Overview
overview
6Static
static
3GDLauncher...64.exe
windows7-x64
4GDLauncher...64.exe
windows10-2004-x64
6$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3GDLauncher.exe
windows7-x64
1GDLauncher.exe
windows10-2004-x64
6LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1owutility.dll
windows7-x64
1owutility.dll
windows10-2004-x64
1resources/...le.exe
windows7-x64
1resources/...le.exe
windows10-2004-x64
5resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...ec.dll
windows7-x64
3Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
GDLauncher__2.0.20__win__x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
GDLauncher__2.0.20__win__x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
GDLauncher.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
GDLauncher.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20240704-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
owutility.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
owutility.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
resources/binaries/core_module.exe
Resource
win7-20240729-en
Behavioral task
behavioral25
Sample
resources/binaries/core_module.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
resources/elevate.exe
Resource
win7-20240708-en
Behavioral task
behavioral27
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
vk_swiftshader.dll
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
vk_swiftshader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
vulkan-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
vulkan-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
General
-
Target
GDLauncher.exe
-
Size
169.9MB
-
MD5
be4a0b976dc22fa138414ea983c4055f
-
SHA1
2e24cbc8b5af690cfe95adc54dcfec1cd6a69e2a
-
SHA256
20b054c46a52908c4f71727228f409cc02f6e23ac50cc72c9729c4a81159ccd4
-
SHA512
942733d8d076ccfc5a80c19f8c61191a789b9dd33c0998be1c671ed85b70a1dba14ec94b7318676803e4bd415000fe76ed4ec378527d7fb7d6887d08c750d8b0
-
SSDEEP
1572864:1s+fxQiW1vVzbHpUcEtmLd7cF3PPHNzLuTe7ulsxM/Gyr/w7VoB4X+x2CFRXQQSl:ce8BWNg3DFxfy
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: core_module.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation GDLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation GDLauncher.exe -
Loads dropped DLL 1 IoCs
pid Process 216 GDLauncher.exe -
pid Process 740 powershell.exe 2196 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString GDLauncher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 GDLauncher.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GDLauncher.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GDLauncher.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\gdlauncher\ = "URL:gdlauncher" GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\gdlauncher\shell\open\command GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\gdlauncher\shell GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\gdlauncher\shell\open GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\gdlauncher\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\GDLauncher.exe\" \"%1\"" GDLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\gdlauncher GDLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\gdlauncher\URL Protocol GDLauncher.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 3040 GDLauncher.exe 3040 GDLauncher.exe 3040 GDLauncher.exe 3040 GDLauncher.exe 2116 core_module.exe 2116 core_module.exe 2116 core_module.exe 2116 core_module.exe 2116 core_module.exe 2196 powershell.exe 2196 powershell.exe 740 powershell.exe 740 powershell.exe 2116 core_module.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 216 GDLauncher.exe 1928 GDLauncher.exe 1928 GDLauncher.exe 1928 GDLauncher.exe 1928 GDLauncher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeDebugPrivilege 2196 powershell.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeIncreaseQuotaPrivilege 740 powershell.exe Token: SeSecurityPrivilege 740 powershell.exe Token: SeTakeOwnershipPrivilege 740 powershell.exe Token: SeLoadDriverPrivilege 740 powershell.exe Token: SeSystemProfilePrivilege 740 powershell.exe Token: SeSystemtimePrivilege 740 powershell.exe Token: SeProfSingleProcessPrivilege 740 powershell.exe Token: SeIncBasePriorityPrivilege 740 powershell.exe Token: SeCreatePagefilePrivilege 740 powershell.exe Token: SeBackupPrivilege 740 powershell.exe Token: SeRestorePrivilege 740 powershell.exe Token: SeShutdownPrivilege 740 powershell.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeSystemEnvironmentPrivilege 740 powershell.exe Token: SeRemoteShutdownPrivilege 740 powershell.exe Token: SeUndockPrivilege 740 powershell.exe Token: SeManageVolumePrivilege 740 powershell.exe Token: 33 740 powershell.exe Token: 34 740 powershell.exe Token: 35 740 powershell.exe Token: 36 740 powershell.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe Token: SeCreatePagefilePrivilege 1888 GDLauncher.exe Token: SeShutdownPrivilege 1888 GDLauncher.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1888 GDLauncher.exe 1888 GDLauncher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1888 wrote to memory of 3360 1888 GDLauncher.exe 82 PID 1888 wrote to memory of 3360 1888 GDLauncher.exe 82 PID 3360 wrote to memory of 4136 3360 cmd.exe 84 PID 3360 wrote to memory of 4136 3360 cmd.exe 84 PID 1888 wrote to memory of 1828 1888 GDLauncher.exe 85 PID 1888 wrote to memory of 1828 1888 GDLauncher.exe 85 PID 1888 wrote to memory of 2116 1888 GDLauncher.exe 86 PID 1888 wrote to memory of 2116 1888 GDLauncher.exe 86 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 4888 1888 GDLauncher.exe 88 PID 1888 wrote to memory of 1176 1888 GDLauncher.exe 89 PID 1888 wrote to memory of 1176 1888 GDLauncher.exe 89 PID 1888 wrote to memory of 3040 1888 GDLauncher.exe 90 PID 1888 wrote to memory of 3040 1888 GDLauncher.exe 90 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91 PID 1888 wrote to memory of 4368 1888 GDLauncher.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"2⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid3⤵PID:4136
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exeC:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon /prefetch:7 --no-rate-limit --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Crashpad --url=https://f.a.k/e --annotation=_productName=GDLauncher --annotation=_version=2.0.20 --annotation=plat=Win64 --annotation=prod=Electron --annotation=ver=28.2.5 --initial-client-data=0x50c,0x510,0x514,0x500,0x518,0x7ff6e1b3f648,0x7ff6e1b3f654,0x7ff6e1b3f6602⤵PID:1828
-
-
C:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exeC:\Users\Admin\AppData\Local\Temp\resources\binaries\core_module.exe --runtime_path C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\data2⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:3928
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:1448
-
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_84546\java.exe"C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_84546\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:2132
-
-
C:\Program Files\Java\jdk-1.8\bin\java.exe"C:\Program Files\Java\jdk-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:5084
-
-
C:\Program Files\Java\jre-1.8\bin\java.exe"C:\Program Files\Java\jre-1.8\bin\java.exe" -cp C:\Users\Admin\AppData\Local\Temp JavaCheck3⤵PID:1936
-
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1864 --field-trial-handle=1868,i,13516566866923863125,591209706542617716,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:22⤵PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --mojo-platform-channel-handle=2064 --field-trial-handle=1868,i,13516566866923863125,591209706542617716,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exeC:\Users\Admin\AppData\Local\Temp\GDLauncher.exe --type=cs --cs-app=GDLauncher2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2676 --field-trial-handle=1868,i,13516566866923863125,591209706542617716,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --skip-intro-animation=false /prefetch:12⤵
- Checks computer location settings
PID:4368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3628 --field-trial-handle=1868,i,13516566866923863125,591209706542617716,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:12⤵
- Checks computer location settings
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --app-user-model-id=GDLauncher --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --node-integration-in-worker --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3636 --field-trial-handle=1868,i,13516566866923863125,591209706542617716,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --uid=dibeihhdinofpmiennjkclnoidpjakanhclfmpmo --package-folder="C:\Users\Admin\AppData\Roaming\ow-electron" --app-root="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --muid=47e88385-b987-4a46-9d6b-7d860f3e5947 --phase=25 --owepm-config="{\"phasing\":100}" --js-flags=--expose-gc /prefetch:12⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --standard-schemes=owepm --secure-schemes=sentry-ipc --bypasscsp-schemes=sentry-ipc --cors-schemes=sentry-ipc --fetch-schemes=sentry-ipc --streaming-schemes=owepm --mojo-platform-channel-handle=3700 --field-trial-handle=1868,i,13516566866923863125,591209706542617716,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe"C:\Users\Admin\AppData\Local\Temp\GDLauncher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\gdlauncher_carbon" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3400 --field-trial-handle=1868,i,13516566866923863125,591209706542617716,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x310 0x4941⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD597d15b94cd59add5e09906418fd2cac9
SHA1dc65484f95cd363dac59e61719eb19d4b376590c
SHA2566f450026f85806e8abb94555030462f5e3501a4363878eb0c63afceb60b693c3
SHA512abfb669b31e41262c0156fa01d7a9ca84e570d205070c65ce10937850bb4ca1d9274e536c0663a2e25fe0e2709a6b4457e9a3f2b90f902452407f29581bdcc91
-
Filesize
46B
MD5194bca0cf5ba87d8a2ba9d2573ce5214
SHA1f2a668368fd51e98d20ca7f6de950d423c0c9f60
SHA256fdebe9a535eff20859d9074722fc68c3d75b85a923f344dee4b3469149b74c26
SHA5120630ccc324cc7589792ce69537090a8e1343516aeb531562abc3ae77e63ff708b3e80a69677187ac5e5a9171fabeeff9e1a238fe999c4aac7d05d3535120f06d
-
Filesize
50B
MD5de9901d0f6beaffdad6a1bf2fb177d32
SHA18390d1571daf329c4af23d6ab9cbb652e78ccf8a
SHA2560b6a9c99a83ac8f7336c10ce30cc7d778dd275ea5186118a6ca9d6bd98109f10
SHA5124f08508274ba1974984feccd99582e66de45739511fd8c297ee69add8d5016d09bcef5da38cf8ac842d47798c7a26bbeacd92746650974283333404f5f0427cf
-
Filesize
3KB
MD506d16fea6ab505097d16fcaa32949d47
SHA10c1c719831fa41cd102d0d72d61c0f46ec5b8de8
SHA25654e15de2bef9f651d7717e2a336ac6b2ea2b723e6f29d2b153d8fbbc89aef723
SHA51203c00f1eebb51cec11703141ae9d9c3ac589f5495bc04d8a4b043714089a9d50bd3a520e4d72b4a4c99f5b9bf5f689bf2585fa5c7d4ddbe6f71cbba0172f593a
-
Filesize
2KB
MD52f87410b0d834a14ceff69e18946d066
SHA1f2ec80550202d493db61806693439a57b76634f3
SHA2565422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65
SHA512a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4
-
Filesize
1013B
MD58098d31488cd52db41f95188b9daed5e
SHA176988b607c667c86211fe1dfe57ed4aedacc5691
SHA256c607f5871610bf9240c75f4abe947469496570b380f670e9d8d09f9c785978b5
SHA512e2b4c54e78daba4a04d17915eded43a3f59a744108cf28baf4c22545d807338a39de052d69243ce610981b930e49790ba8be0f7b370e042a9526ef09e2b9fb78
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
624B
MD56a72f4411a549b730c0b67d168ff9be3
SHA10337d23b5fd3cd8d5e15935cf2528785fb15c32f
SHA2561226287217ee50608d116fbe5d02f83ea769c74056b09d599f08e15005398900
SHA512686d82bd344109831dd37dccbdebc9450e8eb285a58c76587186c72f3ed372538b6dd6d1813fdbae11aa89a89e800b4ef29e62758572e19f10e75183959d8286
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\gdlauncher_carbon\Partitions\__owepm__\Network\Network Persistent State
Filesize761B
MD5ffbdaf51f422f1599db4c1e4ff77a424
SHA1f2b18879c3493984a89a96f1edeeb31c05613275
SHA256cdbccd9cc11bde75095c6fa83b7d4f03249c688a2cd6f4176f264d7c52b1bcde
SHA51231740b1aa1f83671b99983add080a8174f42d6752424de6ceaf18b76d4a142b011cb4f5b1ddcb804fb37d7a45b6c52c641c9229c77c0967bd4d53fe006a8be8f
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
Filesize
248KB
MD5cc3733801ee562c3dc7054fe86f90980
SHA1bfd8aab5ad354e107aac0b44f71b4da5bf2d273e
SHA256abfd86d6a3a00ed4516cc623069f7bc63c8b7cab74b6ab5488261914b6a31265
SHA512074f4d6aed5ca12f9ae57e73851bc091b2d4b097c35882e306e65c8308e29456c711bddc87e2fbd5aa6fa628ca335a16fe56423cd1e873aeabce64b244cc2a0a
-
Filesize
8KB
MD58e09cafde8b74e46c28d0b6555791790
SHA14c47f7663d1e392c08d2ff9ab61f5abd3cddf50b
SHA2568658fdddf0d94b19043c6d50c61f08bba93b9e23b5e273a4064081ec8d5ecb97
SHA5127dd426364177ee147d78842cf9d94fc8d675be8db59ae9681c7c8ccc4590df1e78f7f209122ba59c553cb278ea8fe5707f8a44d8079355e56f1ae3d99a23b9bf
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\logs\utility\utility.log
Filesize309B
MD5c73eed02e9096eb934621705c7b027dc
SHA1dac46891ec969ab107d268eb1fee9886e2ffcfa2
SHA256a03b0b340aed8599ba049f855f2f06733a5de4e9fa30349a779d24fffbf0d82d
SHA512f6c54540b89ac50ffe8ff0b632eba6e4177e2fd173cee6d12cc96ba991be7aa55a26af30fd8a9a2d51bbf1bb3ce02e3b010b85cd1108c968ea8ce51836ef61ec
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\logs\utility\utility.log
Filesize2KB
MD53a58bdda1edc38b8ea3e87e77ea4f9b9
SHA1997d4346c9e03211d7fc6c4a7478baaafd5546f6
SHA2562ea1c747f67f7b7f75907b36d1b71f790517fb8031f81409b5f3bd52ba7dfa49
SHA512c1b6324b4714fb0e332a7bc45f6aa1401adaee1a0e73b1dd3b0c8798406d1adf251e21e916353e1812688407d7e172eff467895015b67250749ed547c5938092
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon.owepk
Filesize695KB
MD56b3881189e3ce3d3f5fa45056580114a
SHA14c3b751cde3c7af1f14798956e202c16788c9447
SHA2563a119d4ddbdfba9328041c73dd3ab894b5669f7e2ff698a8e4be93b6013f6f4d
SHA512a5844fb4256d0af88fde5f0176cd22293a01250bb107275bad3b87d7431cdeac33784c75fb5475aaaec7fb3d1c37c8ff95e9120b9d51d1d38d49bae2215e267e
-
C:\Users\Admin\AppData\Roaming\ow-electron\dibeihhdinofpmiennjkclnoidpjakanhclfmpmo\packages\jopghajpapbfooofklncedoalpgiaglgjaokpkon\2.0.3\ow-electron-utility-plugin.node
Filesize609KB
MD565d13c459f463cb50a50467d6cade186
SHA166752ed8509d4ceea88706107307684539cdc30d
SHA2566dec6e2bf0384953490117d7e1f5b9875769b5acc6a10ff051d4eed02de07142
SHA5126d8a781ed4bfee34123872762062ebd5f742458b4d7c96dcf4f7db8d509512dbf3321ec3c15805ed9d3288a6d05c481c5be113375598d98cc74d99be6b13884a