File name:

GUI Booter 2.exe

Full analysis: https://app.any.run/tasks/3e853b1c-4d63-4797-bf68-50e99ef8c23f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 09, 2025, 22:33:12
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
confuser
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 5 sections
MD5:

6D7EDB25EA433676569A65FC0C4F18BF

SHA1:

B8BB2059B3495635F7B80D083CBEA4B54FF09B79

SHA256:

8E1D7277611475FAC85E17ED954CC608C53EBFD0265A23CE41502D0E39187DA0

SSDEEP:

49152:hkDTbPVhO6TKo2D5nt/Ke8UbrG9wwy6xOQGWDTaLy0CToCHksB6iTxWElDZhBx0C:crVh7TKo2D5nt/Ke8UbrG9wwy6xOQGWG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Internet Explorer settings

      • GUI Booter 2.exe (PID: 7428)
    • Reads security settings of Internet Explorer

      • GUI Booter 2.exe (PID: 7428)
    • Reads Microsoft Outlook installation path

      • GUI Booter 2.exe (PID: 7428)
    • Process requests binary or script from the Internet

      • GUI Booter 2.exe (PID: 7428)
    • Reads the date of Windows installation

      • GUI Booter 2.exe (PID: 7428)
    • Starts CMD.EXE for commands execution

      • GUI Booter 2.exe (PID: 7428)
  • INFO

    • Reads the machine GUID from the registry

      • GUI Booter 2.exe (PID: 7428)
    • Checks supported languages

      • GUI Booter 2.exe (PID: 7428)
    • Reads the computer name

      • GUI Booter 2.exe (PID: 7428)
    • Confuser has been detected (YARA)

      • GUI Booter 2.exe (PID: 7428)
    • Checks proxy server information

      • GUI Booter 2.exe (PID: 7428)
    • Disables trace logs

      • GUI Booter 2.exe (PID: 7428)
    • Reads Environment values

      • GUI Booter 2.exe (PID: 7428)
    • Reads the software policy settings

      • GUI Booter 2.exe (PID: 7428)
    • Creates files or folders in the user directory

      • GUI Booter 2.exe (PID: 7428)
    • Process checks computer location settings

      • GUI Booter 2.exe (PID: 7428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (38.3)
.exe | Win32 Executable (generic) (26.2)
.exe | Win16/32 Executable Delphi generic (12)
.exe | Generic Win/DOS Executable (11.6)
.exe | DOS Executable Generic (11.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:06:17 19:58:16+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 40448
InitializedDataSize: 1193984
UninitializedDataSize: -
EntryPoint: 0x13400a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.4.0.0
ProductVersionNumber: 1.4.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: RPX 1.3.4400.61
CompanyName: XTremeHacker
FileDescription: GUI Booter 2
FileVersion: 1.4.0.0
InternalName: GUIBooter2.exe
LegalCopyright: Copyright © 2015
OriginalFileName: GUIBooter2.exe
ProductName: GUI Booter 2
ProductVersion: 1.4.0.0
AssemblyVersion: 1.4.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start gui booter 2.exe sppextcomobj.exe no specs slui.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2284"C:\Windows\System32\cmd.exe" /C ping -t 000.000.000.000C:\Windows\System32\cmd.exeGUI Booter 2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4776\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6584ping -t 000.000.000.000C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
7428"C:\Users\admin\AppData\Local\Temp\GUI Booter 2.exe" C:\Users\admin\AppData\Local\Temp\GUI Booter 2.exe
explorer.exe
User:
admin
Company:
XTremeHacker
Integrity Level:
MEDIUM
Description:
GUI Booter 2
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\gui booter 2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7532C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7564"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 665
Read events
2 648
Write events
17
Delete events
0

Modification events

(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
0
Suspicious files
15
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\cookieconsent.min[1].csstext
MD5:1F24997C332709912DFEADB7F99BAEA4
SHA256:135606845CE38F1456E06FB6090CB4EBD1BF45387D164991DE1F2969F99C6593
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\jquery-3.6.0.min[1].jsbinary
MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
SHA256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:4A90329071AE30B759D279CCA342B0A6
SHA256:4F544379EDA8E2653F71472AB968AEFD6B5D1F4B3CE28A5EDB14196184ED3B60
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\stats2[1].jsbinary
MD5:7390137A6BA9FD62E8D995B3F650EFD3
SHA256:086CA50D53E18AFE3E979420B1F597F70B7B1DE14620D4DF5373B243BD743C33
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_5E65FCDD03110BA05402E762877D780Ebinary
MD5:FCEFA69643E990519BB45151563B34D5
SHA256:D4376D9C9AB7D509EC02CFC829DC4A2D7D5AF7FF153191F1E8C719FBA8506CA4
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\1029205[1].htmbinary
MD5:BDBB9CEA880654D3F7CE196F35761A71
SHA256:DDB5FCBD16FAE2FCA6A69D1E03DE1B913B54619B480FA38950EABB7E06A36F2E
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\pg.supercounters[1].jsbinary
MD5:D276E91D93A435192AFB6F310A4E2CF4
SHA256:ECA448A46CD0FA0AD8740FAA5131437856CFF9E3DB1CBF3769A2BA10910236AD
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A42127F349D54E7AA939366FF86F74E_7C376D33E2C5CD20166ABC5E9FF45DC1binary
MD5:A08B6D92E9600F7164BD658D1EEFF660
SHA256:672EB27779398528C486588EE495C1B20582556BFA1771731026CA6EC6D0C9D5
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:C58D8545A50D95AB71178C2E5D964FB5
SHA256:D0B3A2C7B763D78F4E3486CC809C8B33C26A1333067C1481B01CBFFF0B088F02
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:1FBB37F79B317A9A248E7C4CE4F5BAC5
SHA256:9BF639C595FE335B6F694EE35990BEFD2123F5E07FD1973FF619E3FC88F5F49F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
28
DNS requests
23
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7428
GUI Booter 2.exe
GET
200
104.21.80.1:80
http://www.supercounters.com/css/cookieconsent.min.css
unknown
unknown
7428
GUI Booter 2.exe
GET
200
104.21.80.1:80
http://www.supercounters.com/js/cookieconsent.min.js
unknown
unknown
7216
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7428
GUI Booter 2.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
7428
GUI Booter 2.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
7428
GUI Booter 2.exe
GET
200
142.250.185.67:80
http://o.pki.goog/we2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEA5sXoYl5VpVCVfRvCVK8Mg%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.139:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7428
GUI Booter 2.exe
104.21.80.1:80
www.supercounters.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 23.48.23.139
  • 23.48.23.193
  • 23.48.23.150
  • 23.48.23.190
  • 23.48.23.156
  • 23.48.23.158
  • 23.48.23.138
  • 23.48.23.194
  • 23.48.23.147
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.131
  • 20.190.159.68
  • 20.190.159.0
  • 20.190.159.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
swaggy-freddy.in
unknown
gui-booter.net
unknown
www.supercounters.com
  • 104.21.80.1
  • 104.21.64.1
  • 104.21.16.1
  • 104.21.112.1
  • 104.21.48.1
  • 104.21.96.1
  • 104.21.32.1
unknown
cdn.jsdelivr.net
  • 151.101.193.229
  • 151.101.65.229
  • 151.101.1.229
  • 151.101.129.229
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
No debug info