Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1200s -
max time network
1202s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 17:31
Static task
static1
General
-
Target
liquidlauncher_0.2.5_x64_en-US.msi
-
Size
7.4MB
-
MD5
dc33c92a4ff59c3e7ead5155f372d017
-
SHA1
b53b631837e6142fc70d5130ea8cac66abc84588
-
SHA256
2803951e49e45d8eb4113e963c2dfeb9f3727c765c39c0f50779ff5d93556dc9
-
SHA512
1cd6fdb73953b39b6448b11b7329258c93c8acf3d05e8960f1eb01e78cb71bf06e10c9d3c8b12bb36f6f37e957460b7fef7c6cde09ddbf4b721b2e0fe93cb4b0
-
SSDEEP
196608:T7UbJG+K70mHXAHZpbzEsxZBaUiUpYEhG8X:nUbJnZrfosxZkUYEhG
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 82 1460 powershell.exe 90 1460 powershell.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\!BCILauncher = "\"C:\\Windows\\Temp\\MUBSTemp\\BCILauncher.EXE\" bgaupmi=C46B5A1609E04EB4A0BD7724E9939387" BGAUpdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\msedge_resetsb_{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062} = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window --reset-startup-boost-last-used" setup.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA liquidlauncher.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs 8 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ = "IEToEdge BHO" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\NoExplorer = "1" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ setup.exe -
Modifies Installed Components in the registry 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\ = "Microsoft Edge" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\StubPath = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\Installer\\setup.exe\" --configure-user-settings --verbose-logging --system-level --msedge --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Localized Name = "Microsoft Edge" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}\Version = "43,0,0,0" setup.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation msedgewebview2.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Microsoft Edge.lnk setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 30 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName MicrosoftEdgeUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\id.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\onramp.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\Trust Protection Lists\Sigma\Cryptomining setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\msedgeupdateres_pl.dll MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Locales\mk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\msedgeupdateres_kok.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\msedgeupdateres_sr-Cyrl-RS.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5204_1426432853\manifest.json msedgewebview2.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\msedgeupdateres_en.dll MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\Trust Protection Lists\Mu\CompatExceptions setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5204_898289042\Microsoft.CognitiveServices.Speech.core.dll msedgewebview2.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\ur.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\v8_context_snapshot.bin setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\Locales\he.pak setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5204_159869106\hyph-de-ch-1901.hyb msedgewebview2.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\msedge.exe.sig setup.exe File opened for modification C:\Program Files\MsEdgeCrashpad\metadata setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\pl.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\libGLESv2.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\ta.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\Locales\lv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\Locales\pt-BR.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Locales\ko.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\EdgeUpdate.dat MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\MicrosoftEdgeUpdateCore.exe MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Trust Protection Lists\Mu\Content setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\hr.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\Locales\eu.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.32\BGAUpdate.exe MicrosoftEdgeUpdate.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\vcruntime140_1.dll setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\msedge_pwa_launcher.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\notification_helper.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\identity_proxy\win11\identity_helper.Sparse.Internal.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\mk.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\msedgeupdateres_quz.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\MicrosoftEdgeComRegisterShellARM64.exe MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\msedgeupdateres_cs.dll MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Locales\nb.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\psuser.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\Trust Protection Lists\Sigma\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\mip_protection_sdk.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\ka.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\cookie_exporter.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\mojo_core.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\msedgeupdateres_mr.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5204_1115481142\manifest.json msedgewebview2.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\vk_swiftshader.dll setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\msedgeupdateres_kk.dll MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\msedge_200_percent.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Locales\pa.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\msedgeupdateres_is.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Trust Protection Lists\Mu\Other setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\psmachine_64.dll MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Installer\setup.exe setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5204_159869106\hyph-bg.hyb msedgewebview2.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\qu.pak setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5204_159869106\hyph-bn.hyb msedgewebview2.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\ms.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\122.0.2365.92\Locales\qu.pak setup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\{5DD087FD-D007-452C-B5DA-E7C18D08CAC3}\ProductIcon msiexec.exe File opened for modification C:\Windows\Installer\{5DD087FD-D007-452C-B5DA-E7C18D08CAC3}\ProductIcon msiexec.exe File created C:\Windows\Installer\e57a21e.msi msiexec.exe File opened for modification C:\Windows\Installer\e57a21c.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{5DD087FD-D007-452C-B5DA-E7C18D08CAC3} msiexec.exe File opened for modification C:\Windows\Installer\MSIA335.tmp msiexec.exe File created C:\Windows\Installer\e57a21c.msi msiexec.exe -
Executes dropped EXE 64 IoCs
pid Process 1248 MicrosoftEdgeWebview2Setup.exe 3664 MicrosoftEdgeUpdate.exe 5352 MicrosoftEdgeUpdate.exe 5380 MicrosoftEdgeUpdate.exe 5404 MicrosoftEdgeUpdateComRegisterShell64.exe 5432 MicrosoftEdgeUpdateComRegisterShell64.exe 5468 MicrosoftEdgeUpdateComRegisterShell64.exe 5524 MicrosoftEdgeUpdate.exe 5616 MicrosoftEdgeUpdate.exe 5652 MicrosoftEdgeUpdate.exe 5696 MicrosoftEdgeUpdate.exe 5228 MicrosoftEdge_X64_122.0.2365.92.exe 5284 setup.exe 5308 setup.exe 5560 MicrosoftEdgeUpdate.exe 5168 liquidlauncher.exe 5204 msedgewebview2.exe 4372 msedgewebview2.exe 5628 msedgewebview2.exe 2188 msedgewebview2.exe 5384 msedgewebview2.exe 3648 msedgewebview2.exe 4304 msedgewebview2.exe 3436 msedgewebview2.exe 3812 msedgewebview2.exe 4376 msedgewebview2.exe 1612 msedgewebview2.exe 3264 msedgewebview2.exe 2740 msedgewebview2.exe 5820 msedgewebview2.exe 5796 msedgewebview2.exe 6052 msedgewebview2.exe 4940 msedgewebview2.exe 5816 msedgewebview2.exe 3720 msedgewebview2.exe 1836 msedgewebview2.exe 3064 msedgewebview2.exe 3788 msedgewebview2.exe 4892 msedgewebview2.exe 3088 msedgewebview2.exe 4636 msedgewebview2.exe 976 msedgewebview2.exe 5348 msedgewebview2.exe 5748 msedgewebview2.exe 5016 msedgewebview2.exe 756 MicrosoftEdgeUpdate.exe 5936 MicrosoftEdgeUpdate.exe 5012 BGAUpdate.exe 2040 MicrosoftEdgeUpdate.exe 5824 MicrosoftEdgeUpdate.exe 5160 MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe 1616 MicrosoftEdgeUpdate.exe 764 MicrosoftEdgeUpdate.exe 4476 MicrosoftEdgeUpdate.exe 4084 MicrosoftEdgeUpdate.exe 5128 MicrosoftEdgeUpdateComRegisterShell64.exe 1724 MicrosoftEdgeUpdateComRegisterShell64.exe 5080 MicrosoftEdgeUpdateComRegisterShell64.exe 5880 MicrosoftEdgeUpdate.exe 5312 MicrosoftEdgeUpdate.exe 5828 MicrosoftEdgeUpdate.exe 2828 MicrosoftEdge_X64_122.0.2365.92.exe 452 setup.exe 4744 setup.exe -
Loads dropped DLL 64 IoCs
pid Process 4000 MsiExec.exe 3664 MicrosoftEdgeUpdate.exe 5352 MicrosoftEdgeUpdate.exe 5380 MicrosoftEdgeUpdate.exe 5404 MicrosoftEdgeUpdateComRegisterShell64.exe 5380 MicrosoftEdgeUpdate.exe 5432 MicrosoftEdgeUpdateComRegisterShell64.exe 5380 MicrosoftEdgeUpdate.exe 5468 MicrosoftEdgeUpdateComRegisterShell64.exe 5380 MicrosoftEdgeUpdate.exe 5524 MicrosoftEdgeUpdate.exe 5616 MicrosoftEdgeUpdate.exe 5652 MicrosoftEdgeUpdate.exe 5652 MicrosoftEdgeUpdate.exe 5616 MicrosoftEdgeUpdate.exe 5696 MicrosoftEdgeUpdate.exe 5560 MicrosoftEdgeUpdate.exe 4000 MsiExec.exe 5168 liquidlauncher.exe 5204 msedgewebview2.exe 4372 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5628 msedgewebview2.exe 2188 msedgewebview2.exe 5628 msedgewebview2.exe 2188 msedgewebview2.exe 5384 msedgewebview2.exe 5384 msedgewebview2.exe 5628 msedgewebview2.exe 5628 msedgewebview2.exe 5628 msedgewebview2.exe 5628 msedgewebview2.exe 3648 msedgewebview2.exe 3648 msedgewebview2.exe 3648 msedgewebview2.exe 4304 msedgewebview2.exe 4304 msedgewebview2.exe 4304 msedgewebview2.exe 5204 msedgewebview2.exe 3436 msedgewebview2.exe 3436 msedgewebview2.exe 3436 msedgewebview2.exe 3812 msedgewebview2.exe 3812 msedgewebview2.exe 3812 msedgewebview2.exe 4376 msedgewebview2.exe 4376 msedgewebview2.exe 1612 msedgewebview2.exe 1612 msedgewebview2.exe 4376 msedgewebview2.exe 1612 msedgewebview2.exe 3264 msedgewebview2.exe 3264 msedgewebview2.exe 3264 msedgewebview2.exe 2740 msedgewebview2.exe 2740 msedgewebview2.exe 2740 msedgewebview2.exe 5820 msedgewebview2.exe 5820 msedgewebview2.exe 5820 msedgewebview2.exe 5796 msedgewebview2.exe 5796 msedgewebview2.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\notification_click_helper.exe" setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\PdfPreview\\PdfPreviewHandler.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ServerExecutable = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\notification_helper.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\notification_helper.exe\"" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\BHO\\ie_to_edge_bho_64.dll" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B54934CD-71A6-4698-BDC2-AFEA5B86504C}\InprocServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3A84F9C2-6164-485C-A7D9-4B27F8AC009E}\InProcServer32\ThreadingModel = "Apartment" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A749F25-A9E2-4CBE-9859-CF7B15255E14}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\notification_click_helper.exe\"" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{628ACE20-B77A-456F-A88D-547DB6CEEDD5}\LocalServer32 setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{983A8821-FE45-462A-919F-41A3B80645B2}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\EnterpriseMode setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29} setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\Policy = "3" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppPath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\122.0.2365.92\\BHO" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\AppName = "ie_to_edge_stub.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\microsoft-edge setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\EnterpriseMode\MSEdgePath = "C:\\Program Files (x86)\\Microsoft\\Edge\\Application" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{c9abcf16-8dc2-4a95-bae3-24fd98f2ed29}\ = "IEToEdge Handler" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\ProtocolExecute setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\EdgeIntegration\AdapterLocations\C:\Program Files (x86)\Microsoft\Edge\Application = "1" setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge\InstallerPinned = "0" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Edge setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23\52C64B7E\@%systemroot%\system32\FirewallControlPanel.dll,-12122 = "Windows Defender Firewall" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE}\ = "IJobObserver" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.Update3WebMachine.1.0\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\NumMethods\ = "9" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\ProgID MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CECDDD22-2E72-4832-9606-A9B0E5E344B2} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\NumMethods\ = "24" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{99F8E195-1042-4F89-A28C-89CDB74A14AE} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\ = "IApp" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ = "IAppCommand" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\ProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\Elevation MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.21\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ServiceParameters = "/comsvc" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ = "ICoCreateAsyncStatus" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ = "IRegistrationUpdateHook" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.mhtml setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\ = "Microsoft Edge Update Broker Class Factory" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods\ = "23" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3805CA06-AC83-4F00-8A02-271DCD89BDEB}\NumMethods\ = "27" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F7B3738C-9BCA-4B14-90B7-89D0F3A3E497}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{C54F392B-CBA7-4F57-AE2E-DDCE3A1A801F}" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\ELEVATION MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FEA2518F-758F-4B95-A59F-97FCEEF1F5D0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32\ = "{983A8821-FE45-462A-919F-41A3B80645B2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\ = "ICoCreateAsync" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5F9C80B5-9E50-43C9-887C-7C6412E110DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ = "IPackage" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\LocalServer32\ = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.185.27\\MicrosoftEdgeUpdateBroker.exe\"" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\ = "IJobObserver2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ = "Microsoft Edge Update Process Launcher Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\CurVer\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F09CD6C-5964-4573-82E3-EBFF7702865B} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3076 msiexec.exe 3076 msiexec.exe 1460 powershell.exe 1460 powershell.exe 1460 powershell.exe 3664 MicrosoftEdgeUpdate.exe 3664 MicrosoftEdgeUpdate.exe 3664 MicrosoftEdgeUpdate.exe 3664 MicrosoftEdgeUpdate.exe 3664 MicrosoftEdgeUpdate.exe 3664 MicrosoftEdgeUpdate.exe 5168 liquidlauncher.exe 5168 liquidlauncher.exe 3788 msedgewebview2.exe 3788 msedgewebview2.exe 756 MicrosoftEdgeUpdate.exe 756 MicrosoftEdgeUpdate.exe 756 MicrosoftEdgeUpdate.exe 756 MicrosoftEdgeUpdate.exe 5824 MicrosoftEdgeUpdate.exe 5824 MicrosoftEdgeUpdate.exe 764 MicrosoftEdgeUpdate.exe 764 MicrosoftEdgeUpdate.exe 5312 MicrosoftEdgeUpdate.exe 5312 MicrosoftEdgeUpdate.exe 5312 MicrosoftEdgeUpdate.exe 5312 MicrosoftEdgeUpdate.exe 3488 setup.exe 3488 setup.exe 5828 MicrosoftEdgeUpdate.exe 5828 MicrosoftEdgeUpdate.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe 5204 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3720 msiexec.exe Token: SeIncreaseQuotaPrivilege 3720 msiexec.exe Token: SeSecurityPrivilege 3076 msiexec.exe Token: SeCreateTokenPrivilege 3720 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3720 msiexec.exe Token: SeLockMemoryPrivilege 3720 msiexec.exe Token: SeIncreaseQuotaPrivilege 3720 msiexec.exe Token: SeMachineAccountPrivilege 3720 msiexec.exe Token: SeTcbPrivilege 3720 msiexec.exe Token: SeSecurityPrivilege 3720 msiexec.exe Token: SeTakeOwnershipPrivilege 3720 msiexec.exe Token: SeLoadDriverPrivilege 3720 msiexec.exe Token: SeSystemProfilePrivilege 3720 msiexec.exe Token: SeSystemtimePrivilege 3720 msiexec.exe Token: SeProfSingleProcessPrivilege 3720 msiexec.exe Token: SeIncBasePriorityPrivilege 3720 msiexec.exe Token: SeCreatePagefilePrivilege 3720 msiexec.exe Token: SeCreatePermanentPrivilege 3720 msiexec.exe Token: SeBackupPrivilege 3720 msiexec.exe Token: SeRestorePrivilege 3720 msiexec.exe Token: SeShutdownPrivilege 3720 msiexec.exe Token: SeDebugPrivilege 3720 msiexec.exe Token: SeAuditPrivilege 3720 msiexec.exe Token: SeSystemEnvironmentPrivilege 3720 msiexec.exe Token: SeChangeNotifyPrivilege 3720 msiexec.exe Token: SeRemoteShutdownPrivilege 3720 msiexec.exe Token: SeUndockPrivilege 3720 msiexec.exe Token: SeSyncAgentPrivilege 3720 msiexec.exe Token: SeEnableDelegationPrivilege 3720 msiexec.exe Token: SeManageVolumePrivilege 3720 msiexec.exe Token: SeImpersonatePrivilege 3720 msiexec.exe Token: SeCreateGlobalPrivilege 3720 msiexec.exe Token: SeCreateTokenPrivilege 3720 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3720 msiexec.exe Token: SeLockMemoryPrivilege 3720 msiexec.exe Token: SeIncreaseQuotaPrivilege 3720 msiexec.exe Token: SeMachineAccountPrivilege 3720 msiexec.exe Token: SeTcbPrivilege 3720 msiexec.exe Token: SeSecurityPrivilege 3720 msiexec.exe Token: SeTakeOwnershipPrivilege 3720 msiexec.exe Token: SeLoadDriverPrivilege 3720 msiexec.exe Token: SeSystemProfilePrivilege 3720 msiexec.exe Token: SeSystemtimePrivilege 3720 msiexec.exe Token: SeProfSingleProcessPrivilege 3720 msiexec.exe Token: SeIncBasePriorityPrivilege 3720 msiexec.exe Token: SeCreatePagefilePrivilege 3720 msiexec.exe Token: SeCreatePermanentPrivilege 3720 msiexec.exe Token: SeBackupPrivilege 3720 msiexec.exe Token: SeRestorePrivilege 3720 msiexec.exe Token: SeShutdownPrivilege 3720 msiexec.exe Token: SeDebugPrivilege 3720 msiexec.exe Token: SeAuditPrivilege 3720 msiexec.exe Token: SeSystemEnvironmentPrivilege 3720 msiexec.exe Token: SeChangeNotifyPrivilege 3720 msiexec.exe Token: SeRemoteShutdownPrivilege 3720 msiexec.exe Token: SeUndockPrivilege 3720 msiexec.exe Token: SeSyncAgentPrivilege 3720 msiexec.exe Token: SeEnableDelegationPrivilege 3720 msiexec.exe Token: SeManageVolumePrivilege 3720 msiexec.exe Token: SeImpersonatePrivilege 3720 msiexec.exe Token: SeCreateGlobalPrivilege 3720 msiexec.exe Token: SeCreateTokenPrivilege 3720 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3720 msiexec.exe Token: SeLockMemoryPrivilege 3720 msiexec.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3720 msiexec.exe 3720 msiexec.exe 3720 msiexec.exe 5168 liquidlauncher.exe 5168 liquidlauncher.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4000 3076 msiexec.exe 100 PID 3076 wrote to memory of 4000 3076 msiexec.exe 100 PID 3076 wrote to memory of 4000 3076 msiexec.exe 100 PID 3076 wrote to memory of 4888 3076 msiexec.exe 106 PID 3076 wrote to memory of 4888 3076 msiexec.exe 106 PID 3076 wrote to memory of 1460 3076 msiexec.exe 108 PID 3076 wrote to memory of 1460 3076 msiexec.exe 108 PID 1460 wrote to memory of 1248 1460 powershell.exe 112 PID 1460 wrote to memory of 1248 1460 powershell.exe 112 PID 1460 wrote to memory of 1248 1460 powershell.exe 112 PID 1248 wrote to memory of 3664 1248 MicrosoftEdgeWebview2Setup.exe 113 PID 1248 wrote to memory of 3664 1248 MicrosoftEdgeWebview2Setup.exe 113 PID 1248 wrote to memory of 3664 1248 MicrosoftEdgeWebview2Setup.exe 113 PID 3664 wrote to memory of 5352 3664 MicrosoftEdgeUpdate.exe 114 PID 3664 wrote to memory of 5352 3664 MicrosoftEdgeUpdate.exe 114 PID 3664 wrote to memory of 5352 3664 MicrosoftEdgeUpdate.exe 114 PID 3664 wrote to memory of 5380 3664 MicrosoftEdgeUpdate.exe 115 PID 3664 wrote to memory of 5380 3664 MicrosoftEdgeUpdate.exe 115 PID 3664 wrote to memory of 5380 3664 MicrosoftEdgeUpdate.exe 115 PID 5380 wrote to memory of 5404 5380 MicrosoftEdgeUpdate.exe 116 PID 5380 wrote to memory of 5404 5380 MicrosoftEdgeUpdate.exe 116 PID 5380 wrote to memory of 5432 5380 MicrosoftEdgeUpdate.exe 117 PID 5380 wrote to memory of 5432 5380 MicrosoftEdgeUpdate.exe 117 PID 5380 wrote to memory of 5468 5380 MicrosoftEdgeUpdate.exe 118 PID 5380 wrote to memory of 5468 5380 MicrosoftEdgeUpdate.exe 118 PID 3664 wrote to memory of 5524 3664 MicrosoftEdgeUpdate.exe 119 PID 3664 wrote to memory of 5524 3664 MicrosoftEdgeUpdate.exe 119 PID 3664 wrote to memory of 5524 3664 MicrosoftEdgeUpdate.exe 119 PID 3664 wrote to memory of 5616 3664 MicrosoftEdgeUpdate.exe 120 PID 3664 wrote to memory of 5616 3664 MicrosoftEdgeUpdate.exe 120 PID 3664 wrote to memory of 5616 3664 MicrosoftEdgeUpdate.exe 120 PID 5652 wrote to memory of 5696 5652 MicrosoftEdgeUpdate.exe 122 PID 5652 wrote to memory of 5696 5652 MicrosoftEdgeUpdate.exe 122 PID 5652 wrote to memory of 5696 5652 MicrosoftEdgeUpdate.exe 122 PID 5652 wrote to memory of 5228 5652 MicrosoftEdgeUpdate.exe 124 PID 5652 wrote to memory of 5228 5652 MicrosoftEdgeUpdate.exe 124 PID 5228 wrote to memory of 5284 5228 MicrosoftEdge_X64_122.0.2365.92.exe 125 PID 5228 wrote to memory of 5284 5228 MicrosoftEdge_X64_122.0.2365.92.exe 125 PID 5284 wrote to memory of 5308 5284 setup.exe 126 PID 5284 wrote to memory of 5308 5284 setup.exe 126 PID 5652 wrote to memory of 5560 5652 MicrosoftEdgeUpdate.exe 128 PID 5652 wrote to memory of 5560 5652 MicrosoftEdgeUpdate.exe 128 PID 5652 wrote to memory of 5560 5652 MicrosoftEdgeUpdate.exe 128 PID 4000 wrote to memory of 5168 4000 MsiExec.exe 134 PID 4000 wrote to memory of 5168 4000 MsiExec.exe 134 PID 5168 wrote to memory of 5204 5168 liquidlauncher.exe 135 PID 5168 wrote to memory of 5204 5168 liquidlauncher.exe 135 PID 5204 wrote to memory of 4372 5204 msedgewebview2.exe 136 PID 5204 wrote to memory of 4372 5204 msedgewebview2.exe 136 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 PID 5204 wrote to memory of 5628 5204 msedgewebview2.exe 137 -
System policy modification 1 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} = "1" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection msedgewebview2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\ setup.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\liquidlauncher_0.2.5_x64_en-US.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3720
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 6097874BC90A9038D44128A4D16BD0C8 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files\liquidlauncher\liquidlauncher.exe"C:\Program Files\liquidlauncher\liquidlauncher.exe"3⤵
- Checks whether UAC is enabled
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5168 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=MojoIpcz --lang=en-US --accept-lang=en-US --mojo-named-platform-channel-pipe=5168.5196.86476503996155900174⤵
- Checks computer location settings
- Checks system information in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5204 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.129 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=122.0.2365.92 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7fff14c15fd8,0x7fff14c15fe4,0x7fff14c15ff05⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4372
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1748 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5628
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=1796 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2188
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=2232 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5384
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=3296 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3648
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=3792 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4304
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=4572 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3436
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=4832 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3812
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=4828 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4376
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=4980 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1612
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=5280 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3264
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=5524 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:2740
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=5712 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5820
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=5060 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5796
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=5984 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:6052
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=6168 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:4940
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=6468 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:5816
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=6268 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:3720
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=5944 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:1836
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=5700 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:3064
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=4652 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=4700 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:4892
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=4688 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:3088
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=4252 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:4636
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=4624 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:976
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=5016 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:5348
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=5708 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:5748
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.92\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.2.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=5736 --field-trial-handle=1740,i,4614931156360769376,10852190625546130743,262144 --enable-features=MojoIpcz --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version /prefetch:85⤵
- Executes dropped EXE
PID:5016
-
-
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoProfile -windowstyle hidden try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 } catch {}; Invoke-WebRequest -Uri "https://go.microsoft.com/fwlink/p/?LinkId=2124703" -OutFile "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" ; Start-Process -FilePath "$env:TEMP\MicrosoftEdgeWebview2Setup.exe" -ArgumentList ('/silent', '/install') -Wait2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUBB80.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"4⤵
- Sets file execution options in registry
- Checks computer location settings
- Checks system information in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:5352
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5380 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5404
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5432
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.21\MicrosoftEdgeUpdateComRegisterShell64.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5468
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjEiIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QkZGNzI5MjgtNUU3Ri00RTU3LUEyOTgtQkI3RTZEQzkwQzk1fSIgdXNlcmlkPSJ7NUQzNDM3MEItRkZENC00M0Y1LUFBRDAtNzA0QTg2QkNGOUQyfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGQTE2NkRENi04ODQ0LTRBRTQtQUFCOC04MDU1MUVEQzdBN0Z9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3I0NTJ0MStrMlRncS9IWHpqdkZOQlJob3BCV1I5c2JqWHhxZVVESDl1WDA9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xODUuMTciIG5leHR2ZXJzaW9uPSIxLjMuMTg1LjIxIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODcwOTM3NzE5IiBpbnN0YWxsX3RpbWVfbXM9IjQ1MyIvPjwvYXBwPjwvcmVxdWVzdD45⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:5524
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{BFF72928-5E7F-4E57-A298-BB7E6DC90C95}" /silent5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5616
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2688
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9Ins4QTY5RDM0NS1ENTY0LTQ2M2MtQUZGMS1BNjlEOUU1MzBGOTZ9IiB2ZXJzaW9uPSIxMDYuMC41MjQ5LjExOSIgbmV4dHZlcnNpb249IiIgbGFuZz0iZW4iIGJyYW5kPSJHR0xTIiBjbGllbnQ9IiIgaW5zdGFsbGFnZT0iMjkiIGluc3RhbGxkYXRldGltZT0iMTcwODk1NzMxNCIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzUzNDU4NzI5MDAwMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE2OTE1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODc2MjUwMzc2Ii8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:5696
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\MicrosoftEdge_X64_122.0.2365.92.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\MicrosoftEdge_X64_122.0.2365.92.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5228 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\EDGEMITMP_5075F.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\EDGEMITMP_5075F.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\MicrosoftEdge_X64_122.0.2365.92.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\EDGEMITMP_5075F.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\EDGEMITMP_5075F.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.129 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{74CA45F3-43B7-4289-869F-775C12554439}\EDGEMITMP_5075F.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.92 --initial-client-data=0x228,0x22c,0x230,0x204,0x234,0x7ff604f279a8,0x7ff604f279b4,0x7ff604f279c04⤵
- Executes dropped EXE
PID:5308
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjEiIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QkZGNzI5MjgtNUU3Ri00RTU3LUEyOTgtQkI3RTZEQzkwQzk1fSIgdXNlcmlkPSJ7NUQzNDM3MEItRkZENC00M0Y1LUFBRDAtNzA0QTg2QkNGOUQyfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins5OEQyRkE3Qy0yNDhELTRFMDUtQUJDQS0xNzkzQTY3NUE1NUV9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-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-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-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Checks system information in the registry
- Executes dropped EXE
- Loads dropped DLL
PID:5560
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4a41⤵PID:2184
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Checks system information in the registry
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:756
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:5936 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{36AE0CF7-8A89-4159-BAD1-007CC828F495}\BGAUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{36AE0CF7-8A89-4159-BAD1-007CC828F495}\BGAUpdate.exe" --edgeupdate-client --system-level2⤵
- Adds Run key to start application
- Executes dropped EXE
PID:5012
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjEiIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RTcwREZDNUQtRkU5Mi00MzQzLTk5QUYtMENGQjk3RDdBNDY4fSIgdXNlcmlkPSJ7NUQzNDM3MEItRkZENC00M0Y1LUFBRDAtNzA0QTg2QkNGOUQyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9InsyQUM4ODYxNC03OTNFLTQyRUEtOTE2My0yRDA2NjIzRjlEQ0J9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O0RWMGpJL0tEbHhoSHVlMUw5S1JHR2NxT2hmM0gzaDNhY1NyRWFuUUtmZ1E9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezFGQUI4Q0ZFLTk4NjAtNDE1Qy1BNkNBLUFBN0QxMjAyMTk0MH0iIHZlcnNpb249IiIgbmV4dHZlcnNpb249IjIuMC4wLjMyIiBsYW5nPSIiIGJyYW5kPSJFVUZJIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9ImNvbnNlbnQ9ZmFsc2UiIGluc3RhbGxhZ2U9Ii0xIiBpbnN0YWxsZGF0ZT0iLTEiPjx1cGRhdGVjaGVjay8-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iODAzNDQ3MDEyOCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjMwMTYiIGRvd25sb2FkX3RpbWVfbXM9IjExNzY5IiBkb3dubG9hZGVkPSIxODA0ODAzMiIgdG90YWw9IjE4MDQ4MDMyIiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSIyOTciLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Checks system information in the registry
- Executes dropped EXE
PID:2040
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5824 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3C1B533-F20B-4895-8BA4-E8022E59A637}\MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{D3C1B533-F20B-4895-8BA4-E8022E59A637}\MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe" /update /sessionid "{5884D602-DCC0-486B-9363-AD8CE6C55779}"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:5160 -
C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUC3C5.tmp\MicrosoftEdgeUpdate.exe" /update /sessionid "{5884D602-DCC0-486B-9363-AD8CE6C55779}"3⤵
- Sets file execution options in registry
- Checks system information in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Modifies registry class
PID:4476
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Modifies registry class
PID:4084 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:5128
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:1724
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.185.27\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
PID:5080
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGV4cCBldGFnPSImcXVvdDtEVjBqSS9LRGx4aEh1ZTFMOUtSR0djcU9oZjNIM2gzYWNTckVhblFLZmdRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTg1LjIxIiBuZXh0dmVyc2lvbj0iMS4zLjE4NS4yNyIgbGFuZz0iIiBicmFuZD0iSU5CWCIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjI4IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MDg5ODUxMjkiPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjgxNjI4MTg2MTciLz48L2FwcD48L3JlcXVlc3Q-4⤵
- Checks system information in the registry
- Executes dropped EXE
PID:5880
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjEiIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NTg4NEQ2MDItRENDMC00ODZCLTkzNjMtQUQ4Q0U2QzU1Nzc5fSIgdXNlcmlkPSJ7NUQzNDM3MEItRkZENC00M0Y1LUFBRDAtNzA0QTg2QkNGOUQyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins2Qzk4RDY2Mi1EODg1LTRFRjMtOEYzRS1BRjBCMDFDRkVCNDN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O0RWMGpJL0tEbHhoSHVlMUw5S1JHR2NxT2hmM0gzaDNhY1NyRWFuUUtmZ1E9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xODUuMjEiIG5leHR2ZXJzaW9uPSIxLjMuMTg1LjI3IiBsYW5nPSIiIGJyYW5kPSJJTkJYIiBjbGllbnQ9IiIgZXhwZXJpbWVudHM9IlByb2R1Y3RzVG9SZWdpc3Rlcj0lN0IxRkFCOENGRS05ODYwLTQxNUMtQTZDQS1BQTdEMTIwMjE5NDAlN0QiIGluc3RhbGxhZ2U9IjI4Ij48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjEyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI4MTQwNjMwOTk4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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_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-PHBpbmcgcj0iMjkiIHJkPSI2MjY1IiBwaW5nX2ZyZXNobmVzcz0ie0NCQzVGMDFCLTRCMjItNDJGOS04QkVBLTM4QTMzOTNCRDBCOH0iLz48L2FwcD48YXBwIGFwcGlkPSJ7NTZFQjE4RjgtQjAwOC00Q0JELUI2RDItOEM5N0ZFN0U5MDYyfSIgdmVyc2lvbj0iOTIuMC45MDIuNjciIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iMjgiIGlzX3Bpbm5lZF9zeXN0ZW09InRydWUiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM1MzQzMzI1NzA5Nzg0MDAiPjx1cGRhdGVjaGVjay8-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-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Checks system information in the registry
- Executes dropped EXE
PID:1616
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5312
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Checks system information in the registry
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5828 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\MicrosoftEdge_X64_122.0.2365.92.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\MicrosoftEdge_X64_122.0.2365.92.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable2⤵
- Executes dropped EXE
PID:2828 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\MicrosoftEdge_X64_122.0.2365.92.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable3⤵
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Modifies Installed Components in the registry
- Drops file in Program Files directory
- Executes dropped EXE
- Registers COM server for autorun
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- System policy modification
PID:452 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.129 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.92 --initial-client-data=0x230,0x234,0x238,0x20c,0x23c,0x7ff61b6679a8,0x7ff61b6679b4,0x7ff61b6679c04⤵
- Executes dropped EXE
PID:4744
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4124 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.129 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.92 --initial-client-data=0x230,0x234,0x238,0x20c,0x23c,0x7ff61b6679a8,0x7ff61b6679b4,0x7ff61b6679c05⤵PID:2672
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Installer\setup.exe" --msedge --channel=stable --register-package-identity --verbose-logging --system-level4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488 -
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.129 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.92\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.92 --initial-client-data=0x230,0x234,0x238,0x20c,0x23c,0x7ff7615479a8,0x7ff7615479b4,0x7ff7615479c05⤵
- Drops file in Program Files directory
PID:5524
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xODUuMjciIHNoZWxsX3ZlcnNpb249IjEuMy4xODUuMjEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MzBGNzM2NzEtOEQyNC00NEE2LUJDMDgtQTg0ODYxRjVFOUU1fSIgdXNlcmlkPSJ7NUQzNDM3MEItRkZENC00M0Y1LUFBRDAtNzA0QTg2QkNGOUQyfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins3NjU4OTA1Ni0xODQ0LTQ4M0EtODdFOC05OUFDM0E1OUJGRkN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O0RWMGpJL0tEbHhoSHVlMUw5S1JHR2NxT2hmM0gzaDNhY1NyRWFuUUtmZ1E9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xODUuMjciIG5leHR2ZXJzaW9uPSIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iUHJvZHVjdHNUb1JlZ2lzdGVyPSU3QjFGQUI4Q0ZFLTk4NjAtNDE1Qy1BNkNBLUFBN0QxMjAyMTk0MCU3RCIgaW5zdGFsbGFnZT0iMjgiIGNvaG9ydD0icnJmQDAuMjciPjx1cGRhdGVjaGVjay8-PHBpbmcgcmQ9IjYyOTQiIHBpbmdfZnJlc2huZXNzPSJ7OTJFOUNFQTctQUFBQy00MzI2LUI4M0EtNTlGREU4NDE1NDExfSIvPjwvYXBwPjxhcHAgYXBwaWQ9Ins1NkVCMThGOC1CMDA4LTRDQkQtQjZEMi04Qzk3RkU3RTkwNjJ9IiB2ZXJzaW9uPSI5Mi4wLjkwMi42NyIgbmV4dHZlcnNpb249IjEyMi4wLjIzNjUuOTIiIGxhbmc9IiIgYnJhbmQ9IklOQlgiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iMjgiIGlzX3Bpbm5lZF9zeXN0ZW09InRydWUiIGxhc3RfbGF1bmNoX2NvdW50PSIxIiBsYXN0X2xhdW5jaF90aW1lPSIxMzM1MzQzMzI1NzA5Nzg0MDAiPjx1cGRhdGVjaGVjay8-PGV2ZW50IGV2ZW50dHlwZT0iMTIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNjAzNDI0NDMzIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNjAzNTgwNTkxIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNjMwODc4MzkwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjExNjQ1MTYwNDY3IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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⤵
- Checks system information in the registry
PID:4956
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5b25f2814163fc155d82595019736562c
SHA1f61c3fda5fae2c4002fa1b353ca1a99ff736926c
SHA256d3b2db213ca7104789bee1d581c9d15e4d4172fbd9b8d10ad9f0b5332bb7a759
SHA5125eb6c3c2243ca1d9d6a159d650b30a8b463571d30011f049b11a2a2ecb37adb1bb77161b0e291f957434721c46c17bc83b6882dd156cb406815d35fcd805b2b4
-
Filesize
6.8MB
MD5e57d4e600d42e4c112b8a5f43297c37e
SHA10981c5251048f46cb425313d9c20f21cd51c4fd3
SHA256ca273139b833de79d48b91263b81f3b37e164706e4dedbd1990c0e0d09ba3161
SHA512c7a831349e02c5ca30b4b3c708828a595b05f54e51f7e4eedb316ab0d855fb6a78a39d97887fcaac55547bb229983c119f75feb53992e6f30c46c52035767b62
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{1FAB8CFE-9860-415C-A6CA-AA7D12021940}\2.0.0.32\BGAUpdate.exe
Filesize17.2MB
MD513eff92ece4abda4c76236b1668a9d0c
SHA11e908ed6cf873c77790c7ee03ce1673bf2850b92
SHA2567c5c9afa4f6a6ee3a854b915a3486c148d8566411e4362baf049b444bc3e4f5c
SHA512b875d9768be15ec6f33744339d0ff26e88d0b9a54b4486c5f0957035ff833828a3c509ade063cd18332ff4efc3c936aa38e314d67579d78bf9610b4c21c5a5f6
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}\122.0.2365.92\MicrosoftEdge_X64_122.0.2365.92.exe
Filesize33.5MB
MD55f75d0a4d3374c47ca660f021b2884c1
SHA1422f7756fae14f1998fc82fe42fdb4a83dda849e
SHA256b2bfa31aee79361274d3ca116e3c39e6877915b111558d8073194e51adbacfe2
SHA5129cbb376b241329f71037c5452ffb3e0bfe162df6feace9992ef99eeb76e04478d3cba08a3c2c728156e9385da058a3b145a309716d171a421fe2521daad8759f
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Download\{F3C4FE00-EFD5-403B-9569-398A20F1BA4A}\1.3.185.27\MicrosoftEdgeUpdateSetup_X86_1.3.185.27.exe
Filesize1.5MB
MD52412838b3caca23e45c8e9f914ec67b8
SHA1c41209bc7f4c71faf2fddf3f022886fc3e78fdfb
SHA25648c1a3d1f9d843b902ffc8d6b64df566ccb6bfeed84f7d072d19da5d2e9d51ef
SHA512665bffe02b8f46551abf081c78f388b5582861f6f8d8986a860958a37942e01a80a73ba2b0d3a9b743c60265d7f2106b4d27700634bb41ea2481e6f58a8fcc30
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{C3C14FA3-3019-44A9-B16B-C176EE47939C}\EDGEMITMP_08EFA.tmp\SETUP.EX_
Filesize2.8MB
MD5ac32fab2c3001f20f9c57a99c2557220
SHA13132e9e81c4d5208470ccea941565aeeee99f446
SHA256817463502712e46e7638d0f681f14cdb0081570b04e0200a027270c1336700c1
SHA51236c3f9cc04e75c7d83eceb09f44fe3a5b243c543d73df00e3527d0f0fff873769e9d3264e71a1b521c74f87135aa7cfc9fb4d3f59d8c5c0cc19cafb1fa015366
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
182KB
MD5433681ca511d96f96479ac2cca102522
SHA1321b86c79779e3685b022012a4ccae8b5f3aae19
SHA256da5f97895efb9698657ea213e6d0cab53ffe6bee32933ca2341406faf64dfcbc
SHA5127b90a0c624f9500a6aaf39c9244818d128cabc898f5e1e8a28f7a67fafb603b6906610834e172d2762703660dae2cc541d51a5b7478644faa5b6b820b6724188
-
Filesize
201KB
MD531f9e08922765ba2913632f758bc7423
SHA1b36b4bf74d6d4b6c8c0e38d9c6b65ec7da2fa9e7
SHA256c2988c13f66ce033fef65f3af20a00faf555047e710dc6c282c124c848c1eb88
SHA51213808d6b3cf8f8e645bd421eb3916b12cfcef46ab5f0ce1a0cbda91c4be374d03504ec09d1a5916ff2944cc24135cd46dc5be3e6c72fb599b30a58cf8aad7c57
-
Filesize
215KB
MD523a351591308d49bfe2625d302820715
SHA14787ceafc8492b09f85a1c8abb7e5d0c07f52e96
SHA2567610b2c0bf22563e850e185864d9244eee94c853e6595cd18ac59b6d603af651
SHA512cb266826f6ca3de75968dffebd2a3b480fd3348fa1c0b972851f1008540285cf93158555448446fb8b83f1fbff726221e05a3a18b11da0518ad65283d8eb8247
-
Filesize
261KB
MD5f5e9477194d0d7c18a7c3529a10f917c
SHA117b0f78f7c56a89ddcf2232242de8f13f0cdba18
SHA256f5c45634efa29acb9dbd1f16880737797171630c3f81fe23aea26f4dfb094323
SHA512227d890734313d4dbaed48501e6c4cd1f3d1bef403bbab1f65084ead6a32779381bd9d71eab03ca6eed332a7866030eb1fa01fcd1c28a8d7899705dde33446da
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.1MB
MD59cb2b82fbdde7133369f0d8618dba139
SHA14ac0771b6da4c435ed9ab270e4b87f5720fda0de
SHA2560aa838b27da61c7bd94e073b35cb5cf1cf0762d74ccc0214d052f7327d52ae06
SHA512002ffd9938e309693e2b4ffa3e2d3add2046f133e0f219cb5e8f898f55003815f326c98f529fddef9f7653a9a81e3ebb543f8ca034e786b25ae960c3cb2c730f
-
Filesize
28KB
MD5b02f36aca674edfd030906d8aa7d3e11
SHA1638981c1e6713e1c2ce2f551bf7326a1d48ae3c7
SHA256962a6ed3be729a924512528f6170fcec6a86bcdc37f89faf8df3e31fb2c9bf21
SHA5122b5c087c5a1a12e87b6b3ad621b9d5e0380f0a962a727bd261ab1b0ed0a40aa9d7c2500648469758889df598b86e343cb2a3f2d034d07250243a7d1e99dbdfb5
-
Filesize
24KB
MD59a1b664570e9631e6cedf8c2d662421f
SHA1d9efd018975d111a08e35fa92b1d8955dc31eb5f
SHA25652d1f080f3c41c4579603c3cca47b6667472d6b4ed787a3dd7d345ed8b3ac747
SHA51269d4b33cecc3280ba369dbdf60fae92481e8965d6640a1424ac4d72a2355f3d0c367469f638ea6296c1e508fc906f94a2987eddf9cff3ca13659113cd4c178ef
-
Filesize
26KB
MD5ff770d70c8ba319bd01ca708e2644572
SHA16b8c84053f4ae62afdc7002cb3f2e849800dcbb9
SHA256db673f6e96287e8827ffdea3ae880aebb5f1b2bc5d45bf26be6513629ed12f1b
SHA5128bdd358dcff62a0e3927202e7bcb85d374a2cc351e940707ed4d2638f4f40b3666c7741345f6c0bcfa75b9b3204c1a821dbb44458fdda95a05b0b6a253890cd1
-
Filesize
28KB
MD5009dce4ff4b372178c28397fce96a59f
SHA192277110bc332fe7863beb2ddd4e09fbc55bf81c
SHA256d333edca46076709ce749e5c55efc888e49120e27c63ffecdf3e78222ea155e5
SHA5124661f3262e7f002916530cb2c9c70d2de5297ba634ad451d4fb39870a26d1a829082995737b5c0b0911c32a20720862dd753330aeb30e993a882fb4fbb110c43
-
Filesize
29KB
MD5ef2bdeeade769996349c0a0f4a7c5872
SHA18d3944bebeca2cc674b0459c637e125df0621967
SHA2566d23e6e87ce3e847ed059781bf895c846e5e34e66083f92089cf08b403432a55
SHA512260d001693a36c7a5db55739d1781bc41b7c76a182d6761229af2723ec223b426b4b4b568544bcd1c97b2415821f2a9514a49c5483f9038438349f7dc31993b8
-
Filesize
29KB
MD57efa4d227351f5deab462bce9149d40c
SHA185cfaed5408724398f9a3584f9737ac24f4993a4
SHA256b36e0c8bb231ec5597b6a8e86379400d1c3dd2218ec8f401c53538ba7fdbc383
SHA51288dbf96fbe3b1756799f6dd9f216e26449277f0b692fcedf099ee5b8563ec2b44de967cfaac0ea7baf072992b0e24166986070811c6a752923c6894961ab3f36
-
Filesize
29KB
MD5f7d821198825ff1e2cf321d15e7033b1
SHA1fce91abf0300084e22521c81f8d194965f25f556
SHA2563518a0aafab4518df873bfe4e1c9e71e3809e092870acdb12eaacfe52c01e25a
SHA51285b196fe52121c49dddb552dfdaf3f986160b53a78523760dd94ca08cafc5ba75098a744dc5e605419c9914a111dd207d7d737afb91d73bee7ccf0cf83a8dbfb
-
Filesize
29KB
MD5a164b4c542d58d702e81e05024d95459
SHA1e034353f3b1e2afff2ec5c36b36028a94bba9567
SHA256f332fd86ea630afb90bc9d50925b25bd85037e18f186aa45c047fc179ccd77a4
SHA512f7f22ae416d949a45887e0f0f6f67f6b9518d8f5a26578365dc1bbe979f731eaacca34a53c1d55947ba9cb99697df6ea628f005701f711afbd73fc356f848893
-
Filesize
28KB
MD578bbea4a67479fad54a247e877c213c3
SHA1800c9ac56787b18fbc010cf0734b4a187d3f4a7f
SHA256beb02561cdbe2694028c2106b603661d4b7649fb4add685e5314c7c1d27f6252
SHA5128528525660df61bad32f3492659d412367ac42291be8f018ed1017d47baf205ae95b091616b0ac2b20859b1ccf504068dc4e317e176495e9021b109c97c72bc1
-
Filesize
29KB
MD564223294845556ab103ce781a07db647
SHA1988e53cba0f55e6405df02ac35f8013e79fa839f
SHA2568ff65e8754d8f33260e75d43c40b8a4b25eb7d42b85ef73ed6d67ea603c513a1
SHA51258af56f6212b055e350047b641bcf4fccc22012f70e12a4df24d5e2af0964f42ee25cce3d5c8cfb75071bb2e2f9cfde3d3142f2502a1a2cea20fad7e219e0de7
-
Filesize
30KB
MD57f21e0d781e6ca29c3912967eb920b33
SHA125f8be269cb3a1dd322de909b8d25e22919febcf
SHA256aa499ed11eb86855c85426158f198b3efb6fcf67c3b484793f34240bb04f049e
SHA512cdd78c9656aaee68306527e3a81bf6b2bb749b971342c1fe2b45230cc06d97a9ba6e6f6aa4ee50de0d5abf983b0f1d0cad3718162f046e623f2f6dda6ea87200
-
Filesize
28KB
MD57f14c4c134a48cdba2c41ad653a5fda5
SHA1a181b6f139b9e999efb74a11b3a966480c706e79
SHA2566fe845b8e932d1422935eadb0fdbbbcaecdf567778f50f6a10eee72e6ac860e8
SHA5124cfe470e0039f7452db7dacdd8512c5d873b597a583a35cf6132cef3080b3787f816022b14e067bf699bce2b142be2073dda65e9bbfb81457e8fcd8b1436e02c
-
Filesize
28KB
MD5b2d69e686d4d6401479b2cbeb5c62c77
SHA1696ddb825bd7f812c11191bb53c2c00d548d4c00
SHA25640810d25a6f9be67b000ad8228dc20e41e2b0d2223d0ae13878f265fa13bcfde
SHA512b0d877c0ea2266087b8f464efee9fa54a504ec12215d2e7f3f463081075e7128e2d9437a550773e2b703227ca952e0283f940d3a6e1325aae2784e53fb3e6a29
-
Filesize
29KB
MD55666fafa9199b490d2b20cbf2f5395f6
SHA11f43b774ef9a8fc218279dd81e437ffeb40966d1
SHA256e4bd6dc7a20b9053b9dfff7c2c6a8abded5914994d300fd1466c9b271a0bf42f
SHA512660403a3abe9a4c9ed7a1e54e5e582816c57cf3cc9a69cf67b8794e98989933d90acdea4df9dce222d82dafb92145efacfd30bae93c09193be281dc5ec634502
-
Filesize
30KB
MD579c1cef8c38d0ad8e4eac06c84accebf
SHA14092a10acc777d560f255c85b1a1437dd53a7101
SHA2565f50709f64eb3f03766e7aee5f446e8cadc1737d0f404db73f5dc447c1f77899
SHA51213cd04233e8af9c194e44d1f322aa29d156fd399717278cde1fbcac8acb1efdc4a004e5e299ff19ce8b423b3cbcf35337c27bc435a777bd60e0bc4e8417aa9c6
-
Filesize
30KB
MD50dbe7ed570d8139edfb03b022abe1b03
SHA1099e20aeaf984cfa025f017706c694a98f04e2e2
SHA25677b34e4beb5b9b9110582cf55432dd1c75d1816d5744d56c26617d44b7ba37d0
SHA512a0667ef377c52467f8c7da6627f9c06786c8134979929a60c8e248a08f44b0bbfbccbc79458db84d9c4e183446acac9e7e18a65ea4b5e8b60ee3a911d8c96a1d
-
Filesize
27KB
MD538d1b69a1f1e07a99c9df5416b7fc639
SHA1f46cca601d1cc38ddb8e93f393dbf9be909e49a8
SHA256952c6fdbcd0d333319e80d415caa91757ce759fb4d8adcff3229b134c5257244
SHA5129ce6849d6915352e746921b9e7c3222d8e99577c77405ac9d44d33d4b0d70df74bbf06d6ec750d38afa21f2824a081bb74dd271b79ee38015e4b23fdc5d840c7
-
Filesize
27KB
MD590afa78198ebd61bb588145b28f6ae28
SHA156e954a7a9d086a30c49b3fadb39108ed41008fd
SHA256900f4de13607028d1e4442d361e7e0b80670c9601cde0a634a12119b13ad1fb1
SHA512d3d5a80e06f1cdf976cff20ac840eed31034e7e7eb37ce10d58bd7a99c2a3a6db711358e32d77e8248e8f7029aee2b87b37a8ae600810c4b454ee3c08ab723e1
-
Filesize
29KB
MD5e393fa3d70aaa6dc5bef5dcd7df4ff9e
SHA1292fa091659e5954b760e75da9ac9c3d2e4ef1c2
SHA256f40ad5f9cde0853afd1834d3823bcb2a50cb358eee188b5d7a1d88b751237026
SHA512b3c879009495975f1603380d10756281ddc5a004474fefbd0fc470741f7f5b59ca8c3603d87f9bed6709a31f8eb04a7d84ca8c10db2c9d4a43487604058a3163
-
Filesize
28KB
MD510bef36b121886cb7468bb209dcc6836
SHA18b98619e4d8ade70f1f9008f6183de785b6b4509
SHA256515f0a0334db3271f84bbb288aac9b907d6c363dc1a9a6447117a7e7c967ad29
SHA5123b3a06f02d5bf5734b99ee38a249c3232b61f2a5fac837405501bd9cc9c8cbcbbb38dbadf3734a7a6b986a79ef34c7ce63c8c8fdde7d10c8bd916a13eb8f662f
-
Filesize
28KB
MD5999504016169d3caedb132c230feacc2
SHA1a0efc52f4104906ac51da46f24779358a319df8c
SHA256ec804f7507269d52785b699b4fd18a2d1a3ca7e0956dc15bac034151596b75c6
SHA512ae3b4b3c38ac6af5dc80238d0e3730ccdfd436dca6daee317b58f92cca22ea51ea2ef720e32f92693d23e8383fefccf9c46c10a148036687f0a7dd8bc844f274
-
Filesize
28KB
MD5cc332ec84b9dc507745c1833284ad4d4
SHA1acab1658ed5f20201ade23311f6436da6bc7ed73
SHA2566533a3d4e7af844763e89e3a4bf2330dc37dd2dfd6176f98720140b1f22a7830
SHA5125125af4cdefd131d79988296362e92dbed46c7ac70264a9592fbc633ea2527944745c7c3cd475b0117efb0729885b696fa7f90cbdacc04d699d6aed235482259
-
Filesize
27KB
MD5cf17425264c5d3e95ec3cc93e0cfd95b
SHA1132652c83194a66e1820ba805b0cd1060ab7c66a
SHA2560a394125c397e472932f7bcf40e2f54ca1050e0620d35ca322c6f48d80bdbf4c
SHA512f7e2408ab5560717252c0536ab652cedbc2cd17a7e6d375d7dcfbd2cd8894b4dcd71f023d2bae35237250e1cbda08385a1484550a07f13901f39e6d75e9f87e7
-
Filesize
28KB
MD53cdfa04a84ba151c6ef1e1711d90b243
SHA1d306f97bd7a3a6f620994c5c98758034a8899727
SHA2560a063456432fce42401c8362714e98ec157e9f9e5ed3eebc4d96f9b4a039167a
SHA512e02ba732feab507c478df22aacf2b8399bdbed4f937cddcde9a3c0dd38cdab0a9c434dcfa8989c1d97fdf1e9efa67b64e9dec631663bc56df0356ca2036e2cd1
-
Filesize
29KB
MD5e448e42312360c764f4eb091472aa469
SHA1b8afcc1406fcd0041c50ce858883d1a629700537
SHA256fb31e09bdf7fc834317bd9ddc3376bd1992c3eacde48ee71a133f969e20401f6
SHA5128af85244d4b24292289feb560e79f69e65dbdbf16ace5cb12fae73371630b71e3bb122bb276debbc7842d8b53b0ea3a12eb89acb51b3c8f39fb45c8337304077
-
Filesize
30KB
MD5000135745b1756a8a8d3e73140e18ac1
SHA12399c903c91bb969794a41d1a5e693e8f33125d9
SHA25692b4f9d8fb86a8aa24f929d27e76e680923717e29a88ede229abf357eec3a299
SHA512c0b3484a02888fd6323b6754d76325cbd5b48cbeaaeea91dd2ad8c2a3e74ee51294e7edbbf4725e9b00c7c589750199548444484c5d8d15ed973bb63bc8f0773
-
Filesize
30KB
MD51e41bacb6e221e7db7772bf7a9b9b228
SHA15036f8c73029b74b51da93330e5bd6be78998953
SHA256ecef2e77abe7a1e67ee7e2b1e281ff3f2b1e0cdc4ae1d96ca4e6d25730587efd
SHA51281bc5de9bf1c392c886b9d83de8e3dd290399c31504ed998a746eb2b3cc2f7c43154854973146a29e9164b2fd6df8e6bae7a63c9288c4dcb7ac9313c18289c9d
-
Filesize
28KB
MD5baab875fbcead06d6bfe0eb3325f9d1c
SHA17c770a51d93b5651f14a290858fc25a8c5458378
SHA256e2706880a1ed7cb34faef4ca0f3b2df7aa4e75d869dae74c86d750df8423c1f9
SHA512994fa0d9f9d02b1320acc5ad336e30451931a52e6a8c48b3b5d9d5179b42c68feaa14fc76cd2ce99f682f1dfad5d8ce21b87a12321fabe504eb9c0844a49fd32
-
Filesize
30KB
MD5c98c2777d3e3f5b4cdaacfac7b92233e
SHA1879cb8fb3f292c05aab59a2852daaa089b13cd00
SHA2561afc654cdc779a78ac66c08f527da746ae99197d2b4a8d23f024afabbe98434e
SHA51272ad4fd9e2f3b29f937ba0cefe6adeb85edcf26f913b5f4dcf8d7921a7cfd38fa1eef67db7c83e1ebc4714dffcc4adb9dd6ca909b2b7ebaf2827d2b2f90523c1
-
Filesize
28KB
MD564e4a461716700e7f14e7014abe9816d
SHA1cea6b0612f2dffb7e42d23629d41ffd73cbc63b8
SHA2569674903cdc0e08f18c8f071ed9fccdb8aa20184c85d48d99e8e90de4f4e33a05
SHA512f68f902cd1a3e1232401db23ab466e7a38ae09e3324bc91fd6066d19b9246dde068178b73ae5fa6cdecc420b0d3a818f183f46d280f53e8c311b063c029537f3
-
Filesize
28KB
MD52bc86512dd0753e4649fc66d72760498
SHA121d7a1ff5c5f54f9aec52b4d6dd6beb72c9988eb
SHA25601df748e21237a03eb6e9d616cf0ab2cc63272a736c8e6fefb476a2b59be3302
SHA512aa7cc40847eb65bd67c07261d48c18322d63cd7acd5d230cd93847ee7e94e879ef87e9fb96b4131af7aa45524b3c48a01c3a215bc515a2227223504045cfdc83
-
Filesize
28KB
MD53a60d0c9d26cd258b08f80daa33b0134
SHA1ea55affe72494cb0f7145644277270627d68f99f
SHA256f8647909bbfbe73c0c962eae21c45ca58717f97cfea7dad404fde52367f837b7
SHA5128e1b6e53020652f391511c8b4e64b8c12bddf5c52f869c8069349c44576520a9529bf120d377c243e5b6dbee0c37a8d9b31a0e4eaf2126b553d485e840027370
-
Filesize
29KB
MD5cabeca48e04e6bcbe4fcd9231bb70ff1
SHA1af016512f0bd3a51b38eb22c7aab8ce07a48e9f1
SHA256fc73ca5d57213643d99432389eb371e13d0217c4718aadf551677667b5f9837b
SHA512e3d1b7f9a5a4672da70090c2c63fbf1a87a27d127a538c940764b611d3e8952ffe7384bc5e103e7d5b90b216eaa595086a9bc070bc9700c7e450476be17a63e8
-
Filesize
29KB
MD5df6a438814eb75ad639cc572f123924f
SHA18aaaba665de347cadd55dce07133265e30d48510
SHA256416d5ed542c2dc6bb7219d2a76b5729ae835db4b63015a9a998a0eaddeeda1a9
SHA51202171d854bfc57845e6eb344a48c4aebd653d229ffd94d4ce1d3d76a623503c6a6b104f9323a7afd16bd0a2007a0d544d8e31f52a3e24a3ee0a4a6520f0933db
-
Filesize
27KB
MD5ef49bfeb60ee4283650932e4e50de722
SHA1e592965caf1dd2f894b24a09f2cd14294ece7d84
SHA256c49adb300b05a792e3b2d0e91d200055886acbbd26b7eaef43722ab3f5c40752
SHA5120a15abbb7f5e43425a561c91ce775ef6944044f3ea9e1dc60371189c79c4fe1cbe059ad38a7492f8b2342f1ecb5fa3a60e1643793bf9db90c21e64f1eeced079
-
Filesize
28KB
MD5333f733cabf382e901c99e1d3049f767
SHA18c858f0ad0f06f137fbc340f01831a7eccbbbaba
SHA25615fb8bbde296a384f6c9bf3acf0d8f6860e30d7dbac2c60cb928300d8464d81a
SHA51281abb4abcca78181956dab1bd8a3b9523cc38f30348675342198f2cf3394fe1366d12f8b61fba7775e8c572c45a23603eca96fe36e693ca2d5f5bee0300101c4
-
Filesize
30KB
MD520af857014bdfa8f869145dc25fdb5e5
SHA10d876e9b0abf907b4cdc0767d120504cf2ecfab5
SHA25613f6f81e6507f2304768922e81ccac99951bec4163cc576f2dc3f65b78cd08cc
SHA512992443bfe3c101270e1fe5b39d8adaf1990b46e79ea2b285fe848e6632bea2ddc6e2a1523611359518c79b0ea4ad5a228f5d778bdf78872010b67e753866ae72
-
Filesize
25KB
MD5f2b801a134d0e6016a500e7237f17fc6
SHA105135e4f7c5c2ffdf7989c761947c7f482e6f859
SHA256556146c69e56b62901e3741d606e12e766324651793c26ed75861c172a34fbf0
SHA5129fd5c3bdd6f6cf4c75869eb0c80f71f00207e3bd0a3cf1ada37ca0916018ad691d93c335faebb919de551ea7e0a0fb8c0ee4b406a573b48f6ce01a21558c555a
-
Filesize
24KB
MD57bee509a3cb93cb97a3c419ded29b379
SHA151b83ac0e624da9dd877894ddb229382c25d479b
SHA2569c24aa6f46f6bb4127a27efb46279762582909dbbe491c2fa1a621a8d9da2408
SHA5120f148229fa873878827437177717ca3be23630f62788886f53703484073d282e3204cb86aab49e493bbde2b2638bc1d6b7f05a7290b32e2b6115854774cf995b
-
Filesize
29KB
MD56e590abdacf69c0a95371ac48ab92698
SHA1f2a4a183010cafedb76c182a6149bbc313ed608e
SHA256975cb32be3ee396f0a076483206fc6a9f8d3671c439ca5aa3649d7cafc1276db
SHA512d2cabc0ae33c9ca75f6146d2c7ed3f37df03a2e6b82e7e6180a2a7bbbd32bff4fa157ec1c8d906c48445c79ad58105ac30e0217739ac21beccf13be369f0cdca
-
Filesize
28KB
MD52b4883e2c8eb6a1cc0618972ab9022bf
SHA190db614ce4217fe3703b87ce8be687e7b244da58
SHA2562815b85a065bab6aae4af23cf5c8ccb5c8f587b5ac57b9719b2fcc6343d573b8
SHA5125e86c7028fa5520fee13b29c833d5949b28bf6e803752df71b6abbe9e1fa5b43c9948e6b4956e554cd5461a101824e051e20b6762cbb418f112f938563f05e20
-
Filesize
27KB
MD519305a2fae65010d305d658338cc4ea4
SHA170fd2048440da6d411fd0ab61f441cbb706b3b11
SHA25627bb6d533b10539f18b9ac37c49d8340ad7bde91e5150981fdd317ef38bb7efb
SHA5125fa9f71e2d5f2b588935be0c1a91faec745e20992584071052cb7624637b7232fb6e5d60aa79926cf2c3ccca47f95ce494769a679259bbf2d5c98374981c61c9
-
Filesize
29KB
MD50b3764cd341edac4f859306f942d816f
SHA16728dcb1c38c7fbee72bf1a23084c806cb724499
SHA2569a7de95fa49e02bc700acc2820cd4099a997988cb57663d2d1e4c2f3c4fe365f
SHA512147380a455df8a314fc7c4173a8e9c2103b09206f0efebcaf8bea96b56ab72f9ee1f92c89146873adc73761d50103543cbe6dedd7717c7ead821157c1bd111ce
-
Filesize
23KB
MD5fc2bf0ff5b72217e0b581be65464836f
SHA1f3e63c61ee645d8ea1db82188ca9c0a74c2f5f9b
SHA256d5b610c073a7e96e6ab38fb15218395a94e4526446a1087f8a45f90fc0b25ce6
SHA512a0de9d8638e89d29dc9b6639ab7e2abeeb710093d6db3b67b0a7290184d0c2200e69ba750f94cec66a4e939687dda65344d6bb020f961fb095444f9c1608462f
-
Filesize
28KB
MD5b0993ff03e515e491a2b30344995f46b
SHA1d4591561bf7ee245a6ee8ef3f10ce59479f46683
SHA2567df3f55e10eb57e79a10a43c9c839ee4dadad6581b1cb696812636194ab3f97b
SHA512244f15d811c519e46a1742502b7cd4c956231239a35f064289398d2b9b94807849f0c0243ebd8d7cb0545a212f23d7d0b621e0254987e2cce46879707ef1af04
-
Filesize
30KB
MD5ae1afaba80329dbf7a2d8c9ae899cb31
SHA159a3c94260512c89f4fa36605273d0a23ca39681
SHA256c01f4e503aaf3b9ba81cdd79255cf3073671758f370bf07fbc59081dfbcd8e45
SHA5127c043fae0aea39b5930e48b2f5eb5a7660da5dc69f288febbac54b3d9b129540c5aa3423fbb77e7c127c6a16bbacb0dfc31f6e3246812a33c1683aecef029acf
-
Filesize
27KB
MD5f341581e529ee7cc558769c1cd23297a
SHA188c956c86045cce4a22fc5ecb16e6184b3ed4c59
SHA256cb5c131a93dd2b77cb0ef5499acc8a0b8d9de15a7193a314452efde262054377
SHA512196542376cd3ec6352a60c2e523ed240c4e1252a8ceb67d4b5ce27ff62c43e6bc5e7191f90afbd0ab910e325b6092a4c5e445fa021b8b02744bf494c62ed9317
-
Filesize
27KB
MD5bf5c6d4441d9495cd1b2a982004a026d
SHA19d92d96194cae48ede6296aff0244f55bd8ca363
SHA2569ef68efd2a91caa4b41321215e4d6adda225311e48ac5c2bddc3e3afe379a595
SHA512a93f651be188a27f90148009c2cc41e194799e3466b1d971f607ee80cda2ee75ce24003d14ae919ab7bfdd14907937aff31672421aed067f381f2480ef3a3a75
-
Filesize
28KB
MD5114b0fdf0183801f36202b4aa52a8c6d
SHA125de0a71c950117c332f3cddaa0f8bc4b1e6a90e
SHA256a8efc8a3399a54ca234bd76247f217576fd8cdc891d1d487e86ba06fef676be0
SHA512cd16f28783f1707215957c6e545cb8454e8d267a606fc91142c7feb1e8f83a020338d4ae3177779bf31b34324e6d8c35d648442345beb019112d402ffb7a0657
-
Filesize
28KB
MD510cd5ec2455ae2eb80280aa5f3a00ad6
SHA1fc0ac954970bb33f9e4f372efa3e99fdc9c32a2c
SHA2569f1f89692559cb6428af5336f29577640015df9fba272dbdf8a44709c9c34496
SHA5121f5209b4efc1d28e3ddde4e8087565861c31bb31e8535d1086601e0d56594ab5b163db0588c8913f6e710630cfa57c4aaf5f2c94717849cc5c73520bb1135738
-
Filesize
29KB
MD5699c8fb732043a02378ead6badb69cd1
SHA1ea9c3bd2eed254ff56dec2cff952a8804ae52ade
SHA256976be8789d91935bd083691afe245bea0230dc159dc2524c93cea2a78229d2e3
SHA5129e8f0af3d5a3f2c602f6566d8ad323bc27d182b6ddb26756d7d2dfa9dc2756f3243c258f6de96f50b8525fdd31cb7230cb360d4098492d52fd7b8a0904ea1f11
-
Filesize
280B
MD5f5761808361458773e9169e2789ca83d
SHA180fa6c4d670fcbacce637e950f0ab28430f71da3
SHA2562a0f89ceed5ed04d8eb56c387cc708ce728f32308e24f812f42f588132e6847d
SHA5125a56b21a73e82d4e2e6deb8eed931a2c5ed8d3225fd03492d3fdc53d667aed44b6c911977cf3b99cf0665c5470c9e4b9bfc418bf4cc652db6fd71ca24d93d8fc
-
Filesize
102B
MD51c539c68a00bd842136703d2cdc94235
SHA1b39f04946e7da8380fa340ddf1baa757afb37df5
SHA256bdd48d0d2e047e4816e1aa4dc248c095998cbda255b50db66b94bd7a42206aed
SHA512eaf0cc24ecfbf8adc1b216a098fa72b95aebe6fbea9206860622c54f684e08447050cc9734fcf83f3eb2e15cb263dfed636539b24c5e4ba94b2ce309d651325b
-
Filesize
66B
MD50c9218609241dbaa26eba66d5aaf08ab
SHA131f1437c07241e5f075268212c11a566ceb514ec
SHA25652493422ac4c18918dc91ef5c4d0e50c130ea3aa99915fa542b890a79ea94f2b
SHA5125d25a1fb8d9e902647673975f13d7ca11e1f00f3c19449973d6b466d333198768e777b8cae5becef5c66c9a0c0ef320a65116b5070c66e3b9844461bb0ffa47f
-
Filesize
134B
MD558d3ca1189df439d0538a75912496bcf
SHA199af5b6a006a6929cc08744d1b54e3623fec2f36
SHA256a946db31a6a985bdb64ea9f403294b479571ca3c22215742bdc26ea1cf123437
SHA512afd7f140e89472d4827156ec1c48da488b0d06daaa737351c7bec6bc12edfc4443460c4ac169287350934ca66fb2f883347ed8084c62caf9f883a736243194a2
-
Filesize
116B
MD5178174a0125d4ff3ed5211426f1ea113
SHA126f72c5a2f65c767c4edb04d8da62bdadc02e809
SHA25664986dfeefa8855069e799b28e5523b35c9efcf2ea152a2b03461471c218da1f
SHA512c0d1d9555f4cd7e9a4b0ee5fc1b069782638ba1680d18ba9c83f796746086b6afdf1400c80b7f586422c3a2a73e51bd04fb250e2db818ef723cb4f7a8b3b15a2
-
Filesize
108B
MD55a6ec1311e0595cabc087867b3974ef0
SHA10a01317eb4d7b7b92f94a434f8914c2c64371978
SHA256dd8d46e0af72599ae64b911eeae346a8932979b6ca1d891e4b597ed8b4ea67e6
SHA5124b2fece51cc467149b4fa2209602532d881c7ac6ae30e41174583d218ee9d965100201e4ba8eb8e9f036c2f3d048d8978fa15c29bac7ce03d787a94741a2a0f4
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
179B
MD5273755bb7d5cc315c91f47cab6d88db9
SHA1c933c95cc07b91294c65016d76b5fa0fa25b323b
SHA2560e22719a850c49b3fba3f23f69c8ff785ce3dee233030ed1ad6e6563c75a9902
SHA5120e375846a5b10cc29b7846b20a5a9193ea55ff802f668336519ff275fb3d179d8d6654fe1d410764992b85a309a3e001cede2f4acdec697957eb71bdeb234bd8
-
Filesize
79B
MD5b2ac91ca2bec034d1a335f9e2f574526
SHA1ae9d2be2c07bfe84fea807d18a235609ac5cae8e
SHA256dfa347c4668c5d16a7d946e9330f08d3551a89dea06e53e1cf24bcf3510ea40e
SHA512ff3dd90c1dc9b10754f54c5c54fff2a6877f00fda09f47e07ab05bcaa40a8d3e960a3654b1cad498cd233c0c09d44d686b523b882a385525b60040d708e88b44
-
Filesize
43B
MD555cf847309615667a4165f3796268958
SHA1097d7d123cb0658c6de187e42c653ad7d5bbf527
SHA25654f5c87c918f69861d93ed21544aac7d38645d10a890fc5b903730eb16d9a877
SHA51253c71b860711561015c09c5000804f3713651ba2db57ccf434aebee07c56e5a162bdf317ce8de55926e34899812b42c994c3ce50870487bfa1803033db9452b7
-
Filesize
113B
MD5b6911958067e8d96526537faed1bb9ef
SHA1a47b5be4fe5bc13948f891d8f92917e3a11ebb6e
SHA256341b28d49c6b736574539180dd6de17c20831995fe29e7bc986449fbc5caa648
SHA51262802f6f6481acb8b99a21631365c50a58eaf8ffdf7d9287d492a7b815c837d6a6377342e24350805fb8a01b7e67816c333ec98dcd16854894aeb7271ea39062
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
15.2MB
MD5c924bdbb4ad2c69b46eb8e4f7f39f870
SHA14608f80e48141278327798686ddf0bae20a77534
SHA25653b7887cfd8a2230c2c6b1f577168e959ffd1cef51f4dad4655095f27acd9af2
SHA5122ed2ccb2d57bbc68cfef356aadaf607a5fba1c2a31b5fd2650b07c5fcaf9a01892712fb69725154fa7ab832985b7a8ee7bafa29e24d39c67da973746b53d1c21
-
Filesize
105KB
MD5ce3e692865380e8ee764b13cabbb08a9
SHA1af0da38a998afb7380606217928ab8029ed30ebe
SHA256076e743c352b96bc71a9e289330d14381e405eae0d40a0f597e296a63d36919c
SHA5120b35e16b92ffe222933d53137d273ef30abc69a6946539226063636b2ef0f047c9bf8b43b140c2453a18a16d7cbde5f47749dd81d025cde68124c592f1fa9d6d
-
Filesize
2KB
MD5b42897bcc9f6c023c5d8ee306abf5013
SHA1f9bb1faf4babcbc43f7df0ea66292d163181b5c4
SHA256b3391459b70d534279c1dfa34bf312a29d3c73c3053e6b69f673bea89f6044f1
SHA5129cf61e8f2bd3d9c9eb5651eb01c3c4996d43d7d6e09603818ca5d0ffb0e149dc6654852d884ebe51c83025ba0351b5b3a544d3c73209ea6af7705741e706f9bd
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\liquidlauncher\liquidlauncher.lnk~RFe57a42f.TMP
Filesize1KB
MD53214dc207f731369377df5a73e258923
SHA13d695349ae92963d4c4d143be4f51d11cca0b0a6
SHA2564a8c4bd3c0524c7c781377466744e910f485944dcb9857a6c7840016987db8c5
SHA5125d54096168e37850e9255df81fd9e1c314d09134347d44598e66e916d1e9e9269d43eb16305c75306206dea055665c58c234e7dc264532a497761e9ab3049304
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
1.5MB
MD5afe19b551bef3007e6c67af7a3c726ef
SHA14f105cd2f045a0b107a58127b75e7818b430c3ae
SHA2560685c3054bbc59a1b1502257d0dafdf4dec22f0965ada2ea88939b4f729b795c
SHA5123d379fdf8f7d24a0032cdc89d68f8c9f4450f19b1ad36d870708a1e70bbdca1dc18ea2fa9710e25b5bcb757e23dd535b35e0212fb3b64055183930035feff01b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\AutoLaunchProtocolsComponent\1.0.0.8\protocols.json
Filesize3KB
MD56bbb18bb210b0af189f5d76a65f7ad80
SHA187b804075e78af64293611a637504273fadfe718
SHA25601594d510a1bbc016897ec89402553eca423dfdc8b82bafbc5653bf0c976f57c
SHA5124788edcfa3911c3bb2be8fc447166c330e8ac389f74e8c44e13238ead2fa45c8538aee325bd0d1cc40d91ad47dea1aa94a92148a62983144fdecff2130ee120d
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\CertificateRevocation\6498.2023.8.1\crl-set
Filesize21KB
MD5d246e8dc614619ad838c649e09969503
SHA170b7cf937136e17d8cf325b7212f58cba5975b53
SHA2569dd9fba7c78050b841643e8d12e58ba9cca9084c98039f1ebff13245655652e1
SHA512736933316ee05520e7839db46da466ef94e5624ba61b414452b818b47d18dcd80d3404b750269da04912dde8f23118f6dfc9752c7bdf1afc5e07016d9c055fdb
-
Filesize
280B
MD5fec34068c5a983b2245bae668c786ae6
SHA1638d181c70787b1d4ffc68c3a124ecddeea31a6a
SHA256517f9376498c006072d5b871298ef1b2fba7470f422da4911d3a1ae24999fc2a
SHA5123a07e067fa1539f12dd6c82139d1072b9c42874344dae0f501a71d154db7c7282ed68dc0b8f953fec1da68ba6257ec081c2e4220019cce13f83c81d6ce643f3d
-
Filesize
280B
MD5b0874f8c7f302cfe010d4716320552f3
SHA112f314a047e178ca5c0f58b2abe59425f2ef9181
SHA256818c412b8cc63783b07d0008acd2f2938a22e7cde6e290f64a2d18d70790716d
SHA512c46831168ec59bce6832f541f4e2b2bc34550adf34d63236ba79275a406888a1fc01ada0c11628bdc2353f7d68ff037be73415cb928028b600387a76ed1b9b63
-
Filesize
50KB
MD5aae1c061cbb5d43a4eba0b3b59b0f029
SHA1814cdc3b92d2cbff7d037fb209708ee60d3f705e
SHA2560e2c87d6bf85f91e04467edceaa817ef394dd5b83bfdf4e258b0cf6f2c942056
SHA5122631c1c795947b2ab9e32f8f3ed0c06621bcffd282cc94c71a8cfe8ab119196e68e89fe8fd8c683852c5706143da7186b60bda04c7fc2403c63e158944ee7969
-
Filesize
96KB
MD533a059caeeec0e49bb8e12d1f37e9a36
SHA1c5989c680d2d4d4f1a9860f85b6028a42a6ad241
SHA2560c4434d49cad02b4667c5685786a8f1a7d3ec1db92cb80373f0764b7c9e6fb25
SHA5124dfde08d30f127d67e244b8d233bb16bf75bbece4186d1ee1e9839d6f41915035db72919e4934f732515a8d0f52a92ece43c7145fda206dfdf5360d7daee9e59
-
Filesize
137KB
MD50662b272c20a131c88a0d0e4ef5ec438
SHA16e6b68e80fae7aba616ba95ce3850520dfe2ab3a
SHA256b2e0b8587b61469ebffdcb5515b355066acc749292aa13e488b499aeeae8550d
SHA512914ce42056ba9d74bf04ea0cb7991cbb88678ba8cae1484f187681cd1303f3bd9b53515fc3d7de6dbd66fb8cf5c0a3023a5205da9924bf2b527f2d4a2342f4df
-
Filesize
56KB
MD5d10c9ee4b0d9dc3bb1aaf72c864fc78c
SHA17f74fba6cf2a056148e95b91b90cd63af48e18b6
SHA25626393ffe1ea3476cc460490259f7c770d03fd1de751b862844a9285e6d63829b
SHA5129f8df0f67b6e005fe4015602128bd4bb14fb91ec4b0fad2acf0c2d17783a335e0b9470fda7cbb75a8c08ba62baffaad4bd5a6e64f4486fb35a4ecc480e050f5c
-
Filesize
19KB
MD5cdc8eebc5968b93310be705973258f07
SHA19330a2fdd0c76768176dfc208e575a0f14e9c8c4
SHA256caf19c50017498e002e2db63f5f69ed0df35b84831b6faae80c6c7272fdf88d4
SHA5122cce3b115f4e0115c21f9790320b41f2715d550793cf8d65e462758cb16371ff063a330ab1291a1adcba6a63b994a32b476ff95b14eb88052455952f6f223fab
-
Filesize
66KB
MD5b62d64ef6acb7d9e69619926d12987fd
SHA1d17547ac81a5b9ec9d3cfaa7fbecd563233af351
SHA256e82a5776a21790a3b2855755cb37d2aea37274b04b5b4e4ee48c318e8127d7e2
SHA51204272f633659e6e220fb325fc42f5909f36b144e5fe8107c65a093ab2b553620749a9b995cf0e8bdb2bfa9fd5cd6708a4f743874a5988ef524d4155e7d8d6e5a
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD59b7378bea5580480cc5e5bf63680ac98
SHA186f6c4cb374b20ab1925948854e65551d0d66a6b
SHA2564e5ecc56c5238dea4c201800cb65fc45b0a712f56df01c7e37ddc7368105e835
SHA51269d59c26af7ebc8ec6a3bbdf104fb0125e170d28422cf4e12d639d8e8d2fe72b456f9da0fd61d6c72acc560fb29bba6e904b13ceec75876dce1f10f46f9f4096
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD58c203420a98c987cb2d363fcf7081df2
SHA1a5d8fbd5a087284c35fc60234b38b3512894b6c0
SHA2565b8414892a46eb8b8d7b2303988531da5e454bf0b9d1317a9b307d4d1dc0af91
SHA51245577e70206de4534b259f0ee9f4c8bd8420db9ee96a5fac02241134cf2352e038a74daafff1cf3df25d01e9574d1ba669a65d7189c48fe5fa08f062b0dba3d6
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD58affa5c4526dae229a218b5049c00758
SHA1b1775c37672d217aac8cb3ce7bbfdf9ab26169b2
SHA256264a897d4fd9349cfb587f4bfd33ff2af4dcc277278771d249af1edbb4d0f62c
SHA5121d1c599a9e0a921630fb8e4c8a6ac10ed6a4bc3efdb9f77512c9fd4f2efa78ef051f38072b81647e9394acc0d5956ed66c885309bf772ad2be245e303a3a4126
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Network\75c900e4-89f5-44b8-bfec-c83bc853128b.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Network\Network Persistent State
Filesize5KB
MD50a33dcfb63bc39a2097baaf9e03c0d4a
SHA1cfaae6deed03b1ba3636dc700204426ad87cfaf4
SHA25628bea9b4a380f026e8cf77ae6f9e1d754efd985d8ec25d034c6b8c456bb1c0fe
SHA512a329e9f2895c5151d0e010edb5fbb1f95a312f5aa157b2ce2ef660ff010801ecfd99729e82507e22a987b32cdc60b17acfb55ec7def2203e02d6da29e48704e2
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Network\Network Persistent State
Filesize12KB
MD5a5255835daaf62dca9b98c7af62996ba
SHA1d11949c2d2ce0de38d10edf89f780a76dd479618
SHA256666999c27ace8083a42567744332e9b9a4c78e01245ca3f227e111b1c24bf52f
SHA512f0cccebf287b531d48aef9f4b817d21822be0bee237f1a16119cf3843f75881ec305e43b163b24d9745c0c8801fd572a550559e5b33de2f44c2d00a4a80d635b
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Network\Network Persistent State
Filesize12KB
MD53a5d482c7ff97c0efd7b127766b22dc1
SHA1072ce216a153cd6a5ec0699c555b857bed6e9813
SHA256b07ee051760112c07184ce581d9886ef4035bad524defa18cfcf0947ea2c9cbf
SHA51220cc6bda3d3f2a8e2b40309a7550c112bfa677b67513e01cbb5336dbe12ebfe8bcbd33f184bc6e2dacad5a2e21c43d86188757ab58b06fcbff63b030aab9cdff
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Network\Network Persistent State~RFe5a0f15.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
523B
MD597998e519d19454420338d4b322d8279
SHA13d4220c3707a06cd37dd4fb80aee678c2a2724f9
SHA2568d1a20204c3052eb9922f7d2a3619f6160298000211d504be18ff20dff6eecbc
SHA512cf6aa7e9d464d18a220a481e444ab701827606dcf79a8c8e3ab0d64024a5f80fbc4fc035f258f0f0caa0c225a79af70f647085a5f89d5c117f36259e20d1440c
-
Filesize
2KB
MD5f3563767e13252f405d4e8e7c0b1c946
SHA1ead1dfbfc3a1e217fe6628528228efdcba05ae66
SHA2567ca9990266260aaaf48057e57df26729769e7e11b46a3859f40a31cdea39c51f
SHA512b42f152a5d6cf74e5e109ceb3b2563468b696f9ea0e2a4d5ad9a757dabf3ba8bba99796a5fb863070b4ebc79359526e3b54843d43427f6afe850ac3a31284847
-
Filesize
2KB
MD55e9e3efd56d496bc47449b8ee36383d5
SHA1751aead373480944e2d2a3dfda97b567deef2c1d
SHA25662b43fea6b36948f6f53c9a93f87def9f933faf9219ba79f24f906d73f68660e
SHA5129d5175454c9b8391a84502e726985d670ed3e1457234ee449583be9dcc6be707de2f97d07f9a65de7df52b1b820577d2c984f34390363d2f314794e09acca47d
-
Filesize
2KB
MD5721e2e50f3cb6b28ee15e86bd05ca2f8
SHA11d96f9524bd75fb0482e8055375d0c36bd1d06e9
SHA256f17f0260c6819e12bc9c452d271054417a3b708dbc4b003b6f2bc5b2030617c4
SHA512622fe0291b187ecd5ffc6d96e5558c65bbd67558d8419a2875d8e9108765bd183fef0da78f59a2e54cd0e5522785e79fbe68faab96887b7740b34e7dbded65cc
-
Filesize
1KB
MD5f922d7fa683fb206aa3dd8265b7ae317
SHA1e863af5aeddce3917fbfa0b24a5ff91feb19b69b
SHA256d3e8e7e329d67323f9961d3cff9938e54a57086989f9eb0553f8c09b6388767f
SHA512379d564018ed69109a4acd9e9b6a8ecaedfc4005990d8c7a2685e0f71fa70851b3ee02f4c8c08e5778dde19e9cf1c9e6455edef922f4afb63c69db5a9a225981
-
Filesize
2KB
MD562e7143de93db8f15c87f60bbe713d68
SHA10c3a879bd2238c0e55843489cdabf2eaca503afd
SHA256f1d2ece0dbddd5600a1aecd0bef1a4e667147421c6edbdbd05c4fc7d71af2b3e
SHA5122338e7f3a2b55ca52c8c83da0579fc6fcb464476a3bf37d04e1bf22719a8aa328203c2a15b4da6aa578bed49316301ff493d104dda651c59a608cdc1de29d26e
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Network\TransportSecurity~RFe599243.TMP
Filesize523B
MD5ca8548dfaac10eb981bbd6a343a6e342
SHA181f497cdea63af37f06817e71d54bd1a308b579d
SHA2560c22515621fb527ddcef39cbc3bf1986f0bda4e1edc2342dded1515470d310af
SHA51256aa24fb7e280f355aa501550868fc22a0993fe5d456bdc5391ccc4a0369d14baed3695e713e39aa805dec6be952e1413cfd8243149a16987008cf31ee218724
-
Filesize
9KB
MD5a70a389995c0035c6c93145dc892b5f9
SHA16b190880f5d0d19c910e301b3f355135955756d4
SHA2561bd0927e6039f4544d7eedf7f18679199b335912760271a9450179d505487e7b
SHA512b634ba0dac9b24520476d2692f5b7e379c2fa173122a230d42a15701e68098dd5d9f3fecdea1d3925b3c1d502c408112e6076b63cdb557841e9bd4c3ebf9302d
-
Filesize
9KB
MD5d72370b3e8050fb2838d8243c4d51bc5
SHA1c7fa7bdf9ab988317d635c3712a838a425e53d5c
SHA2560d35327d5788b54fded8858ab6b99221c12113ce25b60e59bfe6b66dcfd702a2
SHA512d4537771f472991ddfbb966e8b9783611d78724a53983a4f3bd1f9647c82cb205ac2b1c935ea7fbaff865a0c23a7e6784d4a3e22f3a5163625a5abe72da8ad3d
-
Filesize
9KB
MD535c18c31dd861b37c8519d62f6a53b15
SHA15d353aac0579cccebe1431c27bf2faec079644b3
SHA25635405f223da9c6e11ed2f1f91b78edf998b800ca5444e9ffb1a4f972785fa4fb
SHA512f3eb88028d209aad6f99520062dde01963cd4333254238d379db636b27f6b88f99e7268774002294253cbba79af76634ce796b45aa2eb0de6f566402dc8bb878
-
Filesize
9KB
MD50641b8c672440dba0e380820d2815ff7
SHA109afaf81454cb53994e66ae38cf6e29cebe6e7ad
SHA2561c4ac47275087809c49490f9381580a3fa5f10458d394f104eeee45cd57189a8
SHA51253bbbe934745ca4387faacf7d552ffee10322d51923b2a0777fa7104118ae865e1d0aa0f235fcc5bd8b60ed57cb4d9394c1556483aa06b823b8213415cbe35d3
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Service Worker\ScriptCache\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5e0fdb183d1b5022df8621744db85da00
SHA17a74ea526d27f5242a0333e83b6be43e1d57347a
SHA256b0b3f41d2a4e10e15c7257140f989755d30ceef09c299bac0ee47e927ebb03c9
SHA5129ca1a698d782b01db5597652fd958e46490177b2248497e6352aed76a9ed95057256ce7bcfbe400bbd8228fdd2bce89375c8cf77a8ba25cdec65767a5c0c001a
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a2cfd.TMP
Filesize48B
MD586357bbc71df64f8b047b580fcb1563e
SHA120f0072ee3fdaeaab40ee0b67a5f46f800b16aa4
SHA25627baa5559369e9be55c40922b383dfd3c083b565763c55724e717da2be57a994
SHA512dbe21d74cc5952fd54e6a1c541a38a7cc96d4e9ff4bbd307787319336f0103db268f97a4695488e327c55209bf2f3d5955d49fb81630e4e1290645386fc21361
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Site Characteristics Database\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\WebStorage\1\CacheStorage\index.txt
Filesize82B
MD5374c4c20edd6a4a8c3b6917fa14da5aa
SHA10c7644d7496308cc16dffeb050072fb3af6658e5
SHA2562f0e5eea4cba08156d122e268e66039528ed5c6f48a871725d1e2392992a5f08
SHA5127f421031ff9fbbc17b03a0c481b72ebcee4183aa1e9241de74d10992700edbd4a1f35c7bc721ae8d96414956c40b199bd802e2881707eefc7cc8e457c05e7920
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\WebStorage\1\CacheStorage\index.txt~RFe59d8f1.TMP
Filesize146B
MD5af9e1ab6dd2d8eb140fd6788548be480
SHA16cb670f59c61bb858c3565b855a881041297ff74
SHA256f5503ed608c5ef017e7aa0c0d2435ca9055051a30293a32dd48691964ecf3680
SHA512e2928e6557291a4efeabb097ec8b2fe606b7524f43812591e9fb2ad2e2d841e42a8dd3dbd3053fb95e5c9cd5ec720d264f4bd9530f721e4f5e284da31fc0d181
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\WebStorage\3\IndexedDB\indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\b851b3a6-a75f-400e-abdf-da22479e7b6e.tmp
Filesize7KB
MD53fc5042bec20c8eefc7d7b73d409d1cb
SHA190fb9c75cc7d3c92689180447ec0d0c99870f31d
SHA256c5df0020385e5eeb91b67164a36ce9483c6d0c5819965310631efe6b1192d3c3
SHA512b4c28f21eab24565b1b439a959de0b6faca002c506a7c7d76c81516e42795446f8e92a7814d09c1b42817fa6499669f2b32abb9a9975082e26e33074d21436b5
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
2KB
MD5e3ca4e33a3bc8348a709bd7c3f3b8cdf
SHA1162ca86c8095db57af8bcb9574c76b87a0734c33
SHA2566006d243db6efb24c055cddd54c28fee57be7195586c329afff7621999340d8d
SHA51251fefcc6d092877541531ca76b0202bc82cff1f7b4a7df22911fd9b59417fbe8a9f47af969833fdfcfca62275b70fda04eb2d1a6ea43b0f1517a327e8150f71a
-
Filesize
3KB
MD57f13ea40f250029af58b4bc5dffdd8b6
SHA1765ec0b649219e26b3e356d97bf90a8b368f074f
SHA256b9e19217df411521e79a0160706e3b12ce540eb091e51de8a16e4bb880c99b4f
SHA512566efecdcb07b6758897e49969276a06fdd0aa42248523ad10729a5ba969fd3465c2d8a1bc71efdd2669ac3298662c2c4361b04f7f0b9682f23b8173b06d0e66
-
Filesize
1KB
MD54d7b6da24cd299e132416ec036ae7958
SHA147677e7192822289ae3e54b7f54c55087f857aaf
SHA256ae2163285cccd956ebb042b7c872af4118434b80011071dac97ddb961f264284
SHA5129dd777dec8e8170a33b4a18df6d1b5d4f9b307b8b2d192a861e1acbd841aa060d9368fc976ab05a1df47b71da7bc041bcd5f7e77981052d5a97014b9ea360391
-
Filesize
287KB
MD55418f0d0f7d15ca9fbe5da74453722f5
SHA13ca9d7ae11a35a6c47d590b301602583add40e10
SHA256251ad4f7aedd823ee97077e9764592188657aa831cd0948990fb549fd3e593e3
SHA5124206c7c04eda629a2af109e35e48986e80fc16a2285ae3afc2e92f6a29651d7a06d1dc3d49f618fd33965f91e6cccc8b0dcbc34b4613eedabc7fbafc18783b7a
-
Filesize
7KB
MD5f86abfc2651f24867cf9aee405d95a07
SHA151531932b533a36a6ab41700f625f33ae7296825
SHA25670c4568dcbf75e36879c75b068e67a2de7653cb5eff6c12697c3bbfead81d85a
SHA512351a0a4e5b2b4800ef535d4ca1a9ebd65027543608df883a303a32ce37e110206da2555cd37853711bdf049e6a9df17005e6520ea0daadbe6d0fb08bd51b7020
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.52\Filtering Rules
Filesize1.8MB
MD5a97ea939d1b6d363d1a41c4ab55b9ecb
SHA13669e6477eddf2521e874269769b69b042620332
SHA25697115a369f33b66a7ffcfb3d67c935c1e7a24fc723bb8380ad01971c447cfa9f
SHA512399cb37e5790effcd4d62b9b09f706c4fb19eb2ab220f1089698f1e1c6f1efdd2f55d9f4c6d58ddbcc64d7a7cf689ab0dbbfae52ce96d5baa53c43775e018279
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Subresource Filter\Unindexed Rules\10.34.0.52\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\TpcdMetadata\2024.1.12.2\metadata.pb
Filesize6KB
MD541d04d8371715e478903a88c1dce5b95
SHA1067052cc0c61940ee9f956a7be7db1f4938fcd1b
SHA256caf8fe15704f3d8d562956723a5729cd12f870b1a5e817740f314ee4fc2d6470
SHA512b6a239c73473593002c6be71521e63fdb8e0510bd63bf647b9b85329334409177318e316c862dae7cf2873cff6fa5301e26b3b24b56779fb51179f23f8a00a92
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\TrustTokenKeyCommitments\2024.3.25.1\keys.json
Filesize6KB
MD5af8fcadd95b5f42bdb56962938f7d078
SHA12713e1da42c96163d18f84ee662b8b61a1e56d35
SHA256142c07267a3e13f64862d83748ff110704354d3facc3b60743602fc47e651ab3
SHA512a45d792cb98509a1ec7e87e8371f6dd16b7c12b167f62ab68af43f7f3c3d2e5f5890a9556826dc80565adc2db20f7f06eeb3f12cef797ed2d1b132bd6c304d28
-
C:\Users\Admin\AppData\Roaming\CCBlueX\LiquidLauncher\data\mod_cache\liquidbounce-1.20.4-0.1.9+b2f09d32bb1f915cf3527c13577ced585ef355e2.jar
Filesize32.2MB
MD5ef558190185b5e40b9fe1179eb4aa60a
SHA1008eaad542e289d5659b5232abe0cd6a36bc71ca
SHA25616fbce8a3998e05f9df0f6486fb2ecacaee7a3c107768d8b3787c1aa595f95a7
SHA512ebead81b6d0dcf99281a650881cb50b8618d470f02cbd3ca0b1d4e652f909495adab746642219d43c00ab9e9f63cb9355bc3ab5f5b504b4852c2d2ddd5b2be85
-
C:\Users\Admin\AppData\Roaming\CCBlueX\LiquidLauncher\data\runtimes\temurin_17\jdk-17.0.10+7-jre\legal\java.logging\ADDITIONAL_LICENSE_INFO
Filesize49B
MD519c9d1d2aad61ce9cb8fb7f20ef1ca98
SHA12db86ab706d9b73feeb51a904be03b63bee92baf
SHA256ebf9777bd307ed789ceabf282a9aca168c391c7f48e15a60939352efb3ea33f9
SHA5127ec63b59d8f87a42689f544c2e8e7700da5d8720b37b41216cbd1372c47b1bc3b892020f0dd3a44a05f2a7c07471ff484e4165427f1a9cad0d2393840cd94e5b
-
C:\Users\Admin\AppData\Roaming\CCBlueX\LiquidLauncher\data\runtimes\temurin_17\jdk-17.0.10+7-jre\legal\java.logging\ASSEMBLY_EXCEPTION
Filesize44B
MD57caf4cdbb99569deb047c20f1aad47c4
SHA124e7497426d27fe3c17774242883ccbed8f54b4d
SHA256b998cda101e5a1ebcfb5ff9cddd76ed43a2f2169676592d428b7c0d780665f2a
SHA512a1435e6f1e4e9285476a0e7bc3b4f645bbafb01b41798a2450390e16b18b242531f346373e01d568f6cc052932a3256e491a65e8b94b118069853f2b0c8cd619
-
C:\Users\Admin\AppData\Roaming\CCBlueX\LiquidLauncher\data\runtimes\temurin_17\jdk-17.0.10+7-jre\legal\java.logging\LICENSE
Filesize33B
MD516989bab922811e28b64ac30449a5d05
SHA151ab20e8c19ee570bf6c496ec7346b7cf17bd04a
SHA25686e0516b888276a492b19f9a84f5a866ed36925fae1510b3a94a0b6213e69192
SHA51286571f127a6755a7339a9ed06e458c8dc5898e528de89e369a13c183711831af0646474986bae6573bc5155058d5f38348d6bfdeb3fd9318e98e0bf7916e6608
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
7.4MB
MD5dc33c92a4ff59c3e7ead5155f372d017
SHA1b53b631837e6142fc70d5130ea8cac66abc84588
SHA2562803951e49e45d8eb4113e963c2dfeb9f3727c765c39c0f50779ff5d93556dc9
SHA5121cd6fdb73953b39b6448b11b7329258c93c8acf3d05e8960f1eb01e78cb71bf06e10c9d3c8b12bb36f6f37e957460b7fef7c6cde09ddbf4b721b2e0fe93cb4b0