File name:

GuardSer.exe

Full analysis: https://app.any.run/tasks/b8616776-f6da-462a-9671-1d57fff503e5
Verdict: Malicious activity
Analysis date: February 22, 2025, 18:03:33
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

6EF5897E3C4DA2724633A3A6AB678049

SHA1:

B78DFDCBEAF473266ED8CA8A46D1829E351436C1

SHA256:

EE9E775BFF97A590729BE399E6B38E7D32BC955DE64A621E5061C2E354E45414

SSDEEP:

3072:U9CsqTZqqqa2MakHijwpNWQbALGlfE1nEv/:U9CsqTZqqqa2MXijSNWQbALmfE1nO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • GuardSer.exe (PID: 6656)
      • GuardSer.exe (PID: 6492)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Create files in a temporary directory

      • GuardSer.exe (PID: 6656)
    • Checks supported languages

      • GuardSer.exe (PID: 6656)
    • The sample compiled with chinese language support

      • GuardSer.exe (PID: 6656)
    • Reads the computer name

      • GuardSer.exe (PID: 6656)
    • Manual execution by a user

      • WINWORD.EXE (PID: 6360)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:10:28 07:45:21+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 80384
InitializedDataSize: 43008
UninitializedDataSize: -
EntryPoint: 0x126c1
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 20.9.28.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
CompanyName: Shenzhen iMyFone Technology Co., Ltd.
FileDescription: guardService
FileVersion: 20.9.28.1
InternalName: GuardSer.exe
LegalCopyright: Copyright (C) 2020
OriginalFileName: GuardSer.exe
ProductName: MvHost
ProductVersion: 1.0.0.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
5
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start guardser.exe conhost.exe no specs winword.exe ai.exe no specs guardser.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4164"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "255CDA8B-2598-4F7F-B923-3CACC1E86B8B" "4B65C956-61A6-4892-944E-A17C2D0DBED4" "6360"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Exit code:
0
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\rpcrt4.dll
6360"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\precoast.rtf" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6492"C:\Users\admin\AppData\Local\Temp\GuardSer.exe" C:\Users\admin\AppData\Local\Temp\GuardSer.exeexplorer.exe
User:
admin
Company:
Shenzhen iMyFone Technology Co., Ltd.
Integrity Level:
MEDIUM
Description:
guardService
Exit code:
3221226540
Version:
20.9.28.1
Modules
Images
c:\users\admin\appdata\local\temp\guardser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6656"C:\Users\admin\AppData\Local\Temp\GuardSer.exe" C:\Users\admin\AppData\Local\Temp\GuardSer.exe
explorer.exe
User:
admin
Company:
Shenzhen iMyFone Technology Co., Ltd.
Integrity Level:
HIGH
Description:
guardService
Exit code:
0
Version:
20.9.28.1
Modules
Images
c:\users\admin\appdata\local\temp\guardser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
6672\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeGuardSer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
13 937
Read events
13 564
Write events
344
Delete events
29

Modification events

(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:0
Value:
017012000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\WINWORD\6360
Operation:writeName:0
Value:
0B0E1084E1A2C8A10EF5459920F0CB67A4F095230046E6DADE90C2AAE1ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511D831D2120B770069006E0077006F00720064002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(6360) WINWORD.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
33
Suspicious files
128
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
6360WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187binary
MD5:DB7C32390D484EF304C162134D4DD036
SHA256:F874D624EFEDFCF36AA74062D3A3E6C59E509948B2B67F977673C2C61CB207C6
6656GuardSer.exeC:\Users\admin\AppData\Local\Temp\Log\SvcInner.logtext
MD5:B962C3E66387B5D2A6D61BBA7A06360D
SHA256:6B3067A32BD4C3AC3E3B4B2F37B441575342AB6B5108F86899F02CD8A6E52F33
6360WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:44C7BC7C36BD7EC124470E7B28A35393
SHA256:A82989F15E3D16E1C6468CA929C8CCFEDE6B644A5F44FEA8E2B7B69C14211446
6360WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:3A95973D1A486F6B22C35AD4340E6129
SHA256:B535427E528A1A23F30E4A8ABC1E892FBC310F434A93A79A6DF3EF85AC36E838
6360WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187binary
MD5:A1B7D602A89B7C7C30DC2B2BA1519CDA
SHA256:2F25B037104E0E262848A1E78985B39327FDC13C6CF055633218AD13AB55C49C
6360WINWORD.EXEC:\Users\admin\Desktop\~$ecoast.rtfbinary
MD5:2D4CAB40B2252643A7E6C71FD7CAE4ED
SHA256:BD0A5DD7F5901621A3B0F0962A6FD892BFD95C66871A3DFC1027FB399A285C9E
6360WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\56a61aeb75d8f5be186c26607f4bb213abe7c5ec.tbresbinary
MD5:055A48DAC7DCF321CA4E046ED2E2330C
SHA256:C6B3FA5398C81F84EBB8BD78CFBB1C6DE3733E02CEFCEFBD9B578A0090C1DAB7
6360WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
6360WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:0605D602E1DA5CFFC185EC107CC7A972
SHA256:204853E186BE324B4A920D21EA9844883C27898F394585542D788F48AE22EB72
6360WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:B77F68E85DD6D4A28F9A0588EABBAB97
SHA256:6889499CF6D1713D00DFF77B7FE89EC272376F40F88A75A2275E6756715ACEDC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
72
DNS requests
28
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.151:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6360
WINWORD.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6360
WINWORD.EXE
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
236
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
236
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6360
WINWORD.EXE
GET
200
23.48.23.190:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
whitelisted
6360
WINWORD.EXE
GET
200
23.48.23.190:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
184.86.251.24:443
www.bing.com
Akamai International B.V.
DE
whitelisted
23.48.23.151:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2040
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
www.bing.com
  • 184.86.251.24
  • 184.86.251.27
  • 184.86.251.20
  • 184.86.251.17
  • 184.86.251.4
  • 184.86.251.13
  • 184.86.251.14
  • 184.86.251.19
  • 184.86.251.21
whitelisted
crl.microsoft.com
  • 23.48.23.151
  • 23.48.23.145
  • 23.48.23.148
  • 23.48.23.160
  • 23.48.23.157
  • 23.48.23.158
  • 23.48.23.161
  • 23.48.23.156
  • 23.48.23.153
  • 23.48.23.190
  • 23.48.23.139
  • 23.48.23.143
  • 23.48.23.185
  • 23.48.23.192
  • 23.48.23.140
  • 23.48.23.137
  • 23.48.23.193
  • 23.48.23.138
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
google.com
  • 142.250.185.78
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.75
  • 40.126.31.130
  • 20.190.159.128
  • 40.126.31.131
  • 40.126.31.1
  • 20.190.159.68
  • 40.126.31.69
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
officeclient.microsoft.com
  • 52.109.89.18
whitelisted
ecs.office.com
  • 52.123.129.14
  • 52.123.128.14
whitelisted

Threats

No threats detected
Process
Message
GuardSer.exe
[6656.6660.GuardSer.exe.GuardSer] [SVC] -----SVC init(pid = 6656,name = Assistant App GuardService)-------------
GuardSer.exe
[6656.6660.GuardSer.exe.GuardSer] [SVC] ERR:StartServiceCtrlDispatcher fail! 0x427
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.