Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
LabyModLauncherSetup-latest.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
LabyModLauncherSetup-latest.exe
Resource
win10v2004-20240709-en
General
-
Target
LabyModLauncherSetup-latest.exe
-
Size
118.5MB
-
MD5
46ad74bc8b64feb99a251d9c98907f27
-
SHA1
c5c977fe2e5a04679074436b102b5315ac9b615e
-
SHA256
151c49f3dd25931feef73b10908d3c0572454c28a4bd70bd1d3a2b54b55c3796
-
SHA512
7c84d364f08b8dee560b2d01f1a3649083cafb03c559a9d0db0dcf259d5ca1a894a4b142e2c65267036e00ccc9253197a0bdc6026d2832be6447189192b89ee8
-
SSDEEP
3145728:DjIKJTrUAG98yrsfAveykeYTy25+D2Ys2XVhUJ0sZDC2oT:DMokV98yIJTRu4+SsAJ0spzu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation LabyModLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation LabyModLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation LabyModLauncher.exe -
Executes dropped EXE 12 IoCs
pid Process 4448 Update.exe 1304 Squirrel.exe 2452 LabyModLauncher.exe 4288 Update.exe 3492 LabyModLauncher.exe 2892 LabyModLauncher.exe 1840 LabyModLauncher.exe 1104 LabyModLauncher.exe 4624 LabyModLauncher.exe 4572 LabyModLauncher.exe 4660 Update.exe 2300 LabyModLauncher.exe -
Loads dropped DLL 25 IoCs
pid Process 2452 LabyModLauncher.exe 2452 LabyModLauncher.exe 2452 LabyModLauncher.exe 2452 LabyModLauncher.exe 2452 LabyModLauncher.exe 3492 LabyModLauncher.exe 3492 LabyModLauncher.exe 3492 LabyModLauncher.exe 3492 LabyModLauncher.exe 2892 LabyModLauncher.exe 3492 LabyModLauncher.exe 1840 LabyModLauncher.exe 1840 LabyModLauncher.exe 1840 LabyModLauncher.exe 1840 LabyModLauncher.exe 1840 LabyModLauncher.exe 1104 LabyModLauncher.exe 4624 LabyModLauncher.exe 1104 LabyModLauncher.exe 1104 LabyModLauncher.exe 1104 LabyModLauncher.exe 1104 LabyModLauncher.exe 4572 LabyModLauncher.exe 2300 LabyModLauncher.exe 2300 LabyModLauncher.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\labymodlauncher\\app-2.1.6\\LabyModLauncher.exe\" \"%1\"" LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\ = "URL:labymod" LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\shell\open LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\labymodlauncher\\app-2.1.6\\LabyModLauncher.exe\" \"%1\"" LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\ = "URL:labymod" LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\shell\open\command LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\URL Protocol LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\shell\open\command LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\shell LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\labymod\URL Protocol LabyModLauncher.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4448 Update.exe 4448 Update.exe 4448 Update.exe 4448 Update.exe 2300 LabyModLauncher.exe 2300 LabyModLauncher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4448 Update.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeDebugPrivilege 4660 Update.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe Token: SeShutdownPrivilege 1840 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 1840 LabyModLauncher.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4448 Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 4448 8 LabyModLauncherSetup-latest.exe 86 PID 8 wrote to memory of 4448 8 LabyModLauncherSetup-latest.exe 86 PID 4448 wrote to memory of 1304 4448 Update.exe 87 PID 4448 wrote to memory of 1304 4448 Update.exe 87 PID 4448 wrote to memory of 2452 4448 Update.exe 88 PID 4448 wrote to memory of 2452 4448 Update.exe 88 PID 2452 wrote to memory of 4288 2452 LabyModLauncher.exe 89 PID 2452 wrote to memory of 4288 2452 LabyModLauncher.exe 89 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 3492 2452 LabyModLauncher.exe 90 PID 2452 wrote to memory of 2892 2452 LabyModLauncher.exe 91 PID 2452 wrote to memory of 2892 2452 LabyModLauncher.exe 91 PID 4448 wrote to memory of 1840 4448 Update.exe 92 PID 4448 wrote to memory of 1840 4448 Update.exe 92 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94 PID 1840 wrote to memory of 1104 1840 LabyModLauncher.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\LabyModLauncherSetup-latest.exe"C:\Users\Admin\AppData\Local\Temp\LabyModLauncherSetup-latest.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\Squirrel.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\Squirrel.exe" --updateSelf=C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe3⤵
- Executes dropped EXE
PID:1304
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --squirrel-install 2.1.63⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\labymodlauncher\Update.exeC:\Users\Admin\AppData\Local\labymodlauncher\Update.exe --createShortcut=LabyModLauncher.exe4⤵
- Executes dropped EXE
PID:4288
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1876 --field-trial-handle=1880,i,8890096235522874400,11593297332955039863,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3492
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --mojo-platform-channel-handle=2056 --field-trial-handle=1880,i,8890096235522874400,11593297332955039863,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --squirrel-firstrun3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2024 --field-trial-handle=2028,i,1082918289575092658,3023555167122669621,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1104
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --mojo-platform-channel-handle=2288 --field-trial-handle=2028,i,1082918289575092658,3023555167122669621,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4624
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --app-user-model-id=com.squirrel.labymodlauncher.LabyModLauncher --app-path="C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\resources\app" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2504 --field-trial-handle=2028,i,1082918289575092658,3023555167122669621,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4572
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\Update.exeC:\Users\Admin\AppData\Local\labymodlauncher\Update.exe --checkForUpdate https://releases-launcher.labymod.net/update/win32_x64/2.1.6/stable4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"4⤵PID:4388
-
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid5⤵PID:1424
-
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\LabyModLauncher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3456 --field-trial-handle=2028,i,1082918289575092658,3023555167122669621,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86B
MD596607107b77eb1b38a758ada1f9dbd1b
SHA19f56fe8ca98d2731ec05ce6c09efeb3c7d0ee531
SHA25644f3ea4df8ea7eb0812ca1f092911c6a911930ac6160217502272c8de76d69e4
SHA51243df1c45f01c753eb256982c8d666c949f871794dcc0cbcc13e413cd042cf8df2b7cb1391ee1ff09e865b130da5cc345c226b0f6b549c6169df4a496cbb48d0a
-
Filesize
1.8MB
MD57c844f47a28bcb773ed565be6ea0a1a1
SHA19a27914908c96455d3a225550e13373dd772646e
SHA256e7dc3a854bbdcea459cc8e823ecd6dd2318d459cac3dff56af2d57bfd11176a1
SHA5122b5ca21aaaef212d3f5223d0686308ce3a7b7c4b0137b77fb4baf65c5bfefef44d99e6238f7f9e4c6390be6740df9516f9252a373c24b4ddba403d5fbb327fc2
-
Filesize
41KB
MD5def79fef823db7584ce1844c5fb157ef
SHA1c61ac5eba78ac34ee4568c6a85ac780add6cab4f
SHA256dc99de97b0324cddf77f56d2f07de40108eeaac9b50bed3820958bf383e8b345
SHA512a179663bd53c4d39bd31643a08aae2326e12bba9dd07cbfb1d5b79aa4bd64c8d4178528871df5541e4ba7cff9bcb39f63a57eb4cb0e7be6625a5bb318c75f705
-
Filesize
122KB
MD54bce15bbb0487f88efc006fd597441b7
SHA1da5a02653245112aabfd45429c417c39fcb2f67a
SHA2560e684d8f833fd47d4c98d4742ce46abbfdb1f4b130da4a93047df9926f189e46
SHA512e128d96cad8d214d41b60a7ab129dbf105866fe895d206c5b77b65af04c5d83ff1be87ece9b862dc30c88faeda69cff185925d7ae7b311c5351ca664db4a3060
-
Filesize
380KB
MD569e5ec9dec615c3e234e073421850926
SHA15f240d589a5d2221806bad3df33d0cdbbcff0ed2
SHA2562cf7670fde0ca5b2a44b995ee44d5afd242627efe4d5aec8cf77ee0aace510e2
SHA512ee28788d2073569f31a5c72bcbd1e80a6beff1719baaf25a31670eb6e518c516ff27ae06ecad0d26cf9831c810a83a735e713a3c83a3fbc41989c83e8df70c24
-
Filesize
150KB
MD5b1bccf31fa5710207026d373edd96161
SHA1ae7bb0c083aea838df1d78d61b54fb76c9a1182e
SHA25649aff5690cb9b0f54f831351aa0f64416ba180a0c4891a859fa7294e81e9c8e3
SHA512134a13ad86f8bd20a1d2350236269fd39c306389a600556a82025d5e0d5adaab0709d59e9b7ee96e8e2d25b6df49fefea27cdccefe5fba9687abf92a9a941d91
-
Filesize
229KB
MD5e02160c24b8077b36ff06dc05a9df057
SHA1fc722e071ce9caf52ad9a463c90fc2319aa6c790
SHA2564d5b51f720f7d3146e131c54a6f75e4e826c61b2ff15c8955f6d6dd15bedf106
SHA5121bf873b89b571974537b685cdb739f8ed148f710f6f24f0f362f8b6bb605996fcfec1501411f2cb2df374d5fdaf6e2daaada8cea68051e3c10a67030ea25929e
-
Filesize
4.7MB
MD52191e768cc2e19009dad20dc999135a3
SHA1f49a46ba0e954e657aaed1c9019a53d194272b6a
SHA2567353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
SHA5125adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970
-
Filesize
2.7MB
MD5192ad44c75c9f20ddc81f72d1be2826b
SHA1fd14cd15df610591dc1df5fb9ff166a707df36cd
SHA2565a69e026513e6bf17ab1beb16d686afd93f231eef06cf6202b0710b17102b287
SHA51248e18f6b69533607bf94daa1b5a45239b6878c2ffde845044305e4879115b32ef58bac9ae3526637b7b9622ce2db1b46ee490a476f61ccf888b8821769d4ba28
-
Filesize
10.2MB
MD574bded81ce10a426df54da39cfa132ff
SHA1eb26bcc7d24be42bd8cfbded53bd62d605989bbf
SHA2567bf96c193befbf23514401f8f6568076450ade52dd1595b85e4dfcf3de5f6fb9
SHA512bd7b7b52d31803b2d4b1fd8cb76481931ed8abb98d779b893d3965231177bdd33386461e1a820b384712013904da094e3cd15ee24a679ddc766132677a8be54a
-
Filesize
475KB
MD5c702d2199c7ee235561d4641c1fb6e4c
SHA1ab1b03e30ca9bd378b71d4b591ed5f82132e1c1a
SHA256f35b49a7ecd20fa9ba86d8d3d7a2cbedf64ad2cb6304fcc7596403b4f83e39d3
SHA51229019cb99e5ab5a8fb72997d431cfad22d7f1a89f19bb4ddccc302eabe5a7fdf599d1faf76a94998889f89c54ae307f5bef7d54de6f921a7b1b8f8a3664baf84
-
Filesize
7.3MB
MD5fa66ba84d1fc940c98a000e75afe2cf4
SHA1156b7b59bc9a5b1d4cfb3f2e4af6ff56c595442e
SHA256be1eebe639192a04f1cf0562d794b00f8831ac1af673b9fc082705e731fadd47
SHA51232a9525e0199acf29437bb1eb15608db528391b71d931c168d2ea368bcb5be1a4474455a2cbe417cabe367ae471149e1b0345a9c4513e4dbfd3086b28f138ac7
-
Filesize
440KB
MD58f164155d22029535cd60f47966a89af
SHA119733935efe68f7ff3e2a84d28317e0391eb824b
SHA25620be1732675fedf380010b09936ed65c71bb761d0a05732215ef0795b5aba606
SHA5124582715817bb9c99d875aa89b1efbd0f70b63dcd37dbfc64e3078d1d4d7ad4ae8fac5a703afe1fc65b9af2f5c0fe8d3e293e2f0530106a6974b38b4cebca9db0
-
Filesize
5.0MB
MD554790975c932460ffa375cd0f0f8fff0
SHA105b72ff82abb8ddac1a92471f765b87b7ff1e9fd
SHA2561efdd507bb6f4fb07329ec7ec29ee00c952d6390bd5cfe3b41fb307c5caeab6c
SHA512d74627207caa35602e68ad6c08a0ebf55fe062e191a1885eb38226755d382dd3407dea883e4337c5cff23c1f724d64e5598edf7a5ce93d4cc1ea6ea10c41aa0e
-
Filesize
2.5MB
MD5bc3ece201d3a183a3a5d2889f9c11041
SHA19cec73a1806fe17505836488f658de640cb61171
SHA2561dae632a61ed6fd25851e00183102cbc454dee493a33cba44dff80f5f02fabcc
SHA5120a36efb4316b2c5887bdabbf58dcdd519ac600b6f184e9a672446689873ff5673d6b60c1a501a9ed42e94c4b7cd6e19d19bf05093065f2e3c494c57342d7b127
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\resources\app\.webpack\main\native_modules\build\Release\deasync.node
Filesize126KB
MD5b0453a3849dc2bc1b6c69b58615a67c0
SHA17591e6284ef9a452c73ef95e3f748966b1a3838e
SHA2562ae541128680f99e5aa40290464a35b117b4e6f294d660501cf22cf9afbd17e9
SHA5122edba590c37ca1fa8146f9de9b454ba71c661554824da4e25d8f3dde2f48d42976f08d4ace0d37cc709ebcfaea773a15e7d0c8c39498372f363faf4175e66cec
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\resources\app\.webpack\main\native_modules\build\Release\keytar.node
Filesize698KB
MD557948794fa808dc58a497161417f766d
SHA1514554bda846c014dba01921da9f301afd6d66a8
SHA256a54381e97aea12772baedbb2b77d84b130a04744ddf879043420bb6cd8d9276b
SHA51274a02b442c7cc69c75bc6685afdaa1ed634b30fa3c15bb1dc20810e65cf0345b22f3d5c772e14fa80ef19ceee6c0e03dfea1feb8c450035ed8a63359e582d4b0
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\resources\app\.webpack\main\native_modules\prebuilds\win32-x64\liblzma.dll
Filesize154KB
MD5b954c4438b55db55e6e0b386ea515730
SHA119ca890f481c534a6e7136ea43e24978a827bc5b
SHA2565b8d80f237ddf60d2579e31169ecd822f0c0ffe4349aa78c80406979823c97cb
SHA512898f0905717c9b92f7fa5a5c2f78f3e4a97b11016442323faad362c5ff2cdfd73770466f7728986fe4d93ac8786a11e6cf9bd0c8fe96e75af3277292c57625ff
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\resources\app\.webpack\main\native_modules\prebuilds\win32-x64\node.napi.node
Filesize804KB
MD5c892f5bd1684bd6f17bb8d42f275fa47
SHA14ec46213b6e4ca0b6f6c4bb6d34c282ecd1b569f
SHA256f8c2464d79f0b1b9a1ab2398c2f05245ee4bea5a559b2c1e3ea3cd178e2e05a2
SHA5126729cfc578bb9f74c8d1bf3fbd6a2af5cefb3f8ee94772abb42540cdcae81ccd3e265d2596780a3dced4f5eaffcd73197862497c18572ff48e82cc412f091ba1
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.6\resources\app\.webpack\renderer\main_window\index.html
Filesize190B
MD5e608f35f90e7d6180960b796bcec383b
SHA112dfd065df391907ab40ba079ea52da47b150037
SHA256ef086e75b0ba62d27935bbd9be67fb63e2e73f3aa3d03bef05a163b12df0953d
SHA51239f6869340615880a93c432a48d036dcd2eca66d6b972a09142ccc226851aa17afc2488da2441757213e7d5f6869a28e5bc1a152249c6447d25333828a9e58c6
-
Filesize
3KB
MD543881fbb64bc1a4c547d7a6ecd972bf6
SHA17124d98a6948e5b9a4dc1f7c616a4650de5b0aa8
SHA25627c078983e31a8363ec1a73b8333c35bea4db4f3b41cf945b0505bd1bc1a25c8
SHA512c3f8c30bb6d268a6e06867a6e8f3c05aa31bace26416d1127e98fa5358ffce677add16199bd1fbafdc4f2483d3c88121306e69e9b583e7b48b7d2e4835f53182
-
Filesize
34KB
MD5c7fdea9143b094c07e7afea95795c4bf
SHA1d48338de5283ffdec055ed0a3dc43b5384e17326
SHA256ff3efe7f858c3976c1cb7371832cd902d01fe14561a8eb800f3bfeda4fe6a9fa
SHA512bb0dbc78b912a3248ca73354f6a34050cf144e0868004bab08cb3fc8cae169862cb7cca24ec9c41a4ee018e960a5c9908b867c1ea965ce3d4f255c094107cdd3
-
Filesize
10KB
MD5bda9e1bc58693d8ea71527308395c51d
SHA11255de66bb7090747333958de0e36bf7f312413d
SHA2564a63737f5cfaa7da9f9153956ff303407064a38d00ce2392181b91666e048876
SHA5121add320264a5d1d1e4da02205faf11a0ffb92d8f079f1fd375f2832abd53715433f31bf065532083099a685e659f9a4119c87d15e2b27565c0be3b34c59e0b36
-
Filesize
586B
MD5ab3848d104c63dcd6768861199106b86
SHA1066724319750126b75a64d1347da38ee5fee6d76
SHA25693de33a52ddf907f056b317bc1c146480fda106abf2905f4405a4b9b6d82b56c
SHA512872f913f4ce8fb04f8dad4090859142498cd3f384027c8e8b4cfe210b0d139277bb043832785ef65f7c12b5ad904b365261370ed217268d89e375244f7da4793
-
Filesize
41KB
MD5c33f1667bfdfa9cd37004788942343ea
SHA1eafd3907605b3f31452ca366d422b45e93aa9a54
SHA256e6f1bd5bba5d38d8518441d0a559dd0b800f33037a06ee90176dad6027e4680e
SHA512d17d5208489ee874739fdfcd762798d7abe316fa5b31cc5d97bc1d6e2052d83e4f5cfac9718fd13bbaa790e6965502e02b1cf6b50469f34837458ea434e2aae9
-
Filesize
39KB
MD55c3a09c19d91abf60ba96de7e34dc0d7
SHA1daf759893f23d1b6b96e9f75c85ca5b3416cb63c
SHA256cb46fb71483e3b8ab1b25e9fa4152030698634c2e4071609b2afb21f196e3ea7
SHA512ae1786a750b740febe3d76e29d771ed3aee26a99cf85e0068a828787f66de7f909bd59a1089c569fe819a24514dd973a32906d996e35ae97640a3e2f4035e125
-
Filesize
40KB
MD586f009c3aef07baf251d8be2225276f3
SHA14e71bcceac1af06443700d764a5998fbf30b3180
SHA256858ae6c854e97ec428b6e3f44168d593ee77957e49e0892914d7b443e4814e05
SHA512f5743bec4f65913425e9030e90edf73a6e302d3bdc3b86eba115d84d0635cdff78c27fab414ad7dd8b8fa9ba4724f459858b1f70ea27c0fc1711179aec36168f
-
Filesize
73KB
MD54b5e965745d33c7ae6d411d8bb43b8a3
SHA1d3d334fc3c0d25c033d345ce21c52dac9f8975a2
SHA2563f1068bc66952a721a68da58634f68605d98bfc107b6b248a7be35cac1055175
SHA512fd65943dcc2a17ce21129f5697771f1f2d2d7b677af8edc9dd9da17a7c945fdae372344b8406751fe0e8872469111d309f6bf3ac0fe289cc8c752d99192c4526
-
Filesize
1.9MB
MD5655044270f76ccc4b85f3eedc48e7abc
SHA1d80b1e0c792adb48f180190cc9d87963fd4c6cfc
SHA256119b05bf7a45cab767b474ce8f3ea3c7243b9e094a52575d9e32df6205367c0d
SHA5121ce9ba09b1bef95fbb722ec3416c31733ec37839ff7578cfa3c9be8b14dd7de3f66e7731e5c49d1fda8e2eaf244d308f4e8fdffc2cb1209e693619713b765535
-
Filesize
663KB
MD5cc756c4c369ce2e9994a85a3d2894241
SHA1544809241dcc8bde21aa6da16f4804f77a6a6300
SHA256b7cfe8e823588a3bdb8792cb1c8d679fc998687194b3e906931ff9c7ef5c3461
SHA512c62b31041a99ede39dc5379d1197531ab76c475b36920e9503dc0789a710ead867188b349ac2f226d09ca083029f369a82deab9c24aab536aeaec04d89acd25d
-
Filesize
5.1MB
MD5d082fc73229fac533b35690d4fa2532a
SHA115d801d9ecac7da33498545a517e3fd8b03f7930
SHA2560a54affda40dd06a3a95301cef5981d9a2914a8fcc20bc152f3d3586487d2eed
SHA512c6e628f24c6128fcae23ea8c66181ac2ed366eff06b5678824f95d826a2f08b16d266c507bc208a249e17da9cd648e1db887ea3bd260f14f2be8439ac7af3a8a
-
Filesize
434B
MD544102c40496f089a006dd87270bc76bc
SHA1c049fbc85c561d7f3b34fe537b67b260e8c811c4
SHA25628ec569078a3bc9efb80e3829b9dd9b16309b78fc92684f18b5775a0e5e0a2ff
SHA512fe3700b78624e392b0c306aabbf1cc80bdf2534bdcdacb1fbdd471d2c22144e9a82cf7004b0b01fb57dbb2409b05e26f737bf962bd373283d188c131b724a5f7
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
300B
MD5033a216fc02792e05513cf2539d26b8e
SHA13a623fd1d8acbc152d066ea71ea8b3611ea268d2
SHA25601450f8fbc3d76cf512c666b5c9b4893036f3df4b912b3a1350268c68aab5d47
SHA512f5a28b337f89a0b6c39aa3177106a68c8dc6cd96ac06812c1aee530cbe7b72c8db0ae5a466c9314ed5e6a1a365cafecfd57c22432b4f5677f4c5c54135182795
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD537bde8997c1f0ea6ad12eca2d7b4988c
SHA179fb2bfdcbef7e005be23c946e9d45d861d4e592
SHA256ef5ef4e642eab4bf80836f8152abf8341f720edea9102b617f3f37419f006f0e
SHA51229d6f4cec1de15892aeb2b5f20a376bb56fec49cc5aa1198db08b6d7e72e1db0f3ca7ca021aa90a56db1e6896714e2b17e7d941ba91bcd3e12c5854cf1e0810a
-
Filesize
2KB
MD547d31050b91d3713736c6d8114a4063a
SHA119c9052994f5017fd43e75af997b44cf1990b4a7
SHA25610b8c78fe77eac5194842d24c642c2494d21e88ba7ec16923552ad0fc3b39abe
SHA512a4d4ec22c46638fd169bac33a098c6363a1f3976778b91bfb9df3e6cf3578e89026b1ebf1e6c8c12d3e0d3b8075652579b6154ab1d9829c67f68baf541408c6b
-
Filesize
7KB
MD548acb1053f3a14290da813217b1028d7
SHA1ffe42cf0d05252616aaf9805cfe1fd23f61d0f64
SHA256aabc4063ce1c7518d66b7b2e3a781cfbff536b547e14c72fb3063da4fd7eeffe
SHA512f0a59fcd5b920125eb7347161328f9f167810874de4d018091ab7e5b82e0119cebeb415342721987887b367a2148a65ed3b2bdc64590e9ad034cd6d7f9964072
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84