File name:

wps_lid.lid-e8rIwkJPTtxq.exe

Full analysis: https://app.any.run/tasks/78623d9c-eba6-470c-9dac-f073092b1b95
Verdict: Malicious activity
Analysis date: October 25, 2025, 12:10:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
wps
anti-evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

F87575A1B88512307F9EFFD233A67F4A

SHA1:

FB83FBD2190BB7FD28309168055649AA3164D89A

SHA256:

E78694A7566D073603B174DCFEF48711397BEBAA46B3DA61637575EC4754939E

SSDEEP:

98304:5ns08NGObHPCVooCZsf+sUokH3Tu2Yy4yfQl+5Tarzf5/Q+IqRDHta7ShlAjGIh3:IuHJe6G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • WPS mutex has been found

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Process drops legitimate windows executable

      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • The process drops C-runtime libraries

      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Executable content was dropped or overwritten

      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • The process checks if it is being run in the virtual environment

      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
  • INFO

    • Checks supported languages

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Reads the computer name

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Process checks computer location settings

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
    • Creates files in the program directory

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Reads the machine GUID from the registry

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Create files in a temporary directory

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Checks proxy server information

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
    • Creates files or folders in the user directory

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • Reads the software policy settings

      • wps_lid.lid-e8rIwkJPTtxq.exe (PID: 7692)
      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • The sample compiled with english language support

      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • The sample compiled with japanese language support

      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
    • The sample compiled with chinese language support

      • 8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe (PID: 5256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (18)
.exe | Win32 Executable (generic) (2.9)
.exe | Generic Win/DOS Executable (1.3)
.exe | DOS Executable Generic (1.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:08:18 07:42:51+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 4227584
InitializedDataSize: 1556480
UninitializedDataSize: -
EntryPoint: 0x2b9d57
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 12.2.0.21567
ProductVersionNumber: 12.2.0.21567
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Zhuhai Kingsoft Office Software Co.,Ltd
FileDescription: WPS Office Setup
FileVersion: 12,2,0,21567
InternalName: konlinesetup_xa
LegalCopyright: Copyright©2025 Kingsoft Corporation. All rights reserved.
OriginalFileName: konlinesetup_xa.exe
ProductName: WPS Office
ProductVersion: 12,2,0,21567
MIMEType: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
3
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start wps_lid.lid-e8riwkjpttxq.exe 8eb965f8181b753208c3bfcbdfd18f15-16_setup_xa_mui_free.exe.500.2086.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1784C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5256"C:\ProgramData\WPS\Installers\8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe" -installCallByOnlineSetup -defaultOpen -defaultOpenPdf -asso_pic_setup -createIcons -pinTaskbar -curlangofinstalledproduct=en_US -notElevateAndDirectlyInstall -D="C:\Users\admin\AppData\Local\Kingsoft\WPS Office" -notautostartwps -enableSetupMuiPkg -appdata="C:\Users\admin\AppData\Roaming"C:\ProgramData\WPS\Installers\8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
wps_lid.lid-e8rIwkJPTtxq.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Install Application
Version:
12,2,0,23131
Modules
Images
c:\programdata\wps\installers\8eb965f8181b753208c3bfcbdfd18f15-16_setup_xa_mui_free.exe.500.2086.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msi.dll
7692"C:\Users\admin\AppData\Local\Temp\wps_lid.lid-e8rIwkJPTtxq.exe" C:\Users\admin\AppData\Local\Temp\wps_lid.lid-e8rIwkJPTtxq.exe
explorer.exe
User:
admin
Company:
Zhuhai Kingsoft Office Software Co.,Ltd
Integrity Level:
MEDIUM
Description:
WPS Office Setup
Version:
12,2,0,21567
Modules
Images
c:\users\admin\appdata\local\temp\wps_lid.lid-e8riwkjpttxq.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
15 162
Read events
15 125
Write events
34
Delete events
3

Modification events

(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoGuid
Value:
BAE853A8821740E294A4DDE21296A494
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:infoHdid
Value:
8140a2e799fe87a857ab26aea0e9fac2
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id_type
Value:
web
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:onlinesetup_penetrate_id
Value:
lid-e8rIwkJPTtxq
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:startup_time
Value:
2025-10-25 12
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
startup
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\Common
Operation:writeName:newGuideShow
Value:
1
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\kwpsonlinesetup
Operation:writeName:global_progress
Value:
download_start
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:countrycode
Value:
DE
(PID) Process:(7692) wps_lid.lid-e8rIwkJPTtxq.exeKey:HKEY_CURRENT_USER\SOFTWARE\kingsoft\Office\6.0\plugins\kdcsdk
Operation:writeName:lastupdatecountrycode
Value:
1761394266396
Executable files
69
Suspicious files
45
Text files
1 027
Unknown types
33

Dropped files

PID
Process
Filename
Type
7692wps_lid.lid-e8rIwkJPTtxq.exeC:\ProgramData\WPS\Installers\8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
MD5:
SHA256:
52568eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~fee20\CONTROL\prereadimages_et.txt
MD5:
SHA256:
52568eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~fee20\CONTROL\prereadimages_pdf.txt
MD5:
SHA256:
52568eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~fee20\CONTROL\prereadimages_prometheus.txt
MD5:
SHA256:
52568eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~fee20\CONTROL\prereadimages_prome_init.txt
MD5:
SHA256:
52568eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~fee20\CONTROL\prereadimages_qing.txt
MD5:
SHA256:
52568eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~fee20\CONTROL\prereadimages_wpp.txt
MD5:
SHA256:
52568eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exeC:\Users\admin\AppData\Local\Temp\wps\~fee20\CONTROL\prereadimages_wps.txt
MD5:
SHA256:
7692wps_lid.lid-e8rIwkJPTtxq.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_660CACFBF957CBCC19C054A0402E41C3binary
MD5:1E3F044DA91D961F5CD638119E939676
SHA256:C7975A6527585E4033E86ABC6F5F34F791457DC9972E13C97D9C60345F478B6E
7692wps_lid.lid-e8rIwkJPTtxq.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:F913637413D3F4F111E80C38AD2563AC
SHA256:BDEC5D1854BB931EBD8ED57534C07DB6828FB083C547C0F0009815EAC3DFDD12
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
52
DNS requests
27
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7692
wps_lid.lid-e8rIwkJPTtxq.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
7088
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7692
wps_lid.lid-e8rIwkJPTtxq.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEA9S8pUz7rrUEVA2eU7hB08%3D
unknown
whitelisted
7692
wps_lid.lid-e8rIwkJPTtxq.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
5388
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.3.crl
unknown
whitelisted
1808
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5388
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl
unknown
whitelisted
4220
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7596
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4220
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2492
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5596
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7088
SearchApp.exe
184.86.251.9:443
www.bing.com
Akamai International B.V.
DE
whitelisted
7088
SearchApp.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4220
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3440
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7692
wps_lid.lid-e8rIwkJPTtxq.exe
142.250.186.110:443
www.google-analytics.com
GOOGLE
US
whitelisted
7692
wps_lid.lid-e8rIwkJPTtxq.exe
90.84.175.86:443
params.wps.com
Orange
FR
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.31.69
  • 20.190.159.4
  • 40.126.31.0
  • 40.126.31.73
  • 40.126.31.2
  • 40.126.31.3
  • 40.126.31.128
  • 20.190.159.131
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.bing.com
  • 184.86.251.9
  • 184.86.251.14
  • 184.86.251.4
  • 184.86.251.7
  • 184.86.251.24
  • 184.86.251.21
  • 184.86.251.27
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
th.bing.com
  • 184.86.251.9
  • 184.86.251.4
  • 184.86.251.27
  • 184.86.251.24
  • 184.86.251.21
  • 184.86.251.14
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
www.google-analytics.com
  • 142.250.186.110
whitelisted
params.wps.com
  • 90.84.175.86
unknown
arc.msn.com
  • 20.103.156.88
  • 20.74.19.45
whitelisted

Threats

No threats detected
Process
Message
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
[kscreen] isElide:0 switchRec:0 switchRecElide:1
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "", which already has a layout
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_BrandAreaWidget", which already has a layout
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to KFrostedGlassWidget "m_ExtendPanelWidget", which already has a layout
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
Unknown property font-color
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout
8eb965f8181b753208c3bfcbdfd18f15-16_setup_XA_mui_Free.exe.500.2086.exe
QLayout: Attempting to add QLayout "" to QWidget "m_customizeSettingsWidget", which already has a layout