Analysis

  • max time kernel
    128s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    30-07-2024 12:03

General

  • Target

    TeraBox_1.31.0.1.exe

  • Size

    85.5MB

  • MD5

    29479b953032b1bd6ac2056691c361a7

  • SHA1

    afa4ac9af3654b2dda1d2fc4ea60fa579eaa6c34

  • SHA256

    c8909ff67ce9c7ffdebe28171f8eefb2eabbadeb8078409496b7f31803d45d9c

  • SHA512

    20894403cd64b9f174aee6a4cec239e22f7492937f0919e4add66062575dab5cef97639ba4dc38aa905d5e5c481f680a95be6b179123bee9f3a53434354a8119

  • SSDEEP

    1572864:ldJLtviAmwWBetc/tEyBVbvVnt5b5tOdX1WlCGYH1CxDMIgwMWDR8qlqmkSap1yx:ltmBH/maxt5bwEOVC5MIzML9hufp

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBox_1.31.0.1.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBox_1.31.0.1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe" -install "createdetectstartup" -install "btassociation" -install "createshortcut" "0" -install "createstartup"
      2⤵
      • Adds Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1828
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:448
      • C:\Windows\system32\regsvr32.exe
        "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
        3⤵
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Modifies registry class
        PID:1616
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1944
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:660
      • C:\Windows\system32\regsvr32.exe
        "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:1156
    • C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe" --install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:680
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe" reg
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1892
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2016,13375127434004375078,2637937309550872831,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2024 /prefetch:2
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1640
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,13375127434004375078,2637937309550872831,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2716 /prefetch:8
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:2720
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2016,13375127434004375078,2637937309550872831,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2840
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2016,13375127434004375078,2637937309550872831,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2860
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2016,13375127434004375078,2637937309550872831,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 6.1; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;6.1.7601;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2152 /prefetch:2
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3008
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.1948.0.1344951085\378252652 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.233" -PcGuid "TBIMXV2-O_580D6966DB7049169CB3F315654A8FEC-C_0-D_4444303031302033202020202020202020202020-M_EE5017308107-V_B910E1C3" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2932
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.1948.0.1344951085\378252652 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.233" -PcGuid "TBIMXV2-O_580D6966DB7049169CB3F315654A8FEC-C_0-D_4444303031302033202020202020202020202020-M_EE5017308107-V_B910E1C3" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.1948.1.632109391\1811357095 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.233" -PcGuid "TBIMXV2-O_580D6966DB7049169CB3F315654A8FEC-C_0-D_4444303031302033202020202020202020202020-M_EE5017308107-V_B910E1C3" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2152
      • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd 701c2 -unlogin
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1636
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    959B

    MD5

    d5e98140c51869fc462c8975620faa78

    SHA1

    07e032e020b72c3f192f0628a2593a19a70f069e

    SHA256

    5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e

    SHA512

    9bd164cc4b9ef07386762d3775c6d9528b82d4a9dc508c3040104b8d41cfec52eb0b7e6f8dc47c5021ce2fe3ca542c4ae2b54fd02d76b0eabd9724484621a105

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6525274CBC2077D43D7D17A33C868C4F

    Filesize

    192B

    MD5

    6d5c208f26812014504d54f5d7099842

    SHA1

    1812501e7f5b136635a064222a19920fafbf1b07

    SHA256

    a30914b3078b15679bc9f47982f2214909c3e232686897f8930c5f2bf554a524

    SHA512

    8c8377fd937eec348995e845898ce99b36fdb7d11e863e550ac5eebf26aa73d0a9984019a53066cb1dcaa2bc8c44db811e53d299af3bd1c5896acf84bee1d3c8

  • C:\Users\Admin\AppData\Local\Temp\CabADC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB5B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjD07B.tmp\SetupCfg.ini

    Filesize

    75B

    MD5

    ac0835ca6cc22eb3547391cd28babd84

    SHA1

    6f557aeebdae72ce980b7cb0507cbdffb1c13b93

    SHA256

    fe2e95678fbd1a8b6609eb95f3e9941f67018ebab32149cf0b94b0a200354a54

    SHA512

    038269833537aab00f65a1170ff70b3e7c6ce75051ff5e8a05cf52f47438127d7df10b88c60b55996f180c0bbeeae55d58426886184f23a618447ee87aa829ec

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\Download\AutoUpdate.xml

    Filesize

    24KB

    MD5

    04d397e124984b2733e542a78fec6381

    SHA1

    ffb405043e9a642d4dd4709b0b4ecd25a2527644

    SHA256

    e53ffe83942d03f6221d6c31d8dd48fe78979136c5e5e1a2996a9980606b8295

    SHA512

    9c6707554f43b1f98c9115445db3133885c32639d12a82f36f9ab0abcdcc6c564212f36eb264955a4ba96cd8814c3d29581fafbb6199c4dc12c8a9e8218f58dc

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\Download\MainApp\upgrade_13101_13153.cab

    Filesize

    4.5MB

    MD5

    7a70b13ba9a7fecf2216616986563848

    SHA1

    f10f6cd99f54638717fb40b2efd014a165763c86

    SHA256

    cfec57466fc0e49ec1d51995208c0f9608bf74d6cf28124bf4860c71a17a1f52

    SHA512

    6f8d03d9bf1a086707818f1e4441fe285e6ae6523f5bb6cd3ee44d1b98df025178cabba2b353f328544967c7911e8ba1d7f8431c52f700b87190add9fc11f39b

  • C:\Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-conio-l1-1-0.dll

    Filesize

    12KB

    MD5

    4296cf3a7180e10aaf6147f4aecd24e4

    SHA1

    f81e09af979a1146774d554783d1a22a03a61393

    SHA256

    147f86ff93d61fea256b3de9149e1b36b68a83762e62a3389466218e18359ffc

    SHA512

    60357edde6572c5e796f927c3e72c31a96ff700624b7366fdda64bcf51ee00bf1e9ab477a46d8d3ba7391ba10491e69f745efec3607f8f49b6e1a3a3de7a0648

  • C:\Users\Admin\AppData\Roaming\TeraBox\appUtil.DLL

    Filesize

    1.5MB

    MD5

    7e489e7300d3177f64db31665a2079e0

    SHA1

    50b20f0b4e5bb5b35e68dd90a5c465dffd30260e

    SHA256

    7a426359908ae2b6ca1bc8a2773269a48126c2db23c171bc56a3456da4f0016c

    SHA512

    0b3b34c0e5e095dfd77d801cd7e85e0431da23bf1c943aacb855a40f5a0d9439d7667718abe654eac17ed474b3c9eb644b90cc8cc215c9adc99b12e29b7907d3

  • C:\Users\Admin\AppData\Roaming\TeraBox\uninst.exe

    Filesize

    697KB

    MD5

    bdbf614848cfc3fada7dae8a55a9ad8e

    SHA1

    78ad1a6c45e5df62659274c66b3c3a7a8731cdf5

    SHA256

    5cf7f5d5fbb371a29f45d3777860ad07df3b2e12b273076a555c65334a9702ad

    SHA512

    da82bdaf7785333734998c2c919242f7e0d7d585de5972efd028f283913b4a4cfa4d24c73ffba6fec3ea674e8ac69499b992090377144a1cdfe7e5575f1d7d0c

  • C:\Users\Admin\AppData\Roaming\TeraBox\updateagent.dll

    Filesize

    1.1MB

    MD5

    b9ee83666245d8de4f0709b03eac1ad3

    SHA1

    38eaee6757499aaf4e8869837a767708392e225e

    SHA256

    ce10dfac95461981072738c92ccf8b01599b5ddde2b0a21d18506d3528c83fda

    SHA512

    d970c2a52dfde330bd32bc6718d194b90f8bc3131d9d7905e0f438483f3030bf64dfc69091562f467cc6ea34357513614671db94d2b664208016c3c11b77f08b

  • C:\Users\Admin\Desktop\TeraBox.lnk

    Filesize

    840B

    MD5

    9d87b0c4e5ebb9ff86e353f8b00e7f13

    SHA1

    194bcd843c5dcdce44d1d60920418d60b348507d

    SHA256

    78afc64ce40e89b218b528d23a18163aed1f792692ba523624f1a9a80ae2bd69

    SHA512

    03d9891c1f6817fa8fef7b66f8b4f14bb55cefb8661f8288bc853f1f4c24b69c95f828c88c36cc68149f785270e424c74df9dc379d660612fcf8a8278d542773

  • \Users\Admin\AppData\Local\Temp\nsjD07B.tmp\NsisInstallUI.dll

    Filesize

    1.8MB

    MD5

    075abe6be6b717434cea2879a54c4714

    SHA1

    dc02581f578d22db7460352a476727ac5b2fcbb9

    SHA256

    5a5e5398424a4eab5ea1fb905313ea56a19b7210e0da44861503bbf3f9826c13

    SHA512

    90937b6aab2a4eeac74a33cf238131e011edc1b1f2bf9a9ce6dc5e0d21923330131ba5014e9ea1176ee88ee03d847cc69e6f1e91f7f68aa65c7a5ac4852f9d63

  • \Users\Admin\AppData\Local\Temp\nsjD07B.tmp\System.dll

    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • \Users\Admin\AppData\Local\Temp\nsjD07B.tmp\nsProcessW.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • \Users\Admin\AppData\Roaming\TeraBox\Bull140U.dll

    Filesize

    3.2MB

    MD5

    b5ac5913784d34c843677547edd5c578

    SHA1

    ed2a4e165ad8b65b1699aaf048654142a66943c6

    SHA256

    3267244255376bfaf68e75ad38468ba3ca0bbb49fe260f6e05611148d5cee3c9

    SHA512

    28a29ff02d7ce6d6a74b4938a1a1388c4ad6b36600bc9e7664edf14eb8a89aee49c107c46e13aee0194a38ec506cd86094952ce9327d724a98541871ff58d6db

  • \Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe

    Filesize

    6.3MB

    MD5

    7ab6073a5c400a5071bfa4ef2d936425

    SHA1

    f794ea18eced4330979972da2a4bfa33c03afa2f

    SHA256

    7774449e13c24d2b0b69114d9ba044e80dc8378fa3dfb5d17a142d5cb4cde8af

    SHA512

    4371b6b49df43dab4abf90a71819276f30dca823c93335edd5513a67a646c97ef575b2ede650ceb2f0f168af13431254530e9bffc3db0f5b0eada1492c3cab73

  • \Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll

    Filesize

    1011KB

    MD5

    80337d9a646974e377f3c89991ed138c

    SHA1

    38b7f9b0e0e138448592c9776c67e53de8ac52a5

    SHA256

    1cde95285c13d908720f5075a4ece533e4b98a1fefe2ebbbe71fd697f45dfd0d

    SHA512

    9ee967588c6f7718834b2e4d04dc2c46236b20bfcbdd9a09cf011ee3f7f6f57f66a0191ba4c2d85fb95a51f68c34de4b977cf5c099975feee5137928392c8a6e

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-core-file-l1-2-0.dll

    Filesize

    11KB

    MD5

    00d8b4bed48a1bb8a0451b967a902977

    SHA1

    f10ef17bda66d7cab2840d7f89c6de022a7b3ff2

    SHA256

    568d7f8551d8b4199db3359d5145bc4cb01d6d2f1347547f47967eb06a45c3b5

    SHA512

    e248cbc06fc610f315d7efcadb39b5cb85dfe5d40858768d5aea8d41b3b4b23eafe0db2b38cce362fd8ba8bc5eb26e9b2dddc00e2e8615395bca818ecfe0decc

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-core-file-l2-1-0.dll

    Filesize

    11KB

    MD5

    534483b0f4a1924b1ae6d7e66b4a4926

    SHA1

    4e954316acd216007f4a0225b138e0c0a04fbbed

    SHA256

    c1bca1bb524c5ae3d877a099f469b6fc34288bab26ae7a7f4fc47cd869f4958d

    SHA512

    cfad2ddf8a9ad67e36e978726d8a12ca26b180f73122b2e8d19a83f73028a050d9f418e7525f576cc3a9601b3369d4494dddbde620b4011b7ca8a7ec4b0d1b12

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    13KB

    MD5

    73483cbc229c62e129627adbf62b0ffe

    SHA1

    074ce67665c86355d3218b5e3ea4b1b335095af8

    SHA256

    13471eb84db95f8270398ef1deb29f0ea024db17e331497545c36eea7b2a3a7c

    SHA512

    92f06cb8971e29da7607c6b1d1377f21c7e6f0e4a169aaa08326038d5cdb09422b91f4f2d26a7978521e0edbb9cf1235e583f2910048c917ccef8d12c5e1166a

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    11KB

    MD5

    7016bf365a155d29f01a000942a017ef

    SHA1

    47e25b97af56edbdd20ca72bba994c6bcf1b81e6

    SHA256

    b5f815d0a41add7fd9593036a8e6843fcc221298fefd61808f960eed3cc19830

    SHA512

    2cd7e88717a2d81811ce03990737888b8a1e9e351dcdad401ffe5924bdf97be086bd766a1a5b25411b760cbf81b68bebd94d915100b6bc1310360813af11f827

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-core-synch-l1-2-0.dll

    Filesize

    11KB

    MD5

    9efdffac1d337807b52356413b04b97b

    SHA1

    2590bd486abce24312066285fa1c1feaf8332fe0

    SHA256

    e1a87d7d01e2376dde81a16658915ccf2ecb692739fef09adfb962523756e22d

    SHA512

    b3c164e50d48a78bd08cf365e02e263b97ec2dd3efcf04914c8677c838e10be23df5178a8618e3f2a6feb6faa2bb74eaf069e7e2db7c6e6fd9d0137dcffbcead

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    11KB

    MD5

    42c72d838c34e4e7164c578a930b8fc7

    SHA1

    82d02cb090eb6d81a1499189e4d3e6b82aa60061

    SHA256

    f1667bbda1b58fc688b422fd2f9f7040919c4ababe00a4be78b258cae2dfc3d3

    SHA512

    1020d6010dca512adbc18f44b6453a974a200766013c39f6cb1cd0a72234a241c73587c929f1d0fcadf90c3eb71264086167f05bd7ebceb5b944f4e4a0811d92

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-convert-l1-1-0.dll

    Filesize

    15KB

    MD5

    5c6fd1c6a5e69313a853a224e18a7fac

    SHA1

    10bae352f09b214edef2dc6adcb364c45fafdbec

    SHA256

    3aa0eb4c47ac94b911f1a440324d26eee8ddf99557a718f0905bfee3cf56255f

    SHA512

    08c2b1150f6bf505d10085a515bbfab6c1e18663c6ef75ec988727e3d30210532d03bfbfbb048b1a843d4faa5d1060f9079e018a9e892bce03f899a5a85f6034

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-environment-l1-1-0.dll

    Filesize

    11KB

    MD5

    6a3d5701446f6635faff87014a836eee

    SHA1

    7bbc9db1c9ce70e9fc7b7348a2c96681e5d8265b

    SHA256

    16ba05a1fa928501ffaee2e9dce449d28e8fe538df5ec6d8d1080b610b15d466

    SHA512

    839a1277b6dbb9f2d6e572e1b50b0ad08c93256a1367f36997db07285aa7b251346499a643a985a22d9a7618635c11964e414073aa7e1bf60d36368829de8fb3

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-filesystem-l1-1-0.dll

    Filesize

    13KB

    MD5

    4ec243792d382305db59dc78b72d0a1e

    SHA1

    63b7285646c72ee640d34cdc200bfc5863db3563

    SHA256

    56e0bdf91edb21f5f5041f052723025c059a11360bb745f965a9903de9c61756

    SHA512

    88f648d45927db65ff8cead4bb1959b1297410bf3f5b3b2783a173d708649260a61470342694de8b93e9c1657de64db43db40ee71acc661b03786c0921d68d4b

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-heap-l1-1-0.dll

    Filesize

    12KB

    MD5

    a51cfb8cf618571215eeba7095733b25

    SHA1

    db4215890757c7c105a8001b41ae19ce1a5d3558

    SHA256

    6501894e68a3871962731282a2e70614023ec3f63f600f933ec1785400716ce1

    SHA512

    9ae11ab21486dea1aba607a4262f62678c5b0e9f62b6a63c76cfdc7698d872d8696ffb1aaae7aa2e2cf02c1c7eaa53d0ce503432960f4be6886fae0de2659535

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-locale-l1-1-0.dll

    Filesize

    11KB

    MD5

    8d097aa5bec8bdb5df8f39e0db30397c

    SHA1

    56f6da8703f8cdd4a8e4a170d1a6c0d3f2035158

    SHA256

    42c235914844ce5d1bb64002fca34a776ae25ee658fc2b7b9da3291e5def7d4d

    SHA512

    a891536e2a362fc73472fa7f5266ce29e8036959701bc0862f2b7ea5865dcd1505615edc8e064fb2f7aaa1b129e48422efe7b933b01faed9c2afadd8a64452dc

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-math-l1-1-0.dll

    Filesize

    21KB

    MD5

    ab87bdae2f62e32a533f89cd362d081c

    SHA1

    40311859dd042a7e392877364568aad892792ba9

    SHA256

    0439703e47c8fce1f367f9e36248a738db6abcd9f2dd199cb190d5e59ed46978

    SHA512

    dbe0073da8979f3d32204680015b60435226840e732b5df964dbeeb7920c0bc5df92d866964f905518c97cc3539f628664503ffa64e50a2ef90c459b62555444

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-multibyte-l1-1-0.dll

    Filesize

    19KB

    MD5

    169e20a74258b182d2cdc76f1ae77fc5

    SHA1

    fce3f718e6de505ac910cb7333a03a2c6544f654

    SHA256

    224f526871c961615de17b5d7f7bbef2f3a799055cab2c8e3447b43c10c25372

    SHA512

    0881c8704421a5f6e51abd22c55608dd7fb678491682ce86066e068b1973ebf11d6c2163be610a49f87e800c8563ebb41abfe36e1913d7d0b8485fd29ed81bf7

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-runtime-l1-1-0.dll

    Filesize

    15KB

    MD5

    49363f3cf4671baa6be1abd03033542f

    SHA1

    e58902a82df86adf16f44ebdc558b92ad214a979

    SHA256

    505d2bde0d4d7cd3900a9c795cb84ab9c05208d6e5132749ab7c554ccd3c0fcc

    SHA512

    98e78a607cfbb777237dc812f468ec7a1abcba9472e20a5780dfc526f7992da1841fcd9e2f76f20fa161240007f185c7fbdc120fb4c3c1f2b90fdad5913d65dd

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-stdio-l1-1-0.dll

    Filesize

    17KB

    MD5

    be16965acc8b0ce3a8a7c42d09329577

    SHA1

    6ac0f1e759781c7e5342b20f2a200a6aab66535e

    SHA256

    fcd55331cc1f0ff4fb44c9590a9fb8f891b161147a6947ce48b88bf708786c21

    SHA512

    7ba55fa204d43c15aca02031f584b3396bb175365dad88e4047b8a991f1f1ddd88d769e4d8cb93ee0ed45e060a1156e953df794f9cb8bb687c84c4a088da2edf

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-string-l1-1-0.dll

    Filesize

    17KB

    MD5

    3eae6d370f2623b37ec39c521d1f1461

    SHA1

    86d43e2e69b2066333e4afa28a27c7a74ff89991

    SHA256

    ce74bdc6999d084a1b44b2ecea42dd28849b2825d7779effdc4c18360308b79b

    SHA512

    30b2b6cf5cd1bbdf68de048e6d992133fe7ab0c847fa0d5eb8c681a9688d60794621a40178451a104036a0fff2e1bd66a18d9f96be6b28dbdc0bc1c8a535fc85

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-time-l1-1-0.dll

    Filesize

    13KB

    MD5

    a440776e10098f3a8ef1c5eaca72958e

    SHA1

    7b8662714f6e44fb29a4224a038e4127964003e9

    SHA256

    40d8bc312ac7bca072703e5f0852228cde418f89ba9ad69551aa7a80a2b30316

    SHA512

    b043cd020d184a239510b2607c94210dc5fdc5d2a2b9285836bdce8934cc86a1cc3f47a2f520b15db84f755ac2e7c67e0247099648d292bbd5fb76f683d928df

  • \Users\Admin\AppData\Roaming\TeraBox\api-ms-win-crt-utility-l1-1-0.dll

    Filesize

    11KB

    MD5

    a0a883e26be6800508162e2a898148d9

    SHA1

    4f79892e7766cb7831211864978575598c86a11b

    SHA256

    9753ae83536767c73e340c36c5f1610bc76a3e67e033b07503ec31431cba7b90

    SHA512

    70904f2fd074073aebcf665178b34cf7f0f42ced7223ca296f7f202f6fa0175ace2832d9802f5bff4d67891ca09ae14fac47420d69107e72aa44b541a190f6c3

  • \Users\Admin\AppData\Roaming\TeraBox\minosagent.dll

    Filesize

    2.9MB

    MD5

    216a2dd23f95bdd63cd88a50eb7e69bd

    SHA1

    9c63635c26e276179f8dba9e02079bb3170b0321

    SHA256

    63da24020a82333c79806f3f8aa92fb9103f20b0b90ab095ee52601f6b154ada

    SHA512

    390ff16e8b0c07c1bda03584096404bdd22d69a0eb39a76fc6155c81584e1a7737f8f9d359a7be8e861bcfb02ced46950a8ef6c20a896774647086c21ee7edf0

  • \Users\Admin\AppData\Roaming\TeraBox\msvcp140.dll

    Filesize

    429KB

    MD5

    1d8c79f293ca86e8857149fb4efe4452

    SHA1

    7474e7a5cb9c79c4b99fdf9fb50ef3011bef7e8f

    SHA256

    c09b126e7d4c1e6efb3ffcda2358252ce37383572c78e56ca97497a7f7c793e4

    SHA512

    83c4d842d4b07ba5cec559b6cd1c22ab8201941a667e7b173c405d2fc8862f7e5d9703e14bd7a1babd75165c30e1a2c95f9d1648f318340ea5e2b145d54919b1

  • \Users\Admin\AppData\Roaming\TeraBox\ucrtbase.dll

    Filesize

    863KB

    MD5

    8ed02a1a11cec72b6a6a4989bf03cfcc

    SHA1

    172908ff0f8d7e1c0cbf107f7075ed1dba4b36c8

    SHA256

    4fd02f2699c49579319079b963425991198f59cb1589b8afa8795b5d6a0e5db3

    SHA512

    444fe62a5c324d38bdc055d298b5784c741f3ca8faaeaed591bd6dcf94205dbf28c7d7f7d3825ccb99eff04e3ffd831e3f98d9b314820841a0c0960ae6a5e416

  • \Users\Admin\AppData\Roaming\TeraBox\vcruntime140.dll

    Filesize

    83KB

    MD5

    b77eeaeaf5f8493189b89852f3a7a712

    SHA1

    c40cf51c2eadb070a570b969b0525dc3fb684339

    SHA256

    b7c13f8519340257ba6ae3129afce961f137e394dde3e4e41971b9f912355f5e

    SHA512

    a09a1b60c9605969a30f99d3f6215d4bf923759b4057ba0a5375559234f17d47555a84268e340ffc9ad07e03d11f40dd1f3fb5da108d11eb7f7933b7d87f2de3

  • memory/1680-1881-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/1680-1879-0x0000000000370000-0x0000000000371000-memory.dmp

    Filesize

    4KB

  • memory/1680-1906-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1680-1894-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1680-1891-0x0000000000390000-0x0000000000391000-memory.dmp

    Filesize

    4KB

  • memory/1680-1889-0x0000000000390000-0x0000000000391000-memory.dmp

    Filesize

    4KB

  • memory/1680-1886-0x0000000000380000-0x0000000000381000-memory.dmp

    Filesize

    4KB

  • memory/1680-1884-0x0000000000380000-0x0000000000381000-memory.dmp

    Filesize

    4KB

  • memory/1680-1910-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1680-1908-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/1680-1876-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/1680-1874-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/1680-1872-0x0000000000360000-0x0000000000361000-memory.dmp

    Filesize

    4KB

  • memory/1680-1871-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/1680-1869-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/1680-1867-0x0000000000350000-0x0000000000351000-memory.dmp

    Filesize

    4KB

  • memory/1680-1911-0x0000000068500000-0x000000006992C000-memory.dmp

    Filesize

    20.2MB

  • memory/1680-1896-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/3000-20-0x0000000002990000-0x00000000029D0000-memory.dmp

    Filesize

    256KB