Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
LabyModLauncherSetup-latest.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LabyModLauncherSetup-latest.exe
Resource
win10v2004-20240802-en
General
-
Target
LabyModLauncherSetup-latest.exe
-
Size
118.5MB
-
MD5
0a7bd6235295f9f4325d0f7eb98ba508
-
SHA1
2582474e77f54099a89438e23c94edf6acf1d2fd
-
SHA256
9afaf38566a0e92fcc844c0dfb69c76a86c524e4ad167518c5f461025463ddf0
-
SHA512
c89b3aae81db3dda4e3654d85c3830fc551adbb1f76b7d4f76548ddc25aba1ed385baad20eefb874ccfad11b17ee1f972cad2848806753230be3e069719ff1cb
-
SSDEEP
3145728:g6I450/XJLzx3WikTgt2pQYJaUIN47Od4pRvm:gvfNxGikTgApBJaRN47Odqvm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Update.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation LabyModLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation LabyModLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation LabyModLauncher.exe -
Executes dropped EXE 12 IoCs
pid Process 2840 Update.exe 1040 Squirrel.exe 3628 LabyModLauncher.exe 1548 Update.exe 1800 LabyModLauncher.exe 4540 LabyModLauncher.exe 3044 LabyModLauncher.exe 1544 LabyModLauncher.exe 2920 LabyModLauncher.exe 1128 LabyModLauncher.exe 3612 Update.exe 4480 LabyModLauncher.exe -
Loads dropped DLL 25 IoCs
pid Process 3628 LabyModLauncher.exe 3628 LabyModLauncher.exe 3628 LabyModLauncher.exe 3628 LabyModLauncher.exe 3628 LabyModLauncher.exe 4540 LabyModLauncher.exe 1800 LabyModLauncher.exe 1800 LabyModLauncher.exe 1800 LabyModLauncher.exe 1800 LabyModLauncher.exe 1800 LabyModLauncher.exe 3044 LabyModLauncher.exe 3044 LabyModLauncher.exe 3044 LabyModLauncher.exe 3044 LabyModLauncher.exe 3044 LabyModLauncher.exe 1544 LabyModLauncher.exe 2920 LabyModLauncher.exe 1128 LabyModLauncher.exe 1544 LabyModLauncher.exe 1544 LabyModLauncher.exe 1544 LabyModLauncher.exe 1544 LabyModLauncher.exe 4480 LabyModLauncher.exe 4480 LabyModLauncher.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LabyModLauncherSetup-latest.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\labymodlauncher\\app-2.1.7\\LabyModLauncher.exe\" \"%1\"" LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\shell\open\command LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\URL Protocol LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\shell LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\shell\open LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\URL Protocol LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\ = "URL:labymod" LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\labymodlauncher\\app-2.1.7\\LabyModLauncher.exe\" \"%1\"" LabyModLauncher.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\ = "URL:labymod" LabyModLauncher.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\labymod\shell\open\command LabyModLauncher.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2840 Update.exe 2840 Update.exe 4480 LabyModLauncher.exe 4480 LabyModLauncher.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2840 Update.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeDebugPrivilege 3612 Update.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe Token: SeShutdownPrivilege 3044 LabyModLauncher.exe Token: SeCreatePagefilePrivilege 3044 LabyModLauncher.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2840 2360 LabyModLauncherSetup-latest.exe 82 PID 2360 wrote to memory of 2840 2360 LabyModLauncherSetup-latest.exe 82 PID 2840 wrote to memory of 1040 2840 Update.exe 83 PID 2840 wrote to memory of 1040 2840 Update.exe 83 PID 2840 wrote to memory of 3628 2840 Update.exe 84 PID 2840 wrote to memory of 3628 2840 Update.exe 84 PID 3628 wrote to memory of 1548 3628 LabyModLauncher.exe 85 PID 3628 wrote to memory of 1548 3628 LabyModLauncher.exe 85 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 1800 3628 LabyModLauncher.exe 86 PID 3628 wrote to memory of 4540 3628 LabyModLauncher.exe 87 PID 3628 wrote to memory of 4540 3628 LabyModLauncher.exe 87 PID 2840 wrote to memory of 3044 2840 Update.exe 88 PID 2840 wrote to memory of 3044 2840 Update.exe 88 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90 PID 3044 wrote to memory of 1544 3044 LabyModLauncher.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\LabyModLauncherSetup-latest.exe"C:\Users\Admin\AppData\Local\Temp\LabyModLauncherSetup-latest.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\Squirrel.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\Squirrel.exe" --updateSelf=C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe3⤵
- Executes dropped EXE
PID:1040
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --squirrel-install 2.1.73⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\labymodlauncher\Update.exeC:\Users\Admin\AppData\Local\labymodlauncher\Update.exe --createShortcut=LabyModLauncher.exe4⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1860 --field-trial-handle=1864,i,1913151561355706836,3043923222797768630,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --mojo-platform-channel-handle=2044 --field-trial-handle=1864,i,1913151561355706836,3043923222797768630,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4540
-
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --squirrel-firstrun3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2136 --field-trial-handle=2140,i,6034405971731036167,9585184198526983506,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --mojo-platform-channel-handle=2180 --field-trial-handle=2140,i,6034405971731036167,9585184198526983506,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --app-user-model-id=com.squirrel.labymodlauncher.LabyModLauncher --app-path="C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\resources\app" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2464 --field-trial-handle=2140,i,6034405971731036167,9585184198526983506,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"4⤵PID:2692
-
C:\Windows\System32\reg.exeC:\Windows\System32\REG.exe QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid5⤵PID:4716
-
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\Update.exeC:\Users\Admin\AppData\Local\labymodlauncher\Update.exe --checkForUpdate https://releases-launcher.labymod.net/update/win32_x64/2.1.7/stable4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe"C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\LabyModLauncher.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\LabyMod Launcher" --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3864 --field-trial-handle=2140,i,6034405971731036167,9585184198526983506,262144 --enable-features=kWebSQLAccess --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fcc4a55e80568c4693f6d2eff7ef757e
SHA1d24958d197482557722f616507d8b14dbeadebd8
SHA2561f5a1b10b49c35bff02f63ebaf8cd3faf74b51bd131d3dcfb952590c8bcd5eea
SHA51267de4502abff297c90eb2cfbb3d03bfbef3400d6ee19b3cbb47b3ed9bad4b795946406a6975564321edff618d1a589076b57609c2ca38efc5650899a8483a271
-
Filesize
86B
MD596e21527101ec7a2017e863b5042e184
SHA11f8e4c1c4d1a6c05ac2d2df0415ed928d8d0864d
SHA256c7ecdc2f94417299c2abb7b38c38c7e484dd69c2c44204beaad32583081c1817
SHA512aea7024d3ef881f2833b79750b849ccfe3daf88166abda0955fedcfb5bb3e17685ce961ec66f4d4c98d37657f46461c68770e9db98795c09a38885836a862aeb
-
Filesize
1.8MB
MD5e356889661efdc4312a3cf16cffe6d1a
SHA14bee286beef11e95db1d8139f956422fa2a0ccbf
SHA256695013dca3e35baf2cd9506236c4111a4ef72d82467777919660300acd0024a5
SHA5121980a590cfe73f96e795d17ad87fb021b65b56ce81873c086c3b9fbeecb69b8e60181f06c83a1536e8c550a64c0f7dea0eff18b44749a0c9eb0213dfe70502b0
-
Filesize
41KB
MD5def79fef823db7584ce1844c5fb157ef
SHA1c61ac5eba78ac34ee4568c6a85ac780add6cab4f
SHA256dc99de97b0324cddf77f56d2f07de40108eeaac9b50bed3820958bf383e8b345
SHA512a179663bd53c4d39bd31643a08aae2326e12bba9dd07cbfb1d5b79aa4bd64c8d4178528871df5541e4ba7cff9bcb39f63a57eb4cb0e7be6625a5bb318c75f705
-
Filesize
122KB
MD54bce15bbb0487f88efc006fd597441b7
SHA1da5a02653245112aabfd45429c417c39fcb2f67a
SHA2560e684d8f833fd47d4c98d4742ce46abbfdb1f4b130da4a93047df9926f189e46
SHA512e128d96cad8d214d41b60a7ab129dbf105866fe895d206c5b77b65af04c5d83ff1be87ece9b862dc30c88faeda69cff185925d7ae7b311c5351ca664db4a3060
-
Filesize
380KB
MD558f33b6e32ee2dd1687a60b2bb4eda8b
SHA13b8c15c3e23f6f76090374937faf1906995f187f
SHA25624c847d5e7b8e601a95c1c76c2a6573e74731bcaf7baf8dbeaeca104274b87ad
SHA51239b17cf73a56397f484aa4c0abde320773ef77760b21e91ccb3a11d22c1809a274471a2a0d0bc0bf0d25f08071856bd835c0ef9e544843af6210c3a9e1700f1c
-
Filesize
150KB
MD5b1bccf31fa5710207026d373edd96161
SHA1ae7bb0c083aea838df1d78d61b54fb76c9a1182e
SHA25649aff5690cb9b0f54f831351aa0f64416ba180a0c4891a859fa7294e81e9c8e3
SHA512134a13ad86f8bd20a1d2350236269fd39c306389a600556a82025d5e0d5adaab0709d59e9b7ee96e8e2d25b6df49fefea27cdccefe5fba9687abf92a9a941d91
-
Filesize
229KB
MD5e02160c24b8077b36ff06dc05a9df057
SHA1fc722e071ce9caf52ad9a463c90fc2319aa6c790
SHA2564d5b51f720f7d3146e131c54a6f75e4e826c61b2ff15c8955f6d6dd15bedf106
SHA5121bf873b89b571974537b685cdb739f8ed148f710f6f24f0f362f8b6bb605996fcfec1501411f2cb2df374d5fdaf6e2daaada8cea68051e3c10a67030ea25929e
-
Filesize
4.7MB
MD52191e768cc2e19009dad20dc999135a3
SHA1f49a46ba0e954e657aaed1c9019a53d194272b6a
SHA2567353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
SHA5125adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970
-
Filesize
2.7MB
MD5495ec8ea6e48faf690afa1a32695d434
SHA1e77821157f52a6828b43e700b1e982809f16153e
SHA256404cc71e04e4b7b89d9ef746502795643b6c940db82bd58c5403e9d0b27f7248
SHA51250344079483458fae19b0092cc875c67cd92de3f1069d5107e3baaf67a9d70de61e01271e4bda8325749104a743270e521396f4e3a516db44c30fa9646197be5
-
Filesize
10.2MB
MD574bded81ce10a426df54da39cfa132ff
SHA1eb26bcc7d24be42bd8cfbded53bd62d605989bbf
SHA2567bf96c193befbf23514401f8f6568076450ade52dd1595b85e4dfcf3de5f6fb9
SHA512bd7b7b52d31803b2d4b1fd8cb76481931ed8abb98d779b893d3965231177bdd33386461e1a820b384712013904da094e3cd15ee24a679ddc766132677a8be54a
-
Filesize
475KB
MD5c3d0a58f0276048f8bdc82d448ebf62c
SHA16a2d9d085e0ee991d68ced95765ad28e67ebfa89
SHA256e63b3e2c8ad3da55bcdad0439f6a395b58df99336b72305d6713c8dad06d0154
SHA5127edd98f42d3458f5f540ed3f0f3e91e1759f319743bf2083964ec7923de03d8311d5c51a8cbb12c13b40056e15f6a8a610b06debab1cebb716f148ecdf7d4310
-
Filesize
7.3MB
MD56766d91af78d044f9db350bd5fdee019
SHA154f7d48b001e178cefcd17d257c2fd77521d5af6
SHA256491a158de73090ee93457a1a6fe2bb7fd85c4a18c4fcef42ac8b43f264f6a677
SHA512dea9f290c490218d3f522c374940d3e2f39cb229260410aa35de855d04fe349b4bb281f711d62563a356550a4b0a00d667c23d2ebcfeb20956af34c56eef4fc0
-
Filesize
440KB
MD58f164155d22029535cd60f47966a89af
SHA119733935efe68f7ff3e2a84d28317e0391eb824b
SHA25620be1732675fedf380010b09936ed65c71bb761d0a05732215ef0795b5aba606
SHA5124582715817bb9c99d875aa89b1efbd0f70b63dcd37dbfc64e3078d1d4d7ad4ae8fac5a703afe1fc65b9af2f5c0fe8d3e293e2f0530106a6974b38b4cebca9db0
-
Filesize
5.0MB
MD554790975c932460ffa375cd0f0f8fff0
SHA105b72ff82abb8ddac1a92471f765b87b7ff1e9fd
SHA2561efdd507bb6f4fb07329ec7ec29ee00c952d6390bd5cfe3b41fb307c5caeab6c
SHA512d74627207caa35602e68ad6c08a0ebf55fe062e191a1885eb38226755d382dd3407dea883e4337c5cff23c1f724d64e5598edf7a5ce93d4cc1ea6ea10c41aa0e
-
Filesize
2.5MB
MD5159d847e3b32b4ce1867da548fbb5cb7
SHA1e878dde39f79da5c9c5b5fe3ec7be556392ef69f
SHA2565d47d310f8ee1b53c077dcd41eb294b5f497b2d700d8326a20addad6253697c9
SHA512edea4e605e15adc5ade8b103f80bdc5115a32790e66cea08c9365c8bde2fd2d209291ab1cb8ee714ac2c9251be993a9a0da7227cbe2371b355728218948dd634
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\resources\app\.webpack\main\native_modules\build\Release\deasync.node
Filesize126KB
MD515932ad0d08d5b5997aa877d57a40cef
SHA1598d7e0edc678a9f8d239ec43afabe2518b8ca69
SHA256152b0bb3d4eca8307ed485c717c765c225753a7feddd5e0ba86f098043d140cf
SHA5124e119b80e46ef3d6ac7a5a03e44dc687d08f385e2119ec93a8d27a401de8817a7c4193e800c938d9df46e8d5deda94df4dc76a60eb1881c61e8af4d43dae039d
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\resources\app\.webpack\main\native_modules\build\Release\keytar.node
Filesize698KB
MD52989d4decb8df3c5be737b47ff444754
SHA1f565a337e57a8561a7353869d325744c5fa4ebaf
SHA2568611a65622b019dc881d237ab06b75bf0e9bd5a64758d73e8ff23725e6015373
SHA512e8afbf64dd7a0187bc354f5c1920b4ef31ad7dec88136bb6d9cc8b2bd35a7005f37ea27ec9e410ad4bb05e170cf09144f69d1d6e580ac5c67660f42da82323c8
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\resources\app\.webpack\main\native_modules\prebuilds\win32-x64\liblzma.dll
Filesize154KB
MD549846957f312f3f7d61d7ca2800f7a78
SHA1a2c943c31e087c59c68cd1638814cfe8fd4296cb
SHA256be907a85eab332d830d5b16866a5ff23eee8c17e5b2c7bd219ffc0435b661bad
SHA51206c4e0eb16df95b923f28b89f0e5eeabde80c8bb89070945571c5462320a9bd04881595cceebceac658dfeb29cbbaad6fd663dd62e7696e8ee67e86cfcce7d6b
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\resources\app\.webpack\main\native_modules\prebuilds\win32-x64\node.napi.node
Filesize804KB
MD576caa2f1365ca214ffd29fab5b6e313f
SHA181da82e212374187e48b0eb236f8efb884ab90a5
SHA25679c390ab59ccddb13931150a965477ac84f9eb8d8afe553a53557dddc78178f6
SHA5126591ed9023a0949fb212575e8b3bac519dcc60efe0f58c68adeb7e782a80b600fd538e50380bbc9d7f175eb8eb99a9dc6f00e41a32b3c84cd433ba8c023c9d60
-
C:\Users\Admin\AppData\Local\labymodlauncher\app-2.1.7\resources\app\.webpack\renderer\main_window\index.html
Filesize190B
MD5e608f35f90e7d6180960b796bcec383b
SHA112dfd065df391907ab40ba079ea52da47b150037
SHA256ef086e75b0ba62d27935bbd9be67fb63e2e73f3aa3d03bef05a163b12df0953d
SHA51239f6869340615880a93c432a48d036dcd2eca66d6b972a09142ccc226851aa17afc2488da2441757213e7d5f6869a28e5bc1a152249c6447d25333828a9e58c6
-
Filesize
3KB
MD5b443af6f48fd067c301f5a26e2943952
SHA1b5e542f2e0bf116c48add8e0db5fdfa6218ad81f
SHA256f438479a0227613ca25acf329dee6167187cb883fa5caf0fa445e80107cc49a2
SHA5129ba76116c59cc7a0a292cbc231f919c8319e5642e8a1c40099f242261212cb6f19394ed550f6637cd9fe528ba4cc4982b9f11a40a40d43852b99c76b18f0d51f
-
Filesize
34KB
MD5d455c7e6501a784d590df4d5cfa047b3
SHA172179d53a208917e67f50ae28fd45652e9b05461
SHA2560adf11addb7e492ff5d582fcedbca2c9eefb569f8f22dbe3ed486b599b25ebc2
SHA512cdde3b541807b5a06c94ba2ea0187ffa1045846494e78040f59867b2fe5ec19a8a88475863fdb9eb38f0f44c0bb6778c01b7a2bd700e01f370fc36ec953883e7
-
Filesize
10KB
MD5bda9e1bc58693d8ea71527308395c51d
SHA11255de66bb7090747333958de0e36bf7f312413d
SHA2564a63737f5cfaa7da9f9153956ff303407064a38d00ce2392181b91666e048876
SHA5121add320264a5d1d1e4da02205faf11a0ffb92d8f079f1fd375f2832abd53715433f31bf065532083099a685e659f9a4119c87d15e2b27565c0be3b34c59e0b36
-
Filesize
586B
MD5ab3848d104c63dcd6768861199106b86
SHA1066724319750126b75a64d1347da38ee5fee6d76
SHA25693de33a52ddf907f056b317bc1c146480fda106abf2905f4405a4b9b6d82b56c
SHA512872f913f4ce8fb04f8dad4090859142498cd3f384027c8e8b4cfe210b0d139277bb043832785ef65f7c12b5ad904b365261370ed217268d89e375244f7da4793
-
Filesize
73KB
MD54b5e965745d33c7ae6d411d8bb43b8a3
SHA1d3d334fc3c0d25c033d345ce21c52dac9f8975a2
SHA2563f1068bc66952a721a68da58634f68605d98bfc107b6b248a7be35cac1055175
SHA512fd65943dcc2a17ce21129f5697771f1f2d2d7b677af8edc9dd9da17a7c945fdae372344b8406751fe0e8872469111d309f6bf3ac0fe289cc8c752d99192c4526
-
Filesize
1.9MB
MD5a6d96797a9c6d46c6bf953213ddc2a7a
SHA15d6b664ac8750094afe81f5ef68eec46e378fc50
SHA256580f3ecee2f33fca9d37f4102187b17c561ef88284b096af9e41cceaef20e728
SHA5127b4d44fc085cd00dd041579513a534b4acfc2d01d9bd201cc5a24d6b531ef53a0974041622fd74582a5e25ae9abcf7a55bcdd4002ac964d881efe4d793dbf9ba
-
Filesize
663KB
MD5cc756c4c369ce2e9994a85a3d2894241
SHA1544809241dcc8bde21aa6da16f4804f77a6a6300
SHA256b7cfe8e823588a3bdb8792cb1c8d679fc998687194b3e906931ff9c7ef5c3461
SHA512c62b31041a99ede39dc5379d1197531ab76c475b36920e9503dc0789a710ead867188b349ac2f226d09ca083029f369a82deab9c24aab536aeaec04d89acd25d
-
Filesize
5.1MB
MD5287ce1b3e74d4e91ae56838ba30aa9a0
SHA1f3315520e35bc2088bcabcd18cc92555bc64bdda
SHA2563af4a7a0b279ce322f3b85f321c23c71e42b2bca873b130cc31d2489c22adf49
SHA5121809a6d012706d79ae8fe6cac13db1a715130eca1288e22afd9f7dc23275ef8aa8fa0bb908430e7f4041bfa7a11c79548c2848f039b94576bbee8c7a991dacd6
-
Filesize
434B
MD50bef8bd45b1931fc33ebdecb559500fa
SHA1cc854369f32e251146469652d829bcc50d025e77
SHA256bcc44c3115a7579854f2762cdf919b06093e16b54f1d6cfc9147b71b461def52
SHA512aa09696b6f58314190d954b252ce95cce814da95571334bd6199f4794c9fec6a50f5286769643d3611ff2f07cd2a205b3cc8c6562016aa3b9bd67cf7db03d34d
-
Filesize
300B
MD51ce0b636ebbfd4bad10851a1f903a69f
SHA1d971fa54772705074aa0a00806c9d0d398495c43
SHA256a3d6cc3c3903df55599eeb11e0a026a568155ac4bfc9bfefbf03c41a2898012d
SHA512966084aadd698e0f526405fe505c5df970a384379171b27236390adef35831d713b5d307d556ff5a3279005362f2f290c4ef51acc21aa9cb88a7e014d5e59c99
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD5424e8cea803cca4eec6205aa5ca44126
SHA18bc71c56953dc6ebf65c3f19a0f1c074b5af7964
SHA256144f77e52ef8a5e6d02d4cda0da0f1241e4c1ef6c3dd828f7e445ba387769b1c
SHA5121af3d184091d23677ccb059bacd119f41af2e4adbda86706dcb09db78ad147f2ac620e2b6dc687275a5d7999067f85fff7efe36f0f7691a6a01b73dc4c2ef9d3
-
Filesize
2KB
MD57de420a6520cd7cc9bf60c9e20ce1e12
SHA1eddf54a444a7578b79609e412bc23f54186177a4
SHA256359833c8231d1d80a6488e626f9d43d759c27b0733d395dff4ba1d72a0eaa9c5
SHA5128e1673678d4808d9d315cdead01c32b21c5b89a088f6dbd29cd2e98246ca917c47a0692fc4a222bef24fd145fd1eb347965b20a2dbf5ffd26b8784763b439fc7
-
Filesize
3KB
MD5d722e8912bce09a33ef82243d74df2d9
SHA14bfba9d2eb35c107cd8329eb9a5d466f562f68f6
SHA2562bade80a4301b4e0a15a6554d0ce30bd5fde29bb498260cdea276f6a8bf804ae
SHA5126d2d0d05811e58a4ce97e5401a582f9acb4b72049c94bff1ff72e5b38b9241a91e8f2df2450c02122a6056ade8f2ebb6496c912ffedb64e755ae7860b012b2ad
-
Filesize
7KB
MD50046116b628cde709ffd4ab8f2db7dec
SHA128839bab42ad4ce698a72dedb77fb2d147f5e706
SHA25620d53797dc0e40f8ea1f96a3c015b79e2ebcfe752b5e3e582a5697e1fe8ef03c
SHA5123e57862fdc1f812c9124bf663f898dabf511a92dc0447f15fa2a478763c8eb3fa43b47df52f5afd4deac00b770ea9c64241eef7a13404dedf6d6b2f656490a7a
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84