File name:

wps_lid.lid-i5PPMV0qg1fQ.exe

Full analysis: https://app.any.run/tasks/19bc5d17-7080-472a-b0c1-8b4a255ea84a
Verdict: Malicious activity
Analysis date: January 07, 2026, 10:12:51
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
wps
anti-evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

E64F8A08D4AE112398D9A154CD6C57A3

SHA1:

89B2B29C320F4C7C3CA66C3D6FCC93A184203206

SHA256:

1AD4226950BE8B54C87C730F2C650976CB16CDCEDC30250C7A8AE2AF2D1B2BBD

SSDEEP:

98304:AXs0Bhh/ZUrVjqyr00+HK7d98Vu78+jobQmaBTStlmtkXrKmM4OTzNAxfMnMRRR6:MHkk+kISQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • WPS mutex has been found

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • The process checks if it is being run in the virtual environment

      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Process drops legitimate windows executable

      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Executable content was dropped or overwritten

      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • The process drops C-runtime libraries

      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
  • INFO

    • Reads the machine GUID from the registry

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Checks supported languages

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Reads the computer name

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Creates files in the program directory

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Process checks computer location settings

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
    • Creates files or folders in the user directory

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Create files in a temporary directory

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • Checks proxy server information

      • wps_lid.lid-i5PPMV0qg1fQ.exe (PID: 7588)
    • The sample compiled with chinese language support

      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • The sample compiled with english language support

      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
    • The sample compiled with japanese language support

      • 96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 7512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:12:25 05:03:47+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 4226560
InitializedDataSize: 1555456
UninitializedDataSize: -
EntryPoint: 0x2b9947
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 12.2.0.21571
ProductVersionNumber: 12.2.0.21571
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Zhuhai Kingsoft Office Software Co.,Ltd
FileDescription: WPS Office Setup
FileVersion: 12,2,0,21571
InternalName: konlinesetup_xa
LegalCopyright: Copyright©2025 Kingsoft Corporation. All rights reserved.
OriginalFileName: konlinesetup_xa.exe
ProductName: WPS Office
ProductVersion: 12,2,0,21571
MIMEType: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wps_lid.lid-i5ppmv0qg1fq.exe 96aa40b0f55bd6748cdc4993345e7fba-16_setup_xa_mui_free.exe.500.2086.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3344C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7512"C:\ProgramData\WPS\Installers\96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe" -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -pinTaskbar -curlangofinstalledproduct=en_US -notElevateAndDirectlyInstall -D="C:\Users\admin\AppData\Local\Kingsoft\WPS Office" -notautostartwps -enableSetupMuiPkg -appdata="C:\Users\admin\AppData\Roaming"C:\ProgramData\WPS\Installers\96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
wps_lid.lid-i5PPMV0qg1fQ.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Install Application
Version:
12,2,0,23196
Modules
Images
c:\programdata\wps\installers\96aa40b0f55bd6748cdc4993345e7fba-16_setup_xa_mui_free.exe.500.2086.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msi.dll
7588"C:\Users\admin\AppData\Local\Temp\wps_lid.lid-i5PPMV0qg1fQ.exe" C:\Users\admin\AppData\Local\Temp\wps_lid.lid-i5PPMV0qg1fQ.exe
explorer.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Office Setup
Version:
12,2,0,21571
Modules
Images
c:\users\admin\appdata\local\temp\wps_lid.lid-i5ppmv0qg1fq.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
15 146
Read events
15 105
Write events
38
Delete events
3

Modification events

(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:startup_time
Value:
2026-01-07 10
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
startup
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\Common
Operation:writeName:newGuideShow
Value:
1
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
download_start
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoGuid
Value:
98BBC8E5488F420C95A594A3385E563A
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoHdid
Value:
f2297caf453cb822bf59ff3bee10423d
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id_type
Value:
web
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id
Value:
lid-i5PPMV0qg1fQ
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:countrycode
Value:
GB
(PID) Process:(7588) wps_lid.lid-i5PPMV0qg1fQ.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:lastupdatecountrycode
Value:
1767780780240
Executable files
70
Suspicious files
39
Text files
646
Unknown types
14

Dropped files

PID
Process
Filename
Type
7588wps_lid.lid-i5PPMV0qg1fQ.exeC:\ProgramData\WPS\Installers\96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\prereadimages_et.txt
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\prereadimages_pdf.txt
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\prereadimages_prometheus.txt
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\prereadimages_prome_init.txt
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\prereadimages_qing.txt
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\prereadimages_wpp.txt
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\prereadimages_wps.txt
MD5:
SHA256:
751296aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~107457\CONTROL\ja_JP\1003.pngimage
MD5:2D808B698701B15B33BEC04710A4F7EF
SHA256:3CFD7FA737826AC37D44B79F688B4DD2FE7E61B790A3EB5B90081B7F77446549
7588wps_lid.lid-i5PPMV0qg1fQ.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_660CACFBF957CBCC19C054A0402E41C3binary
MD5:A32E67D0FE071BE18A83BA2C26147DDB
SHA256:A5FC6AFFBDEC3F4ECE1532F962D607C984A08A2868BE3E86D889379D2009D8AC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
34
TCP/UDP connections
38
DNS requests
24
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
GET
200
90.84.175.86:443
https://api.wps.com/utils/geo/me
unknown
text
137 b
unknown
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
POST
204
216.58.206.46:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
2420
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
792
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2688
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
216.58.206.46:443
www.google-analytics.com
GOOGLE
US
whitelisted
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
90.84.175.86:443
params.wps.com
OCBHONEY OCB public cloud network
FR
whitelisted
7588
wps_lid.lid-i5PPMV0qg1fQ.exe
89.222.119.91:443
wdl1.pcfg.cache.wpscdn.com
CDN77 _
GB
whitelisted
3412
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2420
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.251.141.110
whitelisted
www.google-analytics.com
  • 216.58.206.46
  • 142.250.186.174
whitelisted
params.wps.com
  • 90.84.175.86
whitelisted
wdl1.pcfg.cache.wpscdn.com
  • 89.222.119.91
unknown
api.wps.com
  • 90.84.175.86
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.74
  • 20.190.160.20
  • 40.126.32.140
  • 20.190.160.2
  • 20.190.160.131
  • 20.190.160.4
  • 20.190.160.130
  • 20.190.160.132
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted

Threats

No threats detected
Process
Message
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
[kscreen] isElide:0 switchRec:0 switchRecElide:1
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_BrandAreaWidget", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
96aa40b0f55bd6748cdc4993345e7fba-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout