Analysis

  • max time kernel
    123s
  • max time network
    124s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22-09-2024 06:22

General

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Downloads MZ/PE file
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://bit.ly/42omqzU
    1⤵
    • Drops Chrome extension
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8e87cc40,0x7ffd8e87cc4c,0x7ffd8e87cc58
      2⤵
        PID:3760
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1772 /prefetch:2
        2⤵
          PID:4052
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2116 /prefetch:3
          2⤵
            PID:952
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2416 /prefetch:8
            2⤵
              PID:5656
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3076,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3104 /prefetch:1
              2⤵
                PID:2944
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3084,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3288 /prefetch:1
                2⤵
                  PID:1684
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4284,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4432 /prefetch:1
                  2⤵
                    PID:2788
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4584,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4812 /prefetch:1
                    2⤵
                      PID:724
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4664,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5104 /prefetch:1
                      2⤵
                        PID:1020
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3712,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5224 /prefetch:1
                        2⤵
                          PID:5664
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3408,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5348 /prefetch:8
                          2⤵
                            PID:5532
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5660,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5672 /prefetch:8
                            2⤵
                              PID:800
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5032,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5036 /prefetch:1
                              2⤵
                                PID:4648
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3152,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4512 /prefetch:1
                                2⤵
                                  PID:6056
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4780,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3280 /prefetch:1
                                  2⤵
                                    PID:5716
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4928,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5844 /prefetch:8
                                    2⤵
                                      PID:2668
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5820,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5980 /prefetch:8
                                      2⤵
                                        PID:3308
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=6132,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6136 /prefetch:1
                                        2⤵
                                          PID:5028
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5196,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6140 /prefetch:1
                                          2⤵
                                            PID:5220
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4684,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5124 /prefetch:8
                                            2⤵
                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                            • NTFS ADS
                                            PID:5040
                                          • C:\Users\Admin\Downloads\TeraBox_sl_b_1.32.0.1.exe
                                            "C:\Users\Admin\Downloads\TeraBox_sl_b_1.32.0.1.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1652
                                            • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
                                              "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe" -install "createdetectstartup" -install "btassociation" -install "createshortcut" "0" -install "createstartup"
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Adds Run key to start application
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1964
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
                                              3⤵
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:5692
                                              • C:\Windows\system32\regsvr32.exe
                                                "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
                                                4⤵
                                                • Loads dropped DLL
                                                • Modifies system executable filetype association
                                                • Modifies registry class
                                                PID:5636
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin.dll"
                                              3⤵
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              PID:6000
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
                                              3⤵
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:6004
                                              • C:\Windows\system32\regsvr32.exe
                                                "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
                                                4⤵
                                                • Loads dropped DLL
                                                • Modifies registry class
                                                PID:5580
                                            • C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe
                                              "C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe" --install
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3080
                                            • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
                                              "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe" reg
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5732
                                            • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
                                              C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              • Modifies system certificate store
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of SendNotifyMessage
                                              PID:3740
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2504,16577232943415149500,442917093955710238,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2528 /prefetch:2
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5580
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2504,16577232943415149500,442917093955710238,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2624 /prefetch:8
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Modifies system certificate store
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5704
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2504,16577232943415149500,442917093955710238,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:1
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2624
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2504,16577232943415149500,442917093955710238,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:1
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5732
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
                                                -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.3740.0.532149000\1825326639 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.98" -PcGuid "TBIMXV2-O_0EF61B94173A4B579227A4BFCEFE194B-C_0-D_232138804165-M_C29957D08146-V_706EADC4" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:1040
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.3740.0.532149000\1825326639 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.98" -PcGuid "TBIMXV2-O_0EF61B94173A4B579227A4BFCEFE194B-C_0-D_232138804165-M_C29957D08146-V_706EADC4" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5820
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.3740.1.1253606804\615140879 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.98" -PcGuid "TBIMXV2-O_0EF61B94173A4B579227A4BFCEFE194B-C_0-D_232138804165-M_C29957D08146-V_706EADC4" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
                                                4⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:4768
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2504,16577232943415149500,442917093955710238,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.22000;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1
                                                4⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:1752
                                              • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe
                                                "C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd a0238 -unlogin
                                                4⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:5888
                                            • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
                                              C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:1528
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5176,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6432 /prefetch:8
                                            2⤵
                                              PID:3940
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5500,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5172 /prefetch:8
                                              2⤵
                                                PID:3452
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6528,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6984 /prefetch:8
                                                2⤵
                                                  PID:4060
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6976,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6964 /prefetch:8
                                                  2⤵
                                                    PID:1048
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=6524,i,12566877495233912392,1769480310773937167,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6516 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4288
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:988
                                                  • C:\Windows\system32\AUDIODG.EXE
                                                    C:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004DC
                                                    1⤵
                                                      PID:3468
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                      1⤵
                                                        PID:4940

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                        Filesize

                                                        64KB

                                                        MD5

                                                        b5ad5caaaee00cb8cf445427975ae66c

                                                        SHA1

                                                        dcde6527290a326e048f9c3a85280d3fa71e1e22

                                                        SHA256

                                                        b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                                                        SHA512

                                                        92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                                                      • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                        Filesize

                                                        4B

                                                        MD5

                                                        f49655f856acb8884cc0ace29216f511

                                                        SHA1

                                                        cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                        SHA256

                                                        7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                        SHA512

                                                        599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                      • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                        Filesize

                                                        1008B

                                                        MD5

                                                        d222b77a61527f2c177b0869e7babc24

                                                        SHA1

                                                        3f23acb984307a4aeba41ebbb70439c97ad1f268

                                                        SHA256

                                                        80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                                                        SHA512

                                                        d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                        Filesize

                                                        649B

                                                        MD5

                                                        ea4053b2f346186f9e6d74facde0411a

                                                        SHA1

                                                        27871e98eb83c3c420fc64b1550e1e8a7d49f63b

                                                        SHA256

                                                        da16aa7b621302a535b4e61a27a2971ff33a96bb8f5acb106dbabb167b13fc0f

                                                        SHA512

                                                        0d70d3e896d781f7c19b1ecccad92f1153ff51e795c1ac89182f9eee0df4367e05734289d68cd98217be2ac7946ad7f3a9fa3dd467ab7dc59efb693028954808

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000060

                                                        Filesize

                                                        43KB

                                                        MD5

                                                        7280b03bb31e19ebde664e77bf238044

                                                        SHA1

                                                        9c4814d82dae364d537708d2bbfadec4ac9236c0

                                                        SHA256

                                                        14a02eac7459e2ee329daf3e9830c4c5b290da5406f0a186fb8d940ddb74795e

                                                        SHA512

                                                        bd7fe6a2de3385e0b9cf5b0fbe9a73ec96f84d7b07f6b98ee3b56e48b9c9ccacd106afbb5395b1e94afe4e20dc5647bad7fac45b3f819d9a9103a31daf2c6934

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000061

                                                        Filesize

                                                        32KB

                                                        MD5

                                                        480cc9ebf17b2f0f0ab90aeedd9ad4eb

                                                        SHA1

                                                        b7e368ae65e561a046184985272e237a614998fa

                                                        SHA256

                                                        acbe81f030ae1eaafb7cfddb87f1eec8d1b1c82c4ec73a2b28040d455940f6e7

                                                        SHA512

                                                        8c811c7a2345cd8341f38a65dc7bc166c1b45f94a4d6df0f64d9ddba7798f6dc9f09635c86ef46e126a169524bdfec71b56980fbe6011b33b82dc76c70e153eb

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000062

                                                        Filesize

                                                        51KB

                                                        MD5

                                                        fe6a7fd3fb4e0c6ab56c579a17cae913

                                                        SHA1

                                                        32cd2a08bf15baf45bb31d4f80792b9ffff6252d

                                                        SHA256

                                                        64ffe7cdb0d79ba02b72dbd3eca0a0be2920052717a4abc3a51c77b112ca8c62

                                                        SHA512

                                                        30c4b3533c8f280a14f27092142d4ef465ea46122fe2e05fc2318d883dabec6c633646270e2b0098b7d9fe41039393ea4ba30eb6fbc78635640487a0525f16dd

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000063

                                                        Filesize

                                                        20KB

                                                        MD5

                                                        8e7c9b7a96e0fece52d167812c3bfe49

                                                        SHA1

                                                        acce87d5ae7a3b902f31dce7a6867ba0280dfaba

                                                        SHA256

                                                        f49f9087d2aa5cc19b210a9cbb8eb422c066903d010896f9a4657c4dde1cabe5

                                                        SHA512

                                                        c3eaf3ce3c783a86ba78006f360b1d94f80d9153b393d676ce37d1a1ab4838edfc20299902e7278d24b279817b67f5c30430f35657a906a2b5d0b4970b803e44

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000064

                                                        Filesize

                                                        148KB

                                                        MD5

                                                        d2f84c8efdf93a6ea5aed33438940c35

                                                        SHA1

                                                        7c5c2f70d6e3a19b894f0a45e0bcf9ea81afa921

                                                        SHA256

                                                        983cc9f11f82045f73ab47625d2e8e11f440cf4396215fae0ecfdc198b51ee81

                                                        SHA512

                                                        c589a0a9c1fefaf3d4744b5e62f84a96d61bdd262aa06a9c6a344eb4d0da0e6e8e203c9f666202677c30b1eaa6b5a45599603768320a24a4dfe240e43c8bbb35

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        a504b3e187317279e911eb8986489cd6

                                                        SHA1

                                                        5c53e6ecbed51794e1b453125805c74f095c4c90

                                                        SHA256

                                                        25702668b3b276e0d3fe7034c7962ce1d578ec7647b9c9195c110a0fe99f180a

                                                        SHA512

                                                        59da936d337a8d08d3f5fdc6fee783b40f916b25bb229f573ddb97aefb06b3c222c0aabdfa4c7b9d193ebdf1364e18168ec108c6708fbe59a1692b8b95d5029d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\_metadata\verified_contents.json

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        3f53538fea29780d614d868ec535c656

                                                        SHA1

                                                        8a5e38c8e37b8c8c4e9c92da71b73cfd73735fd3

                                                        SHA256

                                                        3971200c9ff31a4246c2d1e5fa7b7736dbe0e08ac5e35e9193d61267e1f9beb2

                                                        SHA512

                                                        ee76edbea6b520a61ba09e18864bdf9c93d231a665ace46ab10069b14987096374c67d73626ce88aac4248240519d9a1c16a1b54b772023b0b0c9f63ff59ea9b

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\background.d0591844.js

                                                        Filesize

                                                        910B

                                                        MD5

                                                        ee3827d15e9b168553f227839314692a

                                                        SHA1

                                                        9058e257870ac5b8c3dfd689ec37ab59a4828cfd

                                                        SHA256

                                                        599bcdcaba9a6990d913c7b4a7b82e131c457bf3903a5469647a85553517a6cd

                                                        SHA512

                                                        e3cb4fe1c2e7e571767bc36382ec30bde3bfc3896a22f417168084783da4c123d7056bee4461675b1b93d8cce5f3b4f9b51bafe3c2c2362cf994abad5b48cdbe

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\icon128.plasmo.b89b7dfa.png

                                                        Filesize

                                                        5KB

                                                        MD5

                                                        3209591bb33cf1325b759a3d4a52cdf8

                                                        SHA1

                                                        5bf5d653efe8c59941db96939c882ffddddc4966

                                                        SHA256

                                                        f294dda542ccf32621e8d80806ed03ead3c800ea5ccfd73dbb8db1622de77113

                                                        SHA512

                                                        af02794bf80233644ea18bc144b46ead45b164162b871d89c2ab3db00aa45120c21ae55f8b83d67a8ea743886a6f63b6145bc58cc3b78fd894b2de3feaf82bb7

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\icon16.plasmo.00ac8b83.png

                                                        Filesize

                                                        551B

                                                        MD5

                                                        95f0cecb2dd7458e7e89435bb31dcbdb

                                                        SHA1

                                                        27c7c1313086ed3b4b03f7c578fb9ef2d23bf618

                                                        SHA256

                                                        d491250304085f79022f9751707ab692fa7499a386188e2b157ae1344be40c07

                                                        SHA512

                                                        a50aaf164720d17c2c7a1af08474291869d842cc229a0ebe1d1d557db1b7fa14584864e05f91c7c256e415ff1e9d8ff3e766d766f4a247d688a00b8b78eef4d8

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\icon32.plasmo.9ad0c5b6.png

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        3e70a490ec41a716816b2c7a932eb907

                                                        SHA1

                                                        c347fa82aea65bb5b067a182f7343ae4bd78f40c

                                                        SHA256

                                                        288e661fb7827f84266d385f641514dded71eaafe6073e843e8ad7859f63db91

                                                        SHA512

                                                        91fd8e0bc1924a09b7665cd38ef3ab4baade82c0af773285eda45df33254a0d6b796c1fb4b4b6a6eeccf8a028163b2688cc8539f441f941b6edf214da585633c

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\icon48.plasmo.cae3a6b3.png

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        78c0b51f85bc143297a5219abd4e10f6

                                                        SHA1

                                                        a6f8db876af4cc28d43f91a8eed001852c7d6bf3

                                                        SHA256

                                                        e5d369ffeaa96219d797467f37827237cc307a739e428446a240c968864926c6

                                                        SHA512

                                                        e062ee1fa5dfa09aa2d0fb64b911a2ba4fde60988e22c75515f40c02cbb9519d58ebb5b8860b2672c50c1d2ce95b1757cecfda731328cc0aaa2c3768dca49c7f

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\icon512.9f01ba5c.png

                                                        Filesize

                                                        43KB

                                                        MD5

                                                        5b7857e25912eb814ad3fd6033682576

                                                        SHA1

                                                        8a6eccff0db631b298bb4ba265f9758885486c2a

                                                        SHA256

                                                        a22b5ab578c98de4113a0f0b91106a703fdb543e1a11e6d7594b48cc6090657a

                                                        SHA512

                                                        58c51b9b3bb68216437dc17f969adff663b89bde63187bc107814a0955ee0430a74063f9a2359b6445aff1909348b65f197b5143ef228238635ea2f15b811476

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\icon64.plasmo.e4b604fc.png

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        410b633662ef1689f2ef0238442ce935

                                                        SHA1

                                                        87e5060d0fea11a07b11434b7d16b019f2896960

                                                        SHA256

                                                        8f11e60a86c5ebfb4909213048c62c641532c248a7c7ef2ca4d789cd5f2f5365

                                                        SHA512

                                                        4e64ee7d3739cda2870f27a7249e5bcabe2c516bdd956109d5193a237b499bc3035e8488da5deeb284cce3820eba4131d3f5da83e51e1ed265e3fb595527cc47

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\manifest.json

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        82ade69e0a61d4a5a52599e47d1ded48

                                                        SHA1

                                                        b7cb43601818557e96022e6e14e14c9a608b1ac3

                                                        SHA256

                                                        13c6cd7e1c850769d452c2f971ffbd4cdd37eb6ca0deeb3e670b25766be3eec4

                                                        SHA512

                                                        ea8f112b717f96a5ec61228626ac7f520ec013d4ff9f7d139fdf113841a1ca3cab344a9adad9ce2d87bb76e286ea085a8e751d404c84c42ca6bc0392e2ac8a4d

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\popup.49fbeb31.js

                                                        Filesize

                                                        73KB

                                                        MD5

                                                        b8cb1f92eb5ff732eb84facd56739b47

                                                        SHA1

                                                        cc5719e299003ee07223eb1816ab1e8e2e39aecd

                                                        SHA256

                                                        ccf4f29d0ddb966793774f4ba875b5e39124657a8ccf0458785a4cd98145ef6e

                                                        SHA512

                                                        d5b65d551bf5be6ee8f1e58341249cd08d4c14b133c05fd5a11333dfed8bb946425869faabd05a35a5a8ea79716c842284cd034d5625f2eea1be598bb9ee847b

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\popup.82bbf211.css

                                                        Filesize

                                                        306B

                                                        MD5

                                                        3db5fa906ed2537d677ed16ee400cee8

                                                        SHA1

                                                        1a3dd114649a3fcc7eaaf4d0853cccc2375deea6

                                                        SHA256

                                                        6e5e196aabb6097fd688f75f976dcae2d7c367f73ee29151b6fc567fb11e4f0a

                                                        SHA512

                                                        c748ba696e39bf2bf51643f5180711f38583c201eba59ee430a3e85042ff78ca4d8b9e6f80cbac83a65c40b5e5a7af5fe5ed2627c90ee0eb43eed1442e53aebf

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\popup.html

                                                        Filesize

                                                        247B

                                                        MD5

                                                        aebaafaf40e4efbcdae29865c5f15e45

                                                        SHA1

                                                        4c8d363885b86ea344c2bb4ed56420c9c498dbf5

                                                        SHA256

                                                        6600a4b34d070ebcc773ebec3b87043772ad7c45ad46d8677d820c6a4b21c994

                                                        SHA512

                                                        12dcdaed13823c3e1e03c499fbeb51831e5318afd2ca535ea2118e53724fbdf7b533207f660d4579010a286bda494c543354e2a464651f6325b0ee07f87c6ace

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\tabs\upload.fff2005f.js

                                                        Filesize

                                                        72KB

                                                        MD5

                                                        bf8ee3296e5286ce9cfe4d5bfd0dcf05

                                                        SHA1

                                                        3caa16b5e1f2393b6d5e4f1d0c92344e30b02982

                                                        SHA256

                                                        388db65bc068294f230d3b29e4f57899b2fd8a8b33bb597fa277db4d7bad9726

                                                        SHA512

                                                        2de06740275131e5b0edabedbfa07ef86431f41c55ae7d7c896d051fbf71cb59d4c9cfd9a53ff89a47468ca378b5c2a0092ce5e556a83b4b38084159cc781b74

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp\scoped_dir5008_437147756\CRX_INSTALL\tabs\upload.html

                                                        Filesize

                                                        203B

                                                        MD5

                                                        ce0dbe45c168444b4044186fe777ae6e

                                                        SHA1

                                                        10935a714d607e9c187922990d758d9c44707892

                                                        SHA256

                                                        0a38553872d8ba828acd117a9351495d8751e37068b889583821f18e759ba18c

                                                        SHA512

                                                        aad5cf5b199bc0b2a1d4d057dd18153159a80bfc64ed73610dd3d7700e4a8d2a595109a9e6d1b76f7de58d9ff19809d5ef4c2e7ff1281ca2f31edcf4b89f5ce7

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        7KB

                                                        MD5

                                                        d875ce7c512d4a4c407b0ef815c6dc21

                                                        SHA1

                                                        d52666337c6b3ba478043ec0d556f88a9fe75ede

                                                        SHA256

                                                        2ff1226c4455418ce7a9c24c5fc7884c3673a74adbe54772f49d1778bf9918b0

                                                        SHA512

                                                        2af5c2e969c5da0d7c311ec3999501416de14b9871df3b255b810ba2371d105eeed3a8f2a9d3f094272aacb0fdf8fc4663bc5739f156acc1f755d60d2ee6c5b8

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        87baa5a18dcd9d6e64607a0b3f718f2d

                                                        SHA1

                                                        955fb7da48bc1161a3b74a3c322cc0ba9ca1b14f

                                                        SHA256

                                                        7784dee781fcc9401840d1969c300d84e25be6b88b674441ef921a7dfe94593b

                                                        SHA512

                                                        0e7ae40967c8d2713cb71490996195d9d9d3796c225f8d94084e3f98fa153db93c42a5956b03690048e7882f48a40155844149ab8ba0ec6e73487924db595696

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                        Filesize

                                                        1022B

                                                        MD5

                                                        00387ec0358ba6cf1bdf11aa93c673bd

                                                        SHA1

                                                        2e9eaf8d71e7f7b6e845a09a7d1b8d7abb13fa21

                                                        SHA256

                                                        81363b30d75696d1b9c7d3913f1ccb36ca7f8a6145b883fdf53217e02b01a340

                                                        SHA512

                                                        8cf22dd830fab0ed8afc674383b30d1106e234a67c0db5ff275f7a97be556c16c52837dacc6bed7e08506a5eec97aebdaa3ed392b9b7e2587fba68efb129efcf

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        7c238f553074ee515ef37c9e3ddd3486

                                                        SHA1

                                                        85319eafcd70fb84452c540bee427bc13c7f467e

                                                        SHA256

                                                        20efec1373c5a5f62983c681aec91e468a7661af4a14bb48cfef327488fa33d9

                                                        SHA512

                                                        ef1c7dc54258cc7a64830892c73be712f1fe92871b09b999634be10ed3e88955660704b601f92d86598e655a9fc31a2ed40479b64b402a00f698297f0ea47b72

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        2e303baa0da03bde2083ffe8559ef489

                                                        SHA1

                                                        5433dcf7c68b1371a437561c2bfddf19f8fb52ec

                                                        SHA256

                                                        ed255a8ea972be52bf8b409d12a263acbeff6fd5b7798f6053a8aa20390df56f

                                                        SHA512

                                                        13518610aba5efc5d90eddbda3553b1194986da91690c7470a6f42fe5a2cca64e5b0bf994090c01ab63ccf48fadaa9fd367fdb4d88d3615a4af7d499d81ea4f6

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        7bdb843fa84a1ddd5cec24d474acf8ef

                                                        SHA1

                                                        c2cb7822db1e07b1c4a0d760cc8ca5462438969f

                                                        SHA256

                                                        54f5426e91cadacff0fdda6db70df71b72bd5226da8c00fe6894074cedd72e34

                                                        SHA512

                                                        aa045a8237828d4ca1d4963654c3cf1d15a42d3fe030604f615b3561bd51055e62b6af19b7f489d87a97be15d5b6c7304e8020bf15e263eed2fdb4b31ca23055

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        585df0e1547800aeb224d23833c878a8

                                                        SHA1

                                                        dc7ed744f66b11d79249ea6809923f28f6ebe2e7

                                                        SHA256

                                                        3b87f8c971b81f7b92f6d6b0faec34d6fddc0dd65c1e687694a6bc4d27b2b4b2

                                                        SHA512

                                                        8461c48065bc0f0360d8c2787fd2d55fde18d93fe44a2ec2931f4a5ad3a540b292c662330bef7c865f3a926ab1feffe8b2946e366484849c456396d6c6e1b719

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        97a68261666af628913d9a4481f66b08

                                                        SHA1

                                                        7799d22633ce3e133eb8f304ffae26e3965b9f9f

                                                        SHA256

                                                        fdd5fb733c673bd5a92427d01e2bad763a364637b5a9450bffb305d2fae5b238

                                                        SHA512

                                                        2aa233f37b81d3c43d2bcd2551e17b1a14fbeddff53b9bab9819ec84885230b5ab5a2a593af0611eebd1322a515767ff83ae8fc6b1a353063c0ba12a94e7eca4

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        f06481c3bb18d1549ad4a15267a85cb2

                                                        SHA1

                                                        2b4e273b7ea2319e8f2f3616ea40340fcb600aa5

                                                        SHA256

                                                        f5a09601c56e1480f826346bd2cd76dd73d99c8586aa09f31267c6edcee6eb7f

                                                        SHA512

                                                        8e73bc02e7bb2451e8f4c1d9f3fc0a53e8aeb05920e459945e1e936fde7e7e04f9b77bb62682df24d571635d8c2b5b263a4c51a10ea442459896c89cf64300e9

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        8b508756c162360b08f1871cf55bd920

                                                        SHA1

                                                        bd29b332b2cec7efb6a623e048729e9f2e49fdf5

                                                        SHA256

                                                        ce45651cfb6c19f61665725ddfcc53d17693dfc77ec42e14b8b38a172b5b5a4d

                                                        SHA512

                                                        98196ce45c9c438abd747ba044371a7acd53e37a5d9db558d43e969337ff46175337cfdc3fc6e9168375c4b409c735b3fcf9855fad48bbff79aa052403f65e7a

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        5cab2b8a87dcf201073650f0868bc293

                                                        SHA1

                                                        de52e4f742b289639e5aa80f5e7dad8a850397bf

                                                        SHA256

                                                        52b51f9e540483f2da29a2f9f5fca5f38b60a8ffc30bdced81903f58ee7d9a9d

                                                        SHA512

                                                        bcbdcaeaaa0de5d279a0ce5f74b5d2f33837a3430dbef75936d77ce4ab977fa42efb904c69885e66fdcd7800e4a6d5b648c5f69f349d78dfca3d7cf88ea6eb48

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                        Filesize

                                                        9KB

                                                        MD5

                                                        6dce549932902cd85e87ab665f858cd9

                                                        SHA1

                                                        1f7f12cd8e2d7607f946f8c8b539abc8c1ef45fc

                                                        SHA256

                                                        fa0616d73d0727e7235456da0138b76745d16c9d101af0117280d8de97a2bd6a

                                                        SHA512

                                                        73736e26f1038c109d35b88685f078d297169725a442c684c1daac5dfe15e1a93432b505139f131a1f1c6aced619e7c33bebe9c91e563dbebd36f29009de9b1f

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        73bed4546c140112961151465986f90a

                                                        SHA1

                                                        c6f74d658f8403e26705632f43a724187ae9d2f9

                                                        SHA256

                                                        4e303277ade2c5fb354d6b8fe1c1ea238a727da2a54772af4fd728077d97d9c3

                                                        SHA512

                                                        bc30b0d59b67f4b051a6ac1a15fa5f64a3c8453ff884202767bbcb9648fd4da9ac8fd4e2fc5f633acd2f651202821aa0cbb01be4bb1def354d9a792989d3fcb5

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        99KB

                                                        MD5

                                                        e1e2c20adf890ba67af65e8a023de7b2

                                                        SHA1

                                                        9bdb6251a55a40e64f4131b9855b068548798a67

                                                        SHA256

                                                        36869b825d5ef5ee993746e41f13a6a19f92b02d918124505bcd8ae922b0aca1

                                                        SHA512

                                                        7b940695fbdead5da301774f99ea2daf8daa8ce138f8ea91af72783a99dba96d67479965f447ef07d6f85b643f7b7c0a4d3b3f2751fc46eac9c1fef5ae7e56df

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        99KB

                                                        MD5

                                                        f1b385c831a0ea830486fb5313c2f272

                                                        SHA1

                                                        fa5adf047e044df67043f168bee7e216e9cfd7f9

                                                        SHA256

                                                        24be48e4b40d419ba78f40bdf0abcb3bdb4ccd53a042b80afbc3a2e1eadfb055

                                                        SHA512

                                                        e46f310760dc25323f929576bcbef9fdd4b8fb47a41d4337ea37f1fa9f99cce9160eacce4be7349fa23d93bcc34c7fca18346ca2600f3480474bf65f336ae9cd

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                        Filesize

                                                        99KB

                                                        MD5

                                                        6eb170aecb9dd2784d6f824c674a16cd

                                                        SHA1

                                                        bd0e8bb5768efbd7dfa8ef52852bf9c76da07d33

                                                        SHA256

                                                        d48e92fbd231438056b8caae9eca72c6f364c7234488895adb7b2aa53015d29c

                                                        SHA512

                                                        52f353e009965c8869cd5e40cc78d13672f172c0a3802ed669feea3c138c836f6835816cf9f031f207625b923f2e08f07909e6218e9bae73415596c4d69faa9e

                                                      • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000057

                                                        Filesize

                                                        212KB

                                                        MD5

                                                        08ec57068db9971e917b9046f90d0e49

                                                        SHA1

                                                        28b80d73a861f88735d89e301fa98f2ae502e94b

                                                        SHA256

                                                        7a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1

                                                        SHA512

                                                        b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf

                                                      • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Local Storage\leveldb\CURRENT

                                                        Filesize

                                                        16B

                                                        MD5

                                                        46295cac801e5d4857d09837238a6394

                                                        SHA1

                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                        SHA256

                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                        SHA512

                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                      • C:\Users\Admin\AppData\Local\Temp\nslAB9F.tmp\NsisInstallUI.dll

                                                        Filesize

                                                        1.8MB

                                                        MD5

                                                        69b36f5513e880105fe0994feef54e70

                                                        SHA1

                                                        57b689dbf36719e17a9f16ad5245c8605d59d4c0

                                                        SHA256

                                                        531d1191eded0bf76abb40f0367efa2f4e4554123dc2373cf23ee3af983b6d5f

                                                        SHA512

                                                        c5c09d81a601f8060acf6d9eeaa9e417843bb37b81d5de6b5c70fb404a529c2b906d4bb0995d574dd5a3b4986e3cbe20882aa3e8349e31ff26bdb832692596bd

                                                      • C:\Users\Admin\AppData\Local\Temp\nslAB9F.tmp\SetupCfg.ini

                                                        Filesize

                                                        80B

                                                        MD5

                                                        86daef0a1abf90f934b20119d95e8b73

                                                        SHA1

                                                        fa9170644b102c598005d1764a16aba54314ab69

                                                        SHA256

                                                        a5b0e58f66055ba5c9730dd7983946f92075bcf7052343b8d64ee95faa99eaaa

                                                        SHA512

                                                        1e95d6b697621f5c8bd194b5252f7717c3aa48a25d91d80fcd5fb0f1d06747c5f39708255bd85f18f776468dcde5645a8ac088431d412af1b10932d7f0df67b7

                                                      • C:\Users\Admin\AppData\Local\Temp\nslAB9F.tmp\System.dll

                                                        Filesize

                                                        12KB

                                                        MD5

                                                        8cf2ac271d7679b1d68eefc1ae0c5618

                                                        SHA1

                                                        7cc1caaa747ee16dc894a600a4256f64fa65a9b8

                                                        SHA256

                                                        6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

                                                        SHA512

                                                        ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

                                                      • C:\Users\Admin\AppData\Local\Temp\nslAB9F.tmp\nsProcessW.dll

                                                        Filesize

                                                        4KB

                                                        MD5

                                                        f0438a894f3a7e01a4aae8d1b5dd0289

                                                        SHA1

                                                        b058e3fcfb7b550041da16bf10d8837024c38bf6

                                                        SHA256

                                                        30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

                                                        SHA512

                                                        f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir5008_1446826066\CRX_INSTALL\contents.4683de87.js

                                                        Filesize

                                                        71KB

                                                        MD5

                                                        66fd5b0645cff76133c84e98227fa5ef

                                                        SHA1

                                                        415c40936b7440d23695e9d5229ea0da3d640c7e

                                                        SHA256

                                                        8100e3821f040f50b51a5224736f629b01e6b38acaea835eba1d6c68bcfca189

                                                        SHA512

                                                        9bfc3b173ab90a9a39ba5efca4d78bc5c10a71da8dc84f1f5e2cb141704a03c02e8104432f8bc8c538d030bd3ba69071d5912dea46f4990d4c2f5dce8ccde16e

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir5008_1446826066\CRX_INSTALL\contents.c10c11b1.js

                                                        Filesize

                                                        75KB

                                                        MD5

                                                        16b38d2d77cb0b5da5d28403946a6a2f

                                                        SHA1

                                                        9b129decbf92a0c40006cb08c4d5dd80094676b7

                                                        SHA256

                                                        30994e98ee7992ff32bf1ae2fe6ae5341074ffd29dac3cf3c23569a6549a0571

                                                        SHA512

                                                        c1c575204e49b642ad7db2c7534d33509debb705a6ff66888220a783bcc80d19ad82d9297523e50bd10dc2a30a2b9bd9f215f3c9371d99c731b03c2b7905f290

                                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir5008_1446826066\terabox_ext_chrome.crx

                                                        Filesize

                                                        169KB

                                                        MD5

                                                        d1228d3f6008b5ab6bfeae22e47163d5

                                                        SHA1

                                                        c9daa88047adaf64f79ab8eb39c638fb49d7c40c

                                                        SHA256

                                                        abd139cf05cfb99922766f68292791ef239b589acd0e78e6623b6cd57dcfbee2

                                                        SHA512

                                                        3fab9d678d9a890cd954958fc06b9d97d09bbe843d2c6a563c7a42ac615d2e36c4255a0a362f716e0549282d635ae8532d68c4da6513e345511fc31c791be5b4

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\Download\AutoUpdate.xml

                                                        Filesize

                                                        34KB

                                                        MD5

                                                        3c20637d0f03f1d738b7ed4bd188f6cc

                                                        SHA1

                                                        962dfe88ea36e784041153b7bc8d590aadaad8bc

                                                        SHA256

                                                        74d964f69c722b49398f949a76a8e2d7546c8fbd0148e7ebec9834a374386066

                                                        SHA512

                                                        7c3cbdffcb4eec2789f30cea93a58bfc90e7f11625b5ba915a2986aff7f818a92aa8ab134efffe2f3b8d6d4efed389ae547a3aca5ed42af8b031e47af29f5dac

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\Bull140U.dll

                                                        Filesize

                                                        3.2MB

                                                        MD5

                                                        aed059c46be32077f7b63ab9349eee76

                                                        SHA1

                                                        cc84ed3fe63e110f489111d7acefe9effb389aac

                                                        SHA256

                                                        b7234ea6641f484834412a6edf820a56b7b26257e8780bff70f1c9d7cf02b9ee

                                                        SHA512

                                                        f829e6d503f88f3cb50c1142a024368ca8cd787a9a85f6955fa5092cb5c06f679bdf5377718f97e1077a89a8606c3698839e344524f9d43629cdf02a4306da27

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe

                                                        Filesize

                                                        6.3MB

                                                        MD5

                                                        117c541f80c5e6706e722f9431d9fef6

                                                        SHA1

                                                        d19eb357c221f4802e0c342da69bcdd463400b80

                                                        SHA256

                                                        e6435157581258557202d04b08ebda3c87d52e5354ccc33825d80673c6b16e30

                                                        SHA512

                                                        8239044b8b08d5743d09118c5db1a0e5dac8b77482b8d9b6146130df397d4a1b00427b6049bc82f14e6f6cf67a5dc8cdc3387931e28544277fe4fd9c912c0328

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        1e77999ac64fd309a200921c646ef7c0

                                                        SHA1

                                                        53679977c98b484e24e7d8c0810c695c99c98be5

                                                        SHA256

                                                        5700ddbcd18561e1bd14c1de034fff226038e36e3bfd2451b5678fd6028d5aab

                                                        SHA512

                                                        e1cd7332d9aaf6dd1de0cd053e47d54334b6fadd2fdf78fba33420cd9437d3ace463222bd62ef974a68ac0f752d052f73e45a92899e0ff4a926612ee07d34b17

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin.dll

                                                        Filesize

                                                        378KB

                                                        MD5

                                                        4fffd9ffde2d48f474f9280c944b6940

                                                        SHA1

                                                        2dc56ab63e3241eadbb3e39ef697d2d468d4a57e

                                                        SHA256

                                                        635e8364383318f04667524663191e03fbcab9359006a1e829902bce7e19544d

                                                        SHA512

                                                        d40e5ff0a2f1a8ff38c159c149bb71456f59b9ca277b0e8a2c88e61b258db8142c7ab942817a0c28cac47635cfc300b10dd955fdf1bcb8078122a6d66cd10f85

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll

                                                        Filesize

                                                        491KB

                                                        MD5

                                                        aa257db82af0ce00192bfc3a72c47d56

                                                        SHA1

                                                        bbfa65b9512dbca06985fca1534c1178b331ab7b

                                                        SHA256

                                                        1083ea29c46cc3fdd3324a1887b6e3489e98076e9cc1b941f363ebd2225cbbff

                                                        SHA512

                                                        b45706e23f8f394e2693c49ad1410ddd3012fda01c3d88778f9d8c0ecf23b498fcd9e75d2eb45bb7032ec940bd81f568ace9830d0ef634d989f7408b03104b78

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll

                                                        Filesize

                                                        1011KB

                                                        MD5

                                                        3a70aef3153e58a9624ef1bcaa63fbbb

                                                        SHA1

                                                        9f6a9f877a2153294687cdc5e661c6c539b3136d

                                                        SHA256

                                                        aede12d6e7221cdf81ca4dd73c7961a7d5bd4313f7793f5437a64ac271844317

                                                        SHA512

                                                        4d131f536f560207f7d259144327625d7c352c93979f663212d0fc430840757239e9be9c7030bc1826765d078fdaa9cb730e0cf2d217ff8203f6742547ffdaac

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe

                                                        Filesize

                                                        111KB

                                                        MD5

                                                        666302bb1ecf9edb2445d390e52c737e

                                                        SHA1

                                                        df8272fcabaa673bfe2e135d9f351f5ec366f077

                                                        SHA256

                                                        48a15f0945dd83ec074066e7a47131f1f48e85e31fb26280c8a70753d7584b2b

                                                        SHA512

                                                        ad0850f7d8985dca12cb06b2837c3791e75aba35e74243f13e143c423b116338b4ff5531e2f77b5c778a83926f5dc5ce801f23013ca1e5334ceca36ebd302e6a

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\appUtil.DLL

                                                        Filesize

                                                        1.5MB

                                                        MD5

                                                        2b01d156bf9857a17daa46979218fa4c

                                                        SHA1

                                                        591285020e8525ca51d1021ef8b4267d22b07329

                                                        SHA256

                                                        b36a5d808f8e64ba0635c72c7c9049453a98edf160083df05a0311dff471030f

                                                        SHA512

                                                        8afcfdf2d745cc634fa9440b7792b5d1477b1a15838a787aab9f4be4ee5cf0b81e08f4322a96ece37ff31f19fa4bf1f74463b3c908f0d532d1b25cee0d59bd3e

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\minosagent.dll

                                                        Filesize

                                                        2.9MB

                                                        MD5

                                                        216a2dd23f95bdd63cd88a50eb7e69bd

                                                        SHA1

                                                        9c63635c26e276179f8dba9e02079bb3170b0321

                                                        SHA256

                                                        63da24020a82333c79806f3f8aa92fb9103f20b0b90ab095ee52601f6b154ada

                                                        SHA512

                                                        390ff16e8b0c07c1bda03584096404bdd22d69a0eb39a76fc6155c81584e1a7737f8f9d359a7be8e861bcfb02ced46950a8ef6c20a896774647086c21ee7edf0

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\msvcp140.dll

                                                        Filesize

                                                        429KB

                                                        MD5

                                                        1d8c79f293ca86e8857149fb4efe4452

                                                        SHA1

                                                        7474e7a5cb9c79c4b99fdf9fb50ef3011bef7e8f

                                                        SHA256

                                                        c09b126e7d4c1e6efb3ffcda2358252ce37383572c78e56ca97497a7f7c793e4

                                                        SHA512

                                                        83c4d842d4b07ba5cec559b6cd1c22ab8201941a667e7b173c405d2fc8862f7e5d9703e14bd7a1babd75165c30e1a2c95f9d1648f318340ea5e2b145d54919b1

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\uninst.exe

                                                        Filesize

                                                        697KB

                                                        MD5

                                                        af58fb8e4130fd3779a743f05a17524d

                                                        SHA1

                                                        c1b1d0e256a58c3f148d818aa79b2a7429e8a8ea

                                                        SHA256

                                                        e02a12cda93ff7f02539661d5e7459550cb2c72047c034e357af3d641785ab5f

                                                        SHA512

                                                        27a7681a07d6c3f3f5f18ab8c9ad3fafd2352c6fd10e00544b51bf7314e5e603e556b153ffdfdfa0ccaa0110a53022ea535549de8886f689ff9ebbec25262480

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\updateagent.dll

                                                        Filesize

                                                        1.1MB

                                                        MD5

                                                        1605626fc49e04528739581c8805e227

                                                        SHA1

                                                        c3a3f8b626b99c5c8ca41b5fa181681f571f4825

                                                        SHA256

                                                        8ed13ef0a5372d46ecfa82dd66e3f8bb963c3db7d9442d11ac33aa9ad34d37e6

                                                        SHA512

                                                        975e211ec53d54d434692c48cbb86bb843f314bd2c6ac5dbeed6155097c7a7a59cb7e3df119ce463c2895755be9ded6012bab59b2a7b7dd22dc6acc600a7ef8a

                                                      • C:\Users\Admin\AppData\Roaming\TeraBox\vcruntime140.dll

                                                        Filesize

                                                        83KB

                                                        MD5

                                                        b77eeaeaf5f8493189b89852f3a7a712

                                                        SHA1

                                                        c40cf51c2eadb070a570b969b0525dc3fb684339

                                                        SHA256

                                                        b7c13f8519340257ba6ae3129afce961f137e394dde3e4e41971b9f912355f5e

                                                        SHA512

                                                        a09a1b60c9605969a30f99d3f6215d4bf923759b4057ba0a5375559234f17d47555a84268e340ffc9ad07e03d11f40dd1f3fb5da108d11eb7f7933b7d87f2de3

                                                      • C:\Users\Admin\Downloads\TeraBox_sl_b_1.32.0.1.exe:Zone.Identifier

                                                        Filesize

                                                        26B

                                                        MD5

                                                        fbccf14d504b7b2dbcb5a5bda75bd93b

                                                        SHA1

                                                        d59fc84cdd5217c6cf74785703655f78da6b582b

                                                        SHA256

                                                        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                        SHA512

                                                        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                      • memory/1652-877-0x0000000003170000-0x0000000003180000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/1652-533-0x0000000003170000-0x0000000003180000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/5820-1020-0x00000000012E0000-0x00000000012E1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5820-1024-0x0000000064B40000-0x0000000065F6C000-memory.dmp

                                                        Filesize

                                                        20.2MB

                                                      • memory/5820-1023-0x00000000012F0000-0x00000000012F1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5820-1009-0x0000000001280000-0x0000000001281000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5820-1014-0x00000000012C0000-0x00000000012C1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5820-1017-0x00000000012D0000-0x00000000012D1000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5820-1011-0x0000000001290000-0x0000000001291000-memory.dmp

                                                        Filesize

                                                        4KB

                                                      • memory/5820-1007-0x0000000001270000-0x0000000001271000-memory.dmp

                                                        Filesize

                                                        4KB