File name:

wps_lid.lid-e8N1FJF6TKlt.exe

Full analysis: https://app.any.run/tasks/ecb7a3e8-54be-42d7-bcea-062585a20334
Verdict: Malicious activity
Analysis date: December 20, 2025, 09:01:19
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
wps
anti-evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

AA52F56AA417CD30B9A8949109C81241

SHA1:

3A6E0D270B13A0FE3ACE8397139D4B0B5416D958

SHA256:

900056B49E67914767F76031A5FDABF4B1E3DF82F22F029DFFD32BB053AD164A

SSDEEP:

98304:fHs0FC8XVhfPVfBoJJd+d2efP5uksiKg1iBKtDl44KMWthu5yTK6Z1sMRzrp1LuL:9DKSaAHSo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • Executable content was dropped or overwritten

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • WPS mutex has been found

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • Process drops legitimate windows executable

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • The process drops C-runtime libraries

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • There is functionality for taking screenshot (YARA)

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • The process checks if it is being run in the virtual environment

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
  • INFO

    • Reads the computer name

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • Checks supported languages

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • Creates files in the program directory

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • Create files in a temporary directory

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
    • Reads the machine GUID from the registry

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • Creates files or folders in the user directory

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • Process checks computer location settings

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
    • Checks proxy server information

      • wps_lid.lid-e8N1FJF6TKlt.exe (PID: 7604)
    • The sample compiled with english language support

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • The sample compiled with chinese language support

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
    • The sample compiled with japanese language support

      • eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe (PID: 8040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:11:28 02:56:30+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 4228608
InitializedDataSize: 1555968
UninitializedDataSize: -
EntryPoint: 0x2ba017
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 12.2.0.21570
ProductVersionNumber: 12.2.0.21570
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Zhuhai Kingsoft Office Software Co.,Ltd
FileDescription: WPS Office Setup
FileVersion: 12,2,0,21570
InternalName: konlinesetup_xa
LegalCopyright: Copyright©2025 Kingsoft Corporation. All rights reserved.
OriginalFileName: konlinesetup_xa.exe
ProductName: WPS Office
ProductVersion: 12,2,0,21570
MIMEType: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wps_lid.lid-e8n1fjf6tklt.exe eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_xa_mui_free.exe.601.1074.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7204C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7604"C:\Users\admin\AppData\Local\Temp\wps_lid.lid-e8N1FJF6TKlt.exe" C:\Users\admin\AppData\Local\Temp\wps_lid.lid-e8N1FJF6TKlt.exe
explorer.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Office Setup
Version:
12,2,0,21570
Modules
Images
c:\users\admin\appdata\local\temp\wps_lid.lid-e8n1fjf6tklt.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
8040"C:\ProgramData\WPS\Installers\eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe" -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -pinTaskbar -curlangofinstalledproduct=en_US -notElevateAndDirectlyInstall -D="C:\Users\admin\AppData\Local\Kingsoft\WPS Office" -notautostartwps -enableSetupMuiPkg -appdata="C:\Users\admin\AppData\Roaming"C:\ProgramData\WPS\Installers\eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
wps_lid.lid-e8N1FJF6TKlt.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Install Application
Version:
12,2,0,23155
Modules
Images
c:\programdata\wps\installers\eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_xa_mui_free.exe.601.1074.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msi.dll
Total events
15 143
Read events
15 102
Write events
38
Delete events
3

Modification events

(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoHdid
Value:
de90e79e559da8a39d702eb5545cc924
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id_type
Value:
web
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id
Value:
lid-e8N1FJF6TKlt
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
download_start
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:countrycode
Value:
DE
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:lastupdatecountrycode
Value:
1766221287483
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoGuid
Value:
7D6306B93DAB4FF4986D92BC59457D11
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:startup_time
Value:
2025-12-20 09
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
startup
(PID) Process:(7604) wps_lid.lid-e8N1FJF6TKlt.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\Common
Operation:writeName:newGuideShow
Value:
1
Executable files
70
Suspicious files
45
Text files
1 031
Unknown types
1

Dropped files

PID
Process
Filename
Type
7604wps_lid.lid-e8N1FJF6TKlt.exeC:\ProgramData\WPS\Installers\eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
MD5:
SHA256:
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\prereadimages_et.txt
MD5:
SHA256:
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\prereadimages_pdf.txt
MD5:
SHA256:
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\prereadimages_prometheus.txt
MD5:
SHA256:
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\prereadimages_prome_init.txt
MD5:
SHA256:
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\prereadimages_qing.txt
MD5:
SHA256:
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\prereadimages_wpp.txt
MD5:
SHA256:
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\prereadimages_wps.txt
MD5:
SHA256:
7604wps_lid.lid-e8N1FJF6TKlt.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:634B51DAA658BCACAE75C6CA29E576D6
SHA256:EF9CDED36B9F886A05B5DBF242785FF69AFE70CCFB7CBB48DD77D24555066785
8040eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exeC:\Users\admin\AppData\Local\Temp\wps\~1017ef\CONTROL\default\106.pngimage
MD5:83F3FA276CD75A78053372E32D83DB86
SHA256:F183BCB33059BDAC07040F210AF6ABEB94D2E42DBD3703815893D7AF2D6E49A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
72
TCP/UDP connections
38
DNS requests
22
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
1600
svchost.exe
GET
200
2.16.164.122:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7604
wps_lid.lid-e8N1FJF6TKlt.exe
POST
204
142.251.141.78:443
https://www.google-analytics.com/mp/collect?firebase_app_id=1:463244832315:android:fe82dee1e0f73e232db61e&api_secret=UViz3S6KTv6YlgsE1g4FAQ
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1600
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
Not routed
whitelisted
6768
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2612
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
7604
wps_lid.lid-e8N1FJF6TKlt.exe
142.251.141.78:443
www.google-analytics.com
GOOGLE
US
whitelisted
7604
wps_lid.lid-e8N1FJF6TKlt.exe
90.84.175.86:443
params.wps.com
OCBHONEY OCB public cloud network
FR
whitelisted
7604
wps_lid.lid-e8N1FJF6TKlt.exe
89.222.119.91:443
wdl1.pcfg.cache.wpscdn.com
CDN77 _
GB
whitelisted
3412
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2284
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.google-analytics.com
  • 142.251.141.78
whitelisted
params.wps.com
  • 90.84.175.86
whitelisted
wdl1.pcfg.cache.wpscdn.com
  • 89.222.119.91
unknown
api.wps.com
  • 90.84.175.86
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.2
  • 20.190.159.129
  • 40.126.31.131
  • 20.190.159.73
  • 20.190.159.128
  • 20.190.159.0
  • 20.190.159.23
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 2.16.164.122
  • 2.16.164.129
  • 2.16.164.120
  • 2.16.164.113
  • 2.16.164.104
  • 2.16.164.112
  • 2.16.164.24
  • 2.16.164.99
  • 2.16.164.33
  • 23.216.77.28
  • 23.216.77.6
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
Process
Message
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
[kscreen] isElide:0 switchRec:0 switchRecElide:1
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "", which already has a layout
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "m_BrandAreaWidget", which already has a layout
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
Unknown property font-color
eada1507f3f2d1ea38b4b3c1c06b0508-16_setup_XA_mui_Free.exe.601.1074.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout