Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 18:15

General

  • Target

    GDLauncher.exe

  • Size

    169.9MB

  • MD5

    52b6403f53e1ada74df7084129952d0d

  • SHA1

    ea11febd4cbb09544b088aec2c6ffa2b42f83959

  • SHA256

    a8735f79159bdfed49768d007be08f60a8e4b2c28327c384e2e0f80ce5b6e7cf

  • SHA512

    197253a33c7a72b1adac0becf6e3bb5e5385f2ee96aab01d377d7ad0ea96c09a69436e38e57e2196be4f348e63be873ba0c90194f0ced3263c730bf5880bfaa2

  • SSDEEP

    1572864:bs+fxQiW1vVzbHpUcEtmLd7cF3PPHNzLuTe7ulsxM/Gyr/w7VoB4X+x2CFRXQQS+:ee8BWNg3DFxf1

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Using powershell.exe command.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Windows\System32\reg.exe
        C:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid
        3⤵
          PID:4852
      • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
        C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Crashpad --url=https://f.a.k/e --annotation=_productName=GDLauncher --annotation=_version=2.0.8 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=28.2.5 --initial-client-data=0x510,0x514,0x518,0x504,0x51c,0x7ff70a0bf648,0x7ff70a0bf654,0x7ff70a0bf660
        2⤵
          PID:3844
        • C:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exe
          C:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exe --runtime_path C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\data
          2⤵
          • Enumerates connected drives
          • Suspicious behavior: EnumeratesProcesses
          PID:4032
          • C:\Program Files\Java\jdk-1.8\bin\java.exe
            "C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck
            3⤵
              PID:4576
              • C:\Windows\system32\icacls.exe
                C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
                4⤵
                • Modifies file permissions
                PID:4428
            • C:\Program Files\Java\jre-1.8\bin\java.exe
              "C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck
              3⤵
                PID:4520
              • C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_99062\java.exe
                "C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_99062\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck
                3⤵
                  PID:5028
                • C:\Program Files\Java\jdk-1.8\bin\java.exe
                  "C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck
                  3⤵
                    PID:1736
                  • C:\Program Files\Java\jre-1.8\bin\java.exe
                    "C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck
                    3⤵
                      PID:1936
                  • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                    "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1860 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:2
                    2⤵
                      PID:2644
                    • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                      "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --mojo-platform-channel-handle=2168 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
                      2⤵
                        PID:4016
                      • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                        C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=cs --cs-app=GDLauncher
                        2⤵
                          PID:4856
                        • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                          "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2616 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --skip-intro-animation=false /prefetch:1
                          2⤵
                          • Checks computer location settings
                          PID:3956
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:408
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1732
                        • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                          "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3560 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:1
                          2⤵
                          • Checks computer location settings
                          PID:4156
                        • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                          "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --node-integration-in-worker --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2936 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --uid=dibeihhdinofpmiennjkclnoidpjakanhclfmpmo --package-folder="C:\Users\Admin\AppData\Roaming\ow-electron" --app-root="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --muid=45e35359-e062-d120-8dad-71ce818bbd6c --phase=28 --owepm-config="{\"phasing\":100}" --js-flags=--expose-gc /prefetch:1
                          2⤵
                          • Checks computer location settings
                          • Loads dropped DLL
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1912
                        • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                          "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --mojo-platform-channel-handle=4036 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
                          2⤵
                            PID:784
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /d /s /c "chcp 65001 >NUL & powershell.exe -NoProfile -NonInteractive -InputFormat None -Command "Get-AuthenticodeSignature -LiteralPath 'C:\Users\Admin\AppData\Local\@gddesktop-updater\pending\temp-GDLauncher__2.0.9__win__x64.exe' | ConvertTo-Json -Compress""
                            2⤵
                              PID:1788
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                3⤵
                                  PID:2772
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell.exe -NoProfile -NonInteractive -InputFormat None -Command "Get-AuthenticodeSignature -LiteralPath 'C:\Users\Admin\AppData\Local\@gddesktop-updater\pending\temp-GDLauncher__2.0.9__win__x64.exe' | ConvertTo-Json -Compress"
                                  3⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:228
                              • C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe
                                "C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4040 --field-trial-handle=1872,i,7138469774992675391,10687990043992045395,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:8
                                2⤵
                                • Drops file in System32 directory
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5008
                            • C:\Windows\system32\AUDIODG.EXE
                              C:\Windows\system32\AUDIODG.EXE 0x4ac 0x4f8
                              1⤵
                                PID:3900

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                                Filesize

                                46B

                                MD5

                                eec62cbce6ff61ae85b2af22b1538e91

                                SHA1

                                78c70f411b5af0cf9639dcfcc9e33e4179af7ef6

                                SHA256

                                dfbbc298ded8efe7d3b18b932a085fed9b6784c4d147f5283b003238e381e0e9

                                SHA512

                                9c90d56f8b8fdf7a751b622622121c12ea65f70c7b21ed5e09301e93919d8d99d3a74eb40751f09cdfd6f8f6a0a27bfee2b6ec378d59293c5c7e013f99fb82d8

                              • C:\ProgramData\Oracle\Java\.oracle_jre_usage\3903daac9bc4a3b7.timestamp

                                Filesize

                                46B

                                MD5

                                0f70670492a3ea38b1e2753d341dc194

                                SHA1

                                329f7924a30f29409c02bd0db63876c2df89cc5a

                                SHA256

                                0b20ebe4e114a9f9c83a59b5bafe010b959fe266a565abe744597f4c0fa26751

                                SHA512

                                494f7a6769ed21b9384294fa27d8c5dc1fdd00b3fc9d04752fad8e0cb519204fdb7fe362ac04f89e6c8474a041d3f1c7428afb9b0064b8f19ab2bc542bca7f1d

                              • C:\ProgramData\Oracle\Java\.oracle_jre_usage\905ebba3a8fc8cc.timestamp

                                Filesize

                                50B

                                MD5

                                98485ea9256038a7babbc84490e533a7

                                SHA1

                                99477ab55ac8fdda3e97e12be8c4f17b13d4634e

                                SHA256

                                ecf1edba1ada89ee675508305a89fce7ebd572ed0c91b26a18973024acbe7a0d

                                SHA512

                                e4add8e89ae16f6515d7de0d991a451053126d78f1df51e8ff088139e8615e7cd7c36f06727e69df8a423c71926c4ac9f58e2de2cc99c4e653266793e09859cb

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                Filesize

                                3KB

                                MD5

                                06d16fea6ab505097d16fcaa32949d47

                                SHA1

                                0c1c719831fa41cd102d0d72d61c0f46ec5b8de8

                                SHA256

                                54e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723

                                SHA512

                                03c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                Filesize

                                2KB

                                MD5

                                2f87410b0d834a14ceff69e18946d066

                                SHA1

                                f2ec80550202d493db61806693439a57b76634f3

                                SHA256

                                5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                                SHA512

                                a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

                              • C:\Users\Admin\AppData\Local\Temp\JavaCheck.class

                                Filesize

                                1013B

                                MD5

                                8098d31488cd52db41f95188b9daed5e

                                SHA1

                                76988b607c667c86211fe1dfe57ed4aedacc5691

                                SHA256

                                c607f5871610bf9240c75f4abe947469496570b380f670e9d8d09f9c785978b5

                                SHA512

                                e2b4c54e78daba4a04d17915eded43a3f59a744108cf28baf4c22545d807338a39de052d69243ce610981b930e49790ba8be0f7b370e042a9526ef09e2b9fb78

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s0gpaloc.kgx.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                Filesize

                                2B

                                MD5

                                f3b25701fe362ec84616a93a45ce9998

                                SHA1

                                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                SHA256

                                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                SHA512

                                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Network\Network Persistent State

                                Filesize

                                624B

                                MD5

                                8a0dc979e9bb35b5de4a48ee18ca443f

                                SHA1

                                92e59e72cf7ababd89e53d2a3d9429858504dc48

                                SHA256

                                55a6651ec537e63dd487c317b88c277f256f0cca0c93bfda76f00334f6db9e1d

                                SHA512

                                a9139a552f8a5bb86a99fa96555e07749ffb6d3eedefeddfe852e907a239f3045728d9050f48dcb3e378a7850911cd4474490259f92810281bb9a909b219b028

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Network\Network Persistent State

                                Filesize

                                59B

                                MD5

                                2800881c775077e1c4b6e06bf4676de4

                                SHA1

                                2873631068c8b3b9495638c865915be822442c8b

                                SHA256

                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                SHA512

                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Cache\Cache_Data\data_0

                                Filesize

                                8KB

                                MD5

                                cf89d16bb9107c631daabf0c0ee58efb

                                SHA1

                                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                SHA256

                                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                SHA512

                                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Cache\Cache_Data\data_2

                                Filesize

                                8KB

                                MD5

                                0962291d6d367570bee5454721c17e11

                                SHA1

                                59d10a893ef321a706a9255176761366115bedcb

                                SHA256

                                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                SHA512

                                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Cache\Cache_Data\data_3

                                Filesize

                                8KB

                                MD5

                                41876349cb12d6db992f1309f22df3f0

                                SHA1

                                5cf26b3420fc0302cd0a71e8d029739b8765be27

                                SHA256

                                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                SHA512

                                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                d0d388f3865d0523e451d6ba0be34cc4

                                SHA1

                                8571c6a52aacc2747c048e3419e5657b74612995

                                SHA256

                                902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                SHA512

                                376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Local Storage\leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Network\Network Persistent State

                                Filesize

                                582B

                                MD5

                                9743e3182ba07e9a0d820199d6cee8d0

                                SHA1

                                75fbbdb661c7ad463c2e70bc01ce68fa7eb7046d

                                SHA256

                                f4dca6a17f12f77a163b7128a51b1e026254863e31dc797483212df240366788

                                SHA512

                                fe671d47e7d0a31fd4f63b3f6a6717abc0635eef8eb0ca9a46daf3dc021387092d9f521c3cc5995a27b048187c3e2abda8667884684431d522163a0d08e1b77a

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Session Storage\MANIFEST-000001

                                Filesize

                                41B

                                MD5

                                5af87dfd673ba2115e2fcf5cfdb727ab

                                SHA1

                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                SHA256

                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                SHA512

                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Shared Dictionary\cache\index

                                Filesize

                                24B

                                MD5

                                54cb446f628b2ea4a5bce5769910512e

                                SHA1

                                c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                SHA256

                                fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                SHA512

                                8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\b4ab6001-e3fc-426c-bd71-c0ad82519af6.tmp

                                Filesize

                                57B

                                MD5

                                58127c59cb9e1da127904c341d15372b

                                SHA1

                                62445484661d8036ce9788baeaba31d204e9a5fc

                                SHA256

                                be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de

                                SHA512

                                8d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\main.log

                                Filesize

                                64KB

                                MD5

                                c2746e8f350932fdb3a689016d684cae

                                SHA1

                                4b6ac6fc53e96a84a3b52ec2339c26ab4b0d30b7

                                SHA256

                                b88d4295b3c13d0423df0ec8a83a3907a4ea5de3bfb99d234822163de9a07f23

                                SHA512

                                1c22d99716c465f08fe81a1755059a579da6f429d52294da9363661b76b65afabadf68dd58c5cd16a10cd16329137bcbb4797f7a7bfd77cfc50dfd26390737d7

                              • C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\sentry\scope_v3.json

                                Filesize

                                80KB

                                MD5

                                645d2d96e4318f904354e85e4c30744a

                                SHA1

                                1c1c0f811feac4969c6df3c8f7893d89538776e0

                                SHA256

                                fffe2f540a0f2750c08663de42eea582c259053ef8197fb99fbc78a89c93ce29

                                SHA512

                                5ae6f524858bf1f2cffbea611e6a52c9528aeaed47cc57982718806aade6dc5390fbcee635d7500fc749f3157638519769f8745cef980f1902db7686cbd2c6f5

                              • C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon.owepk

                                Filesize

                                689KB

                                MD5

                                ec246653caf61f960aa12339b1cb8de9

                                SHA1

                                686ad90addefc37baefd256caa4646fdc2d4d10a

                                SHA256

                                4929d3f0d2bc97b7237211cfe0b0eae7aadfad30a8135012365d71b8e2599e3f

                                SHA512

                                ab9f9be8cbe7e67978d6836e7b3792a1c4c1ef1720d8b98ae87fb24cdcdea442780aaa1e46a592880305addfaff2d7d659e26c9856bc37d9f930b4c1e0488125

                              • C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon\1.0.15\ow-electron-utility-plugin.node

                                Filesize

                                607KB

                                MD5

                                1655baa81ad104125f7b67cfe727fd75

                                SHA1

                                00c56f079a9d5df4e8d26c94337382a02d971870

                                SHA256

                                4afac59e7b1e7339117ca9cff131f6c9408f739406d18343b9694e31654af589

                                SHA512

                                c29831964711df2f03645804266323ca9c06c03dadbaf0864d6c6f5b6d3661d8ad1f5d2d528e7c7808faf450a7c1fde3ed65020360fa365fda6ec83866f76d30

                              • memory/228-501-0x000001E1E15F0000-0x000001E1E17B2000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/228-504-0x000001E1E1CF0000-0x000001E1E2218000-memory.dmp

                                Filesize

                                5.2MB

                              • memory/408-173-0x00000147F4690000-0x00000147F46B2000-memory.dmp

                                Filesize

                                136KB

                              • memory/408-236-0x00000147F4880000-0x00000147F48AA000-memory.dmp

                                Filesize

                                168KB

                              • memory/408-237-0x00000147F4880000-0x00000147F48A4000-memory.dmp

                                Filesize

                                144KB

                              • memory/408-220-0x00000147F4CC0000-0x00000147F4D36000-memory.dmp

                                Filesize

                                472KB

                              • memory/784-397-0x00007FFAB1550000-0x00007FFAB1551000-memory.dmp

                                Filesize

                                4KB

                              • memory/784-500-0x0000021D61040000-0x0000021D6106B000-memory.dmp

                                Filesize

                                172KB

                              • memory/1732-202-0x0000023F36AE0000-0x0000023F36B24000-memory.dmp

                                Filesize

                                272KB

                              • memory/1736-371-0x00000284D6380000-0x00000284D6381000-memory.dmp

                                Filesize

                                4KB

                              • memory/1936-383-0x000002020E3F0000-0x000002020E3F1000-memory.dmp

                                Filesize

                                4KB

                              • memory/3956-71-0x00007FFAB1580000-0x00007FFAB1581000-memory.dmp

                                Filesize

                                4KB

                              • memory/3956-70-0x00007FFAB1430000-0x00007FFAB1431000-memory.dmp

                                Filesize

                                4KB

                              • memory/4520-342-0x0000027DDE560000-0x0000027DDE561000-memory.dmp

                                Filesize

                                4KB

                              • memory/4576-324-0x00000221BA770000-0x00000221BA771000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-549-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-554-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-553-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-551-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-550-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-552-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-548-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-544-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-542-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5008-543-0x0000018DF0550000-0x0000018DF0551000-memory.dmp

                                Filesize

                                4KB

                              • memory/5028-356-0x000001E66D750000-0x000001E66D751000-memory.dmp

                                Filesize

                                4KB