File name:

wps_wid.cid-1726498999.1749666569.exe

Full analysis: https://app.any.run/tasks/190595e1-8475-44c2-aaa7-ad5dba0d218d
Verdict: Malicious activity
Analysis date: June 11, 2025, 18:41:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
wps
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

24F7506508AE01E9C029E2AC4FD34451

SHA1:

1CF4D9095B9BC390572C680CA2D3A695A71D21D4

SHA256:

6B953C7B60D39E0ADF0CA1A1DCBF53225E079447EB9C02D549506C583BB1909E

SSDEEP:

98304:f6s0B3ZevjfsjC+qI9zquslfr9fPHMcQpjWeisy5xbLluuJjglkXEXWHH4XL4HuY:/lct3/g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • WPS mutex has been found

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • Process drops legitimate windows executable

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • There is functionality for taking screenshot (YARA)

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • The process drops C-runtime libraries

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • Executable content was dropped or overwritten

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • Reads security settings of Internet Explorer

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • The process checks if it is being run in the virtual environment

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
  • INFO

    • Checks supported languages

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • Reads the computer name

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
    • Process checks computer location settings

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
    • Creates files or folders in the user directory

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • Reads the software policy settings

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • Reads the machine GUID from the registry

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • Create files in a temporary directory

      • wps_wid.cid-1726498999.1749666569.exe (PID: 3780)
      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • The sample compiled with japanese language support

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • The sample compiled with english language support

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
    • The sample compiled with chinese language support

      • eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe (PID: 4080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:05:23 07:34:03+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 4140544
InitializedDataSize: 1524736
UninitializedDataSize: -
EntryPoint: 0x2a6501
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 12.2.0.21212
ProductVersionNumber: 12.2.0.21212
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Zhuhai Kingsoft Office Software Co.,Ltd
FileDescription: WPS Office Setup
FileVersion: 12,2,0,21212
InternalName: konlinesetup_xa
LegalCopyright: Copyright©2025 Kingsoft Corporation. All rights reserved.
OriginalFileName: konlinesetup_xa.exe
ProductName: WPS Office
ProductVersion: 12,2,0,21212
MIMEType: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wps_wid.cid-1726498999.1749666569.exe eaf19e78da1037899ada3bfea5ffe5ae-16_setup_xa_mui_free.exe.601.1081.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3780"C:\Users\admin\AppData\Local\Temp\wps_wid.cid-1726498999.1749666569.exe" C:\Users\admin\AppData\Local\Temp\wps_wid.cid-1726498999.1749666569.exe
explorer.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Office Setup
Version:
12,2,0,21212
Modules
Images
c:\users\admin\appdata\local\temp\wps_wid.cid-1726498999.1749666569.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4080"C:\Users\admin\AppData\Local\Temp\wps_download\eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe" -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -pinTaskbar -curlangofinstalledproduct=en_US -notElevateAndDirectlyInstall -D="C:\Users\admin\AppData\Local\Kingsoft\WPS Office" -notautostartwps -enableSetupMuiPkg -appdata="C:\Users\admin\AppData\Roaming"C:\Users\admin\AppData\Local\Temp\wps_download\eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
wps_wid.cid-1726498999.1749666569.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Install Application
Version:
12,2,0,21546
Modules
Images
c:\users\admin\appdata\local\temp\wps_download\eaf19e78da1037899ada3bfea5ffe5ae-16_setup_xa_mui_free.exe.601.1081.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msi.dll
5552C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
12 158
Read events
12 135
Write events
20
Delete events
3

Modification events

(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\Common
Operation:writeName:newGuideShow
Value:
1
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:countrycode
Value:
LU
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:lastupdatecountrycode
Value:
1749667319142
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoGuid
Value:
C7E0BD6CE43F49419FA81B5289ED2D00
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoHdid
Value:
0abe340eff52be506dc69ea0ba10f709
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id_type
Value:
web
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id
Value:
cid-1726498999.1749666569
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:lastUpdateDeviceInfoDate
Value:
2025/6/11
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\Common
Operation:writeName:Version
Value:
12.2.0.21546
(PID) Process:(3780) wps_wid.cid-1726498999.1749666569.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup\shortlink
Operation:delete keyName:(default)
Value:
Executable files
67
Suspicious files
0
Text files
712
Unknown types
31

Dropped files

PID
Process
Filename
Type
3780wps_wid.cid-1726498999.1749666569.exeC:\Users\admin\AppData\Local\Temp\wps_download\eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\prereadimages_et.txt
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\prereadimages_pdf.txt
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\prereadimages_prometheus.txt
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\prereadimages_prome_init.txt
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\prereadimages_qing.txt
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\prereadimages_wpp.txt
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\prereadimages_wps.txt
MD5:
SHA256:
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\ja_JP\1003.pngimage
MD5:2D808B698701B15B33BEC04710A4F7EF
SHA256:3CFD7FA737826AC37D44B79F688B4DD2FE7E61B790A3EB5B90081B7F77446549
4080eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exeC:\Users\admin\AppData\Local\Temp\wps\~17e2bf\CONTROL\default\background_without_version.PNGimage
MD5:3205727D046D39384D2987D152D47775
SHA256:2B0893B707B706E3B9BE9ABC43D0F961C37F24E2086E3B42979C420D35BB3913
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
31
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4944
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6304
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6304
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4960
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3780
wps_wid.cid-1726498999.1749666569.exe
172.217.16.142:443
www.google-analytics.com
GOOGLE
US
whitelisted
3780
wps_wid.cid-1726498999.1749666569.exe
90.84.175.86:443
api.wps.com
Orange
FR
whitelisted
4
System
192.168.100.255:138
whitelisted
4944
svchost.exe
20.190.160.132:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4944
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2336
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
www.google-analytics.com
  • 172.217.16.142
whitelisted
api.wps.com
  • 90.84.175.86
whitelisted
login.live.com
  • 20.190.160.132
  • 40.126.32.140
  • 20.190.160.66
  • 20.190.160.5
  • 40.126.32.133
  • 40.126.32.136
  • 20.190.160.65
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
wdl1.pcfg.cache.wpscdn.com
  • 23.236.112.178
unknown

Threats

No threats detected
Process
Message
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
[kscreen] isElide:0 switchRec:0 switchRecElide:1
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_BrandAreaWidget", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eaf19e78da1037899ada3bfea5ffe5ae-16_setup_XA_mui_Free.exe.601.1081.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout