Analysis

  • max time kernel
    600s
  • max time network
    602s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    26-01-2021 17:48

General

  • Target

    SS™ Install.exe

  • Size

    20.0MB

  • MD5

    8a98a1219b88d973ed494f8f3037fed4

  • SHA1

    822510a92978231f108d3666003d44ea76e11edb

  • SHA256

    45de963b46628c445931c07fdddd889c33e6be1e2847340d7971b49b40dea39e

  • SHA512

    314a4f04e42a87eb396fb4642d4025ecf71c8ee0282355ad70a237be1e6cebf2066fb5a25a0149ddee08e24e0d788608c309fae3a2a7c4f53565442c6f571c72

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Executes dropped EXE 26 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 109 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • JavaScript code in executable 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 39 IoCs
  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies registry class 92 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 150 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 76 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SS™ Install.exe
    "C:\Users\Admin\AppData\Local\Temp\SS™ Install.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Users\Admin\AppData\Local\Temp\is-DDG36.tmp\SS™ Install.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-DDG36.tmp\SS™ Install.tmp" /SL5="$8003A,20195125,780800,C:\Users\Admin\AppData\Local\Temp\SS™ Install.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:508
      • C:\Program Files (x86)\™Scam Soft Sender\™Scam Soft Sender.exe
        "C:\Program Files (x86)\™Scam Soft Sender\™Scam Soft Sender.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3556
        • C:\Users\Admin\AppData\Roaming\Up_tempsis\keycheck.exe
          "C:\Users\Admin\AppData\Roaming\Up_tempsis\keycheck.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\update.exe
            "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\update.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4232
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp50BC.tmp.cmd""
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4444
              • C:\Windows\SysWOW64\timeout.exe
                timeout 1
                7⤵
                • Delays execution with timeout.exe
                PID:4520
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks.exe /create /f /sc MINUTE /mo 1 /tn "tmp.7C372DB998880EED178D" /tr "'C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe"'
                7⤵
                • Creates scheduled task(s)
                PID:4604
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3388
            5⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4336
        • C:\Users\Admin\AppData\Roaming\Up_tempsis\BuildRs.exe
          "C:\Users\Admin\AppData\Roaming\Up_tempsis\BuildRs.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3948
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpEF91.tmp.cmd""
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2852
            • C:\Windows\system32\timeout.exe
              timeout 4
              6⤵
              • Delays execution with timeout.exe
              PID:4132
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /f /sc MINUTE /mo 1 /tn "SearchProtocol v.0" /tr "'C:\Users\Admin\AppData\Local\SearchProtocol 0\SearchProtocol.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:4192
        • C:\Users\Admin\AppData\Roaming\Up_tempsis\apiparss.exe
          "C:\Users\Admin\AppData\Roaming\Up_tempsis\apiparss.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3768
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3876
        • C:\Users\Admin\AppData\Roaming\Up_tempsis\uni.exe
          "C:\Users\Admin\AppData\Roaming\Up_tempsis\uni.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2404
          • C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\FastExecuteScript.exe
            appslocal\e3b0c442\SIDf4c60000\engine\FastExecuteScript.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:2464
            • C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\Worker.exe
              .\Worker\Worker.exe ru --UseFlash 0 --ProxyTunneling 1 --SkipFrames 1 --unique-process-id=vZJ8crrF --Profile prof/ipvSyo03 --Extensions "" ugpzaxtdnp none 2464
              6⤵
              • Executes dropped EXE
              PID:2276
              • C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\Worker.exe
                "C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\Worker.exe" --type=gpu-process --field-trial-handle=1524,9740843867103738348,8231085034452591133,131072 --disable-features=MimeHandlerViewInCrossProcessFrame --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\debug.log" --log-severity=disable --lang=en-US --parent-process-id=2276 --unique-process-id=vZJ8crrF --gpu-preferences=KAAAAAAAAADgACAwAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\debug.log" --service-request-channel-token=11945768862899048227 --mojo-platform-channel-handle=1536 /prefetch:2
                7⤵
                • Executes dropped EXE
                PID:2088
              • C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\Worker.exe
                "C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\Worker.exe" --type=utility --field-trial-handle=1524,9740843867103738348,8231085034452591133,131072 --disable-features=MimeHandlerViewInCrossProcessFrame --lang=en-US --service-sandbox-type=network --no-sandbox --ignore-certificate-errors --ignore-certificate-errors --log-file="C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\debug.log" --log-severity=disable --lang=en-US --parent-process-id=2276 --unique-process-id=vZJ8crrF --log-file="C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\debug.log" --service-request-channel-token=17081504435842854921 --mojo-platform-channel-handle=1820 /prefetch:8
                7⤵
                • Executes dropped EXE
                PID:1312
              • C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\Worker.exe
                "C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\Worker.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\debug.log" --field-trial-handle=1524,9740843867103738348,8231085034452591133,131072 --disable-features=MimeHandlerViewInCrossProcessFrame --disable-gpu-compositing --enable-blink-features=WebBluetooth,Badging,InstalledApp,WakeLock,Notifications,WebAnimationsAPI,AOMPhase1 --lang=en-US --log-file="C:\Users\Admin\AppData\Roaming\Up_tempsis\appslocal\e3b0c442\SIDf4c60000\engine\Worker\debug.log" --log-severity=disable --parent-process-id=2276 --unique-process-id=vZJ8crrF --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=2655064212265437905 --renderer-client-id=4 --mojo-platform-channel-handle=1932 /prefetch:1
                7⤵
                • Executes dropped EXE
                • Checks computer location settings
                PID:4636
  • C:\Windows\ImmersiveControlPanel\SystemSettings.exe
    "C:\Windows\ImmersiveControlPanel\SystemSettings.exe" -ServerName:microsoft.windows.immersivecontrolpanel
    1⤵
    • Checks SCSI registry key(s)
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1120
  • C:\Users\Admin\AppData\Local\SearchProtocol 0\SearchProtocol.exe
    "C:\Users\Admin\AppData\Local\SearchProtocol 0\SearchProtocol.exe"
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4644
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4644 -s 1816
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2188
  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
    C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
    1⤵
    • Executes dropped EXE
    PID:4652
  • C:\Windows\system32\WerFault.exe
    "C:\Windows\system32\WerFault.exe" -k -lc PoW32kWatchdog PoW32kWatchdog-20210126-1849.dm
    1⤵
      PID:4848
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      1⤵
      • Executes dropped EXE
      PID:4940
    • C:\Program Files (x86)\™Scam Soft Sender\™Scam Soft Sender.exe
      "C:\Program Files (x86)\™Scam Soft Sender\™Scam Soft Sender.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5016
      • C:\Users\Admin\AppData\Roaming\Up_tempsis\keycheck.exe
        "C:\Users\Admin\AppData\Roaming\Up_tempsis\keycheck.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:356
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 356 -s 1552
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:2524
      • C:\Users\Admin\AppData\Roaming\Up_tempsis\BuildRs.exe
        "C:\Users\Admin\AppData\Roaming\Up_tempsis\BuildRs.exe"
        2⤵
        • Executes dropped EXE
        PID:1452
      • C:\Users\Admin\AppData\Roaming\Up_tempsis\apiparss.exe
        "C:\Users\Admin\AppData\Roaming\Up_tempsis\apiparss.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4180
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3368
      • C:\Users\Admin\AppData\Roaming\Up_tempsis\uni.exe
        "C:\Users\Admin\AppData\Roaming\Up_tempsis\uni.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:1400
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      1⤵
      • Executes dropped EXE
      PID:2468
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      1⤵
      • Executes dropped EXE
      PID:4108
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      1⤵
      • Executes dropped EXE
      PID:4660
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      1⤵
      • Executes dropped EXE
      PID:2212
    • C:\Users\Admin\AppData\Local\SearchProtocol 0\SearchProtocol.exe
      "C:\Users\Admin\AppData\Local\SearchProtocol 0\SearchProtocol.exe"
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1832
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\7C372DB998880EED178D.tmp\tmp.7C372DB998880EED178D.exe
      1⤵
      • Executes dropped EXE
      PID:2368

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\™Scam Soft Sender\keyconf.dll

      MD5

      965747da05f49ebfaa55ab595c7ada50

      SHA1

      8f50fb23a0c23e115420a9da31bf211924ac6b22

      SHA256

      2a250346a95f5d18329625f5eab02f7d4626a92311e7cc91a80aaab3f15e1e94

      SHA512

      aca6d561e25c60cbae81341f4cabb573cec1b057ffbd11b1437b94f299219260d97d10be535062d11c5a8e677db8f38630ce5ebd561b7f377d3932da0158d5ec

    • C:\Program Files (x86)\™Scam Soft Sender\™Scam Soft Sender.exe

      MD5

      b94383347a8162bb133bce06598555f6

      SHA1

      fe0affb0d15eb2a1923738bdfc19be5f66ed82c3

      SHA256

      674f37b2c3d45ce7ea0eec8935991440d99674a46cf1f01d27acf552d41a4bfb

      SHA512

      180e88a36a48453bcaee137f3251937e980f67b05f7a0f67706efbfb95153ac5dcb42373820648f2fedd1b9197579f2ffd94050ea587d7920c7e0749c69fa804

    • C:\Program Files (x86)\™Scam Soft Sender\™Scam Soft Sender.exe

      MD5

      b94383347a8162bb133bce06598555f6

      SHA1

      fe0affb0d15eb2a1923738bdfc19be5f66ed82c3

      SHA256

      674f37b2c3d45ce7ea0eec8935991440d99674a46cf1f01d27acf552d41a4bfb

      SHA512

      180e88a36a48453bcaee137f3251937e980f67b05f7a0f67706efbfb95153ac5dcb42373820648f2fedd1b9197579f2ffd94050ea587d7920c7e0749c69fa804

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\update.exe

      MD5

      bb01d547fbc52bf35d3e611625773c55

      SHA1

      5515f037080450b2b8904321a5dcaa3a31335352

      SHA256

      e769eee6bc729bd7b704e30c777ce091327ee3f71261642cf9aff79f247d5cbd

      SHA512

      27acc0daf48e0166ad0dfea1adf3617098e6e863f047078451c6d0d0fbacb4ce32c66741dcde6ee2969521c9fea1c520f9bed982a30789f0934451ac237d5da4

    • C:\Users\Admin\AppData\Local\Temp\is-DDG36.tmp\SS™ Install.tmp

      MD5

      f91519d7bea6ae56d8d54bd8e01a4dfb

      SHA1

      856b94dbad685df5f29e719d895bc7cf38fce898

      SHA256

      474782119f3a0877fe8fc04f748c1ab2fe5ad3f400179a962e0d70e619523571

      SHA512

      84f86be02f70b64028cc5b5fced6687d24f9003682b6435beb996dbf47c7a1487d6c29c8b8d890e65b5377da1a1e51ff6bd56162f1712734a7ff5bef585fc168

    • C:\Users\Admin\AppData\Local\Temp\is-DDG36.tmp\SS™ Install.tmp

      MD5

      f91519d7bea6ae56d8d54bd8e01a4dfb

      SHA1

      856b94dbad685df5f29e719d895bc7cf38fce898

      SHA256

      474782119f3a0877fe8fc04f748c1ab2fe5ad3f400179a962e0d70e619523571

      SHA512

      84f86be02f70b64028cc5b5fced6687d24f9003682b6435beb996dbf47c7a1487d6c29c8b8d890e65b5377da1a1e51ff6bd56162f1712734a7ff5bef585fc168

    • C:\Users\Admin\AppData\Local\Temp\tmpEF91.tmp.cmd

      MD5

      c14895d9b5ec9a625033237e822c36e5

      SHA1

      84ed847b87d3ea52c00fef2ad077f5ec3607e29e

      SHA256

      0b62905c72d49caf963647cddeeabaa8839b256446496f0420a63219a448dc5e

      SHA512

      e37c4c9061824e5120c28cda03f5d9d2b7f7372b0a9bcc377999f961ad90b73ba9e18b6ab5b14f10b1adbd7102d39252449ac385b6aad069f099034290112aab

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\BuildRs.exe

      MD5

      a134645b6c32877c9c93dc25f1cf01fe

      SHA1

      e27007c58b69f1941143e8b8bca49dd84bbcd713

      SHA256

      9e279d1d80ec54117114c2d288eb5ff2e602a3d083df32c728f38b50278a5245

      SHA512

      6eb3fca940df11a7aaa1c889e51f7be0f5ae1b3daddc0e15789f811a9b0d15d7afe7f95c461f53e3e0c36a00fac08e8ee555c704c23c30f0bee3af8c3260ab08

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\BuildRs.exe

      MD5

      a134645b6c32877c9c93dc25f1cf01fe

      SHA1

      e27007c58b69f1941143e8b8bca49dd84bbcd713

      SHA256

      9e279d1d80ec54117114c2d288eb5ff2e602a3d083df32c728f38b50278a5245

      SHA512

      6eb3fca940df11a7aaa1c889e51f7be0f5ae1b3daddc0e15789f811a9b0d15d7afe7f95c461f53e3e0c36a00fac08e8ee555c704c23c30f0bee3af8c3260ab08

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\LIBEAY32.dll

      MD5

      67130d64a3c2b4b792c4f5f955b37287

      SHA1

      6f6cae2a74f7e7b0f18b93367821f7b802b3e6cf

      SHA256

      7581f48b16bd9c959491730e19687656f045afbab59222c0baba52b25d1055be

      SHA512

      d88c26ec059ad324082c4f654786a3a45ecf9561a522c8ec80905548ad1693075f0ffc93079f0ef94614c95a3ac6bbf59c8516018c71b2e59ec1320ba2b99645

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\MSVCP120.dll

      MD5

      fd5cabbe52272bd76007b68186ebaf00

      SHA1

      efd1e306c1092c17f6944cc6bf9a1bfad4d14613

      SHA256

      87c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608

      SHA512

      1563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\MSVCR120.dll

      MD5

      034ccadc1c073e4216e9466b720f9849

      SHA1

      f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1

      SHA256

      86e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f

      SHA512

      5f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\Qt5Core.dll

      MD5

      b4f2c1be9ac448fdbb6833b0fba3bb75

      SHA1

      e34496261619f6dc70efd08b0f3c9c73b3dfee50

      SHA256

      7ab15d298cdd7185f2cceae2613715c54a54861fa788bb2de3d152eceb484288

      SHA512

      be478f77214590ffe6360ee4b9e3c20e45d5281973cfbd502674dbdfb5afe62ec9b0ae06418f4523dd73fa4573d92c52100cf5c3b730ae1bc8ff3f34d8e1860f

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\Qt5Gui.dll

      MD5

      d9b78f4b2f8f393c8854c7cc95eae5d8

      SHA1

      8d648e7bda5b6bf7b02041189b9823fe8d4689e5

      SHA256

      55faebb8f5e28cde50f561bbd2638db7edcfd26e7ee7b975e0049b113145ae38

      SHA512

      6e76b524a56cc9bb5ae4beeedd41a48c35cf03c730752da3cae49862cb7bc3c17283099c39787f5933c1771eca7c2e651d92b961de7f43813f026eb295c90c81

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\Qt5Network.dll

      MD5

      0fdda3a8c8be28993b156b24b300ccdf

      SHA1

      57fe6cfd0b28708d23ae560675d4c462127722c8

      SHA256

      335cec3a5f9082f083190660932b6641f682f4c5818ffbd6ffa98c9d0c24e0f1

      SHA512

      4ba8b28ac903d087344185b77144bfcbcd5bda11efb2a8d45b942363b8a13c7c4fb56820644166c7556fb44b68a8786ebb10b8cc4b3557247aa85214289e4453

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\Qt5Svg.dll

      MD5

      06cc5d18a496520e05bcfee1e3169535

      SHA1

      98ba5d0ed52499a845038c3b4bcba356b9339f11

      SHA256

      ea31035fa96ba656d64b58d4f1a9dd210df7154afad3d4f96ee36b41584e4360

      SHA512

      154a2fdbaa045df6289476420cc4045905a866cd54d756dcc09e0ea79f2cec7f33c748534f47c827841e35c35f71d462cadb801a6b99bf72c162c075d786fdbe

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\Qt5Widgets.dll

      MD5

      f697ffc85fb86d72654c4f5ba4e1bdc2

      SHA1

      670657f598d408ab232dec75be6fc7983bc5ce4b

      SHA256

      400fa69aa8803f6c3a6f9a5fc956475d0396095c4b6d4665b7aa29bbcb8e3640

      SHA512

      47513892c22a193c51ecf09c8f3e4c4271a92be33b7b7d535290ea75a1498c5531881a26a85dbf758361e6892abf12a796f1c5c284a34f1d173d61d2012325b7

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\apiparss.exe

      MD5

      e48f0a012fe2b1cdec9b4d07f901d91b

      SHA1

      8f379d7bfe04b31b9391f85f1e0d761bf710bc3b

      SHA256

      704ed6f2da44e2d3f98fb3f32358880a18796d5810bf00849c1d56e921b1419c

      SHA512

      1bfd4ea10d8fa226cc8ad03e5f37f6ee9950087986b4aef304b2fe096192965808024d2bdb940aa3f45372b518df7898567a753a5ebeaf6b12bb6316c1611c7a

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\apiparss.exe

      MD5

      e48f0a012fe2b1cdec9b4d07f901d91b

      SHA1

      8f379d7bfe04b31b9391f85f1e0d761bf710bc3b

      SHA256

      704ed6f2da44e2d3f98fb3f32358880a18796d5810bf00849c1d56e921b1419c

      SHA512

      1bfd4ea10d8fa226cc8ad03e5f37f6ee9950087986b4aef304b2fe096192965808024d2bdb940aa3f45372b518df7898567a753a5ebeaf6b12bb6316c1611c7a

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\bearer\qgenericbearer.dll

      MD5

      dba35d31c2b6797c8a4d38ae27d68e6e

      SHA1

      37948e71dc758964e0aa19aee063b50ef87a7290

      SHA256

      086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f

      SHA512

      282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\bearer\qnativewifibearer.dll

      MD5

      a8bca50f7966f578b127d1e24fc2430f

      SHA1

      cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8

      SHA256

      c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5

      SHA512

      86b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\data\debug.txt

      MD5

      e8c7c57c391efd6ba3ec01741ae049ac

      SHA1

      ef9ab6649d31d09737007deb1d2e2b064485a800

      SHA256

      5c7be1673414f1aca26117ff53c573fd7001ffcaf6b4ac6682dc4305c5604112

      SHA512

      dbffb9e1d116d70a280e4166d498685b890b8b5ae69e2db8881e77e37bef85460f36cdb3e1a02ce7891444cc365316fc5d63ad4ec030f19a26bfcdf935cab12d

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\data\project.xml

      MD5

      225059631e31d5f2e45c5b914b13942a

      SHA1

      ba8fe05f72df5c3a295c1ae8a21a2ef820f0de2b

      SHA256

      f4c60000f2c635aa51cece75112712497ded7711ab0a812f2f3fb338f59205aa

      SHA512

      5335b438c0c2bdd71d53184cde9ff08c210682a724c94a2fe751136a09bd866553ee11f7d64abf1f5d73b8f88baa1609c4ad63654ef5e75607dd351c253e092c

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\data\remote_settings.ini

      MD5

      6c8b0641d4d019da8f99339de19da7ca

      SHA1

      7f658008a0d49d2bfbbeefe09115e71e27938ed2

      SHA256

      78efb7d5f66cce1c0de86a764bc48450b929df61849280b861fb0db2128b2a37

      SHA512

      8dce46f0c961e12950c7a6e0adc7136b9837575d6c20c917425d3fa2ebc6f4b64b77c9300009714007cd47ddb852bc0ae9cbe143ab094c912d3611737342fccf

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\iconengines\qsvgicon.dll

      MD5

      90bb882a4b5e3427f328259530aa1b3b

      SHA1

      a4059f0c105f4e2abe84efc4a48fa676171f37c5

      SHA256

      b2b420aa1805d8b5dc15ccb74dd664d10bd6ba422743f5043a557a701c8a1778

      SHA512

      a486280bba42d6c2d8b5ca0a0191b6b29067e1c120f85dbff709a4a42c61d925804915f93f815f56c9ca06ea9f8b89de0e692776524d28d81e29ef1c75501db8

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qdds.dll

      MD5

      3fdb8d8407cccfaa0290036cc0107906

      SHA1

      fc708ecac271a35a0781fed826c11500184c1ea4

      SHA256

      3a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db

      SHA512

      79fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qgif.dll

      MD5

      c108d79d7c85786f33f85041445f519f

      SHA1

      2c30d1afc274315c6d50ee19a47fff74a8937ea1

      SHA256

      d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1

      SHA512

      6bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qicns.dll

      MD5

      52c6978203ca20beead6e8872e80d39f

      SHA1

      f223b7ba12657cd68da60ab14f7ab4a2803fc6e7

      SHA256

      e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462

      SHA512

      88b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qico.dll

      MD5

      eddf7fb99f2fcaea6fe4fd34b8fd5d39

      SHA1

      85bbc7a2e1aaafd043e6c69972125202be21c043

      SHA256

      9d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf

      SHA512

      0b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qjpeg.dll

      MD5

      3232706a63e7cdf217b8ed674179706c

      SHA1

      12ac2af70893147ca220d8e4689e33e87f41688d

      SHA256

      45c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602

      SHA512

      db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qsvg.dll

      MD5

      2831b334b8edf842ce273b3dd0ace1f8

      SHA1

      e586bf0172c67e3e42876b9cd6e7f349c09c3435

      SHA256

      6bae9af6a7790fbdee87b7efa53d31d8aff0ab49bdaaefd3fb87a8cc7d4e8a90

      SHA512

      68dca40e3de5053511fc1772b7a4834538b612724ec2de7fb2e182ba18b9281b5f1ccf47bd58d691024f5bcddfc086e58570ad590dd447f6b0185a91a1ac2422

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qtga.dll

      MD5

      d0604a5f13b32a08d5fa5bd887f869a6

      SHA1

      976338eb697507ac857a6434ef1086f34bc9db24

      SHA256

      2b6444d2a8146a066109ca19618ceee98444127a5b422c14635ab837887e55bf

      SHA512

      c42edbaf6506dc1ca3aae3f052a07c7d2c4841f5b83003186cda185193f7cd2035cfe07e04a28356d254ab54666b5d60be4763e3e204273ecd0d7f2cd84bfc90

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qtiff.dll

      MD5

      756d047a93d72771578286e621585ed2

      SHA1

      313add1e91a21648f766aaa643350bec18ec5b5d

      SHA256

      f9ebf4c98c1e0179cd76a1985386928fdb9e6f459e2238ed5530d160df4f0923

      SHA512

      67fa91f266f0030ca0695f1c7964ee4d1c1447413420d0379eca62d54cc9d6cd0706df62da0043259b563e95a9c3a5c7ef0e0baacb36cafed5c9fcb1a3954aca

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qwbmp.dll

      MD5

      131a58669be7b3850c46d8e841da5d4e

      SHA1

      1c08ae3c9d1850da88edc671928aa8d7e2a78098

      SHA256

      043f3acf1dc4f4780721df106046c597262d7344c4b4894e0be55858b9fad00e

      SHA512

      4f62b0c5ba0be6fb85fa15e500c348c2a32266e9b487357ea8ed1c1be05d7eabc46c9a1eeb9c5339291f4dd636b7291447a84d4ad5efbc403e5e7966b3863ade

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qwebp.dll

      MD5

      f859ecc883476fe2c649cefbbd7e6f94

      SHA1

      9900468c306061409e9aa1953d7d6a0d05505de8

      SHA256

      b057c49c23c6ebe92e377b573723d9b349a6ede50cfd3b86573b565bf4a2ae0b

      SHA512

      67af11fb9c81a7e91be747b2d74e81e8fe653ef82f049b652c7892c4ec4cafeba76b54a976616cbf1cd6b83f0abe060e82e46bf37f3ed841d595c4318d6fd73b

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\keycheck.exe

      MD5

      12ae37032cfc6d4de06d051dda1f2257

      SHA1

      ce83e81645386baa15f27df4a4f019c07f644e56

      SHA256

      9d64c3fd35a4568a447728a3d50c4e8e65a1e073513b6846316e945aee9f1a32

      SHA512

      147caea8b56b12fd55906bd63ce70db0a5263786a68e10dc21636a08b19052fee115a47078e553ec1c377f5e11ab2f2c506d26fdbae444bf84f37d96614cf521

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\keycheck.exe

      MD5

      12ae37032cfc6d4de06d051dda1f2257

      SHA1

      ce83e81645386baa15f27df4a4f019c07f644e56

      SHA256

      9d64c3fd35a4568a447728a3d50c4e8e65a1e073513b6846316e945aee9f1a32

      SHA512

      147caea8b56b12fd55906bd63ce70db0a5263786a68e10dc21636a08b19052fee115a47078e553ec1c377f5e11ab2f2c506d26fdbae444bf84f37d96614cf521

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\platforms\qwindows.dll

      MD5

      be068132ece3f794f09c9d6b5ba20b91

      SHA1

      859599fa72d128e33db6fe99ba95a8b63b15cc89

      SHA256

      59dcecb111aa15159414819f4f522e7f90597939cab572b982beebee5dc0efdf

      SHA512

      13829ae9b7bd0cba95800075b24570f3c70a6c4b3d4b3c4da76b0077e37c75194e929d8d56a2db69e22a319ba5077d188a6f3baedd1f69f79979717d6f6d1b6f

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\ssleay32.dll

      MD5

      df38eb2002e5979e57babf8b4f6a2f82

      SHA1

      219d5837f6461688122d637bf67f041fc6c19aac

      SHA256

      5c2f10a772edfbeef8a5261b8677e68c4194cb87f3cb9bc319c8da75cfaefa3f

      SHA512

      da4b6ec820f5886102577a7e98187ed45165ee5373504fb4f610cfb47eb2ad6e0b75d868464df4ee8b97f506c2f493a1d3bf029c184c08b311dbc1b76c2a37f6

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\uni.exe

      MD5

      4925fc72ab39f6c901c26536a6a108fe

      SHA1

      5e50a1716c7d53e051ccc957f5d0f5755bde4a4e

      SHA256

      2bceeaeece712b40378eb47ef1691c2dd5eac355d09f8bee808932ee7e814a00

      SHA512

      8061fa04f6981189eb44ba10d22155044a39a5d7bdd608b8d8e5c603ef770989483269155380f28640c916f373bd262c64b8de183fc45b9e1f41ce74e80e215b

    • C:\Users\Admin\AppData\Roaming\Up_tempsis\uni.exe

      MD5

      4925fc72ab39f6c901c26536a6a108fe

      SHA1

      5e50a1716c7d53e051ccc957f5d0f5755bde4a4e

      SHA256

      2bceeaeece712b40378eb47ef1691c2dd5eac355d09f8bee808932ee7e814a00

      SHA512

      8061fa04f6981189eb44ba10d22155044a39a5d7bdd608b8d8e5c603ef770989483269155380f28640c916f373bd262c64b8de183fc45b9e1f41ce74e80e215b

    • \Users\Admin\AppData\Roaming\Up_tempsis\Qt5Core.dll

      MD5

      b4f2c1be9ac448fdbb6833b0fba3bb75

      SHA1

      e34496261619f6dc70efd08b0f3c9c73b3dfee50

      SHA256

      7ab15d298cdd7185f2cceae2613715c54a54861fa788bb2de3d152eceb484288

      SHA512

      be478f77214590ffe6360ee4b9e3c20e45d5281973cfbd502674dbdfb5afe62ec9b0ae06418f4523dd73fa4573d92c52100cf5c3b730ae1bc8ff3f34d8e1860f

    • \Users\Admin\AppData\Roaming\Up_tempsis\Qt5Gui.dll

      MD5

      d9b78f4b2f8f393c8854c7cc95eae5d8

      SHA1

      8d648e7bda5b6bf7b02041189b9823fe8d4689e5

      SHA256

      55faebb8f5e28cde50f561bbd2638db7edcfd26e7ee7b975e0049b113145ae38

      SHA512

      6e76b524a56cc9bb5ae4beeedd41a48c35cf03c730752da3cae49862cb7bc3c17283099c39787f5933c1771eca7c2e651d92b961de7f43813f026eb295c90c81

    • \Users\Admin\AppData\Roaming\Up_tempsis\Qt5Network.dll

      MD5

      0fdda3a8c8be28993b156b24b300ccdf

      SHA1

      57fe6cfd0b28708d23ae560675d4c462127722c8

      SHA256

      335cec3a5f9082f083190660932b6641f682f4c5818ffbd6ffa98c9d0c24e0f1

      SHA512

      4ba8b28ac903d087344185b77144bfcbcd5bda11efb2a8d45b942363b8a13c7c4fb56820644166c7556fb44b68a8786ebb10b8cc4b3557247aa85214289e4453

    • \Users\Admin\AppData\Roaming\Up_tempsis\Qt5Svg.dll

      MD5

      06cc5d18a496520e05bcfee1e3169535

      SHA1

      98ba5d0ed52499a845038c3b4bcba356b9339f11

      SHA256

      ea31035fa96ba656d64b58d4f1a9dd210df7154afad3d4f96ee36b41584e4360

      SHA512

      154a2fdbaa045df6289476420cc4045905a866cd54d756dcc09e0ea79f2cec7f33c748534f47c827841e35c35f71d462cadb801a6b99bf72c162c075d786fdbe

    • \Users\Admin\AppData\Roaming\Up_tempsis\Qt5Widgets.dll

      MD5

      f697ffc85fb86d72654c4f5ba4e1bdc2

      SHA1

      670657f598d408ab232dec75be6fc7983bc5ce4b

      SHA256

      400fa69aa8803f6c3a6f9a5fc956475d0396095c4b6d4665b7aa29bbcb8e3640

      SHA512

      47513892c22a193c51ecf09c8f3e4c4271a92be33b7b7d535290ea75a1498c5531881a26a85dbf758361e6892abf12a796f1c5c284a34f1d173d61d2012325b7

    • \Users\Admin\AppData\Roaming\Up_tempsis\bearer\qgenericbearer.dll

      MD5

      dba35d31c2b6797c8a4d38ae27d68e6e

      SHA1

      37948e71dc758964e0aa19aee063b50ef87a7290

      SHA256

      086d6ba24f34a269856c4e0159a860657590d05aabb2530247e685543b34c52f

      SHA512

      282e7613fe445785fa5ed345415bc008637b7d1d7988cc6da715b024311a1c29425f5edb26a1d90f301af408b60244dd81e1459eef2aab10b07d1ac352770b4b

    • \Users\Admin\AppData\Roaming\Up_tempsis\bearer\qnativewifibearer.dll

      MD5

      a8bca50f7966f578b127d1e24fc2430f

      SHA1

      cfa1e5d684d938fdb9a97ff874cd2166a10ca0c8

      SHA256

      c209d080a62f5e67ddc01a3ae6b4f9b103faf4104c93b7dbb5ffa8d548bf0cd5

      SHA512

      86b1e4eec873b5951408f1793b5a35725fb53e2282e194b409705f476d8bea9750dcee74bd51ae5d3acb3d47846a8b7210b1493f7d9ac012140df5e6a57d8c69

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qdds.dll

      MD5

      3fdb8d8407cccfaa0290036cc0107906

      SHA1

      fc708ecac271a35a0781fed826c11500184c1ea4

      SHA256

      3a71a119eeabce867b57636070adeb057443a6ec262be1360f344cb3905545db

      SHA512

      79fdf0f6316069a4810a67c64a662803dede86d32223b6c07da4e970d45e0a75f6027183a63d361787514fb095ce980a640c7e840c11aba93abc8318cc92ee94

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qgif.dll

      MD5

      c108d79d7c85786f33f85041445f519f

      SHA1

      2c30d1afc274315c6d50ee19a47fff74a8937ea1

      SHA256

      d5459a707922dd2bf50114cc6718965173ee5b0f67deb05e933556150cfdd9d1

      SHA512

      6bb5316cd8cd193a8bc2b9fbe258a4b9233508f4aaaa079d930a8c574dc9c9786863ae0a181061fcb2a84b7a43e5b98c5a264cad8aae5e0890a2a58c114a0d9c

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qicns.dll

      MD5

      52c6978203ca20beead6e8872e80d39f

      SHA1

      f223b7ba12657cd68da60ab14f7ab4a2803fc6e7

      SHA256

      e665f3519309bae42e0e62f459ecc511701ddddf94599ebfd213d0a71775c462

      SHA512

      88b64203d6f3daed11da153bc2f02196296203dc913836c98595c09f7772c40830284366db964fcb6886b78b0ebb8f78517cdc7b6d0ad7922861597eaf474b85

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qico.dll

      MD5

      eddf7fb99f2fcaea6fe4fd34b8fd5d39

      SHA1

      85bbc7a2e1aaafd043e6c69972125202be21c043

      SHA256

      9d942215a80a25e10ee1a2bb3d7c76003642d3a2d704c38c822e6a2ca82227bf

      SHA512

      0b835d4521421d305cf34d16b521f0c49b37812ef54a20b4ab69998b032cca59581b35c01e885ec4a77eac0b4e1d23228d9c76186a04a346a83f74a7198c343b

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qjpeg.dll

      MD5

      3232706a63e7cdf217b8ed674179706c

      SHA1

      12ac2af70893147ca220d8e4689e33e87f41688d

      SHA256

      45c1f50c922ac1d9d4108e37f49981fd94f997667e23085cb2ea226d406c5602

      SHA512

      db787e96a2ad4d67338f254996cf14c441de54fc112065fba230da97593de6b1fb4ef0459dcd7f4aea8fb3648fa959c05978ca40813036bf8a26860befa38407

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qsvg.dll

      MD5

      2831b334b8edf842ce273b3dd0ace1f8

      SHA1

      e586bf0172c67e3e42876b9cd6e7f349c09c3435

      SHA256

      6bae9af6a7790fbdee87b7efa53d31d8aff0ab49bdaaefd3fb87a8cc7d4e8a90

      SHA512

      68dca40e3de5053511fc1772b7a4834538b612724ec2de7fb2e182ba18b9281b5f1ccf47bd58d691024f5bcddfc086e58570ad590dd447f6b0185a91a1ac2422

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qtga.dll

      MD5

      d0604a5f13b32a08d5fa5bd887f869a6

      SHA1

      976338eb697507ac857a6434ef1086f34bc9db24

      SHA256

      2b6444d2a8146a066109ca19618ceee98444127a5b422c14635ab837887e55bf

      SHA512

      c42edbaf6506dc1ca3aae3f052a07c7d2c4841f5b83003186cda185193f7cd2035cfe07e04a28356d254ab54666b5d60be4763e3e204273ecd0d7f2cd84bfc90

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qtiff.dll

      MD5

      756d047a93d72771578286e621585ed2

      SHA1

      313add1e91a21648f766aaa643350bec18ec5b5d

      SHA256

      f9ebf4c98c1e0179cd76a1985386928fdb9e6f459e2238ed5530d160df4f0923

      SHA512

      67fa91f266f0030ca0695f1c7964ee4d1c1447413420d0379eca62d54cc9d6cd0706df62da0043259b563e95a9c3a5c7ef0e0baacb36cafed5c9fcb1a3954aca

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qwbmp.dll

      MD5

      131a58669be7b3850c46d8e841da5d4e

      SHA1

      1c08ae3c9d1850da88edc671928aa8d7e2a78098

      SHA256

      043f3acf1dc4f4780721df106046c597262d7344c4b4894e0be55858b9fad00e

      SHA512

      4f62b0c5ba0be6fb85fa15e500c348c2a32266e9b487357ea8ed1c1be05d7eabc46c9a1eeb9c5339291f4dd636b7291447a84d4ad5efbc403e5e7966b3863ade

    • \Users\Admin\AppData\Roaming\Up_tempsis\imageformats\qwebp.dll

      MD5

      f859ecc883476fe2c649cefbbd7e6f94

      SHA1

      9900468c306061409e9aa1953d7d6a0d05505de8

      SHA256

      b057c49c23c6ebe92e377b573723d9b349a6ede50cfd3b86573b565bf4a2ae0b

      SHA512

      67af11fb9c81a7e91be747b2d74e81e8fe653ef82f049b652c7892c4ec4cafeba76b54a976616cbf1cd6b83f0abe060e82e46bf37f3ed841d595c4318d6fd73b

    • \Users\Admin\AppData\Roaming\Up_tempsis\libeay32.dll

      MD5

      67130d64a3c2b4b792c4f5f955b37287

      SHA1

      6f6cae2a74f7e7b0f18b93367821f7b802b3e6cf

      SHA256

      7581f48b16bd9c959491730e19687656f045afbab59222c0baba52b25d1055be

      SHA512

      d88c26ec059ad324082c4f654786a3a45ecf9561a522c8ec80905548ad1693075f0ffc93079f0ef94614c95a3ac6bbf59c8516018c71b2e59ec1320ba2b99645

    • \Users\Admin\AppData\Roaming\Up_tempsis\msvcp120.dll

      MD5

      fd5cabbe52272bd76007b68186ebaf00

      SHA1

      efd1e306c1092c17f6944cc6bf9a1bfad4d14613

      SHA256

      87c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608

      SHA512

      1563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5

    • \Users\Admin\AppData\Roaming\Up_tempsis\msvcr120.dll

      MD5

      034ccadc1c073e4216e9466b720f9849

      SHA1

      f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1

      SHA256

      86e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f

      SHA512

      5f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7

    • \Users\Admin\AppData\Roaming\Up_tempsis\platforms\qwindows.dll

      MD5

      be068132ece3f794f09c9d6b5ba20b91

      SHA1

      859599fa72d128e33db6fe99ba95a8b63b15cc89

      SHA256

      59dcecb111aa15159414819f4f522e7f90597939cab572b982beebee5dc0efdf

      SHA512

      13829ae9b7bd0cba95800075b24570f3c70a6c4b3d4b3c4da76b0077e37c75194e929d8d56a2db69e22a319ba5077d188a6f3baedd1f69f79979717d6f6d1b6f

    • \Users\Admin\AppData\Roaming\Up_tempsis\ssleay32.dll

      MD5

      df38eb2002e5979e57babf8b4f6a2f82

      SHA1

      219d5837f6461688122d637bf67f041fc6c19aac

      SHA256

      5c2f10a772edfbeef8a5261b8677e68c4194cb87f3cb9bc319c8da75cfaefa3f

      SHA512

      da4b6ec820f5886102577a7e98187ed45165ee5373504fb4f610cfb47eb2ad6e0b75d868464df4ee8b97f506c2f493a1d3bf029c184c08b311dbc1b76c2a37f6

    • memory/356-206-0x0000000005A20000-0x0000000005A21000-memory.dmp

      Filesize

      4KB

    • memory/356-189-0x0000000000000000-mapping.dmp

    • memory/356-197-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/356-213-0x0000000005A23000-0x0000000005A25000-memory.dmp

      Filesize

      8KB

    • memory/508-2-0x0000000000000000-mapping.dmp

    • memory/508-5-0x0000000000740000-0x0000000000741000-memory.dmp

      Filesize

      4KB

    • memory/1312-277-0x0000000000000000-mapping.dmp

    • memory/1400-192-0x0000000000000000-mapping.dmp

    • memory/1452-193-0x00007FF98A520000-0x00007FF98AF0C000-memory.dmp

      Filesize

      9.9MB

    • memory/1452-190-0x0000000000000000-mapping.dmp

    • memory/1832-284-0x000000001BB90000-0x000000001BB92000-memory.dmp

      Filesize

      8KB

    • memory/1832-289-0x000000001BB9A000-0x000000001BB9F000-memory.dmp

      Filesize

      20KB

    • memory/1832-293-0x000000001C82C000-0x000000001C831000-memory.dmp

      Filesize

      20KB

    • memory/1832-287-0x000000001BB96000-0x000000001BB98000-memory.dmp

      Filesize

      8KB

    • memory/1832-288-0x000000001BB98000-0x000000001BB9A000-memory.dmp

      Filesize

      8KB

    • memory/1832-285-0x000000001BB92000-0x000000001BB94000-memory.dmp

      Filesize

      8KB

    • memory/1832-292-0x000000001C827000-0x000000001C82C000-memory.dmp

      Filesize

      20KB

    • memory/1832-290-0x000000001C820000-0x000000001C824000-memory.dmp

      Filesize

      16KB

    • memory/1832-291-0x000000001C824000-0x000000001C827000-memory.dmp

      Filesize

      12KB

    • memory/1832-286-0x000000001BB94000-0x000000001BB96000-memory.dmp

      Filesize

      8KB

    • memory/1832-274-0x00007FF98A520000-0x00007FF98AF0C000-memory.dmp

      Filesize

      9.9MB

    • memory/1832-294-0x000000001C831000-0x000000001C836000-memory.dmp

      Filesize

      20KB

    • memory/1832-295-0x000000001C836000-0x000000001C83B000-memory.dmp

      Filesize

      20KB

    • memory/2088-276-0x0000000000000000-mapping.dmp

    • memory/2188-266-0x00000213BF2C0000-0x00000213BF2C1000-memory.dmp

      Filesize

      4KB

    • memory/2212-270-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/2276-273-0x0000000000000000-mapping.dmp

    • memory/2368-275-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/2404-108-0x0000000004650000-0x0000000004651000-memory.dmp

      Filesize

      4KB

    • memory/2404-30-0x0000000000000000-mapping.dmp

    • memory/2404-106-0x0000000004650000-0x0000000004651000-memory.dmp

      Filesize

      4KB

    • memory/2404-107-0x0000000004E50000-0x0000000004E51000-memory.dmp

      Filesize

      4KB

    • memory/2464-233-0x0000029593AE0000-0x0000029593AE1000-memory.dmp

      Filesize

      4KB

    • memory/2464-232-0x00000295942E0000-0x00000295942E1000-memory.dmp

      Filesize

      4KB

    • memory/2464-231-0x0000029593AE0000-0x0000029593AE1000-memory.dmp

      Filesize

      4KB

    • memory/2464-235-0x0000029593AE0000-0x0000029593AE1000-memory.dmp

      Filesize

      4KB

    • memory/2464-230-0x0000000000000000-mapping.dmp

    • memory/2468-258-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/2524-215-0x0000000004210000-0x0000000004211000-memory.dmp

      Filesize

      4KB

    • memory/2632-4-0x0000000000401000-0x00000000004B7000-memory.dmp

      Filesize

      728KB

    • memory/2732-84-0x0000000000A50000-0x0000000000A51000-memory.dmp

      Filesize

      4KB

    • memory/2732-89-0x0000000005D40000-0x0000000005D41000-memory.dmp

      Filesize

      4KB

    • memory/2732-98-0x0000000005513000-0x0000000005515000-memory.dmp

      Filesize

      8KB

    • memory/2732-99-0x0000000006310000-0x0000000006311000-memory.dmp

      Filesize

      4KB

    • memory/2732-124-0x0000000005515000-0x0000000005516000-memory.dmp

      Filesize

      4KB

    • memory/2732-55-0x0000000072F30000-0x000000007361E000-memory.dmp

      Filesize

      6.9MB

    • memory/2732-90-0x0000000005510000-0x0000000005511000-memory.dmp

      Filesize

      4KB

    • memory/2732-105-0x00000000063D0000-0x0000000006441000-memory.dmp

      Filesize

      452KB

    • memory/2732-21-0x0000000000000000-mapping.dmp

    • memory/2732-97-0x0000000006290000-0x0000000006291000-memory.dmp

      Filesize

      4KB

    • memory/2852-111-0x0000000000000000-mapping.dmp

    • memory/3368-218-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/3368-228-0x0000000004F10000-0x0000000004F11000-memory.dmp

      Filesize

      4KB

    • memory/3368-224-0x0000000004D70000-0x0000000004D71000-memory.dmp

      Filesize

      4KB

    • memory/3368-216-0x0000000000447CEE-mapping.dmp

    • memory/3556-18-0x0000000008F60000-0x0000000008F61000-memory.dmp

      Filesize

      4KB

    • memory/3556-7-0x0000000000000000-mapping.dmp

    • memory/3556-10-0x0000000072F30000-0x000000007361E000-memory.dmp

      Filesize

      6.9MB

    • memory/3556-11-0x0000000000E60000-0x0000000000E61000-memory.dmp

      Filesize

      4KB

    • memory/3556-13-0x0000000005E30000-0x0000000005E31000-memory.dmp

      Filesize

      4KB

    • memory/3556-14-0x0000000005750000-0x0000000005751000-memory.dmp

      Filesize

      4KB

    • memory/3556-15-0x0000000005920000-0x0000000005921000-memory.dmp

      Filesize

      4KB

    • memory/3556-16-0x0000000005700000-0x0000000005701000-memory.dmp

      Filesize

      4KB

    • memory/3556-17-0x0000000005923000-0x0000000005925000-memory.dmp

      Filesize

      8KB

    • memory/3556-20-0x000000000ADB0000-0x000000000ADE2000-memory.dmp

      Filesize

      200KB

    • memory/3768-32-0x0000000072F30000-0x000000007361E000-memory.dmp

      Filesize

      6.9MB

    • memory/3768-49-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/3768-100-0x0000000005390000-0x0000000005391000-memory.dmp

      Filesize

      4KB

    • memory/3768-28-0x0000000000000000-mapping.dmp

    • memory/3768-103-0x0000000004A00000-0x0000000004A01000-memory.dmp

      Filesize

      4KB

    • memory/3768-85-0x0000000004860000-0x0000000004861000-memory.dmp

      Filesize

      4KB

    • memory/3876-142-0x0000000006880000-0x0000000006881000-memory.dmp

      Filesize

      4KB

    • memory/3876-141-0x0000000006180000-0x0000000006181000-memory.dmp

      Filesize

      4KB

    • memory/3876-134-0x0000000005190000-0x0000000005191000-memory.dmp

      Filesize

      4KB

    • memory/3876-129-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

      Filesize

      4KB

    • memory/3876-133-0x0000000004F50000-0x0000000004F51000-memory.dmp

      Filesize

      4KB

    • memory/3876-132-0x0000000004E50000-0x0000000004E51000-memory.dmp

      Filesize

      4KB

    • memory/3876-153-0x0000000007B90000-0x0000000007B91000-memory.dmp

      Filesize

      4KB

    • memory/3876-118-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/3876-120-0x0000000000447CEE-mapping.dmp

    • memory/3876-121-0x0000000072F30000-0x000000007361E000-memory.dmp

      Filesize

      6.9MB

    • memory/3876-131-0x0000000004E00000-0x0000000004E01000-memory.dmp

      Filesize

      4KB

    • memory/3876-127-0x0000000005560000-0x0000000005561000-memory.dmp

      Filesize

      4KB

    • memory/3948-96-0x000000001BC26000-0x000000001BC28000-memory.dmp

      Filesize

      8KB

    • memory/3948-27-0x00007FF98A520000-0x00007FF98AF0C000-memory.dmp

      Filesize

      9.9MB

    • memory/3948-88-0x0000000001800000-0x0000000001808000-memory.dmp

      Filesize

      32KB

    • memory/3948-113-0x000000001BC2A000-0x000000001BC2F000-memory.dmp

      Filesize

      20KB

    • memory/3948-102-0x000000001BC22000-0x000000001BC24000-memory.dmp

      Filesize

      8KB

    • memory/3948-110-0x000000001BC28000-0x000000001BC2A000-memory.dmp

      Filesize

      8KB

    • memory/3948-24-0x0000000000000000-mapping.dmp

    • memory/3948-104-0x000000001BC24000-0x000000001BC26000-memory.dmp

      Filesize

      8KB

    • memory/3948-101-0x000000001BC20000-0x000000001BC22000-memory.dmp

      Filesize

      8KB

    • memory/3948-56-0x0000000000E80000-0x0000000000E81000-memory.dmp

      Filesize

      4KB

    • memory/4108-263-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/4132-130-0x0000000000000000-mapping.dmp

    • memory/4180-194-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/4180-191-0x0000000000000000-mapping.dmp

    • memory/4180-205-0x0000000004AF0000-0x0000000004AF1000-memory.dmp

      Filesize

      4KB

    • memory/4192-135-0x0000000000000000-mapping.dmp

    • memory/4232-147-0x00000000056F3000-0x00000000056F5000-memory.dmp

      Filesize

      8KB

    • memory/4232-146-0x00000000056F0000-0x00000000056F1000-memory.dmp

      Filesize

      4KB

    • memory/4232-139-0x0000000000C40000-0x0000000000C41000-memory.dmp

      Filesize

      4KB

    • memory/4232-148-0x00000000056F5000-0x00000000056F6000-memory.dmp

      Filesize

      4KB

    • memory/4232-138-0x0000000072F30000-0x000000007361E000-memory.dmp

      Filesize

      6.9MB

    • memory/4232-136-0x0000000000000000-mapping.dmp

    • memory/4232-151-0x00000000056F6000-0x00000000056F7000-memory.dmp

      Filesize

      4KB

    • memory/4336-143-0x0000000004330000-0x0000000004331000-memory.dmp

      Filesize

      4KB

    • memory/4444-150-0x0000000000000000-mapping.dmp

    • memory/4520-152-0x0000000000000000-mapping.dmp

    • memory/4604-155-0x0000000000000000-mapping.dmp

    • memory/4636-280-0x0000000000000000-mapping.dmp

    • memory/4644-177-0x0000000002BE6000-0x0000000002BEB000-memory.dmp

      Filesize

      20KB

    • memory/4644-165-0x0000000002D04000-0x0000000002D06000-memory.dmp

      Filesize

      8KB

    • memory/4644-256-0x0000000002BDB000-0x0000000002BDE000-memory.dmp

      Filesize

      12KB

    • memory/4644-157-0x00007FF98A520000-0x00007FF98AF0C000-memory.dmp

      Filesize

      9.9MB

    • memory/4644-178-0x0000000002BEB000-0x0000000002BF4000-memory.dmp

      Filesize

      36KB

    • memory/4644-163-0x0000000002D00000-0x0000000002D02000-memory.dmp

      Filesize

      8KB

    • memory/4644-164-0x0000000002D02000-0x0000000002D04000-memory.dmp

      Filesize

      8KB

    • memory/4644-173-0x0000000002BE1000-0x0000000002BE6000-memory.dmp

      Filesize

      20KB

    • memory/4644-172-0x0000000002BDC000-0x0000000002BE1000-memory.dmp

      Filesize

      20KB

    • memory/4644-188-0x0000000002BF4000-0x0000000002BFD000-memory.dmp

      Filesize

      36KB

    • memory/4644-171-0x0000000002BD7000-0x0000000002BDC000-memory.dmp

      Filesize

      20KB

    • memory/4644-170-0x0000000002BD4000-0x0000000002BD7000-memory.dmp

      Filesize

      12KB

    • memory/4644-169-0x0000000002BD0000-0x0000000002BD4000-memory.dmp

      Filesize

      16KB

    • memory/4644-168-0x0000000002D0A000-0x0000000002D0F000-memory.dmp

      Filesize

      20KB

    • memory/4644-167-0x0000000002D08000-0x0000000002D0A000-memory.dmp

      Filesize

      8KB

    • memory/4644-166-0x0000000002D06000-0x0000000002D08000-memory.dmp

      Filesize

      8KB

    • memory/4652-156-0x0000000072F30000-0x000000007361E000-memory.dmp

      Filesize

      6.9MB

    • memory/4660-267-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/4940-174-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB

    • memory/5016-184-0x00000000053C0000-0x00000000053C1000-memory.dmp

      Filesize

      4KB

    • memory/5016-187-0x00000000053C3000-0x00000000053C5000-memory.dmp

      Filesize

      8KB

    • memory/5016-179-0x0000000073DA0000-0x000000007448E000-memory.dmp

      Filesize

      6.9MB