Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-09-2024 12:38

General

  • Target

    Terabox_1.32.0.1.exe

  • Size

    85.5MB

  • MD5

    b73657d85fe21f889cdbaf4f1724ff57

  • SHA1

    c10e0f8cf0abda003931c5b27ce2416a076b0478

  • SHA256

    9ed5767db68fb669b3f18a0565cae471ee3800b94a187c4512e5a6691797c511

  • SHA512

    b013b7015e90043e2d8c021d9ea9a87505c36ffcb4619eb5fd06bd0e2c5742c3bc3fddc3a448112def652ab26d5372fee4a2d6f95c3c5ce09a000ffb7bf457f1

  • SSDEEP

    1572864:yBumaBVNigHypMDTKWRhvRL7b3NWPVQ6kzjn:yBumaRigyp8TDRhvRD3APVr6jn

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Terabox_1.32.0.1.exe
    "C:\Users\Admin\AppData\Local\Temp\Terabox_1.32.0.1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:124
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe" -install "createdetectstartup" -install "btassociation" -install "createshortcut" "0" -install "createstartup"
      2⤵
      • Adds Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:692
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\system32\regsvr32.exe
        "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
        3⤵
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Modifies registry class
        PID:1624
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3000
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\system32\regsvr32.exe
        "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:2328
    • C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe" --install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1608
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe" reg
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4376
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2512,11662426521001596126,7222874468165074376,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2536 /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3828
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2512,11662426521001596126,7222874468165074376,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2968 /prefetch:8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:4832
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2512,11662426521001596126,7222874468165074376,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2088
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2512,11662426521001596126,7222874468165074376,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4828
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.5112.0.1209553231\649862581 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.77" -PcGuid "TBIMXV2-O_467DEEC1D7614016BA94FB5B7568C9A3-C_0-D_232138804165-M_DE9F295A8EA0-V_8C6CA0F0" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1732
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.5112.0.1209553231\649862581 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.77" -PcGuid "TBIMXV2-O_467DEEC1D7614016BA94FB5B7568C9A3-C_0-D_232138804165-M_DE9F295A8EA0-V_8C6CA0F0" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2512,11662426521001596126,7222874468165074376,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4800
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.5112.1.907222267\974823966 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.1.77" -PcGuid "TBIMXV2-O_467DEEC1D7614016BA94FB5B7568C9A3-C_0-D_232138804165-M_DE9F295A8EA0-V_8C6CA0F0" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1356
      • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd 502d6 -unlogin
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4932
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000057

    Filesize

    212KB

    MD5

    08ec57068db9971e917b9046f90d0e49

    SHA1

    28b80d73a861f88735d89e301fa98f2ae502e94b

    SHA256

    7a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1

    SHA512

    b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index

    Filesize

    624B

    MD5

    bc2cbc52f10965f49cbc1990c1864c70

    SHA1

    cbb858d8479a4998f9ac8d25f3e12acc23bbfa55

    SHA256

    4e2f28d96ab342da5f1a9a5865bb483a529e23d2807677cfe3933e27f302f6e2

    SHA512

    6451958277cdd1f33abedb68eb8d0e8136510a7fb90e493912b98b09feec6c65daad602fb99a93048f1697b073e90b9e046abe398cb373303e7f80330c245d31

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index

    Filesize

    48B

    MD5

    b9e76fcb4e956b50f9ef26ca49feb90f

    SHA1

    65a0bf4c47639ab91542c50caad4502adfab7aeb

    SHA256

    1ac4924bacc8cb85aa42e41ef5c6aeef19976acf211695a6a76845e693a435f8

    SHA512

    4f34402fadb3fbbcad30fbd743c4620874ae1eed8fcf9b4ef4c7d5b90025120df94b8c06504600c81d279f4a1a66719a5e85e908508e9f662d6a55076aa02dc8

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\IndexedDB\https_www.terabox.com_0.indexeddb.leveldb\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\nsfD275.tmp\NsisInstallUI.dll

    Filesize

    1.8MB

    MD5

    69b36f5513e880105fe0994feef54e70

    SHA1

    57b689dbf36719e17a9f16ad5245c8605d59d4c0

    SHA256

    531d1191eded0bf76abb40f0367efa2f4e4554123dc2373cf23ee3af983b6d5f

    SHA512

    c5c09d81a601f8060acf6d9eeaa9e417843bb37b81d5de6b5c70fb404a529c2b906d4bb0995d574dd5a3b4986e3cbe20882aa3e8349e31ff26bdb832692596bd

  • C:\Users\Admin\AppData\Local\Temp\nsfD275.tmp\SetupCfg.ini

    Filesize

    75B

    MD5

    ac0835ca6cc22eb3547391cd28babd84

    SHA1

    6f557aeebdae72ce980b7cb0507cbdffb1c13b93

    SHA256

    fe2e95678fbd1a8b6609eb95f3e9941f67018ebab32149cf0b94b0a200354a54

    SHA512

    038269833537aab00f65a1170ff70b3e7c6ce75051ff5e8a05cf52f47438127d7df10b88c60b55996f180c0bbeeae55d58426886184f23a618447ee87aa829ec

  • C:\Users\Admin\AppData\Local\Temp\nsfD275.tmp\System.dll

    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • C:\Users\Admin\AppData\Local\Temp\nsfD275.tmp\nsProcessW.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • C:\Users\Admin\AppData\Roaming\TeraBox\AppUtil.dll

    Filesize

    1.5MB

    MD5

    2b01d156bf9857a17daa46979218fa4c

    SHA1

    591285020e8525ca51d1021ef8b4267d22b07329

    SHA256

    b36a5d808f8e64ba0635c72c7c9049453a98edf160083df05a0311dff471030f

    SHA512

    8afcfdf2d745cc634fa9440b7792b5d1477b1a15838a787aab9f4be4ee5cf0b81e08f4322a96ece37ff31f19fa4bf1f74463b3c908f0d532d1b25cee0d59bd3e

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdateUtil.dll

    Filesize

    198KB

    MD5

    bf5e773b31cea30b6a8388c719cf0342

    SHA1

    db300c09fce3c878225146f0ef1d07dcc15e54af

    SHA256

    7a7e10507d07f8da2866233143e77ce7a3590c745300f08334d8e6308ab39115

    SHA512

    52d37d86de26635caf46f49fd3c03d2530b57402a3dfbb21e6281c0331ec6e53a730ef0ab55c39d56eaf92308fe2efeb8c1ea4cfe1fed0b03f459fbe450e7a06

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\Download\AutoUpdate.xml

    Filesize

    34KB

    MD5

    3c20637d0f03f1d738b7ed4bd188f6cc

    SHA1

    962dfe88ea36e784041153b7bc8d590aadaad8bc

    SHA256

    74d964f69c722b49398f949a76a8e2d7546c8fbd0148e7ebec9834a374386066

    SHA512

    7c3cbdffcb4eec2789f30cea93a58bfc90e7f11625b5ba915a2986aff7f818a92aa8ab134efffe2f3b8d6d4efed389ae547a3aca5ed42af8b031e47af29f5dac

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\config.ini

    Filesize

    52B

    MD5

    5cc36a5a9945e4fbda1cc8b475f98ea9

    SHA1

    16ff4141e975705252b9c556c5da8c84e7dbc74e

    SHA256

    61d88eb427ba7668f56c7391410c4de3a8e17cde7baba80291f8a06efafbef7c

    SHA512

    8b451ca92dd61ace8fc6cc4bcfc09499aa3c006803a7bdca1bdac9ee40a7b8fc9311e28078f07fbe4fbf1d40d71ffcebcf49a440ca0c6c100391fea4ee888a9e

  • C:\Users\Admin\AppData\Roaming\TeraBox\Bull140U.dll

    Filesize

    3.2MB

    MD5

    aed059c46be32077f7b63ab9349eee76

    SHA1

    cc84ed3fe63e110f489111d7acefe9effb389aac

    SHA256

    b7234ea6641f484834412a6edf820a56b7b26257e8780bff70f1c9d7cf02b9ee

    SHA512

    f829e6d503f88f3cb50c1142a024368ca8cd787a9a85f6955fa5092cb5c06f679bdf5377718f97e1077a89a8606c3698839e344524f9d43629cdf02a4306da27

  • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe

    Filesize

    6.3MB

    MD5

    117c541f80c5e6706e722f9431d9fef6

    SHA1

    d19eb357c221f4802e0c342da69bcdd463400b80

    SHA256

    e6435157581258557202d04b08ebda3c87d52e5354ccc33825d80673c6b16e30

    SHA512

    8239044b8b08d5743d09118c5db1a0e5dac8b77482b8d9b6146130df397d4a1b00427b6049bc82f14e6f6cf67a5dc8cdc3387931e28544277fe4fd9c912c0328

  • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe

    Filesize

    1.1MB

    MD5

    1e77999ac64fd309a200921c646ef7c0

    SHA1

    53679977c98b484e24e7d8c0810c695c99c98be5

    SHA256

    5700ddbcd18561e1bd14c1de034fff226038e36e3bfd2451b5678fd6028d5aab

    SHA512

    e1cd7332d9aaf6dd1de0cd053e47d54334b6fadd2fdf78fba33420cd9437d3ace463222bd62ef974a68ac0f752d052f73e45a92899e0ff4a926612ee07d34b17

  • C:\Users\Admin\AppData\Roaming\TeraBox\VCRUNTIME140.dll

    Filesize

    83KB

    MD5

    b77eeaeaf5f8493189b89852f3a7a712

    SHA1

    c40cf51c2eadb070a570b969b0525dc3fb684339

    SHA256

    b7c13f8519340257ba6ae3129afce961f137e394dde3e4e41971b9f912355f5e

    SHA512

    a09a1b60c9605969a30f99d3f6215d4bf923759b4057ba0a5375559234f17d47555a84268e340ffc9ad07e03d11f40dd1f3fb5da108d11eb7f7933b7d87f2de3

  • C:\Users\Admin\AppData\Roaming\TeraBox\VersionInfo

    Filesize

    192B

    MD5

    aef980496e31ca94eddcff0044a32549

    SHA1

    ed3f1474c6c8b09c8da07bbac61f5c03aa60d992

    SHA256

    7c71738efeb52cc51e923b4aa64fa29af5a99f60802fd922394e7ad30d25574f

    SHA512

    5144db5524ddf448a7764b7c5c9312c335a4b19365ba813303a0dd1abdbe2a6fc74291bf39df27416cd7503cd3ba85eaaca5e4a3c59c44e655292dadf4b31fbc

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunDb.dll

    Filesize

    777KB

    MD5

    2858917ba572bb6c9ae5f6d3f6dacefd

    SHA1

    32f7e70fdbbab4076f562016735c65d59e84389c

    SHA256

    cbb041c110915067896baaf87738d8f06fb4d6afece8e76b189ff14537dcbf5b

    SHA512

    09003219620543a20edc634c0d4125d700d2b3c703ab9298dfac44c7b1cd2c25dd2db5a7c12713986e1bd871667be170bb9bd9655350f9ba961c94bf0cea5a43

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunDls.dll

    Filesize

    2.1MB

    MD5

    cfc32dd40b7abaa38ba2c2ab0feaaf9e

    SHA1

    ca1a9ce7f862ec7915443a6c37297be19cbc2507

    SHA256

    04aa450c5ee8db022e6d6cc035b77bd4ce17ae7e4aa8cf9e3b1bad5ae564ceef

    SHA512

    fdd3d346651ec67949b43b714eb6296ad6b253b3bfb0d2d550162f10a110051026fbc58dccc557a4f92d4d76e0c00845b60f619187f804014d46be873dba6407

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunLogic.dll

    Filesize

    6.3MB

    MD5

    2f049c2ca3d1446cd944993e8734bf0b

    SHA1

    5afdff83485216268af0efa397399b2d8722b496

    SHA256

    efb6eda25f1c82605caf839f45ab63fea5ad33ee36c891051d25b8309bb7e7c4

    SHA512

    08920358699849bdb309b18a56b4351aae58e3de5657e56d3c7e12bc4e7101a317a94147ee27ebb396922cf2b6db43237d646386e4aeca1e5d0ebaaf7d2dc4ac

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin.dll

    Filesize

    378KB

    MD5

    4fffd9ffde2d48f474f9280c944b6940

    SHA1

    2dc56ab63e3241eadbb3e39ef697d2d468d4a57e

    SHA256

    635e8364383318f04667524663191e03fbcab9359006a1e829902bce7e19544d

    SHA512

    d40e5ff0a2f1a8ff38c159c149bb71456f59b9ca277b0e8a2c88e61b258db8142c7ab942817a0c28cac47635cfc300b10dd955fdf1bcb8078122a6d66cd10f85

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll

    Filesize

    491KB

    MD5

    aa257db82af0ce00192bfc3a72c47d56

    SHA1

    bbfa65b9512dbca06985fca1534c1178b331ab7b

    SHA256

    1083ea29c46cc3fdd3324a1887b6e3489e98076e9cc1b941f363ebd2225cbbff

    SHA512

    b45706e23f8f394e2693c49ad1410ddd3012fda01c3d88778f9d8c0ecf23b498fcd9e75d2eb45bb7032ec940bd81f568ace9830d0ef634d989f7408b03104b78

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll

    Filesize

    1011KB

    MD5

    3a70aef3153e58a9624ef1bcaa63fbbb

    SHA1

    9f6a9f877a2153294687cdc5e661c6c539b3136d

    SHA256

    aede12d6e7221cdf81ca4dd73c7961a7d5bd4313f7793f5437a64ac271844317

    SHA512

    4d131f536f560207f7d259144327625d7c352c93979f663212d0fc430840757239e9be9c7030bc1826765d078fdaa9cb730e0cf2d217ff8203f6742547ffdaac

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe

    Filesize

    111KB

    MD5

    666302bb1ecf9edb2445d390e52c737e

    SHA1

    df8272fcabaa673bfe2e135d9f351f5ec366f077

    SHA256

    48a15f0945dd83ec074066e7a47131f1f48e85e31fb26280c8a70753d7584b2b

    SHA512

    ad0850f7d8985dca12cb06b2837c3791e75aba35e74243f13e143c423b116338b4ff5531e2f77b5c778a83926f5dc5ce801f23013ca1e5334ceca36ebd302e6a

  • C:\Users\Admin\AppData\Roaming\TeraBox\chrome_elf.dll

    Filesize

    845KB

    MD5

    17ec5dcc1961b82709a9bfa3e66251f8

    SHA1

    4c42d6b31615a678893f45c4ca53f21df45ecf10

    SHA256

    434ecac3c4e433671df7ee0678459775404065a13ddce238f0372d756e58d33f

    SHA512

    1a6cdd8a33707739c85ee98f111e46d7a1efdbe9d32daed8906f0062a6deadda829bb809bf937221b8db4bb9b3006d8f2e62000f4f2e7bbc7ff5106ebc5c59f6

  • C:\Users\Admin\AppData\Roaming\TeraBox\minosagent.dll

    Filesize

    2.9MB

    MD5

    216a2dd23f95bdd63cd88a50eb7e69bd

    SHA1

    9c63635c26e276179f8dba9e02079bb3170b0321

    SHA256

    63da24020a82333c79806f3f8aa92fb9103f20b0b90ab095ee52601f6b154ada

    SHA512

    390ff16e8b0c07c1bda03584096404bdd22d69a0eb39a76fc6155c81584e1a7737f8f9d359a7be8e861bcfb02ced46950a8ef6c20a896774647086c21ee7edf0

  • C:\Users\Admin\AppData\Roaming\TeraBox\module\TeraBoxModuleList.db

    Filesize

    16KB

    MD5

    0ea82ee4ea2091fd430c45dbf62894b1

    SHA1

    36d18fb92a5f5704803543ee0aedd84fadae382a

    SHA256

    3009fcfc02003af64d2a4d1cea439d2ae67ad75a19302e3ae0416534e0882ee4

    SHA512

    cedd747c6315b9540aadfb39b17932c43753aff429813f4dfee65534fbd0b9f6b07f02cee1a441d6e89177a94c2ce417b4846b6d1ff156252bf46411d2b5f9e3

  • C:\Users\Admin\AppData\Roaming\TeraBox\msvcp140.dll

    Filesize

    429KB

    MD5

    1d8c79f293ca86e8857149fb4efe4452

    SHA1

    7474e7a5cb9c79c4b99fdf9fb50ef3011bef7e8f

    SHA256

    c09b126e7d4c1e6efb3ffcda2358252ce37383572c78e56ca97497a7f7c793e4

    SHA512

    83c4d842d4b07ba5cec559b6cd1c22ab8201941a667e7b173c405d2fc8862f7e5d9703e14bd7a1babd75165c30e1a2c95f9d1648f318340ea5e2b145d54919b1

  • C:\Users\Admin\AppData\Roaming\TeraBox\resource.db

    Filesize

    52KB

    MD5

    4f65b8cb550d59fba5834981da06c7fe

    SHA1

    131633f01a736283ea057fd4f6a1f59df3152880

    SHA256

    eaea3e43ac1b3afea07a20b9f838194fc3a730ad88ef431ea243f00211a614cc

    SHA512

    32da2b87ff33f8815907f8bef6a55d2771d313d54732eb87276c1241742cd2e78bbbcbbacd1410ab4bee353670ee7170b67bd623d127eedb3302264fa02bc604

  • C:\Users\Admin\AppData\Roaming\TeraBox\uninst.exe

    Filesize

    697KB

    MD5

    af58fb8e4130fd3779a743f05a17524d

    SHA1

    c1b1d0e256a58c3f148d818aa79b2a7429e8a8ea

    SHA256

    e02a12cda93ff7f02539661d5e7459550cb2c72047c034e357af3d641785ab5f

    SHA512

    27a7681a07d6c3f3f5f18ab8c9ad3fafd2352c6fd10e00544b51bf7314e5e603e556b153ffdfdfa0ccaa0110a53022ea535549de8886f689ff9ebbec25262480

  • C:\Users\Admin\AppData\Roaming\TeraBox\updateagent.dll

    Filesize

    1.1MB

    MD5

    1605626fc49e04528739581c8805e227

    SHA1

    c3a3f8b626b99c5c8ca41b5fa181681f571f4825

    SHA256

    8ed13ef0a5372d46ecfa82dd66e3f8bb963c3db7d9442d11ac33aa9ad34d37e6

    SHA512

    975e211ec53d54d434692c48cbb86bb843f314bd2c6ac5dbeed6155097c7a7a59cb7e3df119ce463c2895755be9ded6012bab59b2a7b7dd22dc6acc600a7ef8a

  • C:\Users\Admin\AppData\Roaming\TeraBox\users\localdata.dat

    Filesize

    135B

    MD5

    8b33ee873631b455610c30e89b783c93

    SHA1

    bb735c65e56e7345e9cc863756ec6269a4e02a42

    SHA256

    85479aace7f91dc6f7a84250c2e573ff4d32e7fbeed1224a430337b29d4c3b54

    SHA512

    587a49bea7edbec0f34bf68cfa5087fb83e1892a3a78f8abe4be349bcd202ed19eec6a762ab2ebe6aadcaf91a1fd5f46024e3099e13ed1f52c9fe5860c7f7902

  • C:\Users\Admin\AppData\Roaming\TeraBox\xImage.dll

    Filesize

    1.1MB

    MD5

    7b55c620df65a511e22d806b4308af20

    SHA1

    4198b85a0cba2ba7f38b3da17befd81514f8cfae

    SHA256

    11803dc90d659c40cd118fbee6c73b8d572515db05b57c5ddcde796ef1e3d81a

    SHA512

    18a3fe0c7275f5e9daf6811232e629646f186dad8773d2515d1e9de3cfdb75929eb6354e4db79be5f678d6c5da4c92bb7d7b563bed8838d5ad35570cb6cee3c2

  • memory/124-17-0x0000000003270000-0x0000000003280000-memory.dmp

    Filesize

    64KB

  • memory/124-126-0x0000000003270000-0x0000000003280000-memory.dmp

    Filesize

    64KB

  • memory/1852-442-0x00000000015D0000-0x00000000015D1000-memory.dmp

    Filesize

    4KB

  • memory/1852-438-0x0000000001580000-0x0000000001581000-memory.dmp

    Filesize

    4KB

  • memory/1852-436-0x0000000001540000-0x0000000001541000-memory.dmp

    Filesize

    4KB

  • memory/1852-455-0x0000000064D80000-0x00000000661AC000-memory.dmp

    Filesize

    20.2MB

  • memory/1852-440-0x00000000015C0000-0x00000000015C1000-memory.dmp

    Filesize

    4KB

  • memory/1852-454-0x00000000036C0000-0x00000000036C1000-memory.dmp

    Filesize

    4KB

  • memory/1852-439-0x00000000015B0000-0x00000000015B1000-memory.dmp

    Filesize

    4KB

  • memory/1852-437-0x0000000001550000-0x0000000001551000-memory.dmp

    Filesize

    4KB