Overview
overview
10Static
static
4TeraBox_sl....1.exe
windows7-x64
10TeraBox_sl....1.exe
windows10-2004-x64
4$PLUGINSDI...UI.dll
windows7-x64
3$PLUGINSDI...UI.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sW.dll
windows7-x64
3$PLUGINSDI...sW.dll
windows10-2004-x64
3$TEMP/kernel.dll
windows7-x64
1$TEMP/kernel.dll
windows10-2004-x64
1AppUtil.dll
windows7-x64
1AppUtil.dll
windows10-2004-x64
1AutoUpdate...il.dll
windows7-x64
3AutoUpdate...il.dll
windows10-2004-x64
3AutoUpdate...te.exe
windows7-x64
1AutoUpdate...te.exe
windows10-2004-x64
1BugReport.exe
windows7-x64
3BugReport.exe
windows10-2004-x64
5Bull140U.dll
windows7-x64
1Bull140U.dll
windows10-2004-x64
1ChromeNati...st.exe
windows7-x64
1ChromeNati...st.exe
windows10-2004-x64
1HelpUtility.exe
windows7-x64
1HelpUtility.exe
windows10-2004-x64
1TeraBox.exe
windows7-x64
5TeraBox.exe
windows10-2004-x64
TeraBoxHost.exe
windows7-x64
1TeraBoxHost.exe
windows10-2004-x64
1TeraBoxRender.exe
windows7-x64
1TeraBoxRender.exe
windows10-2004-x64
1TeraBoxWebService.exe
windows7-x64
1TeraBoxWebService.exe
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 21:01
Behavioral task
behavioral1
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$TEMP/kernel.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$TEMP/kernel.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
AppUtil.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
AppUtil.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
AutoUpdate/Autoupdate.exe
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
AutoUpdate/Autoupdate.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
BugReport.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
BugReport.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Bull140U.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Bull140U.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
ChromeNativeMessagingHost.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
ChromeNativeMessagingHost.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
HelpUtility.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
HelpUtility.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
TeraBox.exe
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
TeraBox.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
TeraBoxHost.exe
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
TeraBoxHost.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
TeraBoxRender.exe
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
TeraBoxRender.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
TeraBoxWebService.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
TeraBoxWebService.exe
Resource
win10v2004-20240709-en
General
-
Target
AutoUpdate/Autoupdate.exe
-
Size
2.8MB
-
MD5
94c5b0443f1c39b71b22931509bf1985
-
SHA1
35cb27275187b8c0da72d00b8551aaf2c1059794
-
SHA256
7260c2623c4277b045d97e87a677d41bbfd11647109a4d648c311310889cebfb
-
SHA512
a08a897095239f367c51b36724f54aa961420e07f76185075902efd7ee023eb8f0a6c8b49769158fbf9372377028182515995b0ac0b7277e12a2640a3e6a3721
-
SSDEEP
49152:57L6oPOReVwkTVcXj/SZTLvIkP4qgh7Xufw58hG7UB:57NQeZVcX7aIFqgtX8S
Malware Config
Signatures
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3419463127-3903270268-2580331543-1000\{395D24F2-0AAE-465E-9628-426FF0317612} TeraBoxRender.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4364 Autoupdate.exe 4364 Autoupdate.exe 4672 TeraBox.exe 4672 TeraBox.exe 4672 TeraBox.exe 4672 TeraBox.exe 2312 TeraBoxRender.exe 2312 TeraBoxRender.exe 4484 TeraBoxRender.exe 4484 TeraBoxRender.exe 3384 TeraBoxRender.exe 3384 TeraBoxRender.exe 1148 TeraBoxRender.exe 1148 TeraBoxRender.exe 3952 TeraBoxHost.exe 3952 TeraBoxHost.exe 3952 TeraBoxHost.exe 3952 TeraBoxHost.exe 3952 TeraBoxHost.exe 3952 TeraBoxHost.exe 3900 TeraBoxRender.exe 3900 TeraBoxRender.exe 2712 TeraBoxRender.exe 2712 TeraBoxRender.exe 2712 TeraBoxRender.exe 2712 TeraBoxRender.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4364 Autoupdate.exe Token: SeIncreaseQuotaPrivilege 4364 Autoupdate.exe Token: SeAssignPrimaryTokenPrivilege 4364 Autoupdate.exe Token: SeManageVolumePrivilege 3952 TeraBoxHost.exe Token: SeBackupPrivilege 3952 TeraBoxHost.exe Token: SeSecurityPrivilege 3952 TeraBoxHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4672 TeraBox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4672 TeraBox.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4672 wrote to memory of 2312 4672 TeraBox.exe 86 PID 4672 wrote to memory of 2312 4672 TeraBox.exe 86 PID 4672 wrote to memory of 2312 4672 TeraBox.exe 86 PID 4672 wrote to memory of 4484 4672 TeraBox.exe 87 PID 4672 wrote to memory of 4484 4672 TeraBox.exe 87 PID 4672 wrote to memory of 4484 4672 TeraBox.exe 87 PID 4672 wrote to memory of 1148 4672 TeraBox.exe 88 PID 4672 wrote to memory of 1148 4672 TeraBox.exe 88 PID 4672 wrote to memory of 1148 4672 TeraBox.exe 88 PID 4672 wrote to memory of 3384 4672 TeraBox.exe 89 PID 4672 wrote to memory of 3384 4672 TeraBox.exe 89 PID 4672 wrote to memory of 3384 4672 TeraBox.exe 89 PID 4672 wrote to memory of 3752 4672 TeraBox.exe 90 PID 4672 wrote to memory of 3752 4672 TeraBox.exe 90 PID 4672 wrote to memory of 3752 4672 TeraBox.exe 90 PID 4672 wrote to memory of 2568 4672 TeraBox.exe 92 PID 4672 wrote to memory of 2568 4672 TeraBox.exe 92 PID 4672 wrote to memory of 2568 4672 TeraBox.exe 92 PID 4672 wrote to memory of 3952 4672 TeraBox.exe 93 PID 4672 wrote to memory of 3952 4672 TeraBox.exe 93 PID 4672 wrote to memory of 3952 4672 TeraBox.exe 93 PID 4672 wrote to memory of 3900 4672 TeraBox.exe 94 PID 4672 wrote to memory of 3900 4672 TeraBox.exe 94 PID 4672 wrote to memory of 3900 4672 TeraBox.exe 94 PID 4672 wrote to memory of 1588 4672 TeraBox.exe 95 PID 4672 wrote to memory of 1588 4672 TeraBox.exe 95 PID 4672 wrote to memory of 1588 4672 TeraBox.exe 95 PID 4672 wrote to memory of 2712 4672 TeraBox.exe 98 PID 4672 wrote to memory of 2712 4672 TeraBox.exe 98 PID 4672 wrote to memory of 2712 4672 TeraBox.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\TeraBox.exeC:\Users\Admin\AppData\Local\Temp\TeraBox.exe NoUpdate2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2484,7656127922170392856,10220518316643822560,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2632 /prefetch:23⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2484,7656127922170392856,10220518316643822560,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2820 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2484,7656127922170392856,10220518316643822560,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2484,7656127922170392856,10220518316643822560,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"3⤵PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe-PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.4672.0.1679060253\301566013 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.134" -PcGuid "TBIMXV2-O_24419685C74042A5A8D722B08271D99E-C_0-D_DD00013-M_CEC55C810519-V_0C7B4B7B" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.4672.0.1679060253\301566013 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.134" -PcGuid "TBIMXV2-O_24419685C74042A5A8D722B08271D99E-C_0-D_DD00013-M_CEC55C810519-V_0C7B4B7B" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2484,7656127922170392856,10220518316643822560,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.4672.1.1339444939\578448459 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.134" -PcGuid "TBIMXV2-O_24419685C74042A5A8D722B08271D99E-C_0-D_DD00013-M_CEC55C810519-V_0C7B4B7B" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2484,7656127922170392856,10220518316643822560,131072 --enable-features=CastMediaRouteProvider --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=4816 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD523161041eea2263ce4aec476306496c5
SHA19d0df82af832d4dd8bfcef06598e2965e188cbb8
SHA2560a4239164e236ef6244867223a44e286a3357876d911ff488eab3d1e0f054472
SHA5121537e7e9d8a5e53b6bf6c5c7ee80370f4df473deee13d523bf69b518e2a56f1837fc1c12b785cf52ce02a3c65c82627b99fa8397d6edb51f2b2d45675e326c7b
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
624B
MD543ed2185f112458f4c498e1f0833214d
SHA1bf99b83f9de97787dc932057836019206ed37c30
SHA256ff681dc173c463bf4eadf090eb437c2cce58e775fdad98874a5deae8ec131143
SHA512f189894c78ccde5ac47a745fd3db498f0c1a42e9fbdc04074263a18730f45977bc09fb6efdf3c4cffa4de95f95c4cae5fe84b464e73d05464a05d0ad734e3276
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe5882e7.TMP
Filesize48B
MD50e61858e61cf76fc6fd6875374d1c8f8
SHA18a2d9c828cee50e5f5068551b9b5d11961c4c673
SHA25609e4de5dabcae73ed3bf4a5c8381775107396e9fc35e3300781275ed90e4ec63
SHA51221c5590bb0b7ebda376b325bf07ee2ce628eac1dcf059bd304e9fef0ea7127cec203f0b330885560550af70a45a3029774029e5b479b47bdec1a4370aaf98168
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\IndexedDB\https_www.terabox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD563b2c96807403424d4336df60032dfcf
SHA1d8ea7546d5a01632f867ee61846808e4cb6e16db
SHA256a569e54ccdb8a9cb093aad6a739b17fa0053dedc9cfe67a04597f600f4840ef4
SHA512659448c96f89cec3c4ccf6a90586dced3c7645b92e2efc50a529aa776011cac208479ca0528302d328265ada306797281208ce518f3573dcfa4b3ff6ab58dfc2
-
Filesize
59B
MD578bfcecb05ed1904edce3b60cb5c7e62
SHA1bf77a7461de9d41d12aa88fba056ba758793d9ce
SHA256c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572
SHA5122420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73