                                                      SHA256

                                                                                      5e7b5d18430429bb83cc81567d19c1e4567bf1e329b73e41f4f1406e7d950e8d

                                                                                      SHA512

                                                                                      0e4696a949b2c04dd31a371e6a65cff00833c1a5671e1017b0f334b92c094387e12fb427cec13701822c7f8ce9f4ca2529839d838fabaab308ba9b265142d26b

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\mui\zh_CN\templates\Wpp Default Object\Preset Slide Layout\wideLayout\presetLayout_16.pptx

                                                                                      Filesize

                                                                                      45KB

                                                                                      MD5

                                                                                      17ea9186a351ccf5bb9e8608077f40a4

                                                                                      SHA1

                                                                                      713a1fa1031245c639080b5708f2c40abaa41f4e

                                                                                      SHA256

                                                                                      0d83ba0a38951b5e06fd13020514c96bdb11688e7739b713b1d7a70ce4251101

                                                                                      SHA512

                                                                                      af8f4c5d3a45038fe6bd8ac8632de5a21af9324d8f4be6cab8a2dc03fd3f38747983c7720798ce8e4ca1234cf8b13cb7d475de3446ce08f4f6e76af0ab64a40f

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\office6\wpscloudsvr.exe

                                                                                      Filesize

                                                                                      904KB

                                                                                      MD5

                                                                                      c5768ab883d310b72e3796d334a16269

                                                                                      SHA1

                                                                                      9b0c3e2f83c66112501b82b751498d74bcca8e2d

                                                                                      SHA256

                                                                                      6d1cafd178007a0da59710a5c68a77eec389c00855e6e8b558facd4322d51c50

                                                                                      SHA512

                                                                                      0611e9dce683c69fd4080aed2e29956f84ee2731809b22424522b65a2a559b24e3d454c4a992b39980310b77a0357f2487066929828aaa09c3ced5e49d7db7b1

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\utility\install.ini

                                                                                      Filesize

                                                                                      499B

                                                                                      MD5

                                                                                      ff7f70f866e51eafa34e1a6e2c01a036

                                                                                      SHA1

                                                                                      229dc211f6bf582a23e4b87dbf391fcccd618637

                                                                                      SHA256

                                                                                      ec54e0b3d965e50566dd1b8fbfa85fe34c290a0fa535f01d4e750df48473a713

                                                                                      SHA512

                                                                                      61b485f3da9d0cae630f977e61a020cb232b51d47fa9cc5edca4aefcfe7179be724b9205c4a531f3947e64455aa8b47c5be255853628b4ebc7fa99a837f48103

                                                                                    • C:\Users\Admin\AppData\Local\Kingsoft\WPS Office\12.1.0.18912\utility\install.ini

                                                                                      Filesize

                                                                                      625B

                                                                                      MD5

                                                                                      c84a8715b6857bcbb59e3ee939044374

                                                                                      SHA1

                                                                                      060d185e9953eff2f76e3ffdd913ef46fd1945e0

                                                                                      SHA256

                                                                                      1f3132a30baa382d71f44cd04070407b78afdb9afabdaaa139e946aaf99d7eb4

                                                                                      SHA512

                                                                                      8d121393bcdc0da70e00fd84be6d2b453af92b85bfed2fa0b821589ab499e87adef7e77e054c1493d511dfced5e2201ebbeace0b87fcf3d51189f1f7e4b1b680

                                                                                    • C:\Users\Admin\AppData\Local\Temp\Kingsoft\WPS Office.lnk

                                                                                      Filesize

                                                                                      2KB

                                                                                      MD5

                                                                                      e3d40136c39f02a2addb315c477d2346

                                                                                      SHA1

                                                                                      bcdf274c3ff0e42ad3cce2e0b87b915de4080f04

                                                                                      SHA256

                                                                                      391daedf80262f8ae93af5276e5d98d67d555f916d5d03623dd322dfc88e4b48

                                                                                      SHA512

                                                                                      ba7a1e029eb506619126b7e8784c10ad61f87136630ae4ce201c539d550189ae8cd86ea4352d3c32337cecfb3fc816d640cc2bcf61e3ac371404aee45c3aaf66

                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsb8ABC.tmp\AccessControl.dll

                                                                                      Filesize

                                                                                      13KB

                                                                                      MD5

                                                                                      28c87a09fdb49060aa4ab558a2832109

                                                                                      SHA1

                                                                                      9213a24964cd479eac91d01ad54190f9c11d0c75

                                                                                      SHA256

                                                                                      933cadcd3a463484bbb3c45077afda0edbb539dfbe988efad79a88cae63bf95f

                                                                                      SHA512

                                                                                      413b3afe5a3b139a199f2a6954edc055eee3b312c3dffd568cfdbe1f740f07a7c27fbf7b2a0b6e3c3dd6ee358ce96cc1ca821883f055bf63ddebda854384700d

                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsb8ABC.tmp\System.dll

                                                                                      Filesize

                                                                                      11KB

                                                                                      MD5

                                                                                      0063d48afe5a0cdc02833145667b6641

                                                                                      SHA1

                                                                                      e7eb614805d183ecb1127c62decb1a6be1b4f7a8

                                                                                      SHA256

                                                                                      ac9dfe3b35ea4b8932536ed7406c29a432976b685cc5322f94ef93df920fede7

                                                                                      SHA512

                                                                                      71cbbcaeb345e09306e368717ea0503fe8df485be2e95200febc61bcd8ba74fb4211cd263c232f148c0123f6c6f2e3fd4ea20bdecc4070f5208c35c6920240f0

                                                                                    • C:\Users\Admin\AppData\Local\Temp\nsb8ABC.tmp\v6svc_oem.dll

                                                                                      Filesize

                                                                                      192KB

                                                                                      MD5

                                                                                      500318167948bdd3ad42a40721e1a72b

                                                                                      SHA1

                                                                                      24134691693e6d78d6eb0a0c64833c12a0090968

                                                                                      SHA256

                                                                                      d3378ee739debcaee8c715963403d96bf025db98bfbb55e54635429890db85c6

                                                                                      SHA512

                                                                                      0a2d3b55528cc53cfce5b47158997300c562afd2c7bb5596532b218d3f482380887ee7c204b13d42425dc0c4cc439a7f9ed167f3767bda7b6e205e7e8f454863

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\Qt5CoreKso.dll

                                                                                      Filesize

                                                                                      5.0MB

                                                                                      MD5

                                                                                      78fe966f7cf2fba8b747edbad9946d13

                                                                                      SHA1

                                                                                      184c29513bfa6b32d4156162d6bda507fbe9fbff

                                                                                      SHA256

                                                                                      915d10d462955a7d518f89cc745df971584603e43a360d8f51ac56ee2d2fb365

                                                                                      SHA512

                                                                                      ed0f1f365d719e69fc1e04c40606ec09b706ba346491a21321062714865547f9103cac379a4cf2c9b2dc378ea0510d1e4cbea17d17c715e1dff6b9293583ad01

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\Qt5GuiKso.dll

                                                                                      Filesize

                                                                                      5.3MB

                                                                                      MD5

                                                                                      a35e999396ed122f3e0233440fab996f

                                                                                      SHA1

                                                                                      a1802754a81d8c6bb69dbcec27b38d212d796f14

                                                                                      SHA256

                                                                                      c972489efff452a167cfc91f5f38df2097607a3f4c040ed16b6e048c74e8cb29

                                                                                      SHA512

                                                                                      0561c1975deda555610621c407637380dcde9219798e118676fa090e4f23aa5988383c548f96851d8262ad0f9b1a0421bb19c87e0821adcef6e3e3f63401e4b9

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\Qt5SvgKso.dll

                                                                                      Filesize

                                                                                      392KB

                                                                                      MD5

                                                                                      e3f21b8fff7a1352cb346b5197a02bf8

                                                                                      SHA1

                                                                                      0fd021bf2a1710edce1041d6a64c6553224d6409

                                                                                      SHA256

                                                                                      3305d301ea5e30574bc572ce500e97993a691dc74d476032ef34267bc4828447

                                                                                      SHA512

                                                                                      851b33d649c3e7a41d2c3cf550801f458f349ec7407eefabd2d7490d0e06a4ea55202f457987bc9e2f34f963de8640e705884f3e79fb42809172df819a0cd7c5

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\Qt5WidgetsKso.dll

                                                                                      Filesize

                                                                                      4.5MB

                                                                                      MD5

                                                                                      1e8239fc7fc5fadc4282a6fccea81a96

                                                                                      SHA1

                                                                                      63d4d12344b3590c2c91b7a82438ffebb8adbef6

                                                                                      SHA256

                                                                                      17fc9f28b4bf41f4b66bfbfe5b1546b50425b573ab448fdfeb6694d55e02129c

                                                                                      SHA512

                                                                                      4e6e9ef83197ca8f9f1b54baaa5662a5b45f4401068522b25bc6a0bc2ce5535b4187736fe99a0254a8d4e51e329348d77de818fcfa07f89f4ae6d97d9cacd2ac

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\Qt5WinExtrasKso.dll

                                                                                      Filesize

                                                                                      217KB

                                                                                      MD5

                                                                                      7b828f73ad6cf42453bb51beb6986bdf

                                                                                      SHA1

                                                                                      e59fc400ea2788dd7706abc3ca642b6eb57f9c04

                                                                                      SHA256

                                                                                      5c61dd388ed746ea4b00c885e7f2bd5bbec5d2fc76733d7c264e4e6937cffe52

                                                                                      SHA512

                                                                                      de8292e41930165df87ba1556724980369c9f74932f48157b5007da313000d3aa5744f8025d8c7ba90f060b9fb99b9915613e2481fd928d1b2d495c399202011

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\kpacketui.dll

                                                                                      Filesize

                                                                                      1.9MB

                                                                                      MD5

                                                                                      2ab0200912ffa7d8a6c1b68c2e38cd2e

                                                                                      SHA1

                                                                                      44cad0fa714c9a4ecbe8081382a7c6b033f5c635

                                                                                      SHA256

                                                                                      4c7a2886fc4664a97534afc99f3a439a085ac2784660ddfa79dd7b55769a3dcd

                                                                                      SHA512

                                                                                      e82523f0f74f2eca9e49456dd3bfc644bd75efb80a8b8e0c90815f41ef6b87720f530e1739768661a83bac7f8c5878f7b45eb684ba7ea2db04b370c4d88b7e58

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\msvcp140.dll

                                                                                      Filesize

                                                                                      427KB

                                                                                      MD5

                                                                                      db1e9807b717b91ac6df6262141bd99f

                                                                                      SHA1

                                                                                      f55b0a6b2142c210bbfeebf1bac78134acc383b2

                                                                                      SHA256

                                                                                      5a6dfa5e1ffb6c1e7fc76bd121c6c91305e10dd75fc2124f79fee291a9dd9e86

                                                                                      SHA512

                                                                                      f0621977d20989d21ae14b66c1a7a6c752bfd6d7ccc2c4c4ec1c70ba6756e642fb7f9b1c6a94afadd0f8a05d3c377792e4aa4c1a771d833c40a6f46b90cbe7c3

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\qt\plugins\iconengines\qsvgicon.dll

                                                                                      Filesize

                                                                                      61KB

                                                                                      MD5

                                                                                      bca06db91a82a5ec364bd16699305a51

                                                                                      SHA1

                                                                                      4ec7cc816dde8f133f04245042b9ef33d048e668

                                                                                      SHA256

                                                                                      a51b9ea43708101a94da0c703d932bca9dbf116ac16ff9a8158b0ed5c594cc75

                                                                                      SHA512

                                                                                      17a78b74ad1c10a450004763a39d23e0984cfc5a1443544a2016c655a7aec22c3b0ecdce7c35d6cf9d0f7082f1f2b4b10affcb7cfd474bab49ebf1869fbcf8eb

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\qt\plugins\imageformats\qsvg.dll

                                                                                      Filesize

                                                                                      41KB

                                                                                      MD5

                                                                                      afc29e1baea327510f5922a6c739dc25

                                                                                      SHA1

                                                                                      21548f69ff63221247d445f14b2d76f3b152d098

                                                                                      SHA256

                                                                                      039d1a856bc9ab91242b30de33d58ef031ea519dede44d9f69a94177691f4bb6

                                                                                      SHA512

                                                                                      c63e48e1b9388505b21027c5e0ba3cf0933d4007b5b19d90ce48c84253ba569658f94b4c0437b592f4d08900127f86713a12607aa14aff73e3ea59cacda714a5

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\qt\plugins\platforms\qwindows.dll

                                                                                      Filesize

                                                                                      1.3MB

                                                                                      MD5

                                                                                      63f417b05fda561286a55247ff9e69c7

                                                                                      SHA1

                                                                                      55d7ce68b362df5783e64c70bfc5670fcedc26a7

                                                                                      SHA256

                                                                                      3a84a253b230fe3e2d957dc19803d51b7c68b062de6a9e5b187900d42d7eb1b9

                                                                                      SHA512

                                                                                      094c29702c6085d2af447565c976fcd52497d878a70912fed85b3a41f94c2ffb6bb3085bdd766b10e27443a82066102ff8bf074175b3bc7ee44c7d5eec4ec92f

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\qt\plugins\styles\qwindowsvistastyle.dll

                                                                                      Filesize

                                                                                      145KB

                                                                                      MD5

                                                                                      4aac3b6bc8ddf0fb8d0f2b5cdcfff5ad

                                                                                      SHA1

                                                                                      e4ac73f45ca6ce08c4e02741a20ff86c7cbb0b07

                                                                                      SHA256

                                                                                      78d9cf2832cc261fbcc8467691ad947363b66927788bf3a90fdabb448999bb96

                                                                                      SHA512

                                                                                      7befa3bffe3220efff1723574ef14fc8d778754900393b77a0aa207bbc42e39b85d79ff6d6e460541d970a1c98c3dbf26ef00156299ae8d3ad63f57e8bab448d

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\ucrtbase.dll

                                                                                      Filesize

                                                                                      1.1MB

                                                                                      MD5

                                                                                      2040cdcd779bbebad36d36035c675d99

                                                                                      SHA1

                                                                                      918bc19f55e656f6d6b1e4713604483eb997ea15

                                                                                      SHA256

                                                                                      2ad9a105a9caa24f41e7b1a6f303c07e6faeceaf3aaf43ebd644d9d5746a4359

                                                                                      SHA512

                                                                                      83dc3c7e35f0f83e1224505d04cdbaee12b7ea37a2c3367cb4fccc4fff3e5923cf8a79dd513c33a667d8231b1cc6cfb1e33f957d92e195892060a22f53c7532f

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\office6\vcruntime140.dll

                                                                                      Filesize

                                                                                      75KB

                                                                                      MD5

                                                                                      8fdb26199d64ae926509f5606460f573

                                                                                      SHA1

                                                                                      7d7d8849e7c77af3042a6f54bdf2bb303d7cd678

                                                                                      SHA256

                                                                                      f1fd5f6ec1cfe0cc3b66b5322ac97568bc63b19c1e415b99aad7c69ddbafa33c

                                                                                      SHA512

                                                                                      f56bf11d4259dbf5d4d1f9fc2ad60ff609cddb21278999e9fa55fe5d74552e8a01ddc55cfdc9bf4b09b3e3130a1356142a24a7db8ec5ea19344de617dc9fa99f

                                                                                    • C:\Users\Admin\AppData\Local\Temp\wps\~e579337\CONTROL\product.dat

                                                                                      Filesize

                                                                                      101KB

                                                                                      MD5

                                                                                      f6e9f1463fe638ab89b015d80066f0f0

                                                                                      SHA1

                                                                                      420ab30d4ea3a099dfe322a65607943ef2ee80e6

                                                                                      SHA256

                                                                                      82e478a56b0af1a925117eff4c55c41b672831a45ab1f18d53fe361c5ddd1707

                                                                                      SHA512

                                                                                      a178552396124d037223502e02f25406dffe4b6893c46835f9b606a60adb2324a7bf200511adaf2aba89c04742c3fa4497c1999655f5b94358aa000a5ca3d841

                                                                                    • C:\Users\Admin\AppData\Local\tempinstall.ini

                                                                                      Filesize

                                                                                      382B

                                                                                      MD5

                                                                                      6a5eea749583001de63b993fc66496ba

                                                                                      SHA1

                                                                                      fd41691ec4751e85be89917d46454f8533800b4e

                                                                                      SHA256

                                                                                      bca613688e735ccd1fae7164550bd8ae90862028cd0bf31534c149ea0d7c9f60

                                                                                      SHA512

                                                                                      6a5b9b863bf139c87b5734d6e8310c7231a1015d8eceb15f76ccf7676d36f9107fd5d817a6f04ed47c3ee45be409073c837beee3c079abde5bc38233c98b9712

                                                                                    • C:\Users\Admin\AppData\Local\tempinstall.ini

                                                                                      Filesize

                                                                                      428B

                                                                                      MD5

                                                                                      5e1b68b67986b1588301c0135f19fc7c

                                                                                      SHA1

                                                                                      957ea47285f7d903cce7530ee34852435de5b5b4

                                                                                      SHA256

                                                                                      23456d8ce681d1a5a31bf06262e088f4feb8d0e8fdc1d37afa4aa02830ffacdc

                                                                                      SHA512

                                                                                      268ec437c5971552dacca1e9ef6850543614d5a7f05ac34b41bf05f73e97e4c694d59e4f0618a57660ffad4f2faee653b4c0c824f97a6e9fddc48d22c52739af

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\ksomisc\ksomisc_2025_03_28.log

                                                                                      Filesize

                                                                                      5KB

                                                                                      MD5

                                                                                      fc6298b6b03699f66a11412f9dfbeef3

                                                                                      SHA1

                                                                                      6b748d60251ffa2f27baf0e87916bf016929640b

                                                                                      SHA256

                                                                                      5ee2c94b9141db6fadcd2ac70619d464b74e8e783608aed172e29e95ec9c1e50

                                                                                      SHA512

                                                                                      f67b6b526815785b2419b585e34c906e090fe0478b2ce6ed8650c1b4760f98e49099270060b1cddc688de7f1babeb5c057e50650be9e0f04527d871f19b6e987

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      8e056f3aefbacf5d7431bd35603990ea

                                                                                      SHA1

                                                                                      7697d08a5c36345dd30783573dd2f142dad8bbf7

                                                                                      SHA256

                                                                                      11379297a654b22a86605008e008c7995299cdbccf36ed9f99739a08fea28d5c

                                                                                      SHA512

                                                                                      11e60b988ae0045e86668683c0c1ddcc8b6dede35fb8e156a588f06d78eb140aca611c39002e0cb1a784e2b337673abb7703fccdb5dbde22a10bcb367374381f

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

                                                                                      Filesize

                                                                                      8KB

                                                                                      MD5

                                                                                      f66039a69d84ec7647f1c88be2c0f671

                                                                                      SHA1

                                                                                      b5fa727b8444f0db1778b3f573cdf21d6deba14b

                                                                                      SHA256

                                                                                      12a65c74be8086763514025e43a4f0409494e27fe3040ee2f707562d9d3dbebe

                                                                                      SHA512

                                                                                      b057c687ca60616b989050ee6826439f70020982e35ff76e1ea1d1ae35cc8a5b524c845dcb65221934d740a8a09bc14e766bed223a9c7e20b02fecb74685403d

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

                                                                                      Filesize

                                                                                      26KB

                                                                                      MD5

                                                                                      45c10ad6b80d1a381d3b0a2286e7b05b

                                                                                      SHA1

                                                                                      aa474fbac53b3b95e13608991cdd5ebd352402e1

                                                                                      SHA256

                                                                                      20ff520b5a0358ed25be8fc157342b10d24e795fc44d34c291e77caf2bcc0956

                                                                                      SHA512

                                                                                      e3af91d7be4f4ff6e3c77703799b16fed7d9cf26a08d0650943ea56a19bb07f51f4193e1f9df078f3f527d40afa7be9e8c346e8ec1755a624ec3166f5ed94c02

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

                                                                                      Filesize

                                                                                      48KB

                                                                                      MD5

                                                                                      5fa5a4a55fb620a54d8dcc91b69e2d23

                                                                                      SHA1

                                                                                      5a82c9496766722eaa6848a0dbee441f002a487b

                                                                                      SHA256

                                                                                      c3d76d48e395c49630ab5a2557c91c4af8b250c16bbc06c1d97ba49ac17d18bb

                                                                                      SHA512

                                                                                      3f23405cec14b8964b93d0cbfe31811ac6e0e83a1a6aa64853dc191c4eefa8e32aa6a7e3a79fffbc7d312399fd5acd174ca15d4dd6c93823c7c69543a81417c5

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\setup\wpssetup.log

                                                                                      Filesize

                                                                                      58KB

                                                                                      MD5

                                                                                      a83beafca54bed49c2dc844f28d8ea4c

                                                                                      SHA1

                                                                                      8815c6111ca99ea164b877ac9d410f97321f78fd

                                                                                      SHA256

                                                                                      6bd4ccc186c298ba2d5c3862a0122d14cf6fa50ab868834f573c5b2beb881749

                                                                                      SHA512

                                                                                      d17d79433ee61d14722b0c749342751d816475df3aada051bd4566d543dc8f3f545e303a10e38de25ff5b4fa81c6367464a93919b2c2586b0b1d2913fd6549f2

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\office6\log\update\wpsupdate_2025_03_28.log

                                                                                      Filesize

                                                                                      2KB

                                                                                      MD5

                                                                                      a435d065a8f7ff1a13f601033a46afe9

                                                                                      SHA1

                                                                                      af3608e229062b081a0bf0e66e2e44615d4b81e8

                                                                                      SHA256

                                                                                      dea505ae2e4555f4189bc24a3d1bae0ac61f99320db957b73e9c2847b83ceaa6

                                                                                      SHA512

                                                                                      2b747c349d3fa81424d9892c0a5feddd24a9de373035e642ddc1452a9395edbe00262edcbee8021aec6b20360aae3db79d6cc59e9411e4e749db83b44d5f76f0

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\kconfigcenter\kccsdkdb\kccsdkpriortydb\mdbx.dat

                                                                                      Filesize

                                                                                      64KB

                                                                                      MD5

                                                                                      b081f361b492775d86550029a4860b16

                                                                                      SHA1

                                                                                      60f3566fe46db274792308b1f5965697b09761fd

                                                                                      SHA256

                                                                                      b2e68029a40a7e729e256a76cfb7160ada44f8a49fa89d670fe3e7aa20677726

                                                                                      SHA512

                                                                                      d78c8a84f69ee7465f86b989cc7a58ea9547e22be7450117b16c1195e7335cfd1294a7cf5bb3b5edb6853ca4177969efdde11efed57cf2fde727708d93ca925b

                                                                                    • C:\Users\Admin\AppData\Roaming\kingsoft\wps\addons\data\win-i386\kconfigcenter\kccsdkdb\kccsdkpriortydb\mdbx.dat

                                                                                      Filesize

                                                                                      64KB

                                                                                      MD5

                                                                                      c21d89255a95cedc2e7098dfc9b18d75

                                                                                      SHA1

                                                                                      4862506faf0b42a087cfd0797700f5e06b258b9d

                                                                                      SHA256

                                                                                      82bd1c0833eba35fa4121c20118556228aa774a988219854d640a3e8f07fc7f3

                                                                                      SHA512

                                                                                      7b5eff5049b6d38a50382e142acabbbe0fc2796417c9bc8c59e2b536d669bd4a37cceb1b2fabdd70cc028ec6c01301d17534fe09ecbdc9ef731363fdb5ffe1c7

                                                                                    • memory/344-5227-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5263-0x00000000016B0000-0x00000000016C7000-memory.dmp

                                                                                      Filesize

                                                                                      92KB

                                                                                    • memory/344-5226-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5225-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5224-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5223-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5222-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5215-0x000000006C2A0000-0x000000006CA1D000-memory.dmp

                                                                                      Filesize

                                                                                      7.5MB

                                                                                    • memory/344-5228-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5219-0x000000006FBA0000-0x00000000712E0000-memory.dmp

                                                                                      Filesize

                                                                                      23.2MB

                                                                                    • memory/344-5214-0x000000006ED10000-0x000000006F71D000-memory.dmp

                                                                                      Filesize

                                                                                      10.1MB

                                                                                    • memory/344-5229-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5230-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/344-5231-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5220-0x000000006BEC0000-0x000000006BED0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5241-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5234-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5217-0x000000006ED10000-0x000000006F71D000-memory.dmp

                                                                                      Filesize

                                                                                      10.1MB

                                                                                    • memory/1568-5235-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5232-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5266-0x00000000033C0000-0x00000000033D7000-memory.dmp

                                                                                      Filesize

                                                                                      92KB

                                                                                    • memory/1568-5218-0x000000006C2A0000-0x000000006CA1D000-memory.dmp

                                                                                      Filesize

                                                                                      7.5MB

                                                                                    • memory/1568-5216-0x000000006FBA0000-0x00000000712E0000-memory.dmp

                                                                                      Filesize

                                                                                      23.2MB

                                                                                    • memory/1568-5233-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5240-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5239-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5238-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5237-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1568-5236-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1996-5353-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/1996-5351-0x000000006C3C0000-0x000000006CB3D000-memory.dmp

                                                                                      Filesize

                                                                                      7.5MB

                                                                                    • memory/1996-5349-0x000000006E800000-0x000000006F20D000-memory.dmp

                                                                                      Filesize

                                                                                      10.1MB

                                                                                    • memory/3604-5277-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5276-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5271-0x000000006E800000-0x000000006F20D000-memory.dmp

                                                                                      Filesize

                                                                                      10.1MB

                                                                                    • memory/3604-5293-0x0000000002F00000-0x0000000002F17000-memory.dmp

                                                                                      Filesize

                                                                                      92KB

                                                                                    • memory/3604-5275-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5272-0x000000006C2A0000-0x000000006CA1D000-memory.dmp

                                                                                      Filesize

                                                                                      7.5MB

                                                                                    • memory/3604-5284-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5273-0x000000006F210000-0x0000000070950000-memory.dmp

                                                                                      Filesize

                                                                                      23.2MB

                                                                                    • memory/3604-5283-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5282-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5281-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5280-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5279-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3604-5278-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5329-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5324-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5319-0x000000006C3C0000-0x000000006CB3D000-memory.dmp

                                                                                      Filesize

                                                                                      7.5MB

                                                                                    • memory/4756-5318-0x000000006F210000-0x0000000070950000-memory.dmp

                                                                                      Filesize

                                                                                      23.2MB

                                                                                    • memory/4756-5344-0x0000000002D10000-0x0000000002D27000-memory.dmp

                                                                                      Filesize

                                                                                      92KB

                                                                                    • memory/4756-5322-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5323-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5321-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5325-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5326-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5327-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5328-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5330-0x000000006BEB0000-0x000000006BEC0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/4756-5317-0x000000006E800000-0x000000006F20D000-memory.dmp

                                                                                      Filesize

                                                                                      10.1MB