Overview
overview
7Static
static
3GDLauncher...64.exe
windows7-x64
4GDLauncher...64.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3GDLauncher.exe
windows7-x64
1GDLauncher.exe
windows10-2004-x64
7LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1owutility.dll
windows7-x64
1owutility.dll
windows10-2004-x64
1resources/...li.exe
windows7-x64
1resources/...li.exe
windows10-2004-x64
1resources/...le.exe
windows7-x64
1resources/...le.exe
windows10-2004-x64
5resources/elevate.exe
windows7-x64
1resources/elevate.exe
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
GDLauncher__2.0.8__win__x64.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
GDLauncher__2.0.8__win__x64.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
GDLauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
GDLauncher.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240220-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240220-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
owutility.dll
Resource
win7-20231129-en
Behavioral task
behavioral23
Sample
owutility.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral24
Sample
resources/app.asar.unpacked/node_modules/@sentry/cli-win32-x64/bin/sentry-cli.exe
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
resources/app.asar.unpacked/node_modules/@sentry/cli-win32-x64/bin/sentry-cli.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
resources/binaries/core_module.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
resources/binaries/core_module.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral28
Sample
resources/elevate.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
resources/elevate.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral30
Sample
vk_swiftshader.dll
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
vk_swiftshader.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral32
Sample
vulkan-1.dll
Resource
win7-20240220-en
General
-
Target
GDLauncher.exe
-
Size
169.9MB
-
MD5
52b6403f53e1ada74df7084129952d0d
-
SHA1
ea11febd4cbb09544b088aec2c6ffa2b42f83959
-
SHA256
a8735f79159bdfed49768d007be08f60a8e4b2c28327c384e2e0f80ce5b6e7cf
-
SHA512
197253a33c7a72b1adac0becf6e3bb5e5385f2ee96aab01d377d7ad0ea96c09a69436e38e57e2196be4f348e63be873ba0c90194f0ced3263c730bf5880bfaa2
-
SSDEEP
1572864:bs+fxQiW1vVzbHpUcEtmLd7cF3PPHNzLuTe7ulsxM/Gyr/w7VoB4X+x2CFRXQQS+:ee8BWNg3DFxf1
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 4428 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: core_module.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GDLauncher.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF GDLauncher.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF GDLauncher.exe -
Loads dropped DLL 1 IoCs
pid Process 1912 GDLauncher.exe -
pid Process 408 powershell.exe 1732 powershell.exe 228 powershell.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GDLauncher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString GDLauncher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 GDLauncher.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\gdlauncher\shell\open\command GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\gdlauncher\shell GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\gdlauncher\shell\open GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\gdlauncher\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GDLauncher.exe\" \"%1\"" GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\gdlauncher GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\gdlauncher\URL Protocol GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\gdlauncher\ = "URL:gdlauncher" GDLauncher.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1732 powershell.exe 1732 powershell.exe 408 powershell.exe 408 powershell.exe 1732 powershell.exe 408 powershell.exe 4032 core_module.exe 4032 core_module.exe 4032 core_module.exe 4032 core_module.exe 4032 core_module.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 1912 GDLauncher.exe 228 powershell.exe 228 powershell.exe 228 powershell.exe 5008 GDLauncher.exe 5008 GDLauncher.exe 5008 GDLauncher.exe 5008 GDLauncher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1732 powershell.exe Token: SeDebugPrivilege 408 powershell.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeIncreaseQuotaPrivilege 408 powershell.exe Token: SeSecurityPrivilege 408 powershell.exe Token: SeTakeOwnershipPrivilege 408 powershell.exe Token: SeLoadDriverPrivilege 408 powershell.exe Token: SeSystemProfilePrivilege 408 powershell.exe Token: SeSystemtimePrivilege 408 powershell.exe Token: SeProfSingleProcessPrivilege 408 powershell.exe Token: SeIncBasePriorityPrivilege 408 powershell.exe Token: SeCreatePagefilePrivilege 408 powershell.exe Token: SeBackupPrivilege 408 powershell.exe Token: SeRestorePrivilege 408 powershell.exe Token: SeShutdownPrivilege 408 powershell.exe Token: SeDebugPrivilege 408 powershell.exe Token: SeSystemEnvironmentPrivilege 408 powershell.exe Token: SeRemoteShutdownPrivilege 408 powershell.exe Token: SeUndockPrivilege 408 powershell.exe Token: SeManageVolumePrivilege 408 powershell.exe Token: 33 408 powershell.exe Token: 34 408 powershell.exe Token: 35 408 powershell.exe Token: 36 408 powershell.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe Token: SeDebugPrivilege 228 powershell.exe Token: SeShutdownPrivilege 3380 GDLauncher.exe Token: SeCreatePagefilePrivilege 3380 GDLauncher.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3380 GDLauncher.exe 3380 GDLauncher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3576 3380 GDLauncher.exe 92 PID 3380 wrote to memory of 3576 3380 GDLauncher.exe 92 PID 3576 wrote to memory of 4852 3576 cmd.exe 94 PID 3576 wrote to memory of 4852 3576 cmd.exe 94 PID 3380 wrote to memory of 3844 3380 GDLauncher.exe 95 PID 3380 wrote to memory of 3844 3380 GDLauncher.exe 95 PID 3380 wrote to memory of 4032 3380 GDLauncher.exe 96 PID 3380 wrote to memory of 4032 3380 GDLauncher.exe 96 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 2644 3380 GDLauncher.exe 98 PID 3380 wrote to memory of 4016 3380 GDLauncher.exe 99 PID 3380 wrote to memory of 4016 3380 GDLauncher.exe 99 PID 3380 wrote to memory of 4856 3380 GDLauncher.exe 100 PID 3380 wrote to memory of 4856 3380 GDLauncher.exe 100 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101 PID 3380 wrote to memory of 3956 3380 GDLauncher.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"2⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid3⤵PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exeC:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Crashpad --url=https://f.a.k/e --annotation=_productName=GDLauncher --annotation=_version=2.0.8 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=28.2.5 --initial-client-data=0x510,0x514,0x518,0x504,0x51c,0x7ff70a0bf648,0x7ff70a0bf654,0x7ff70a0bf6602⤵PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exeC:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exe --runtime_path C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\data2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:4032 -
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:4576
-
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M4⤵
- Modifies file permissions
PID:4428
-
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:4520
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_99062\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_99062\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:5028
-
-
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:1736
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1860 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:22⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --mojo-platform-channel-handle=2168 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exeC:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=cs --cs-app=GDLauncher2⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2616 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --skip-intro-animation=false /prefetch:12⤵
- Checks computer location settings
PID:3956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3560 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:12⤵
- Checks computer location settings
PID:4156
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --node-integration-in-worker --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --uid=dibeihhdinofpmiennjkclnoidpjakanhclfmpmo --package-folder="C:\Users\Admin\AppData\Roaming\ow-electron" --app-root="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --muid=45e35359-e062-d120-8dad-71ce818bbd6c --phase=28 --owepm-config="{\"phasing\":100}" --js-flags=--expose-gc /prefetch:12⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --mojo-platform-channel-handle=4036 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵PID:784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp 65001 >NUL & powershell.exe -NoProfile -NonInteractive -InputFormat None -Command "Get-AuthenticodeSignature -LiteralPath 'C:\Users\Admin\AppData\Local\@gddesktop-updater\pending\temp-GDLauncher__2.0.9__win__x64.exe' | ConvertTo-Json -Compress""2⤵PID:1788
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NonInteractive -InputFormat None -Command "Get-AuthenticodeSignature -LiteralPath 'C:\Users\Admin\AppData\Local\@gddesktop-updater\pending\temp-GDLauncher__2.0.9__win__x64.exe' | ConvertTo-Json -Compress"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4040 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ac 0x4f81⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD5eec62cbce6ff61ae85b2af22b1538e91
SHA178c70f411b5af0cf9639dcfcc9e33e4179af7ef6
SHA256dfbbc298ded8efe7d3b18b932a085fed9b6784c4d147f5283b003238e381e0e9
SHA5129c90d56f8b8fdf7a751b622622121c12ea65f70c7b21ed5e09301e93919d8d99d3a74eb40751f09cdfd6f8f6a0a27bfee2b6ec378d59293c5c7e013f99fb82d8
-
Filesize
46B
MD50f70670492a3ea38b1e2753d341dc194
SHA1329f7924a30f29409c02bd0db63876c2df89cc5a
SHA2560b20ebe4e114a9f9c83a59b5bafe010b959fe266a565abe744597f4c0fa26751
SHA512494f7a6769ed21b9384294fa27d8c5dc1fdd00b3fc9d04752fad8e0cb519204fdb7fe362ac04f89e6c8474a041d3f1c7428afb9b0064b8f19ab2bc542bca7f1d
-
Filesize
50B
MD598485ea9256038a7babbc84490e533a7
SHA199477ab55ac8fdda3e97e12be8c4f17b13d4634e
SHA256ecf1edba1ada89ee675508305a89fce7ebd572ed0c91b26a18973024acbe7a0d
SHA512e4add8e89ae16f6515d7de0d991a451053126d78f1df51e8ff088139e8615e7cd7c36f06727e69df8a423c71926c4ac9f58e2de2cc99c4e653266793e09859cb
-
Filesize
3KB
MD506d16fea6ab505097d16fcaa32949d47
SHA10c1c719831fa41cd102d0d72d61c0f46ec5b8de8
SHA25654e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723
SHA51203c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a
-
Filesize
2KB
MD52f87410b0d834a14ceff69e18946d066
SHA1f2ec80550202d493db61806693439a57b76634f3
SHA2565422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65
SHA512a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4
-
Filesize
1013B
MD58098d31488cd52db41f95188b9daed5e
SHA176988b607c667c86211fe1dfe57ed4aedacc5691
SHA256c607f5871610bf9240c75f4abe947469496570b380f670e9d8d09f9c785978b5
SHA512e2b4c54e78daba4a04d17915eded43a3f59a744108cf28baf4c22545d807338a39de052d69243ce610981b930e49790ba8be0f7b370e042a9526ef09e2b9fb78
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
624B
MD58a0dc979e9bb35b5de4a48ee18ca443f
SHA192e59e72cf7ababd89e53d2a3d9429858504dc48
SHA25655a6651ec537e63dd487c317b88c277f256f0cca0c93bfda76f00334f6db9e1d
SHA512a9139a552f8a5bb86a99fa96555e07749ffb6d3eedefeddfe852e907a239f3045728d9050f48dcb3e378a7850911cd4474490259f92810281bb9a909b219b028
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Network\Network Persistent State
Filesize582B
MD59743e3182ba07e9a0d820199d6cee8d0
SHA175fbbdb661c7ad463c2e70bc01ce68fa7eb7046d
SHA256f4dca6a17f12f77a163b7128a51b1e026254863e31dc797483212df240366788
SHA512fe671d47e7d0a31fd4f63b3f6a6717abc0635eef8eb0ca9a46daf3dc021387092d9f521c3cc5995a27b048187c3e2abda8667884684431d522163a0d08e1b77a
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
64KB
MD5c2746e8f350932fdb3a689016d684cae
SHA14b6ac6fc53e96a84a3b52ec2339c26ab4b0d30b7
SHA256b88d4295b3c13d0423df0ec8a83a3907a4ea5de3bfb99d234822163de9a07f23
SHA5121c22d99716c465f08fe81a1755059a579da6f429d52294da9363661b76b65afabadf68dd58c5cd16a10cd16329137bcbb4797f7a7bfd77cfc50dfd26390737d7
-
Filesize
80KB
MD5645d2d96e4318f904354e85e4c30744a
SHA11c1c0f811feac4969c6df3c8f7893d89538776e0
SHA256fffe2f540a0f2750c08663de42eea582c259053ef8197fb99fbc78a89c93ce29
SHA5125ae6f524858bf1f2cffbea611e6a52c9528aeaed47cc57982718806aade6dc5390fbcee635d7500fc749f3157638519769f8745cef980f1902db7686cbd2c6f5
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon.owepk
Filesize689KB
MD5ec246653caf61f960aa12339b1cb8de9
SHA1686ad90addefc37baefd256caa4646fdc2d4d10a
SHA2564929d3f0d2bc97b7237211cfe0b0eae7aadfad30a8135012365d71b8e2599e3f
SHA512ab9f9be8cbe7e67978d6836e7b3792a1c4c1ef1720d8b98ae87fb24cdcdea442780aaa1e46a592880305addfaff2d7d659e26c9856bc37d9f930b4c1e0488125
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon\1.0.15\ow-electron-utility-plugin.node
Filesize607KB
MD51655baa81ad104125f7b67cfe727fd75
SHA100c56f079a9d5df4e8d26c94337382a02d971870
SHA2564afac59e7b1e7339117ca9cff131f6c9408f739406d18343b9694e31654af589
SHA512c29831964711df2f03645804266323ca9c06c03dadbaf0864d6c6f5b6d3661d8ad1f5d2d528e7c7808faf450a7c1fde3ed65020360fa365fda6ec83866f76d30