File name:

wps_wid.cid-495582761.1759365814.exe

Full analysis: https://app.any.run/tasks/5d6e177e-af13-410a-8515-3a17e2e09279
Verdict: Malicious activity
Analysis date: October 02, 2025, 00:50:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
wps
anti-evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

806116B7F0DD8F8CA68917DB1EEE58FB

SHA1:

364281483CFFEF13B181395EF6F62BDD36C0A75A

SHA256:

6B20D7448FEB95630661A577BDABCD303173E969B457447944F73624F96C71E6

SSDEEP:

98304:kns08NGObHPCVooCZsf+sUokH3Tu2Yy4yfQl+5Tarzf5/Q+IqRDHta7ShlAjGIh1:vuHJe6K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • WPS mutex has been found

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Reads security settings of Internet Explorer

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Process drops legitimate windows executable

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Executable content was dropped or overwritten

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • The process drops C-runtime libraries

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • There is functionality for taking screenshot (YARA)

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • The process checks if it is being run in the virtual environment

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
  • INFO

    • Checks supported languages

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Reads the computer name

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Creates files or folders in the user directory

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Creates files in the program directory

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
    • Reads the machine GUID from the registry

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Reads the software policy settings

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • Process checks computer location settings

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
    • Checks proxy server information

      • wps_wid.cid-495582761.1759365814.exe (PID: 5552)
    • Create files in a temporary directory

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • The sample compiled with english language support

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • The sample compiled with chinese language support

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
    • The sample compiled with japanese language support

      • cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe (PID: 4168)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:08:18 07:42:51+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 4227584
InitializedDataSize: 1556480
UninitializedDataSize: -
EntryPoint: 0x2b9d57
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 12.2.0.21567
ProductVersionNumber: 12.2.0.21567
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Zhuhai Kingsoft Office Software Co.,Ltd
FileDescription: WPS Office Setup
FileVersion: 12,2,0,21567
InternalName: konlinesetup_xa
LegalCopyright: Copyright©2025 Kingsoft Corporation. All rights reserved.
OriginalFileName: konlinesetup_xa.exe
ProductName: WPS Office
ProductVersion: 12,2,0,21567
MIMEType: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wps_wid.cid-495582761.1759365814.exe cff2f906a22e99b9f9906563684b77e7-16_setup_xa_mui_free.exe.601.1242.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3852C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4168"C:\ProgramData\WPS\Installers\cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe" -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -pinTaskbar -curlangofinstalledproduct=en_US -notElevateAndDirectlyInstall -D="C:\Users\admin\AppData\Local\Kingsoft\WPS Office" -notautostartwps -enableSetupMuiPkg -appdata="C:\Users\admin\AppData\Roaming"C:\ProgramData\WPS\Installers\cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
wps_wid.cid-495582761.1759365814.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Install Application
Version:
12,2,0,22549
Modules
Images
c:\programdata\wps\installers\cff2f906a22e99b9f9906563684b77e7-16_setup_xa_mui_free.exe.601.1242.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msi.dll
5552"C:\Users\admin\AppData\Local\Temp\wps_wid.cid-495582761.1759365814.exe" C:\Users\admin\AppData\Local\Temp\wps_wid.cid-495582761.1759365814.exe
explorer.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Office Setup
Version:
12,2,0,21567
Modules
Images
c:\users\admin\appdata\local\temp\wps_wid.cid-495582761.1759365814.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
15 086
Read events
15 058
Write events
25
Delete events
3

Modification events

(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoGuid
Value:
F631CF2B61CB44CCA1FCDA82EE6049B9
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoHdid
Value:
803ba127160989175aef642f51892c4c
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:countrycode
Value:
US
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:lastupdatecountrycode
Value:
1759366231603
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id_type
Value:
web
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id
Value:
cid-495582761.1759365814
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:startup_time
Value:
2025-10-02 00
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
startup
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\Common
Operation:writeName:newGuideShow
Value:
1
(PID) Process:(5552) wps_wid.cid-495582761.1759365814.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
download_start
Executable files
70
Suspicious files
44
Text files
982
Unknown types
0

Dropped files

PID
Process
Filename
Type
5552wps_wid.cid-495582761.1759365814.exeC:\ProgramData\WPS\Installers\cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
MD5:
SHA256:
4168cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exeC:\Users\admin\AppData\Local\Temp\wps\~19138e\CONTROL\prereadimages_et.txt
MD5:
SHA256:
4168cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exeC:\Users\admin\AppData\Local\Temp\wps\~19138e\CONTROL\prereadimages_pdf.txt
MD5:
SHA256:
4168cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exeC:\Users\admin\AppData\Local\Temp\wps\~19138e\CONTROL\prereadimages_prometheus.txt
MD5:
SHA256:
4168cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exeC:\Users\admin\AppData\Local\Temp\wps\~19138e\CONTROL\prereadimages_prome_init.txt
MD5:
SHA256:
4168cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exeC:\Users\admin\AppData\Local\Temp\wps\~19138e\CONTROL\prereadimages_qing.txt
MD5:
SHA256:
4168cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exeC:\Users\admin\AppData\Local\Temp\wps\~19138e\CONTROL\prereadimages_wpp.txt
MD5:
SHA256:
4168cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exeC:\Users\admin\AppData\Local\Temp\wps\~19138e\CONTROL\prereadimages_wps.txt
MD5:
SHA256:
5552wps_wid.cid-495582761.1759365814.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:3106C21469BA74152130742C07C67EC5
SHA256:617AA15725BFD172815FC31135904609014D47BEE9097E4CFA8AC58D80E4DE12
5552wps_wid.cid-495582761.1759365814.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:A247D653D403EB5DAE5B46CA5A157BC2
SHA256:5E5DF817EAF133A47ED0851F92EC9801F98259AEA2CF433A69A5DCA23CC51EDC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
32
DNS requests
20
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5724
svchost.exe
GET
200
172.66.2.5:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.110.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.32.213.122:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5552
wps_wid.cid-495582761.1759365814.exe
GET
200
172.66.2.5:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEA9S8pUz7rrUEVA2eU7hB08%3D
unknown
whitelisted
5552
wps_wid.cid-495582761.1759365814.exe
GET
200
172.66.2.5:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
5552
wps_wid.cid-495582761.1759365814.exe
GET
200
172.66.2.5:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
5188
SIHClient.exe
GET
200
23.40.125.183:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5188
SIHClient.exe
GET
200
23.40.125.183:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
5188
SIHClient.exe
GET
200
23.40.125.183:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5188
SIHClient.exe
GET
200
213.155.157.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4916
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5552
wps_wid.cid-495582761.1759365814.exe
216.58.206.46:443
www.google-analytics.com
GOOGLE
US
whitelisted
5552
wps_wid.cid-495582761.1759365814.exe
90.84.175.86:443
params.wps.com
Orange
FR
whitelisted
5552
wps_wid.cid-495582761.1759365814.exe
185.229.190.27:443
wdl1.pcfg.cache.wpscdn.com
Datacamp Limited
NL
unknown
4
System
192.168.100.255:138
whitelisted
5724
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5724
svchost.exe
172.66.2.5:80
ocsp.digicert.com
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.google-analytics.com
  • 216.58.206.46
whitelisted
params.wps.com
  • 90.84.175.86
unknown
wdl1.pcfg.cache.wpscdn.com
  • 185.229.190.27
unknown
api.wps.com
  • 90.84.175.86
unknown
login.live.com
  • 40.126.31.129
  • 20.190.159.0
  • 40.126.31.1
  • 20.190.159.73
  • 40.126.31.128
  • 20.190.159.129
  • 40.126.31.69
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 172.66.2.5
  • 162.159.142.9
whitelisted
crl.microsoft.com
  • 23.55.110.193
  • 23.55.110.211
  • 213.155.157.176
  • 213.155.157.219
whitelisted
www.microsoft.com
  • 23.32.213.122
  • 23.40.125.183
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Process
Message
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
[kscreen] isElide:0 switchRec:0 switchRecElide:1
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_BrandAreaWidget", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
cff2f906a22e99b9f9906563684b77e7-16_setup_XA_mui_Free.exe.601.1242.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout