Overview
overview
7Static
static
3liquidlaun...up.exe
windows11-21h2-x64
7$PLUGINSDI...dl.dll
windows11-21h2-x64
3$PLUGINSDI...nu.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3$PLUGINSDI...ls.dll
windows11-21h2-x64
3liquidlauncher.exe
windows11-21h2-x64
6uninstall.exe
windows11-21h2-x64
7$PLUGINSDI...LL.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ls.dll
windows11-21h2-x64
3Analysis
-
max time kernel
101s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03/10/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
liquidlauncher_0.3.0_x64-setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
liquidlauncher.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
uninstall.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win11-20240802-en
General
-
Target
liquidlauncher_0.3.0_x64-setup.exe
-
Size
6.1MB
-
MD5
488e15c06c044be1eb8a42b1396d4768
-
SHA1
f1e56df200072ce90811b4b985c33dd851526433
-
SHA256
98a7fccdb0443b44fa3afabc5c673d4419014668992e531766a18b9f4bcb133d
-
SHA512
f7d99054d446e67a6bfa0ffe2bbfff0120186f0c04ae4c7230c1e1a7d9525dfc10099be677b37ebb93e3ad827733742ad5ee120d15d520318826d710bb7d6320
-
SSDEEP
196608:xxaBup4JrgUFFDG7U6uqLYkzzGZ4R0K8MNFUtfik:xAgp4JrXGwMFpTjOfn
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 3900 liquidlauncher.exe 3428 liquidlauncher.exe 4976 liquidlauncher.exe 2524 uninstall.exe 2140 Un_A.exe -
Loads dropped DLL 6 IoCs
pid Process 1184 liquidlauncher_0.3.0_x64-setup.exe 1184 liquidlauncher_0.3.0_x64-setup.exe 1184 liquidlauncher_0.3.0_x64-setup.exe 1184 liquidlauncher_0.3.0_x64-setup.exe 2140 Un_A.exe 2140 Un_A.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liquidlauncher_0.3.0_x64-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Un_A.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedgewebview2.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Un_A.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1184 liquidlauncher_0.3.0_x64-setup.exe 1184 liquidlauncher_0.3.0_x64-setup.exe 3532 msedgewebview2.exe 3532 msedgewebview2.exe 5116 msedgewebview2.exe 5116 msedgewebview2.exe 1732 msedgewebview2.exe 1732 msedgewebview2.exe 2140 Un_A.exe 2140 Un_A.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1056 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3576 msedgewebview2.exe 3288 msedgewebview2.exe 2016 msedgewebview2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1056 7zFM.exe Token: 35 1056 7zFM.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 3900 liquidlauncher.exe 3576 msedgewebview2.exe 3576 msedgewebview2.exe 3428 liquidlauncher.exe 3288 msedgewebview2.exe 3288 msedgewebview2.exe 4976 liquidlauncher.exe 2016 msedgewebview2.exe 2016 msedgewebview2.exe 1056 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 3900 1184 liquidlauncher_0.3.0_x64-setup.exe 79 PID 1184 wrote to memory of 3900 1184 liquidlauncher_0.3.0_x64-setup.exe 79 PID 3900 wrote to memory of 3576 3900 liquidlauncher.exe 80 PID 3900 wrote to memory of 3576 3900 liquidlauncher.exe 80 PID 3576 wrote to memory of 1336 3576 msedgewebview2.exe 81 PID 3576 wrote to memory of 1336 3576 msedgewebview2.exe 81 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 2756 3576 msedgewebview2.exe 83 PID 3576 wrote to memory of 3532 3576 msedgewebview2.exe 84 PID 3576 wrote to memory of 3532 3576 msedgewebview2.exe 84 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85 PID 3576 wrote to memory of 4020 3576 msedgewebview2.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\liquidlauncher_0.3.0_x64-setup.exe"C:\Users\Admin\AppData\Local\Temp\liquidlauncher_0.3.0_x64-setup.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\liquidlauncher\liquidlauncher.exe"C:\Users\Admin\AppData\Local\liquidlauncher\liquidlauncher.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=3900.2620.61947546665216487033⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0xe0,0x1b4,0x7fff10df3cb8,0x7fff10df3cc8,0x7fff10df3cd84⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1804,9850065656870717964,9157310325822789098,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1820 /prefetch:24⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1804,9850065656870717964,9157310325822789098,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2056 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1804,9850065656870717964,9157310325822789098,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2344 /prefetch:84⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1804,9850065656870717964,9157310325822789098,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:14⤵PID:1008
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:652
-
C:\Users\Admin\AppData\Local\liquidlauncher\liquidlauncher.exe"C:\Users\Admin\AppData\Local\liquidlauncher\liquidlauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3428 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=3428.4296.134456496033427724812⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3288 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x1d4,0x7fff10df3cb8,0x7fff10df3cc8,0x7fff10df3cd83⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1772,8919076660578525833,5664736946036335789,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1788 /prefetch:23⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1772,8919076660578525833,5664736946036335789,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2116 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1772,8919076660578525833,5664736946036335789,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2012 /prefetch:83⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1772,8919076660578525833,5664736946036335789,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:13⤵PID:4632
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:664
-
C:\Users\Admin\AppData\Local\liquidlauncher\liquidlauncher.exe"C:\Users\Admin\AppData\Local\liquidlauncher\liquidlauncher.exe"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4976 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --mojo-named-platform-channel-pipe=4976.3924.119377613549247508122⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2016 -
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x1b8,0x7fff10df3cb8,0x7fff10df3cc8,0x7fff10df3cd83⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1816,1375939806828612969,2013519336897159003,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1800 /prefetch:23⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,1375939806828612969,2013519336897159003,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=1908 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,1375939806828612969,2013519336897159003,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2372 /prefetch:83⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe"C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1816,1375939806828612969,2013519336897159003,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msPdfOOUI,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSmartScreenProtection,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch,msWebOOUI --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=liquidlauncher.exe --webview-exe-version=0.3.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:13⤵PID:1780
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\liquidlauncher\liquidlauncher.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1056
-
C:\Users\Admin\AppData\Local\liquidlauncher\uninstall.exe"C:\Users\Admin\AppData\Local\liquidlauncher\uninstall.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\liquidlauncher\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5d070f3275df715bf3708beff2c6c307d
SHA193d3725801e07303e9727c4369e19fd139e69023
SHA25642dd4dda3249a94e32e20f76eaffae784a5475ed00c60ef0197c8a2c1ccd2fb7
SHA512fcaf625dac4684dad33d12e3a942b38489ecc90649eee885d823a932e70db63c1edb8614b9fa8904d1710e9b820e82c5a37aeb8403cf21cf1e3692f76438664d
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
Filesize
25KB
MD5cbe40fd2b1ec96daedc65da172d90022
SHA1366c216220aa4329dff6c485fd0e9b0f4f0a7944
SHA2563ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2
SHA51262990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
Filesize
28KB
MD5a573dcf90cb9d9e30624eea14018980e
SHA101e48d6429b48b640230c6ce8f257c84758943aa
SHA2562fe7953cd06cd9ab1d5e91834ecfe70bcf7a9ed6b2c40aebc21c98c6f96eb89c
SHA512823a79f1b1e6e64481f0c305e189d95b51528b6ce87a2330e2199a33ebfe074a6e39382c79cb28d89c89294205031f0519bff5aacd2334813a74d32529d2eaa7
-
Filesize
17.2MB
MD551140997b3be1fca581064d4ec286612
SHA1824de0f9423169bacc25d80760e4e74e734791b0
SHA256b288cae4f82117c611fafb15eea67211ae8e3858b6b232b2b1a0ca03afe5b8b6
SHA5120a8306b4f42a4b70f99c88cf777a7e85efe8b8367e6f485949f44422cce1cf483a20ffe1d0d4a9a6ad69675fc14432c58531a4b991dc2fcd0cc9e26d99509f1a
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\6a1e0166-df21-44b1-81c6-5dfe83c9d719.tmp
Filesize2KB
MD5df487b05c02933f80084dcc0302e5520
SHA11e097a32efb5c7b4b5673009ed3cec09ff92f686
SHA256fa9c7a92c0af6c1b49af0445dc0e5c5e655083ca074277975f9c3dc3eaa35066
SHA5122352720e1c6235d778708fd8b617dab7b37aa355cd986e2994877557c84f553e55cb6a41aedd9d374ab6b21ddee4b52801e129b2066dde23c8b44e39ec761ca6
-
Filesize
152B
MD5416360696937b750842a67c6f1a7b7e4
SHA19a6d56cc2abcd6e7ed8785c5f192e73205c7b733
SHA2562cf3b4752ab0f488da6d868f3de9b14becb09ec27b4b277e26e28a99764f1956
SHA512f55426561a766280a1c82a4b38460ef3604661b5cc7fe74c7e8267b72644e8d25c2d482d5be61e05df4e6ce62ec5210f545e2373be75989d4ab879538dfbd81a
-
Filesize
152B
MD5a317decb0244b96289bc1f35d4bc8063
SHA1ac9b796c22737a231af0575703137d529d469989
SHA2567a8c91bb1bcc866c8f1a939a7ae0bd1a9ed9016699c4aabb290f3218479fc462
SHA51227c8f4a739e7a783eddd0d348473431ec348d13e687c76e7dbf29c4433b64e570346cfd8217581958447fa72ef18ac294feee4f8ce35cd80019a6e83f8d304fb
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Code Cache\wasm\index-dir\the-real-index
Filesize48B
MD5227273fd361d1bc3ef158db83950631d
SHA1f85cc6417f96b93d544f722e19aa339dded4ea34
SHA256a45de20565704873bb5faba6417c46dc4f62fd27392dfc98e3ad51264b4a488e
SHA5126ef8392d24bc547c232bdad4fde019610937ed21f8909c1162921fd3c34c48d68af9310016f8b9fee0607bf237afa0c14512493554f22a98a03334761596ba62
-
Filesize
20KB
MD522be08f683bcc01d7a9799bbd2c10041
SHA12efb6041cf3d6e67970135e592569c76fc4c41de
SHA256451c2c0cf3b7cb412a05347c6e75ed8680f0d2e5f2ab0f64cc2436db9309a457
SHA5120eef192b3d5abe5d2435acf54b42c729c3979e4ad0b73d36666521458043ee7df1e10386bef266d7df9c31db94fb2833152bb2798936cb2082715318ef05d936
-
Filesize
20KB
MD55688ce73407154729a65e71e4123ab21
SHA19a2bb4125d44f996af3ed51a71ee6f8ecd296bd7
SHA256be1b822e970dfe1a120d248db7000eaf799bd6531929a1308676c70fe1608d60
SHA512eb6452b23ea36c39d03ead154185616c13583f12f382cb2456beeb1ba6e5febdfd2a6f1064283cf115ad1c517dbf409777cdacb128e00c9d3f401335db355537
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
256KB
MD5fd5ea3f7f0ea1bec80848b0afabf5e21
SHA17e30fdc786ba307f0118095dce99e29be347462e
SHA25668ff407aa7ea8661e13a630e284c90063a2062182d0b4cfde5d2066b2cb53514
SHA5122ad0689f695fa6ea13aaf73d17f2c25980faa7021a72e43abc873a35a749f97c5d7c803c0317f435736fd08a1329b68a692f3817fd24594072d846ea5ce33fbe
-
Filesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
Filesize
6B
MD5a9851aa4c3c8af2d1bd8834201b2ba51
SHA1fa95986f7ebfac4aab3b261d3ed0a21b142e91fc
SHA256e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191
SHA51241a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818
-
Filesize
315B
MD55deccd4ad5c77575e05793a8aa357040
SHA14f699d2bdb96d4327b53968d79551c5032828974
SHA256f996dd398c2e24c64a6993271111a1a2b60058b4765ace253184f787e68c503a
SHA512becc6410c034806edb60b630706396c6b15bf469a07487a296f6ed9d77afe3bb2a6352eab92c323e1d8ba05f79bd0557140b9fbb8b97e2b973ec6b8f33881584
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
Filesize
76KB
MD5cf7ac318453f6b64b6dc186489ff4593
SHA1b405c8e0737be8e16a08556757dc817bd02af025
SHA256634434e865f1ba1b90039bd5afd8f01bad6d278377106022ea2a9c2d8778d31a
SHA512b64e484d16222d8de31f53cd60b719b7d855bbc552a7d052e202382bc3013e0edaceb31e3a287f2ea6b7117ccfdb8a56ea9d7da78535d2c606183072ecd084e4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
Filesize
3KB
MD54e2e28ab1ca89f14719e06487c24ece2
SHA173f40f100789753abb66d38b28713a12b5c08999
SHA25611028fd0a1fbf2d51b3ada727a0841e88b496bbed901ddba321dd3be85a6c12d
SHA51247f1cf07adffebd98c757491ed9620934b829badcdd166fb8f8511e4f3643963bf24153df2878cee4bfd5836c2863083b48e4094792beb41b3bcdc3f61ec34a8
-
Filesize
3KB
MD5d02f40a8548d7f0151b88eacc3600e37
SHA1cabff2cec81d0eb674c6abe3d70ffbe9d71a0078
SHA256826c4b037486ef8726ff00e2b0bea6658b7b4e1f4dc2ac2c0f4a301aac31437b
SHA512bd4cac67dcadf4f38fb23f62f14e91feae0118a23ce491fefaf73097b0371082b02ec3c12b60c61fbb8e9857cfd4fcff09ce98a9c5f32db783b1cd8308e31cf9
-
Filesize
3KB
MD5b2d871ca20a8bee85800f61d3dfc93bf
SHA1f45b8bf05e7dbcea04c2749941e8af727ef69e3b
SHA256bb9ce57f98e3ae4d482e2460b0cf9ad0b60c3f72c941d980e83fb2d72bafce46
SHA5127ace6cfba6f0f09bd32f5531fdca6e18fbcda403fe95b7e39a8106861b8e150c2712671db43d6c7ff4f2004397e64fb4fe81ab567bf2eecfe688a2c7a5e051f7
-
Filesize
8KB
MD52b6e84dc712b39205d853ec5832509df
SHA1b041fdffc26350552e8676fc54b9193317481090
SHA25602d03dbaad5784090f032af412760248bf0749d82e28894be97f9e60aa0e8a1a
SHA512d2a40616286c7c2f2ccc431195bb9e056306ad90fc48977ceaa1374bf6dd183124149e46cb340d6e3d0867aefa3d4683277d9327615081954cf5a1591a9781cc
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Session Storage\000003.log
Filesize80B
MD569449520fd9c139c534e2970342c6bd8
SHA1230fe369a09def748f8cc23ad70fd19ed8d1b885
SHA2563f2e9648dfdb2ddb8e9d607e8802fef05afa447e17733dd3fd6d933e7ca49277
SHA512ea34c39aea13b281a6067de20ad0cda84135e70c97db3cdd59e25e6536b19f7781e5fc0ca4a11c3618d43fc3bd3fbc120dd5c1c47821a248b8ad351f9f4e6367
-
Filesize
303B
MD53e68fb091a35aa277ae09c4d01489bf7
SHA111c404ff3129b40c800b7ca4ce5dd2b8564b6dcd
SHA25630f8c43c6eb886095900601fedbdda3014f468aff717b3f534514edb6af01c4d
SHA512317997406fa82c4ef686ae5f13c20ab4114f24776a9a96fbbd1df032e458754478d1394edc334faf45bfc8958d0a2bdbb478683ea7f5454f13f5670218572fbd
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Site Characteristics Database\000003.log
Filesize40B
MD5148079685e25097536785f4536af014b
SHA1c5ff5b1b69487a9dd4d244d11bbafa91708c1a41
SHA256f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8
SHA512c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Site Characteristics Database\LOG
Filesize331B
MD51eed3d942076da159d43ba2d13445a04
SHA105778b9b7689a6ffe092555a78e24d1c09bc027d
SHA256977f229d3408186101dd81d368268be48ffad42d1d73ce633e3cc2af45c99cff
SHA51265f7edfb486703d12ae55f5c7bd009675f65d8f711def3def6532c0a5d556040ce2389250c88ded86f75f2a2a396f437ade4e57d9d37475e98ea5760608355a7
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\Sync Data\LevelDB\000003.log
Filesize46B
MD590881c9c26f29fca29815a08ba858544
SHA106fee974987b91d82c2839a4bb12991fa99e1bdd
SHA256a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a
SHA51215f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
309B
MD50808af0e8297179b87170f2c50304eea
SHA15c35212575ec13911758455f2aae39e17de20cd9
SHA256bf03bd55c869dd5b6d1ab70569574ea4eb965fe5c1183ba009b33820188fc411
SHA512db61e2e76cf7fa3d9a33ce32944fccfa2575014e03770edbec346227e72aeb6c29ef99b6feb7e0795cb95d953e52a55346bdb41f0451f7360fe91d6c014756db
-
Filesize
20KB
MD5325ddf165383376a8e530a8288a9fb73
SHA1f451204bb6f3de9de42f27bd887576b083026e87
SHA25653eb4fcb3cbcaacd4d94036c9379715990f86185b8ef7fd18cb27665193da6c8
SHA512edb9c49956741560f40df102b81c3b558b1ae9ce902040f89cecb2fbbf60277dcb73f68d8b7c60340a92c46915828b7a204420292d0a4906ac0e9082943ad528
-
Filesize
128KB
MD547f03a171b218516bc8f339640526503
SHA1f2812293e92706102adbfb2ae5eae34f64e7b617
SHA25661a83d038a7c2385cdf5955cea74473eeda2528633d70c589290b2dac8a1f8ab
SHA5124427ccf9cffba6f801fb96afb78a52909646da3bad621921ecf752f45f8f166bf5efc6f36f5db1de3cecc7333c4702c8c57bfc66da8b549d3484e17cddee2df4
-
Filesize
110KB
MD512aff5c24b1e165da94cc9ddef6d752a
SHA1345a57b067d6c7561b149b6a7de1d0cf53e42cc9
SHA256b49ee954c97289b707fcaed55266f7c49720d1c24f4a8872038384155081aabf
SHA512fd584f3d7e3a5603ff2699e1b4930d6594b0ea09c0a194b7329f44d3d4d2e1e985a42ab512afc1b6a0f35412ef839d35f27fab1f6506e871d74c648c3adb0ae6
-
C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Default\fa84ac79-bb19-445b-92df-d9121127fde3.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
44KB
MD5144dfaaa82df72858197f4ef7ddd34f2
SHA1e6bbbc5593c1d782e2d23c6ba6a5f5468e7548fa
SHA256fe2844d9713e3f49ff6e5c6d5e9f3b7af671fe9165cafe01ebbaf61bb1ae84b9
SHA5125a53b1dfd4729dd2cf7c5fb45b4b15e3b1729c7c7dca1a029b39964a6e0f9435bde61ba5c8e7b859254798fa135264c9814533409e5980159e52cdca2b1a5793
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
256KB
MD5de1e73853cb38106ca1f4f5265787da5
SHA19d21ffd35cb64691cf2ac0ca36384e774f3ccb07
SHA2569f25b670a2f9e0a93ecfb2252e6e7fccc485dc83e715bb42499b047ac79d3b87
SHA512572129d2377c9ff1c0e0fa0617d1501b2dc9d25171dae610b2e2371e70e77f9ecabb459c4beb54ca340712be7adedc9b315853775171fa79c4767da0e5e89041
-
Filesize
11B
MD5b29bcf9cd0e55f93000b4bb265a9810b
SHA1e662b8c98bd5eced29495dbe2a8f1930e3f714b8
SHA256f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4
SHA512e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011
-
Filesize
2KB
MD54a5ac1a51e1721563985cc96c2d008e9
SHA1c573a6f62ff0deb86df37f61e46fc1034e7b50ab
SHA2567cb42d6360d04d01ac82c52cea522a06c1a7d11f202788d76c3939db8b9bf4f8
SHA51292ebe42e4d655cc2a52d40e59d3fcb1708a55aed1590e04244236aa58462851af05c9e78fa204bd21c8ad1c940504cd49e13565591f96a3fff97097e53ad63b3
-
Filesize
2KB
MD5196f3190e6b051750d912a3341456600
SHA1304c389c1174725869e523282f04d7718cbd8455
SHA2566a18b5b611fa6e968a4c87530796710b4cc51b901b0dad124d48f54de8e76270
SHA5121a8ab92ea4e5fe65d4bee6289659a463849e5e899beac85fcf198bc978701611b3e5470308a99fb0f6b8b219854da261a756742bb557c8f00b0edf8eb9de3e59
-
Filesize
256KB
MD5adcbbfdec66474c607d0f04724d989a9
SHA19b3f1974453c669648140400b1707b366143ce3b
SHA256d192594879ddcbcb298660fafb9f4ff158e77fd33ff85c51d441e2ac67cd1959
SHA512dc5bf2a0e061f85f54718b0051fb9f460a9d4ed17e7ee6e6af98440daf75bcd84e673efe6912def2f8c8643982855c5434e8c1ea9af1e52c2ae2b110c493f711
-
Filesize
1KB
MD574f0532287dda4ae004a7b139706d7cd
SHA119b4e9906ae5f60a3f2522b21a455017db10bacd
SHA2566332e3515134f450e6b71cd1f2904aca2d12013579ad4063178635fd2ea1a2f8
SHA5129dc7fb1d8829f38f5b17505a26ce496c78ad4047774197164b166dc17bed9a7f14c367c9eafe2ae0067f4e12393878d731fa33342ff148b0d99b38d98ccb6ebf