Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3GDLauncher...64.exe
windows7-x64
4GDLauncher...64.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
7GDLauncher.exe
windows7-x64
1GDLauncher.exe
windows10-2004-x64
7LICENSE.electron.txt
windows7-x64
1LICENSE.electron.txt
windows10-2004-x64
1chrome_100...nt.pak
windows7-x64
3chrome_100...nt.pak
windows10-2004-x64
3chrome_200...nt.pak
windows7-x64
3chrome_200...nt.pak
windows10-2004-x64
3d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1icudtl.dat
windows7-x64
3icudtl.dat
windows10-2004-x64
3libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1owutility.dll
windows7-x64
1owutility.dll
windows10-2004-x64
1resources/...li.exe
windows7-x64
1Analysis
-
max time kernel
122s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23/04/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
GDLauncher__2.0.6__win__x64.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
GDLauncher__2.0.6__win__x64.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
GDLauncher.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
GDLauncher.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
LICENSE.electron.txt
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
LICENSE.electron.txt
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
chrome_100_percent.pak
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
chrome_100_percent.pak
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
chrome_200_percent.pak
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
chrome_200_percent.pak
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral22
Sample
ffmpeg.dll
Resource
win7-20240215-en
Behavioral task
behavioral23
Sample
ffmpeg.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral24
Sample
icudtl.dat
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
icudtl.dat
Resource
win10v2004-20240412-en
Behavioral task
behavioral26
Sample
libEGL.dll
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
libEGL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral28
Sample
libGLESv2.dll
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
libGLESv2.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral30
Sample
owutility.dll
Resource
win7-20231129-en
Behavioral task
behavioral31
Sample
owutility.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/@sentry/cli-win32-x64/bin/sentry-cli.exe
Resource
win7-20240221-en
General
-
Target
GDLauncher.exe
-
Size
169.9MB
-
MD5
1e78a22ba51219a321c0ffe245871915
-
SHA1
d27ab1645110f5c9b29bf0d93775f414af9d8e90
-
SHA256
a9c23f5fd00df04dd51c57aa0fe46cc2af8c9e523dc3183018dad093f03ab1d1
-
SHA512
c4175a0f48042f285525c4f674003febaf385fd4ab63546502a467173a2f9bd3f66b0a233d84b685ae7dff5ccd0d986ffce5743519fb9f30db2b9a579ec6292d
-
SSDEEP
1572864:js+fxQiW1vVzbHpUcEtmLd7cF3PPHNzLuTe7ulsxM/Gyr/w7VoB4X+x2CFRXQQS5:2e8BWNg3DFxfq
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1500 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: core_module.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation GDLauncher.exe -
Loads dropped DLL 1 IoCs
pid Process 5300 GDLauncher.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString GDLauncher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 GDLauncher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GDLauncher.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\gdlauncher GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\gdlauncher\URL Protocol GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\gdlauncher\ = "URL:gdlauncher" GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\gdlauncher\shell\open\command GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\gdlauncher\shell GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\gdlauncher\shell\open GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000_Classes\gdlauncher\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GDLauncher.exe\" \"%1\"" GDLauncher.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1736 powershell.exe 1736 powershell.exe 724 powershell.exe 724 powershell.exe 724 powershell.exe 1624 core_module.exe 1624 core_module.exe 1736 powershell.exe 1624 core_module.exe 1624 core_module.exe 1624 core_module.exe 5300 GDLauncher.exe 5300 GDLauncher.exe 5300 GDLauncher.exe 5300 GDLauncher.exe 5868 GDLauncher.exe 5868 GDLauncher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 724 powershell.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeIncreaseQuotaPrivilege 724 powershell.exe Token: SeSecurityPrivilege 724 powershell.exe Token: SeTakeOwnershipPrivilege 724 powershell.exe Token: SeLoadDriverPrivilege 724 powershell.exe Token: SeSystemProfilePrivilege 724 powershell.exe Token: SeSystemtimePrivilege 724 powershell.exe Token: SeProfSingleProcessPrivilege 724 powershell.exe Token: SeIncBasePriorityPrivilege 724 powershell.exe Token: SeCreatePagefilePrivilege 724 powershell.exe Token: SeBackupPrivilege 724 powershell.exe Token: SeRestorePrivilege 724 powershell.exe Token: SeShutdownPrivilege 724 powershell.exe Token: SeDebugPrivilege 724 powershell.exe Token: SeSystemEnvironmentPrivilege 724 powershell.exe Token: SeRemoteShutdownPrivilege 724 powershell.exe Token: SeUndockPrivilege 724 powershell.exe Token: SeManageVolumePrivilege 724 powershell.exe Token: 33 724 powershell.exe Token: 34 724 powershell.exe Token: 35 724 powershell.exe Token: 36 724 powershell.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe Token: SeCreatePagefilePrivilege 3724 GDLauncher.exe Token: SeShutdownPrivilege 3724 GDLauncher.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3724 GDLauncher.exe 3724 GDLauncher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 5808 3724 GDLauncher.exe 94 PID 3724 wrote to memory of 5808 3724 GDLauncher.exe 94 PID 5808 wrote to memory of 4048 5808 cmd.exe 96 PID 5808 wrote to memory of 4048 5808 cmd.exe 96 PID 3724 wrote to memory of 2196 3724 GDLauncher.exe 97 PID 3724 wrote to memory of 2196 3724 GDLauncher.exe 97 PID 3724 wrote to memory of 1624 3724 GDLauncher.exe 98 PID 3724 wrote to memory of 1624 3724 GDLauncher.exe 98 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5336 3724 GDLauncher.exe 101 PID 3724 wrote to memory of 5336 3724 GDLauncher.exe 101 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 5384 3724 GDLauncher.exe 100 PID 3724 wrote to memory of 3500 3724 GDLauncher.exe 102 PID 3724 wrote to memory of 3500 3724 GDLauncher.exe 102 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103 PID 3724 wrote to memory of 5412 3724 GDLauncher.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"2⤵
- Suspicious use of WriteProcessMemory
PID:5808 -
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid3⤵PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exeC:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Crashpad --url=https://f.a.k/e --annotation=_productName=GDLauncher --annotation=_version=2.0.6 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=28.2.5 --initial-client-data=0x524,0x528,0x52c,0x518,0x530,0x7ff71e81f648,0x7ff71e81f654,0x7ff71e81f6602⤵PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exeC:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exe --runtime_path C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\data2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:1592
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M4⤵
- Modifies file permissions
PID:1500
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:6004
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77343\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_77343\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:2596
-
-
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:4532
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:3476
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1844 --field-trial-handle=1848,i,13943583732712912370,4086354150899960712,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:22⤵PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exeC:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=cs --cs-app=GDLauncher2⤵PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --mojo-platform-channel-handle=2308 --field-trial-handle=1848,i,13943583732712912370,4086354150899960712,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2616 --field-trial-handle=1848,i,13943583732712912370,4086354150899960712,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --skip-intro-animation=false /prefetch:12⤵
- Checks computer location settings
PID:5412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3580 --field-trial-handle=1848,i,13943583732712912370,4086354150899960712,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:12⤵
- Checks computer location settings
PID:720
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --node-integration-in-worker --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2940 --field-trial-handle=1848,i,13943583732712912370,4086354150899960712,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --uid=dibeihhdinofpmiennjkclnoidpjakanhclfmpmo --package-folder="C:\Users\Admin\AppData\Roaming\ow-electron" --app-root="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --muid=f5f58736-7798-afd4-93a1-afdb16c2bc11 --phase=46 --owepm-config="{\"phasing\":100}" --js-flags=--expose-gc /prefetch:12⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5300
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2300 --field-trial-handle=1848,i,13943583732712912370,4086354150899960712,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD585e451c8c0d79908be704fce72dcd979
SHA1705c8ae4fc069ecec48c5598132cd4ed12421d44
SHA256db93527dddbf730097243826a058430e53f2d8cda25d1fc0b35f1aca288363d5
SHA512497a47ea6ac8f1b859846efa5bfa47a528663b74f269e3b2192cb8400a5fcf3caf9d4a22bc83e061026a57fd5956236589822035378f6843fcf4a53e228d4d8b
-
Filesize
50B
MD5a0c9c4cb63e4ec7eac03e5278911ae88
SHA16b109e5bbb0813d39450995ebdaa059e9f9272e5
SHA256d2bfc5930c93f1fe28456de1b742ca18152db69737a296320b08e6554e0713eb
SHA512d8af8efeb86a1b4a31ba52d25e05fd7a89c004e32f2b25371def3e01e41818a5a3aac1652bdae5e4402fbc7b8e84b6749d8d34501c78d091f8af0a9dba3f4789
-
Filesize
3KB
MD506d16fea6ab505097d16fcaa32949d47
SHA10c1c719831fa41cd102d0d72d61c0f46ec5b8de8
SHA25654e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723
SHA51203c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a
-
Filesize
2KB
MD52f87410b0d834a14ceff69e18946d066
SHA1f2ec80550202d493db61806693439a57b76634f3
SHA2565422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65
SHA512a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4
-
Filesize
1013B
MD58098d31488cd52db41f95188b9daed5e
SHA176988b607c667c86211fe1dfe57ed4aedacc5691
SHA256c607f5871610bf9240c75f4abe947469496570b380f670e9d8d09f9c785978b5
SHA512e2b4c54e78daba4a04d17915eded43a3f59a744108cf28baf4c22545d807338a39de052d69243ce610981b930e49790ba8be0f7b370e042a9526ef09e2b9fb78
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
624B
MD50907ac58f209ba2c8ae7b87a984e2886
SHA10ad619c929d663cb52d454fb697aa4a177fddcf5
SHA2560f729de2193fd27af52cccbae1c26b8937ff72230434a1fb269d797bd27642b5
SHA5128ebaac835911ea2f93b8d22eb08bfeab53ecea858a00371eb084ef5cdc4d3973ca9c836834cfc28fab36cce4ee8730c8011485a2947853e82ad863e75b8c4c58
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Network\Network Persistent State
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Network\Network Persistent State
Filesize761B
MD5e382e8c6631b9b0ca8361af4385a4a8f
SHA1fdc22f301e264f7f13b4e002f6d328fef6402a4a
SHA256b11deccbbaf05656ad591d6959a4f169ba5561f073f522cccb585a4914b4e67b
SHA51208cf3c3a2fcec15e8cefeb65ca383b7df05283632869869e60e477954f5b953e4c92b90ce4de6ff97f9de5c105ac7c86731d59b1b8dbef4e57149f8e7affb228
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
6KB
MD5b6f046c5ebe02cfa2de2559b5fecb802
SHA1f9b5b6192f532f65eb9724be335fb92aed90d19f
SHA2562c37e17c47bd83a674154f406f58684d510f0be47b7af15dba3a121b397fad9b
SHA5129f8cb467b33bf75ab9e9670cc0e56567f376fe56194c9f9d1f50c0715a2952b852651b32764a333b17adb37d0a1a36a552be0118c2d17c005a8d25c38b2b8fd5
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\logs\utility\utility.log
Filesize548B
MD55fe7f91626fbea7ffddd189b931ac204
SHA156a039919f8072384d9406cafcc6e8e28e155751
SHA25688f9751196ea9950dc21e59b34815f802832aee3163bdefbdfc6e70df2166535
SHA51211dec64f490c35ff6cb073754c243a98ed34d23145b741c2fa3595c859315bf0a5f77e78c8a6ec5510ff3ddea47e413b1b53104d63d55c4e7c69d72cb0f18010
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon.owepk
Filesize689KB
MD51aa9b2344cbf42ff93609215c5504429
SHA12b1ee6074ee2993b6edccb6a78e5ed9a38aef662
SHA25603f48386dd35ae74e5b1208dfc423d79f91f364b3c56e3f7fa6eb1c1da23f6f7
SHA5123a2a12595be77db890163f387fc0f3f379c8bce3a00515fcc9426d747788dc2251233357760738745058323ae6b82a2c1869171e8db6c7259ca71560e34df468
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon\1.0.14\ow-electron-utility-plugin.node
Filesize607KB
MD51655baa81ad104125f7b67cfe727fd75
SHA100c56f079a9d5df4e8d26c94337382a02d971870
SHA2564afac59e7b1e7339117ca9cff131f6c9408f739406d18343b9694e31654af589
SHA512c29831964711df2f03645804266323ca9c06c03dadbaf0864d6c6f5b6d3661d8ad1f5d2d528e7c7808faf450a7c1fde3ed65020360fa365fda6ec83866f76d30