File name:

GUI Booter 2.exe

Full analysis: https://app.any.run/tasks/3e853b1c-4d63-4797-bf68-50e99ef8c23f
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 09, 2025, 22:33:12
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
confuser
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 5 sections
MD5:

6D7EDB25EA433676569A65FC0C4F18BF

SHA1:

B8BB2059B3495635F7B80D083CBEA4B54FF09B79

SHA256:

8E1D7277611475FAC85E17ED954CC608C53EBFD0265A23CE41502D0E39187DA0

SSDEEP:

49152:hkDTbPVhO6TKo2D5nt/Ke8UbrG9wwy6xOQGWDTaLy0CToCHksB6iTxWElDZhBx0C:crVh7TKo2D5nt/Ke8UbrG9wwy6xOQGWG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • GUI Booter 2.exe (PID: 7428)
    • Reads Microsoft Outlook installation path

      • GUI Booter 2.exe (PID: 7428)
    • Reads Internet Explorer settings

      • GUI Booter 2.exe (PID: 7428)
    • Process requests binary or script from the Internet

      • GUI Booter 2.exe (PID: 7428)
    • Reads the date of Windows installation

      • GUI Booter 2.exe (PID: 7428)
    • Starts CMD.EXE for commands execution

      • GUI Booter 2.exe (PID: 7428)
  • INFO

    • Checks supported languages

      • GUI Booter 2.exe (PID: 7428)
    • Reads the machine GUID from the registry

      • GUI Booter 2.exe (PID: 7428)
    • Reads the computer name

      • GUI Booter 2.exe (PID: 7428)
    • Checks proxy server information

      • GUI Booter 2.exe (PID: 7428)
    • Reads Environment values

      • GUI Booter 2.exe (PID: 7428)
    • Confuser has been detected (YARA)

      • GUI Booter 2.exe (PID: 7428)
    • Disables trace logs

      • GUI Booter 2.exe (PID: 7428)
    • Creates files or folders in the user directory

      • GUI Booter 2.exe (PID: 7428)
    • Reads the software policy settings

      • GUI Booter 2.exe (PID: 7428)
    • Process checks computer location settings

      • GUI Booter 2.exe (PID: 7428)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (38.3)
.exe | Win32 Executable (generic) (26.2)
.exe | Win16/32 Executable Delphi generic (12)
.exe | Generic Win/DOS Executable (11.6)
.exe | DOS Executable Generic (11.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:06:17 19:58:16+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 40448
InitializedDataSize: 1193984
UninitializedDataSize: -
EntryPoint: 0x13400a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.4.0.0
ProductVersionNumber: 1.4.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: RPX 1.3.4400.61
CompanyName: XTremeHacker
FileDescription: GUI Booter 2
FileVersion: 1.4.0.0
InternalName: GUIBooter2.exe
LegalCopyright: Copyright © 2015
OriginalFileName: GUIBooter2.exe
ProductName: GUI Booter 2
ProductVersion: 1.4.0.0
AssemblyVersion: 1.4.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start gui booter 2.exe sppextcomobj.exe no specs slui.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2284"C:\Windows\System32\cmd.exe" /C ping -t 000.000.000.000C:\Windows\System32\cmd.exeGUI Booter 2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
4776\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6584ping -t 000.000.000.000C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
7428"C:\Users\admin\AppData\Local\Temp\GUI Booter 2.exe" C:\Users\admin\AppData\Local\Temp\GUI Booter 2.exe
explorer.exe
User:
admin
Company:
XTremeHacker
Integrity Level:
MEDIUM
Description:
GUI Booter 2
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\gui booter 2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7532C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7564"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 665
Read events
2 648
Write events
17
Delete events
0

Modification events

(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7428) GUI Booter 2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\GUI Booter 2_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
0
Suspicious files
15
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\1029205[1].htmbinary
MD5:BDBB9CEA880654D3F7CE196F35761A71
SHA256:DDB5FCBD16FAE2FCA6A69D1E03DE1B913B54619B480FA38950EABB7E06A36F2E
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\bootstrap.bundle.min[1].jsbinary
MD5:90146F01D8A2028ED6F2C3D2FBA4AC9B
SHA256:7E02C082FEDFC821A8A51FE004DAB6896DD928876A21CCAC8675142C2E2F7B1F
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\jquery-3.6.0.min[1].jsbinary
MD5:8FB8FEE4FCC3CC86FF6C724154C49C42
SHA256:FF1523FB7389539C84C65ABA19260648793BB4F5E29329D2EE8804BC37A3FE6E
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:4A90329071AE30B759D279CCA342B0A6
SHA256:4F544379EDA8E2653F71472AB968AEFD6B5D1F4B3CE28A5EDB14196184ED3B60
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\bootstrap.min[1].csstext
MD5:D44328CEE87C2B405213893BA35EAF78
SHA256:0C5ED985FDBDDC027124D4E6879CE1A1860832CDA85E2B517C18D8FBD2FFFC06
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:5DC1923EDFE5BE3ACE3DBEEEDD7DA898
SHA256:FE2C7C4987EFAAA3EC71AEDA3F335B6E25FC0478FB5273A8F11F11A1FB314C54
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A42127F349D54E7AA939366FF86F74E_7C376D33E2C5CD20166ABC5E9FF45DC1binary
MD5:A08B6D92E9600F7164BD658D1EEFF660
SHA256:672EB27779398528C486588EE495C1B20582556BFA1771731026CA6EC6D0C9D5
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2A42127F349D54E7AA939366FF86F74E_7C376D33E2C5CD20166ABC5E9FF45DC1binary
MD5:2137B26411383BB946E22CCAFDE2EBCA
SHA256:2C7FC824255D5BB38A35955DFBABE0735C8884BD7204D771F83D62E9E004441A
7428GUI Booter 2.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_5E65FCDD03110BA05402E762877D780Ebinary
MD5:FCEFA69643E990519BB45151563B34D5
SHA256:D4376D9C9AB7D509EC02CFC829DC4A2D7D5AF7FF153191F1E8C719FBA8506CA4
7428GUI Booter 2.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\stats2[1].jsbinary
MD5:7390137A6BA9FD62E8D995B3F650EFD3
SHA256:086CA50D53E18AFE3E979420B1F597F70B7B1DE14620D4DF5373B243BD743C33
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
28
DNS requests
23
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.48.23.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7428
GUI Booter 2.exe
GET
200
104.21.80.1:80
http://www.supercounters.com/online/1029205
unknown
unknown
7428
GUI Booter 2.exe
GET
200
104.21.80.1:80
http://www.supercounters.com/js/jquery-3.6.0.min.js
unknown
unknown
7428
GUI Booter 2.exe
GET
200
104.21.80.1:80
http://www.supercounters.com/js/stats2.js
unknown
unknown
7428
GUI Booter 2.exe
GET
200
13.35.58.67:80
http://c.pubguru.net/pg.supercounters.js
unknown
unknown
7428
GUI Booter 2.exe
GET
200
151.101.194.133:80
http://ocsp2.globalsign.com/rootr3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEQCA5WrF4j1Lr8MOJXyXArf%2F
unknown
whitelisted
7428
GUI Booter 2.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.139:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7428
GUI Booter 2.exe
104.21.80.1:80
www.supercounters.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 23.48.23.139
  • 23.48.23.193
  • 23.48.23.150
  • 23.48.23.190
  • 23.48.23.156
  • 23.48.23.158
  • 23.48.23.138
  • 23.48.23.194
  • 23.48.23.147
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.131
  • 20.190.159.68
  • 20.190.159.0
  • 20.190.159.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
swaggy-freddy.in
unknown
gui-booter.net
unknown
www.supercounters.com
  • 104.21.80.1
  • 104.21.64.1
  • 104.21.16.1
  • 104.21.112.1
  • 104.21.48.1
  • 104.21.96.1
  • 104.21.32.1
unknown
cdn.jsdelivr.net
  • 151.101.193.229
  • 151.101.65.229
  • 151.101.1.229
  • 151.101.129.229
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
No debug info