| File name: | GuildBorn1.0.0.msi |
| Full analysis: | https://app.any.run/tasks/df6ae60d-ea10-4254-ab01-242f54e0afdb |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | July 03, 2025, 22:15:03 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-msi |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: GuildBorn, Author: Unreal Game Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install GuildBorn., Template: x64;1033, Revision Number: {2D9520B3-6654-4F81-95CC-12C9A34675E5}, Create Time/Date: Wed Jul 2 02:29:26 2025, Last Saved Time/Date: Wed Jul 2 02:29:26 2025, Number of Pages: 500, Number of Words: 2, Name of Creating Application: WiX Toolset (4.0.0.5512), Security: 2 |
| MD5: | 926235FD2A5DA105132F3DFE486782E1 |
| SHA1: | A2C0F46BACBACE5592E2C9C22AADCEF0C0666B2E |
| SHA256: | 1009EC53E19281E42F4369264FA7B737F3D19F3E542CF19E3AB71909CF5618F4 |
| SSDEEP: | 786432:8isTv6NIvcJt9w2bywlG9ODbszPY8k+TGK8aKiJML97VbZq:8isr6NIEJt9iMWY8kbK8a7JML9JbZq |
| .msi | | | Microsoft Installer (100) |
|---|
| CodePage: | Windows Latin 1 (Western European) |
|---|---|
| Title: | Installation Database |
| Subject: | GuildBorn |
| Author: | Unreal Game Inc. |
| Keywords: | Installer |
| Comments: | This installer database contains the logic and data required to install GuildBorn. |
| Template: | x64;1033 |
| RevisionNumber: | {2D9520B3-6654-4F81-95CC-12C9A34675E5} |
| CreateDate: | 2025:07:02 02:29:26 |
| ModifyDate: | 2025:07:02 02:29:26 |
| Pages: | 500 |
| Words: | 2 |
| Software: | WiX Toolset (4.0.0.5512) |
| Security: | Read-only recommended |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4460,i,15076537969571948191,16805046044605086254,262144 --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=4476 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 133.0.6943.127 Modules
| |||||||||||||||
| 320 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3828,i,17159436287056569763,2202446976901978766,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:1 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 1 Version: 133.0.3065.92 Modules
| |||||||||||||||
| 480 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --field-trial-handle=2248,i,15076537969571948191,16805046044605086254,262144 --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=2396 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 1 Version: 133.0.6943.127 Modules
| |||||||||||||||
| 536 | C:\WINDOWS\system32\cmd.exe /d /s /c "cscript //Nologo "C:\Users\admin\AppData\Local\Temp\1339159155.vbs"" | C:\Windows\System32\cmd.exe | — | GuildBorn.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 868 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1068 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | SrTasks.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1392 | taskkill /F /IM chrome.exe | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1828 | taskkill /F /T /IM msedge.exe | C:\Windows\System32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1880 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | evilsoul_f3bfea2d36e77b2a.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1944 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,15076537969571948191,16805046044605086254,262144 --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=2628 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 1 Version: 133.0.6943.127 Modules
| |||||||||||||||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore |
| Operation: | write | Name: | SrCreateRp (Enter) |
Value: 48000000000000003CA7390568ECDB0128170000C8150000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Enter) |
Value: 48000000000000003CA7390568ECDB0128170000C8150000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Leave) |
Value: 4800000000000000803F620568ECDB0128170000C8150000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Enter) |
Value: 4800000000000000803F620568ECDB0128170000C8150000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Leave) |
Value: 48000000000000008692640568ECDB0128170000C8150000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppCreate (Enter) |
Value: 480000000000000077F6660568ECDB0128170000C8150000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP |
| Operation: | write | Name: | LastIndex |
Value: 11 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGatherWriterMetadata (Enter) |
Value: 4800000000000000DED19D0568ECDB0128170000C8150000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (5928) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 48000000000000009F35A00568ECDB0128170000300B0000E803000001000000000000000000000039972FDEB1B1544DB7C899CDAE0A07B200000000000000000000000000000000 | |||
| (PID) Process: | (4664) VSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer |
| Operation: | write | Name: | IDENTIFY (Leave) |
Value: 48000000000000003B47B30568ECDB0138120000D8120000E80300000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5928 | msiexec.exe | C:\System Volume Information\SPP\metadata-2 | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\Windows\Installer\17adf3.msi | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\Users\admin\AppData\Local\Programs\guildborn\GuildBorn.exe | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\Users\admin\AppData\Local\Programs\guildborn\LICENSES.chromium.html | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\Users\admin\AppData\Local\Programs\guildborn\icudtl.dat | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\Users\admin\AppData\Local\Programs\guildborn\resources.pak | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\Users\admin\AppData\Local\Programs\guildborn\resources\app.asar | — | |
MD5:— | SHA256:— | |||
| 5928 | msiexec.exe | C:\System Volume Information\SPP\snapshot-2 | binary | |
MD5:EA9BCE2B308264DC5B99B303CD04B976 | SHA256:3CCA844FBBEEA5862AEAC2A5C1AABA3D8C05FA96F5A676976360093D834D7D30 | |||
| 5928 | msiexec.exe | C:\Users\admin\AppData\Local\Programs\guildborn\resources\app.asar.unpacked\node_modules\sqlite3\package.json | binary | |
MD5:174BF28FCCD7FDB6F0766F31FAC3060D | SHA256:91008A93E604674024BD65569670AF5B01F1E4CAF86CDE50835EE58F59A5DC61 | |||
| 5928 | msiexec.exe | C:\Users\admin\AppData\Local\Programs\guildborn\libEGL.dll | executable | |
MD5:1DCF5AC3CB0DCDA9C9679EEB018D01BD | SHA256:9CFC3001191E8B3EB9C96BA29E57E5BF9AAAB264E83897E47CB968167A8A811B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 3.125.102.39:443 | https://d760-18-188-171-105.ngrok-free.app/download/vbs | unknown | text | 658 b | malicious |
4804 | GuildBorn.exe | GET | 307 | 3.125.209.94:80 | http://d760-18-188-171-105.ngrok-free.app/download/vbs | unknown | — | — | malicious |
4804 | GuildBorn.exe | GET | 307 | 3.125.209.94:80 | http://d760-18-188-171-105.ngrok-free.app/download/panel | unknown | — | — | malicious |
— | — | GET | 200 | 3.124.142.205:443 | https://d760-18-188-171-105.ngrok-free.app/download/panel | unknown | executable | 66.4 Mb | malicious |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | GET | 200 | 216.58.206.42:443 | https://safebrowsingohttpgateway.googleapis.com/v1/ohttp/hpkekeyconfig?key=AIzaSyA2KlwBX3mkFo30om9LUFYQhpqLoa_BNhE | unknown | binary | 41 b | whitelisted |
— | — | POST | 200 | 142.250.27.84:443 | https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard | unknown | text | 17 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 2.16.168.124:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
— | — | 2.16.168.124:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
1268 | svchost.exe | 2.16.168.124:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
5944 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
d760-18-188-171-105.ngrok-free.app |
| malicious |
activation-v2.sls.microsoft.com |
| whitelisted |
0dcf-18-188-171-105.ngrok-free.app |
| malicious |
clients2.google.com |
| whitelisted |
safebrowsingohttpgateway.googleapis.com |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2200 | svchost.exe | Misc activity | ET INFO Observed DNS Query to *.ngrok Domain (ngrok-free .app) |
— | — | A Network Trojan was detected | SUSPICIOUS [ANY.RUN] VBS is used to run Shell |
— | — | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
2200 | svchost.exe | Misc activity | ET INFO Observed DNS Query to *.ngrok Domain (ngrok-free .app) |
— | — | Generic Protocol Command Decode | SURICATA HTTP file name too long |
2200 | svchost.exe | Misc activity | ET INFO Observed DNS Query to *.ngrok Domain (ngrok-free .app) |
Process | Message |
|---|---|
msedge.exe | RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Microsoft\Edge\User Data directory exists )
|