Analysis
-
max time kernel
489s -
max time network
492s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 07:02
Static task
static1
General
-
Target
dmaster.exe
-
Size
7.2MB
-
MD5
84c4021135555ce4384f22c66ba4595b
-
SHA1
74a4051dc39188c1b90768204707ef641881ebf4
-
SHA256
0af06fb0a98f36849371c928af03a39c57e7596b32c806da9f358651714a2ac7
-
SHA512
1d43f69d504c890c3c050cfe05c6553cc3984cf5e0c6801c4c88cd1b53d935f507056b8aa060dd3d41af988146d3404ccadb143d002df155f6ae3d1e9dda0a32
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 188 created 2868 188 WerFault.exe dmaster.exe -
ACProtect 1.3x - 1.4x DLL software 18 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Program Files (x86)\Download Master\unzip32.dll acprotect C:\Program Files (x86)\Download Master\unzip32.dll acprotect C:\Program Files (x86)\Download Master\Plugins\videoserv.dll acprotect \Program Files (x86)\Download Master\Plugins\videoserv.dll acprotect \Program Files (x86)\Download Master\Plugins\videoserv.dll acprotect \Program Files (x86)\Download Master\Plugins\advscheduler.dll acprotect C:\Program Files (x86)\Download Master\Plugins\advscheduler.dll acprotect \Program Files (x86)\Download Master\Plugins\advscheduler.dll acprotect C:\Program Files (x86)\Download Master\Plugins\botmaster.dll acprotect \Program Files (x86)\Download Master\Plugins\botmaster.dll acprotect \Program Files (x86)\Download Master\Plugins\botmaster.dll acprotect \Program Files (x86)\Download Master\unzip32.dll acprotect \Program Files (x86)\Download Master\Plugins\videoserv.dll acprotect \Program Files (x86)\Download Master\Plugins\videoserv.dll acprotect \Program Files (x86)\Download Master\Plugins\advscheduler.dll acprotect \Program Files (x86)\Download Master\Plugins\advscheduler.dll acprotect \Program Files (x86)\Download Master\Plugins\botmaster.dll acprotect \Program Files (x86)\Download Master\Plugins\botmaster.dll acprotect -
Executes dropped EXE 6 IoCs
Processes:
dmaster.tmpdmaster.exedmaster.exedmaster.exedmaster.exedmaster.exepid process 4084 dmaster.tmp 1308 dmaster.exe 3012 dmaster.exe 4084 dmaster.exe 740 dmaster.exe 2868 dmaster.exe -
Processes:
resource yara_rule \Program Files (x86)\Download Master\unzip32.dll upx C:\Program Files (x86)\Download Master\unzip32.dll upx C:\Program Files (x86)\Download Master\Plugins\videoserv.dll upx \Program Files (x86)\Download Master\Plugins\videoserv.dll upx \Program Files (x86)\Download Master\Plugins\videoserv.dll upx \Program Files (x86)\Download Master\Plugins\advscheduler.dll upx C:\Program Files (x86)\Download Master\Plugins\advscheduler.dll upx \Program Files (x86)\Download Master\Plugins\advscheduler.dll upx C:\Program Files (x86)\Download Master\Plugins\botmaster.dll upx \Program Files (x86)\Download Master\Plugins\botmaster.dll upx \Program Files (x86)\Download Master\Plugins\botmaster.dll upx \Program Files (x86)\Download Master\unzip32.dll upx \Program Files (x86)\Download Master\Plugins\videoserv.dll upx \Program Files (x86)\Download Master\Plugins\videoserv.dll upx \Program Files (x86)\Download Master\Plugins\advscheduler.dll upx \Program Files (x86)\Download Master\Plugins\advscheduler.dll upx \Program Files (x86)\Download Master\Plugins\botmaster.dll upx \Program Files (x86)\Download Master\Plugins\botmaster.dll upx -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dmaster.exedmaster.exedmaster.exedmaster.exedmaster.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation dmaster.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation dmaster.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation dmaster.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation dmaster.exe Key value queried \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo\Nation dmaster.exe -
Loads dropped DLL 52 IoCs
Processes:
regsvr32.exeregsvr32.exedmaster.exedmaster.exedmaster.exedmaster.exedmaster.exepid process 1424 regsvr32.exe 3484 regsvr32.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe 2868 dmaster.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dmaster.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run dmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Download Master = "C:\\Program Files (x86)\\Download Master\\dmaster.exe -autorun" dmaster.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in Program Files directory 64 IoCs
Processes:
dmaster.tmpdescription ioc process File opened for modification C:\Program Files (x86)\Download Master\Plugins\remotedownload.dll dmaster.tmp File created C:\Program Files (x86)\Download Master\is-EFTQ4.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\unins000.msg dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\unzip32.dll dmaster.tmp File created C:\Program Files (x86)\Download Master\is-1QDC3.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-MIUFR.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-IGCAL.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-U2IIH.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-5FLD1.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-PCR37.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-5LRV6.tmp dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\dm_rus.chm dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\temp\downloader_old.exe dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\Plugins\advscheduler.chm dmaster.tmp File created C:\Program Files (x86)\Download Master\unins000.dat dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-VCJVP.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Sounds\is-UO33H.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Skins\is-NQCTE.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Plugins\is-T3H7L.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-JB7M4.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-91U49.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-SGB05.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-GMHMV.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Extensions\is-Q6DTC.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-1CD8O.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-NMDG3.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-B5MHE.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-CI5LH.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-OMKSU.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-60OB3.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-18USR.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Sounds\is-6D1R2.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-U1PI2.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-8M3HP.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-C47UU.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-2O7IQ.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-6B7OR.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-698I6.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-TPRQT.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-UAFUJ.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-DPR58.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-31DCU.tmp dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\dmie.dll dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\temp\downloader.exe dmaster.tmp File created C:\Program Files (x86)\Download Master\is-DNJJF.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-C14UI.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-OSPRP.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-B1PDJ.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\is-LFGMS.tmp dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\Plugins\videoserv.dll dmaster.tmp File created C:\Program Files (x86)\Download Master\is-NV06B.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Skins\is-LAPID.tmp dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\com.westbyte.downloadmaster.exe dmaster.tmp File created C:\Program Files (x86)\Download Master\Extensions\is-4GPEE.tmp dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\unins000.dat dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\Plugins\botmaster.dll dmaster.tmp File created C:\Program Files (x86)\Download Master\is-CLM07.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-U8HR9.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Sounds\is-EET71.tmp dmaster.tmp File opened for modification C:\Program Files (x86)\Download Master\Plugins\advscheduler.dll dmaster.tmp File created C:\Program Files (x86)\Download Master\is-OULUP.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\temp\is-Q2B88.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Plugins\is-9TKTL.tmp dmaster.tmp File created C:\Program Files (x86)\Download Master\Plugins\is-56QDT.tmp dmaster.tmp -
Drops file in Windows directory 5 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exetaskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2274612954.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\4183903823\1195458082.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3068621934.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 344 1308 WerFault.exe dmaster.exe 3784 3012 WerFault.exe dmaster.exe 3528 4084 WerFault.exe dmaster.exe 2332 2868 WerFault.exe dmaster.exe 188 2868 WerFault.exe dmaster.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies Control Panel 5 IoCs
Processes:
dmaster.exedmaster.exedmaster.exedmaster.exedmaster.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International\Geo dmaster.exe -
Processes:
dmaster.tmpbrowser_broker.exedmaster.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Закачать при помощи Download Master\contexts = "34" dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\ButtonText = "Download Master" dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Закачать ВСЕ при помощи Download Master\ = "C:\\Program Files (x86)\\Download Master\\dmieall.htm" dmaster.tmp Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74} dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\CLSID = "{1FBA04EE-3024-11d2-8F1F-0000F87ABD16}" dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\MenuStatusBar = "Download Master" dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\International\CpMRU dmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Çàêà÷àòü ïðè ïîìîùè Download Master\ = "C:\\Program Files (x86)\\Download Master\\dmie.htm" dmaster.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Ïåðåäàòü íà óäàëåííóþ çàêà÷êó DM\contexts = "34" dmaster.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Закачать ВСЕ при помощи Download Master dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\MenuText = "&Download Master" dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Çàêà÷àòü ïðè ïîìîùè Download Master dmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Çàêà÷àòü ÂÑÅ ïðè ïîìîùè Download Master\ = "C:\\Program Files (x86)\\Download Master\\dmieall.htm" dmaster.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Закачать при помощи Download Master dmaster.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Передать на удаленную закачку DM\contexts = "34" dmaster.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\dmaster.exe = "11000" dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Çàêà÷àòü ÂÑÅ ïðè ïîìîùè Download Master dmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Закачать при помощи Download Master\ = "C:\\Program Files (x86)\\Download Master\\dmie.htm" dmaster.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Закачать ВСЕ при помощи Download Master\contexts = "243" dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Передать на удаленную закачку DM dmaster.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\dmaster.exe = "11000" dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" dmaster.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\HotIcon = "C:\\Program Files (x86)\\Download Master\\dmaster.exe,210" dmaster.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION dmaster.tmp Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Çàêà÷àòü ïðè ïîìîùè Download Master\contexts = "34" dmaster.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Çàêà÷àòü ÂÑÅ ïðè ïîìîùè Download Master\contexts = "243" dmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Ïåðåäàòü íà óäàëåííóþ çàêà÷êó DM\ = "C:\\Program Files (x86)\\Download Master\\remdown.htm" dmaster.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" dmaster.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\MenuExt\Передать на удаленную закачку DM\ = "C:\\Program Files (x86)\\Download Master\\remdown.htm" dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\Default Visible = "Yes" dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\Icon = "C:\\Program Files (x86)\\Download Master\\dmaster.exe,211" dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{8DAE90AD-4583-4977-9DD4-4360F7A45C74}\Exec = "C:\\Program Files (x86)\\Download Master\\dmaster.exe" dmaster.tmp Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\MenuExt\Ïåðåäàòü íà óäàëåííóþ çàêà÷êó DM dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeregsvr32.exeregsvr32.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedmaster.tmpdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9961627E-4059-41B4-8E0E-A7D6B3854ADF}\ = "IE 4.x-6.x BHO for Download Master" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\SubSysId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\UUID = "{6C103304-4D00-4B6D-A269-E02795C89952}" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31DB2428-93BB-43E8-9F31-686C7F8C58DF}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMIE.MoveURL\ = "MoveURL Object" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMIE.IEDownloadManager\ = "DM Download catcher for IE6" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = eda47e9320aed701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\ClearBrowsingHistoryOnStart = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 99e8e61825c3d701 MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{22D1250D-930F-4DFB-AE98-9FB407679AEB}\1.0\ = "DMIE Library" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9961627E-4059-41B4-8E0E-A7D6B3854ADF}\ProgID\ = "dmiehlp.DMIEHelper" regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\MigrationTime = eda47e9320aed701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMFile\DefaultIcon\ = "C:\\Program Files (x86)\\Download Master\\dmaster.exe,-201" dmaster.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.urls dmaster.tmp Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url1 = "https://www.facebook.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "{99C71D7D-FC1E-4CD5-AD22-1078D716F4E0}" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DMFile\DefaultIcon dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMFile\shell\open\command\ = "C:\\Program Files (x86)\\Download Master\\dmaster.exe \"%L\"" dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{22D1250D-930F-4DFB-AE98-9FB407679AEB}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Download Master\\" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DMIE.IEDownloadManager\Clsid\ = "{31DB2428-93BB-43E8-9F31-686C7F8C58DF}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\LastClosedHeight = "600" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{22D1250D-930F-4DFB-AE98-9FB407679AEB}\1.0\0\win32\ = "C:\\Program Files (x86)\\Download Master\\dmie.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6FC88142-1C6D-48FB-9592-2923CEA45815}\TypeLib\ = "{22D1250D-930F-4DFB-AE98-9FB407679AEB}" regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DMUrlsFile\shell\open\command dmaster.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9961627E-4059-41B4-8E0E-A7D6B3854ADF}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6FC88142-1C6D-48FB-9592-2923CEA45815}\ = "IMoveURL" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe -
Processes:
dmaster.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\SystemCertificates\SYSTEM dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\SystemCertificates\SYSTEM\Certificates dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\SystemCertificates\SYSTEM\CRLs dmaster.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\SystemCertificates\SYSTEM\CTLs dmaster.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dmaster.tmpWerFault.exeWerFault.exeWerFault.exetaskmgr.exeWerFault.exepid process 4084 dmaster.tmp 4084 dmaster.tmp 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 344 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3784 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 3528 WerFault.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe 2332 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
Processes:
dmaster.exedmaster.exedmaster.exedmaster.exepid process 1308 dmaster.exe 3012 dmaster.exe 4084 dmaster.exe 740 dmaster.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 2744 MicrosoftEdgeCP.exe 2744 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeWerFault.exeWerFault.exeWerFault.exefirefox.exeAUDIODG.EXEtaskmgr.exeWerFault.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2128 MicrosoftEdge.exe Token: SeDebugPrivilege 2128 MicrosoftEdge.exe Token: SeDebugPrivilege 2128 MicrosoftEdge.exe Token: SeDebugPrivilege 2128 MicrosoftEdge.exe Token: SeDebugPrivilege 3756 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3756 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3756 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3756 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2128 MicrosoftEdge.exe Token: SeDebugPrivilege 2444 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2444 MicrosoftEdgeCP.exe Token: SeRestorePrivilege 344 WerFault.exe Token: SeBackupPrivilege 344 WerFault.exe Token: SeDebugPrivilege 344 WerFault.exe Token: SeDebugPrivilege 3784 WerFault.exe Token: SeDebugPrivilege 3528 WerFault.exe Token: SeDebugPrivilege 3044 firefox.exe Token: SeDebugPrivilege 3044 firefox.exe Token: 33 4020 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4020 AUDIODG.EXE Token: SeDebugPrivilege 3044 firefox.exe Token: SeDebugPrivilege 3044 firefox.exe Token: SeDebugPrivilege 2760 taskmgr.exe Token: SeSystemProfilePrivilege 2760 taskmgr.exe Token: SeCreateGlobalPrivilege 2760 taskmgr.exe Token: 33 2760 taskmgr.exe Token: SeIncBasePriorityPrivilege 2760 taskmgr.exe Token: SeDebugPrivilege 2332 WerFault.exe Token: SeDebugPrivilege 188 WerFault.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
dmaster.tmpdmaster.exedmaster.exedmaster.exedmaster.exefirefox.exetaskmgr.exepid process 4084 dmaster.tmp 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 3044 firefox.exe 3044 firefox.exe 3044 firefox.exe 3044 firefox.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
dmaster.exedmaster.exedmaster.exedmaster.exefirefox.exetaskmgr.exedmaster.exepid process 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 1308 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 740 dmaster.exe 3044 firefox.exe 3044 firefox.exe 3044 firefox.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2760 taskmgr.exe 2868 dmaster.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
dmaster.exeMicrosoftEdge.exeMicrosoftEdgeCP.exedmaster.exedmaster.exedmaster.exefirefox.exedmaster.exepid process 1308 dmaster.exe 2128 MicrosoftEdge.exe 2744 MicrosoftEdgeCP.exe 2744 MicrosoftEdgeCP.exe 1308 dmaster.exe 1308 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 3012 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 4084 dmaster.exe 740 dmaster.exe 3044 firefox.exe 2868 dmaster.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dmaster.exedmaster.tmpMicrosoftEdgeCP.exefirefox.exefirefox.exedescription pid process target process PID 2352 wrote to memory of 4084 2352 dmaster.exe dmaster.tmp PID 2352 wrote to memory of 4084 2352 dmaster.exe dmaster.tmp PID 2352 wrote to memory of 4084 2352 dmaster.exe dmaster.tmp PID 4084 wrote to memory of 1424 4084 dmaster.tmp regsvr32.exe PID 4084 wrote to memory of 1424 4084 dmaster.tmp regsvr32.exe PID 4084 wrote to memory of 1424 4084 dmaster.tmp regsvr32.exe PID 4084 wrote to memory of 3484 4084 dmaster.tmp regsvr32.exe PID 4084 wrote to memory of 3484 4084 dmaster.tmp regsvr32.exe PID 4084 wrote to memory of 3484 4084 dmaster.tmp regsvr32.exe PID 4084 wrote to memory of 1308 4084 dmaster.tmp dmaster.exe PID 4084 wrote to memory of 1308 4084 dmaster.tmp dmaster.exe PID 4084 wrote to memory of 1308 4084 dmaster.tmp dmaster.exe PID 2744 wrote to memory of 3756 2744 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2744 wrote to memory of 3756 2744 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2744 wrote to memory of 3756 2744 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3264 wrote to memory of 3044 3264 firefox.exe firefox.exe PID 3044 wrote to memory of 1512 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 1512 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe PID 3044 wrote to memory of 180 3044 firefox.exe firefox.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dmaster.exe"C:\Users\Admin\AppData\Local\Temp\dmaster.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-LP67N.tmp\dmaster.tmp"C:\Users\Admin\AppData\Local\Temp\is-LP67N.tmp\dmaster.tmp" /SL5="$601DE,7072878,121344,C:\Users\Admin\AppData\Local\Temp\dmaster.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Download Master\dmie.dll"3⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Download Master\dmiehlp.dll"3⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Download Master\dmaster.exe"C:\Program Files (x86)\Download Master\dmaster.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 31044⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Download Master\dmaster.exe"C:\Program Files (x86)\Download Master\dmaster.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 26962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Download Master\dmaster.exe"C:\Program Files (x86)\Download Master\dmaster.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 30202⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Download Master\dmaster.exe"C:\Program Files (x86)\Download Master\dmaster.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies Control Panel
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3044.0.556548890\1816411743" -parentBuildID 20200403170909 -prefsHandle 1512 -prefMapHandle 1460 -prefsLen 1 -prefMapSize 219808 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3044 "\\.\pipe\gecko-crash-server-pipe.3044" 1612 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3044.3.1241354535\1877323070" -childID 1 -isForBrowser -prefsHandle 2096 -prefMapHandle 2208 -prefsLen 122 -prefMapSize 219808 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3044 "\\.\pipe\gecko-crash-server-pipe.3044" 2228 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3044.13.790818544\188095952" -childID 2 -isForBrowser -prefsHandle 3452 -prefMapHandle 3440 -prefsLen 6979 -prefMapSize 219808 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3044 "\\.\pipe\gecko-crash-server-pipe.3044" 3464 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3044.20.1066505934\1492830986" -childID 3 -isForBrowser -prefsHandle 4112 -prefMapHandle 4108 -prefsLen 7907 -prefMapSize 219808 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3044 "\\.\pipe\gecko-crash-server-pipe.3044" 4328 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3044.27.978475557\1126324486" -parentBuildID 20200403170909 -prefsHandle 4684 -prefMapHandle 4824 -prefsLen 8529 -prefMapSize 219808 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3044 "\\.\pipe\gecko-crash-server-pipe.3044" 4784 rdd3⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4101⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\Download Master\dmaster.exe"C:\Program Files (x86)\Download Master\dmaster.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies Control Panel
- Modifies system certificate store
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 24082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 23522⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Download Master\Extensions\dm@westbyte.com.xpiMD5
7b5261cbaaec8149ee770e3a4b943b1a
SHA1e8acf08eb0499bf91a002c3384b15dd7d4b22088
SHA2563dc431f6ffbcf2d8236fc4c00eda17465527eac98e89f9283e1bbab557ef5ce2
SHA5127895ff2297bbef267e65b81abbd9d7de98edd5aa8dcd312d5d8321bcc08b17c12c8b2f630bd9df87f74d3a8d6afc07455f5d6c8ecb103c6a2db48225ec81aafd
-
C:\Program Files (x86)\Download Master\Extensions\dmbarff@westbyte.com.xpiMD5
f714ca78f383dc4e61c4a6b407562a75
SHA1162e8f6ce0829e062c2d42c534d72c7cd8899497
SHA2567717cff48a48860e0873cc4a2b36c077c82d06d6f721526bc4518521d6a1cd07
SHA5129afc9a5a16c2e36e4b5420517302474fd5da3c37c90dc057745515fced6ebbc60e87e3a3ec442cea7471e8c6588c08f3311c988127c8f3280e91ab60f7a61f5e
-
C:\Program Files (x86)\Download Master\Plugins\advscheduler.dllMD5
e2af2f93e7d1db2119b1a03292d75ac2
SHA1998c95aebf41a82bccda6cf52e5fe48eb9c47683
SHA256e6549cab193396e65c034c716a326e9b85baf86a7300430d6729eb3f6137af2c
SHA512a39aba6682388526af69e7cdb14ac3c6ea09f4e64bc2f518b79ab4f6b18ddd7597805515fa8ba7656bbf7719abbe69c313461c0c897e2b2d02c8616011595fb9
-
C:\Program Files (x86)\Download Master\Plugins\botmaster.dllMD5
f32c1bda6922633245804ea84e55dcc0
SHA180ac467eb71c92ed970b21f8eb83fe6aeaa623ec
SHA2562c4cfee81092f3e49d1d3af7bcbd917bd30bdac9dab57f3e200f59f805cff209
SHA512712ccc45dd0bd399ec47424d2706a4af3c7a86ab5ef9a34dcdd4fca170fb0146b581d7f5a3825516e89dd24fd69662e18857a1cf841a13e7cffeb1d893b414ff
-
C:\Program Files (x86)\Download Master\Plugins\remotedownload.dllMD5
8d8ac3e961e45ce7a2a929931c7e18f0
SHA102c95bd0d01755d17eaf471021eea1cd59c3b859
SHA256a65a3250f892c2a5c4ab035992a0b602cdc170ad0a7a96ebab0980c34977a081
SHA51292874fb14e1e87f860c5fa6d4b4d80f3120524adb7986b4cbf2d5df964020477cefc734be1e5401a2ba19e650277f78dd318649edc0157ccaac4e1db07060a88
-
C:\Program Files (x86)\Download Master\Plugins\videoserv.dllMD5
2792d3f67b6cee10a9c0cd5d1e98efda
SHA1a9aecb387b85fc9f2eb368578cb3ae0917a0cd59
SHA2560ba76db695f8cf004d9f645220cb0f5d88d5dffd62a01d7f0102be7d7380c868
SHA51214c111f67f8af846afc4c785c0a2cf011fbb64560aac926c7c97f773bf397e0dee8ac13c5e7ce96fa08ed8dca8a04170de52fe1be13c8b2efe9ade802db79073
-
C:\Program Files (x86)\Download Master\Skins\Standard.sknMD5
3b04357247712abb24f1ecbb92889a29
SHA1c0309dd24c9bc7eb528024ab221649c9f1ff8ee3
SHA256addd9b02b9ad491ff5c1fd34df76278d5bdc1229ba5bec1f5fe46b338fc698e5
SHA5128a50746a95fa7ce35b9c9f62cd23c45924c72171489cb57967cfbe177ae95370e4421cdad3d0761dacb92e84b8ad1967087738b4cf7ec00196e7d2e85e998b8b
-
C:\Program Files (x86)\Download Master\bugtype_e.cfgMD5
4e045bbf332997627ccea8f34d2bc35a
SHA1365eb578636b8063bf4a3aee05e0f4eff22f5dfa
SHA25612b7f3ffb57586776259978a057fcc4cdaf99f96dfac5d152655b58d7f1885d9
SHA512b388071105b1004485d1573216ef80a6fe722745cf28be134af849199502262b9d6176c5cfb1e4f06fe5e3934e0654f44911d588bd157daea09f5d60a7e69b46
-
C:\Program Files (x86)\Download Master\dmaster.exeMD5
cb03a9f43c59523c812b89f539509237
SHA12fbc7ede4d5fe8f59b093220526ba1dbc08a7734
SHA25601805fe80e168fa9b0e4bea1c060e2283341d8717044a36f77586fadbda01f48
SHA5129f6a7b6364d8bce7daff63371c940ae4001b76bfe8c7b78a1cbdca23cc2de3dd5e80808b3435e09f9c1c1f5a003399d43232ba7c0e337e42a9ad161010b4ec54
-
C:\Program Files (x86)\Download Master\dmaster.exeMD5
cb03a9f43c59523c812b89f539509237
SHA12fbc7ede4d5fe8f59b093220526ba1dbc08a7734
SHA25601805fe80e168fa9b0e4bea1c060e2283341d8717044a36f77586fadbda01f48
SHA5129f6a7b6364d8bce7daff63371c940ae4001b76bfe8c7b78a1cbdca23cc2de3dd5e80808b3435e09f9c1c1f5a003399d43232ba7c0e337e42a9ad161010b4ec54
-
C:\Program Files (x86)\Download Master\dmaster.exeMD5
cb03a9f43c59523c812b89f539509237
SHA12fbc7ede4d5fe8f59b093220526ba1dbc08a7734
SHA25601805fe80e168fa9b0e4bea1c060e2283341d8717044a36f77586fadbda01f48
SHA5129f6a7b6364d8bce7daff63371c940ae4001b76bfe8c7b78a1cbdca23cc2de3dd5e80808b3435e09f9c1c1f5a003399d43232ba7c0e337e42a9ad161010b4ec54
-
C:\Program Files (x86)\Download Master\dmaster4.datMD5
17e0ca37d4edfc694640b63ee0782d1d
SHA1d5a1e3b86255571cfde7572d2df6ff808e0ec7ee
SHA25697c5ba9bd1eb25d95c688bb3a7b958a5832a1bcc7ac82c69c0d93451b7383db9
SHA512512ff3e08b499a1a67a27c6667df199b34062fbfc74999f2accc41f73f5cdda2cdc53f5f35aaffe06d73fbefffc143a800e177a31510339781df903853812169
-
C:\Program Files (x86)\Download Master\dmie.dllMD5
464632653b8ef1febda37d5efc44aeee
SHA1bd114b3af59a4a7c42234ee8908fac0d7beb23f0
SHA256ab7f9245c46507a18d4a96747a8b33e8b0b5ee78fb7b99b8d9833496a5c52af2
SHA5126b113f0e3c25b69f27c3e8a173240f536621234d50013f668171e680bbd796f1f8859ece9b7c4af337a05fbe2cf87595152924956a6147dfd9a6583fd908b368
-
C:\Program Files (x86)\Download Master\dmiehlp.dllMD5
ece3d898b9a156dec1cbbb88108f693f
SHA168839ede5155c6d86f46f85988ec109d7b3713f4
SHA25603a41f5572b5c872ba0b8cf05c5ca3a3f51d2ee34a2dc95b4b9c63d4a30b289a
SHA5126d5b483e2da474ed4b34a2ffbfa050215c79ab93814bce56e42b7ed07350f969147778a3f4db9a15b499a5929692df29d4348a62f8723978294df2a161691bd7
-
C:\Program Files (x86)\Download Master\hintf.bmpMD5
d97ac2dc81cea733a6bc49e609b75213
SHA185abd47e2ab8bdbc201325795c104a7d3497fed2
SHA256af207dcde55fff6a1597c3e16764b58841197930ed2909f5075b44053c5c5afe
SHA5123ffb1eaea942f448c82bb61f089140ba278886487ba1b452311efc9904aefec5596328df26a450dde5e622b751a692c519335bea88bba9c1b3f26cf79423270f
-
C:\Program Files (x86)\Download Master\lvcolors.cfgMD5
69031e6ed2e4b83bf7b9d187347c0190
SHA127a5c366b206278fa785121541323c8553211a0d
SHA256d90950f0ccc19fe055a0ea13832a0614eea8d80594180c20a7849918cf4224b5
SHA5120bab3364fed611018da297a23ae845383c8630b033266f35ba025999bbf460995e267c5e90f2ebe287e7b1fd53e8a940012417978a014c2224c9a2333f508229
-
C:\Program Files (x86)\Download Master\nodelist.xmlMD5
afd964c0a9a441d7397218779a59b56c
SHA178254a73e01d8fdb295de5f3556b39225059c2ed
SHA2563b1d21b350487001c3852727119ee55607f870cd23494e89c983ceb1c10090ee
SHA5124d068982941e2de162ee08cb5d176a071f7226be3516461e12a2eb65a09d9679a33db1a71117fbea9c22eae3cb94b112ee7a5d8d7506994ad4a409c7dde531d8
-
C:\Program Files (x86)\Download Master\referers.txtMD5
a0d6298382365ca3d88f0b0b7f07ff84
SHA1b60b2341dcf74cf95ca4d48429a75ceeaf425aa4
SHA256e35e4ae517a16d8811c7bac92228894a95bacb8a78136a20927be092ca03664b
SHA51260b61336526a33b522b835443476cf13b1672c240a7a77f52c564cc9d5216ce57fc0c2b2b44acf04a997be62cb0aea682dbcce00754f7e6cffb7c8e0c5c8ec37
-
C:\Program Files (x86)\Download Master\temp\dbans.lnkMD5
3f42d2bd78c3a93d7ea5002a4f283db7
SHA1b45f67c12947b44a06c781b156c22d7a218a90c8
SHA2562ece12916d2620e96715bbfcfdea0fa94863d2f4501fec2aca3b74a0d0dc2fe2
SHA51288cc595cff70870f3a500e9fce2ceacef93fa47cb68a1f01f785bc2ff558bcbef2057da3c5f7a16b1f84584f843d56f771da35d778be0a2605d54debfa19b023
-
C:\Program Files (x86)\Download Master\typeconn.cfgMD5
720371839624c0e1c3ede84a80fe31fb
SHA19b7cb75a6c9d3f3e922efea0ef7e4e89b1f995b8
SHA256ee07e7aed21902c95c54aa8cb27aa2175c9e89e6845482f0881be6d562febc90
SHA512190668f595a75d7c5a14cf930b3fc5857e065c4a4fa6a5b0029823de071833bf2bc2989484cf21ce186252ceddd72dd19999f4dfeaaea5098040cedf066bb261
-
C:\Program Files (x86)\Download Master\unrar.dllMD5
2fc227e035465dd4e919109e7bbbd5dd
SHA12bddec34e0a96bc64e7e65c9a36ee66cf1306c47
SHA2563282a2e45b60b071a1c73711c9be47ff92086ef64896b99e75b0e0bdde0166b8
SHA512042879ee001498b28387a62c9294e0984f0f6d44804afb131dd01b3e18000a371636d8a56dfd468033468b0a551bdc35dfa69cfcc8cdf038b3da3976d0146139
-
C:\Program Files (x86)\Download Master\unzip32.dllMD5
28b6d614f3534c9f1f81b83b9f63e770
SHA194e66b25313c325d8325a906d6ce855943be881f
SHA25603c197713f23eec900b65ac17c4c2660419de99a3807fb36128458b0840a8748
SHA512cbbb627460cbbd9e32075cce50b58d89d535db46bca3330935ae13a3ebb09f3f7de6cbc859852f87e7da38f146c7d3201c0a39ab581e8adbf9c322333b15d713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751MD5
54e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E641460193B4703F88F361E852980652MD5
0dfabe6d885d0a239d3a48680112db52
SHA17a257f2aab77247ccca18e6dd796f99ff2f07af9
SHA2567f2c15d347ecdb3c538339411a0b16cb4497f540ffd85592b13fbc81f342b300
SHA512765e1a2f018d87cea3d60517dad0fd819100f9bbc7170f89f13dbd2165d6be5cde8af10f9d58333cda256b91572803cabdd2344ce05fc0158c1cedb0c8ede368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751MD5
867e3b6411166493966fb01204310dec
SHA12c08f48c0ecf7820028bf76c57670a7a293137c3
SHA2567605d508c29c3441e1aa0f86eeab0876940fce679184ba115e0a96f6e0b913be
SHA51265b613ddcafebe0c2b4b2d7ab8c6b19b16d9339c62f4553b30b5877600f6c44b8bf353ea8a17517eb80cfedc9546409a8f0c3dc684cc0898b843c4092ad8f30d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E641460193B4703F88F361E852980652MD5
5b421b4adbd5fe49bb978bd18a217c2b
SHA1bc17d2a040f3892296e78d023e8902c7feda4909
SHA2561d4ef3d1b6cfbc0badcb5a6bbfe3b3f1c352567b7a3ab46e67c62147a057580b
SHA512d8a2ba92f424397abe1925a4cb7ec9e5ca3efc4235daaae9ac3a12c23c352245ab46e464dcfd9d96bedb2cb9b9152eb3284d28bc3c1a0248be1f481a2d75b656
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\HBPS4WXS\popup[1].cssMD5
6ed564810dd0019e45e01c89da076181
SHA11082787dcc91355093bbe51ec98e82af807515bc
SHA2568fe22f158544d92828702f5fd84e2c56f30a07e36765bc5e723f03ffa7a77ea9
SHA51220bad9e1eef75b0fa62791c0d08e89b853b012eaebe147e72e097442f31b68218a83a47fdd9024a420c4185217d3571cc1975877c968dcaae7bf6efb48d66de8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QT2UOKDP\main[1].cssMD5
193d17e44fb24f56b95f624609ff9595
SHA1ff1d69c5c1e6398d4c3c1c2a0e5d75cd4a07bce3
SHA2565fd6a4c2d08694c80d9f8d661fdb3954191c9777cc9b4241decec55ae796fc7f
SHA512dd033ca8c8a4afa4e21fdd141fb4a7d91524096c2e6a41b2bbffb44df0b55b30963a028e167bb6276e63a16d83d5884513393fb7d9add3bb141c556eb6145628
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\V32L7G2N.cookieMD5
88d243d2de68da5333983bb6ebd5f18f
SHA1ed058815b42ba4de47ca2da9dd4ef390fe550bad
SHA256d573db3caaf2293484dbad2e1d51b604b4d9bf5ca5dccf99098eb62ff6e4f7a9
SHA512bfa9615f1c0f71a40d1a1c03afd5e8b75b520dea827a0a82f9b0d8c8ddd926530e72e3debdeaace5b0fb07d781350d872fe8c79c81172f5ef4d419a3ac3d1ddf
-
C:\Users\Admin\AppData\Local\Temp\is-LP67N.tmp\dmaster.tmpMD5
50bed2bd35a9a3f6061d7024a17d95ba
SHA16804ac3b28a3605cfd70c83573e43a52c3b6666e
SHA256a808ead5636289e1909533957c96a93fb717d9494b4c271d07bfbd6c030a5314
SHA512aced9c20256cea52b7b77f1d95eef21f11fef52957434dc1a81898c57206f36981d885da8883d7f1b83ffc69feaf95845e7e3d60dfdf6f18ff5dd48a57c8986e
-
C:\Users\Admin\AppData\Local\Temp\is-LP67N.tmp\dmaster.tmpMD5
50bed2bd35a9a3f6061d7024a17d95ba
SHA16804ac3b28a3605cfd70c83573e43a52c3b6666e
SHA256a808ead5636289e1909533957c96a93fb717d9494b4c271d07bfbd6c030a5314
SHA512aced9c20256cea52b7b77f1d95eef21f11fef52957434dc1a81898c57206f36981d885da8883d7f1b83ffc69feaf95845e7e3d60dfdf6f18ff5dd48a57c8986e
-
C:\Users\Admin\AppData\Roaming\Download Master\nodelist.xmlMD5
afd964c0a9a441d7397218779a59b56c
SHA178254a73e01d8fdb295de5f3556b39225059c2ed
SHA2563b1d21b350487001c3852727119ee55607f870cd23494e89c983ceb1c10090ee
SHA5124d068982941e2de162ee08cb5d176a071f7226be3516461e12a2eb65a09d9679a33db1a71117fbea9c22eae3cb94b112ee7a5d8d7506994ad4a409c7dde531d8
-
C:\Users\Admin\AppData\Roaming\Download Master\temp\cart_ind.bmpMD5
65d7bddaf6c7c4960f3bb608bf08a136
SHA1c2ced19822863816bb16393ebb9b8631bf21c14c
SHA2569ce69e9d7d01741e7caae93fac9111254c3c27040013c1bbfa2cbb12e54d877e
SHA512c9a736ee981db67291aeb7754aca6af3a468a01c83467d6114fcaf31138149263e88fd5a7a86f627816faa0536d9dc8acc73d9b96d1e270c70eecba0df6c10b3
-
C:\Users\Admin\AppData\Roaming\Download Master\temp\skin.dllMD5
6ea3ce191c3461be6b71f2e09f3bdb31
SHA194e0ce22eb7d60786b6abc4892f5d1fa3d2054ab
SHA25660a6f1a8163c62a866594fe68a675202bb6ebc991356ca69d62c1b8453f6da95
SHA5127768e0e18c82ac863bebcc78c607f4d3ba15fcdeb7222b2dc10071f79232df3ef806ba16b9a1ccee73f2dd149c7183eaea429dd8ed39d4a448096c8f6fc06f00
-
C:\Users\Admin\AppData\Roaming\Download Master\temp\skin_dll.cfgMD5
6840e4976ea46eff3c192f6a81aceef9
SHA1b38e657b761324e54762ad2b9c85af484a0a95d2
SHA256b6cda18e3f2e5584e526eea0697146cb4b8466cdd8e8c94d2876545ca367c872
SHA512e4535d3dc3e1aa463b43f8fc264491ad526e58c228a72f381b0660b86268b680c2016311e3bea24169350d3118f80aad909f13a242a986a145d5aeeeb0694c26
-
C:\Users\Admin\AppData\Roaming\Download Master\temp\spd_ind.bmpMD5
6a0a9888b397725f3c1cd2ffd5d916c5
SHA1fed67b621fa4199fa364d2cd532f195bf97b40bf
SHA2566d183b352abb0a1eeb29627c0dc474643cb406facb2eb2365b93d628f1a6ffaf
SHA512f734e7a7275b466ef0e4a61444628cb6a17745bfe9624ab96f5a698a746a7d456584a8525a6acbfa48981c33c53439fe944feb52c4ba3062d613afc6d1503405
-
C:\Users\Admin\AppData\Roaming\Download Master\temp\spd_indl.bmpMD5
3d7b5718c4a9214b227c3e70107a71ae
SHA13a6ddc0864e6a5e7bc9244e8f3ed03c95ed38f5d
SHA25685050c55055d87de2d9512dd9311cc7db3d97d2609e451de85fa7fe50ee976b3
SHA5123370067d1b97f498cf6bc0406f6ff6d76c32890d91525fc4ed61d73fe859e17baa60d2a9582e27d3ec5fba72884c2991074bcf8485f07ae74f68ec865f110682
-
C:\Users\Admin\AppData\Roaming\Download Master\temp\standard.cfgMD5
74a5761d0c1442dc81ff1c062d486d89
SHA161f9a82162edca4b527355341c8bca07ae9e2ce7
SHA256e103a20f39ff3fbc8b19b13dd60e96fea846cd86eb24562e585c62c51a167d8c
SHA512a79d4b21d0189574b2536b177ddb87f3e34672c156cb88299c043557ee817ecf7b20c429265a638f6daae5bf20fb29035db33be20b8dd50a791b1b8c0e722f0f
-
C:\Users\Admin\AppData\Roaming\Download Master\temp\tb_bgrn.bmpMD5
1a526c6720ed5cd5c2ed406da9fbf850
SHA194826c714b316f27e2ead3595da0e24ad4e33391
SHA256fc6ca3c29f66c52a46f225d0f827eb58cd353bf626e3614399f565552dfb89ce
SHA512d361d573f16c8f8d90fa529811b9a8b1e3aa3b5b0a35673f7d4335baeed69a6c7e247030087355765d74b0c9def64640b50136099e94a25bd8c8f2747cb28912
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ee4c73248a23a265.customDestinations-msMD5
0c591c0f893f1bcf85ab97b27911a733
SHA1c472cfb5c3371d7f3735b778a198d4c8a57da214
SHA2563045d181f6084bd58bb6c3876aed241f04d9ef363d106d7092f43a90f192b0b8
SHA51250af4c4370c015839628ea0936bbce931c1a5628d16c91a41b0c3f68c44be2094ff14ad1923f42bca1e89b97993d52df2376ae035b4d257fd08d04da3258499f
-
C:\Users\Admin\Desktop\Download Master.lnkMD5
07f756b7a7018295331128d56e741156
SHA1c57892e276a38bf145c2006ccfad7e4d63e04e87
SHA2562fe23c14d6359de4bffb7d18fbc19ef422cff0e445b563ab035c74c203a8be53
SHA51278c74a7c6504b2194f6bee9b33ece11f5b4a79c7740802044264f8583aea02e6d6d035ec3f0779ced3926a8d3e7f920733877f8e03140e81d49b3c76b22df2b0
-
\Program Files (x86)\Download Master\Plugins\advscheduler.dllMD5
e2af2f93e7d1db2119b1a03292d75ac2
SHA1998c95aebf41a82bccda6cf52e5fe48eb9c47683
SHA256e6549cab193396e65c034c716a326e9b85baf86a7300430d6729eb3f6137af2c
SHA512a39aba6682388526af69e7cdb14ac3c6ea09f4e64bc2f518b79ab4f6b18ddd7597805515fa8ba7656bbf7719abbe69c313461c0c897e2b2d02c8616011595fb9
-
\Program Files (x86)\Download Master\Plugins\advscheduler.dllMD5
e2af2f93e7d1db2119b1a03292d75ac2
SHA1998c95aebf41a82bccda6cf52e5fe48eb9c47683
SHA256e6549cab193396e65c034c716a326e9b85baf86a7300430d6729eb3f6137af2c
SHA512a39aba6682388526af69e7cdb14ac3c6ea09f4e64bc2f518b79ab4f6b18ddd7597805515fa8ba7656bbf7719abbe69c313461c0c897e2b2d02c8616011595fb9
-
\Program Files (x86)\Download Master\Plugins\advscheduler.dllMD5
e2af2f93e7d1db2119b1a03292d75ac2
SHA1998c95aebf41a82bccda6cf52e5fe48eb9c47683
SHA256e6549cab193396e65c034c716a326e9b85baf86a7300430d6729eb3f6137af2c
SHA512a39aba6682388526af69e7cdb14ac3c6ea09f4e64bc2f518b79ab4f6b18ddd7597805515fa8ba7656bbf7719abbe69c313461c0c897e2b2d02c8616011595fb9
-
\Program Files (x86)\Download Master\Plugins\advscheduler.dllMD5
e2af2f93e7d1db2119b1a03292d75ac2
SHA1998c95aebf41a82bccda6cf52e5fe48eb9c47683
SHA256e6549cab193396e65c034c716a326e9b85baf86a7300430d6729eb3f6137af2c
SHA512a39aba6682388526af69e7cdb14ac3c6ea09f4e64bc2f518b79ab4f6b18ddd7597805515fa8ba7656bbf7719abbe69c313461c0c897e2b2d02c8616011595fb9
-
\Program Files (x86)\Download Master\Plugins\botmaster.dllMD5
f32c1bda6922633245804ea84e55dcc0
SHA180ac467eb71c92ed970b21f8eb83fe6aeaa623ec
SHA2562c4cfee81092f3e49d1d3af7bcbd917bd30bdac9dab57f3e200f59f805cff209
SHA512712ccc45dd0bd399ec47424d2706a4af3c7a86ab5ef9a34dcdd4fca170fb0146b581d7f5a3825516e89dd24fd69662e18857a1cf841a13e7cffeb1d893b414ff
-
\Program Files (x86)\Download Master\Plugins\botmaster.dllMD5
f32c1bda6922633245804ea84e55dcc0
SHA180ac467eb71c92ed970b21f8eb83fe6aeaa623ec
SHA2562c4cfee81092f3e49d1d3af7bcbd917bd30bdac9dab57f3e200f59f805cff209
SHA512712ccc45dd0bd399ec47424d2706a4af3c7a86ab5ef9a34dcdd4fca170fb0146b581d7f5a3825516e89dd24fd69662e18857a1cf841a13e7cffeb1d893b414ff
-
\Program Files (x86)\Download Master\Plugins\botmaster.dllMD5
f32c1bda6922633245804ea84e55dcc0
SHA180ac467eb71c92ed970b21f8eb83fe6aeaa623ec
SHA2562c4cfee81092f3e49d1d3af7bcbd917bd30bdac9dab57f3e200f59f805cff209
SHA512712ccc45dd0bd399ec47424d2706a4af3c7a86ab5ef9a34dcdd4fca170fb0146b581d7f5a3825516e89dd24fd69662e18857a1cf841a13e7cffeb1d893b414ff
-
\Program Files (x86)\Download Master\Plugins\botmaster.dllMD5
f32c1bda6922633245804ea84e55dcc0
SHA180ac467eb71c92ed970b21f8eb83fe6aeaa623ec
SHA2562c4cfee81092f3e49d1d3af7bcbd917bd30bdac9dab57f3e200f59f805cff209
SHA512712ccc45dd0bd399ec47424d2706a4af3c7a86ab5ef9a34dcdd4fca170fb0146b581d7f5a3825516e89dd24fd69662e18857a1cf841a13e7cffeb1d893b414ff
-
\Program Files (x86)\Download Master\Plugins\remotedownload.dllMD5
8d8ac3e961e45ce7a2a929931c7e18f0
SHA102c95bd0d01755d17eaf471021eea1cd59c3b859
SHA256a65a3250f892c2a5c4ab035992a0b602cdc170ad0a7a96ebab0980c34977a081
SHA51292874fb14e1e87f860c5fa6d4b4d80f3120524adb7986b4cbf2d5df964020477cefc734be1e5401a2ba19e650277f78dd318649edc0157ccaac4e1db07060a88
-
\Program Files (x86)\Download Master\Plugins\remotedownload.dllMD5
8d8ac3e961e45ce7a2a929931c7e18f0
SHA102c95bd0d01755d17eaf471021eea1cd59c3b859
SHA256a65a3250f892c2a5c4ab035992a0b602cdc170ad0a7a96ebab0980c34977a081
SHA51292874fb14e1e87f860c5fa6d4b4d80f3120524adb7986b4cbf2d5df964020477cefc734be1e5401a2ba19e650277f78dd318649edc0157ccaac4e1db07060a88
-
\Program Files (x86)\Download Master\Plugins\remotedownload.dllMD5
8d8ac3e961e45ce7a2a929931c7e18f0
SHA102c95bd0d01755d17eaf471021eea1cd59c3b859
SHA256a65a3250f892c2a5c4ab035992a0b602cdc170ad0a7a96ebab0980c34977a081
SHA51292874fb14e1e87f860c5fa6d4b4d80f3120524adb7986b4cbf2d5df964020477cefc734be1e5401a2ba19e650277f78dd318649edc0157ccaac4e1db07060a88
-
\Program Files (x86)\Download Master\Plugins\remotedownload.dllMD5
8d8ac3e961e45ce7a2a929931c7e18f0
SHA102c95bd0d01755d17eaf471021eea1cd59c3b859
SHA256a65a3250f892c2a5c4ab035992a0b602cdc170ad0a7a96ebab0980c34977a081
SHA51292874fb14e1e87f860c5fa6d4b4d80f3120524adb7986b4cbf2d5df964020477cefc734be1e5401a2ba19e650277f78dd318649edc0157ccaac4e1db07060a88
-
\Program Files (x86)\Download Master\Plugins\videoserv.dllMD5
2792d3f67b6cee10a9c0cd5d1e98efda
SHA1a9aecb387b85fc9f2eb368578cb3ae0917a0cd59
SHA2560ba76db695f8cf004d9f645220cb0f5d88d5dffd62a01d7f0102be7d7380c868
SHA51214c111f67f8af846afc4c785c0a2cf011fbb64560aac926c7c97f773bf397e0dee8ac13c5e7ce96fa08ed8dca8a04170de52fe1be13c8b2efe9ade802db79073
-
\Program Files (x86)\Download Master\Plugins\videoserv.dllMD5
2792d3f67b6cee10a9c0cd5d1e98efda
SHA1a9aecb387b85fc9f2eb368578cb3ae0917a0cd59
SHA2560ba76db695f8cf004d9f645220cb0f5d88d5dffd62a01d7f0102be7d7380c868
SHA51214c111f67f8af846afc4c785c0a2cf011fbb64560aac926c7c97f773bf397e0dee8ac13c5e7ce96fa08ed8dca8a04170de52fe1be13c8b2efe9ade802db79073
-
\Program Files (x86)\Download Master\Plugins\videoserv.dllMD5
2792d3f67b6cee10a9c0cd5d1e98efda
SHA1a9aecb387b85fc9f2eb368578cb3ae0917a0cd59
SHA2560ba76db695f8cf004d9f645220cb0f5d88d5dffd62a01d7f0102be7d7380c868
SHA51214c111f67f8af846afc4c785c0a2cf011fbb64560aac926c7c97f773bf397e0dee8ac13c5e7ce96fa08ed8dca8a04170de52fe1be13c8b2efe9ade802db79073
-
\Program Files (x86)\Download Master\Plugins\videoserv.dllMD5
2792d3f67b6cee10a9c0cd5d1e98efda
SHA1a9aecb387b85fc9f2eb368578cb3ae0917a0cd59
SHA2560ba76db695f8cf004d9f645220cb0f5d88d5dffd62a01d7f0102be7d7380c868
SHA51214c111f67f8af846afc4c785c0a2cf011fbb64560aac926c7c97f773bf397e0dee8ac13c5e7ce96fa08ed8dca8a04170de52fe1be13c8b2efe9ade802db79073
-
\Program Files (x86)\Download Master\dmie.dllMD5
464632653b8ef1febda37d5efc44aeee
SHA1bd114b3af59a4a7c42234ee8908fac0d7beb23f0
SHA256ab7f9245c46507a18d4a96747a8b33e8b0b5ee78fb7b99b8d9833496a5c52af2
SHA5126b113f0e3c25b69f27c3e8a173240f536621234d50013f668171e680bbd796f1f8859ece9b7c4af337a05fbe2cf87595152924956a6147dfd9a6583fd908b368
-
\Program Files (x86)\Download Master\dmiehlp.dllMD5
ece3d898b9a156dec1cbbb88108f693f
SHA168839ede5155c6d86f46f85988ec109d7b3713f4
SHA25603a41f5572b5c872ba0b8cf05c5ca3a3f51d2ee34a2dc95b4b9c63d4a30b289a
SHA5126d5b483e2da474ed4b34a2ffbfa050215c79ab93814bce56e42b7ed07350f969147778a3f4db9a15b499a5929692df29d4348a62f8723978294df2a161691bd7
-
\Program Files (x86)\Download Master\unrar.dllMD5
2fc227e035465dd4e919109e7bbbd5dd
SHA12bddec34e0a96bc64e7e65c9a36ee66cf1306c47
SHA2563282a2e45b60b071a1c73711c9be47ff92086ef64896b99e75b0e0bdde0166b8
SHA512042879ee001498b28387a62c9294e0984f0f6d44804afb131dd01b3e18000a371636d8a56dfd468033468b0a551bdc35dfa69cfcc8cdf038b3da3976d0146139
-
\Program Files (x86)\Download Master\unrar.dllMD5
2fc227e035465dd4e919109e7bbbd5dd
SHA12bddec34e0a96bc64e7e65c9a36ee66cf1306c47
SHA2563282a2e45b60b071a1c73711c9be47ff92086ef64896b99e75b0e0bdde0166b8
SHA512042879ee001498b28387a62c9294e0984f0f6d44804afb131dd01b3e18000a371636d8a56dfd468033468b0a551bdc35dfa69cfcc8cdf038b3da3976d0146139
-
\Program Files (x86)\Download Master\unzip32.dllMD5
28b6d614f3534c9f1f81b83b9f63e770
SHA194e66b25313c325d8325a906d6ce855943be881f
SHA25603c197713f23eec900b65ac17c4c2660419de99a3807fb36128458b0840a8748
SHA512cbbb627460cbbd9e32075cce50b58d89d535db46bca3330935ae13a3ebb09f3f7de6cbc859852f87e7da38f146c7d3201c0a39ab581e8adbf9c322333b15d713
-
\Program Files (x86)\Download Master\unzip32.dllMD5
28b6d614f3534c9f1f81b83b9f63e770
SHA194e66b25313c325d8325a906d6ce855943be881f
SHA25603c197713f23eec900b65ac17c4c2660419de99a3807fb36128458b0840a8748
SHA512cbbb627460cbbd9e32075cce50b58d89d535db46bca3330935ae13a3ebb09f3f7de6cbc859852f87e7da38f146c7d3201c0a39ab581e8adbf9c322333b15d713
-
memory/740-192-0x0000000000BA0000-0x0000000000CEA000-memory.dmpFilesize
1.3MB
-
memory/1308-135-0x00000000028B0000-0x00000000028B1000-memory.dmpFilesize
4KB
-
memory/1308-155-0x0000000006400000-0x0000000006497000-memory.dmpFilesize
604KB
-
memory/1308-128-0x0000000000000000-mapping.dmp
-
memory/1424-122-0x0000000000000000-mapping.dmp
-
memory/2352-117-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2868-196-0x0000000000DD0000-0x0000000000DD1000-memory.dmpFilesize
4KB
-
memory/3012-181-0x00000000063C0000-0x0000000006457000-memory.dmpFilesize
604KB
-
memory/3012-163-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB
-
memory/3484-125-0x0000000000000000-mapping.dmp
-
memory/4020-194-0x000002374D640000-0x000002374D642000-memory.dmpFilesize
8KB
-
memory/4020-195-0x000002374D640000-0x000002374D642000-memory.dmpFilesize
8KB
-
memory/4084-190-0x0000000000C40000-0x0000000000C41000-memory.dmpFilesize
4KB
-
memory/4084-118-0x0000000000000000-mapping.dmp
-
memory/4084-120-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB