Resubmissions

27-11-2024 20:39

241127-zfpdtszjes 6

27-11-2024 20:33

241127-zbwbksvqhl 6

25-11-2024 22:14

241125-15w1mswlcp 6

25-11-2024 20:57

241125-zryrmswke1 6

28-09-2024 18:21

240928-wzje5ssdlc 10

Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    27-11-2024 20:39

General

  • Target

    Terabox_1.32.0.1.exe

  • Size

    85.5MB

  • MD5

    b73657d85fe21f889cdbaf4f1724ff57

  • SHA1

    c10e0f8cf0abda003931c5b27ce2416a076b0478

  • SHA256

    9ed5767db68fb669b3f18a0565cae471ee3800b94a187c4512e5a6691797c511

  • SHA512

    b013b7015e90043e2d8c021d9ea9a87505c36ffcb4619eb5fd06bd0e2c5742c3bc3fddc3a448112def652ab26d5372fee4a2d6f95c3c5ce09a000ffb7bf457f1

  • SSDEEP

    1572864:yBumaBVNigHypMDTKWRhvRL7b3NWPVQ6kzjn:yBumaRigyp8TDRhvRD3APVr6jn

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Terabox_1.32.0.1.exe
    "C:\Users\Admin\AppData\Local\Temp\Terabox_1.32.0.1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe" -install "createdetectstartup" -install "btassociation" -install "createshortcut" "0" -install "createstartup"
      2⤵
      • Adds Run key to start application
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2944
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Windows\system32\regsvr32.exe
        "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll"
        3⤵
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Modifies registry class
        PID:4772
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:936
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\system32\regsvr32.exe
        "/s" "C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll"
        3⤵
        • Loads dropped DLL
        • Modifies registry class
        PID:2004
    • C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe" --install
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2816
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe" reg
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2256
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2608,3289556350834801431,11746978119157835592,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2616 /prefetch:2
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3428
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2608,3289556350834801431,11746978119157835592,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --mojo-platform-channel-handle=2980 /prefetch:8
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:4784
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2608,3289556350834801431,11746978119157835592,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1612
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2608,3289556350834801431,11746978119157835592,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3244
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.1232.0.1247603186\1823281081 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.218" -PcGuid "TBIMXV2-O_CBC5FC11D4C24A409B47E6D8F195F179-C_0-D_232138804165-M_E60B6437E69C-V_B4AA3980" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:3768
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\kernel.dll" -ChannelName terabox.1232.0.1247603186\1823281081 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.218" -PcGuid "TBIMXV2-O_CBC5FC11D4C24A409B47E6D8F195F179-C_0-D_232138804165-M_E60B6437E69C-V_B4AA3980" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2180
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Roaming\TeraBox\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.1232.1.313006685\2141021971 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.218" -PcGuid "TBIMXV2-O_CBC5FC11D4C24A409B47E6D8F195F179-C_0-D_232138804165-M_E60B6437E69C-V_B4AA3980" -Version "1.32.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 1
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:912
      • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --field-trial-handle=2608,3289556350834801431,11746978119157835592,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres\locales" --log-file="C:\Users\Admin\AppData\Roaming\TeraBox\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Roaming\TeraBox\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.32.0.1;PC;PC-Windows;10.0.19044;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Roaming\TeraBox\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1968
      • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe
        "C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdate.exe" -client_info "C:\Users\Admin\AppData\Local\Temp\TeraBox_status" -update_cfg_url "aHR0cHM6Ly90ZXJhYm94LmNvbS9hdXRvdXBkYXRl" -srvwnd 701dc -unlogin
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1752
    • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000017

    Filesize

    215KB

    MD5

    2be38925751dc3580e84c3af3a87f98d

    SHA1

    8a390d24e6588bef5da1d3db713784c11ca58921

    SHA256

    1412046f2516b688d644ff26b6c7ef2275b6c8f132eb809bd32e118208a4ec1b

    SHA512

    1341ffc84f16c1247eb0e9baacd26a70c6b9ee904bc2861e55b092263613c0f09072efd174b3e649a347ef3192ae92d7807cc4f5782f8fd07389703d75c4c4e2

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index

    Filesize

    624B

    MD5

    70d16e300105c3f1bcc8565f4e1c69df

    SHA1

    cc0f5d446f5096459e037550e6a328d482f31cbb

    SHA256

    3c413766bbb0313757c85f85c7f3983f0234d28a70cf4c45b074ef57b74a8a64

    SHA512

    61ffc20ec31118f763825cbd9949d0951e17f47dd4c406eafce79a4651f2b431293eee5c42465dfebac1f003637be33535c6b936552e3f585afff60bb349d6c8

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe585501.TMP

    Filesize

    48B

    MD5

    9c3c14748a9e142a24985b64abd46241

    SHA1

    d474951af1f962374e65658d0b986d59adeeb5a4

    SHA256

    fc67a0ead0349d87ec92fc668a12555ab980395b89b8b1b5532dd522f4421b65

    SHA512

    f2b2bc71899becbed6964139eaa726b15ed066ea89310db6c14d3bd8acb22a57cf3bb1406b8eb4e0f47a0abaccaeff58ab8cc7ab6e27afb5770d6c649be5ad92

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Local Storage\leveldb\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State

    Filesize

    1KB

    MD5

    96441e9a91cc4727dc3abdfd324686db

    SHA1

    eb453f7c5df8268f718d47330d5d51886f6f833e

    SHA256

    d9fdb2c0a9aed1e49b4385026564721ee647e36e1506ad287f4ed5e5a92c3130

    SHA512

    25e4046b41bdd623e2dbe5862dd5f11d41483ae9f25ba1395d218357dfd718afd9016a84bcd4aff72685b9a869d851eef49ccb1a519cb9c4409f25efb2cbea50

  • C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State~RFe5901ac.TMP

    Filesize

    59B

    MD5

    78bfcecb05ed1904edce3b60cb5c7e62

    SHA1

    bf77a7461de9d41d12aa88fba056ba758793d9ce

    SHA256

    c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572

    SHA512

    2420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73

  • C:\Users\Admin\AppData\Local\Temp\nsx9A0F.tmp\NsisInstallUI.dll

    Filesize

    1.8MB

    MD5

    69b36f5513e880105fe0994feef54e70

    SHA1

    57b689dbf36719e17a9f16ad5245c8605d59d4c0

    SHA256

    531d1191eded0bf76abb40f0367efa2f4e4554123dc2373cf23ee3af983b6d5f

    SHA512

    c5c09d81a601f8060acf6d9eeaa9e417843bb37b81d5de6b5c70fb404a529c2b906d4bb0995d574dd5a3b4986e3cbe20882aa3e8349e31ff26bdb832692596bd

  • C:\Users\Admin\AppData\Local\Temp\nsx9A0F.tmp\SetupCfg.ini

    Filesize

    75B

    MD5

    ac0835ca6cc22eb3547391cd28babd84

    SHA1

    6f557aeebdae72ce980b7cb0507cbdffb1c13b93

    SHA256

    fe2e95678fbd1a8b6609eb95f3e9941f67018ebab32149cf0b94b0a200354a54

    SHA512

    038269833537aab00f65a1170ff70b3e7c6ce75051ff5e8a05cf52f47438127d7df10b88c60b55996f180c0bbeeae55d58426886184f23a618447ee87aa829ec

  • C:\Users\Admin\AppData\Local\Temp\nsx9A0F.tmp\System.dll

    Filesize

    12KB

    MD5

    8cf2ac271d7679b1d68eefc1ae0c5618

    SHA1

    7cc1caaa747ee16dc894a600a4256f64fa65a9b8

    SHA256

    6950991102462d84fdc0e3b0ae30c95af8c192f77ce3d78e8d54e6b22f7c09ba

    SHA512

    ce828fb9ecd7655cc4c974f78f209d3326ba71ced60171a45a437fc3fff3bd0d69a0997adaca29265c7b5419bdea2b17f8cc8ceae1b8ce6b22b7ed9120bb5ad3

  • C:\Users\Admin\AppData\Local\Temp\nsx9A0F.tmp\nsProcessW.dll

    Filesize

    4KB

    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • C:\Users\Admin\AppData\Roaming\TeraBox\AppUtil.dll

    Filesize

    1.5MB

    MD5

    2b01d156bf9857a17daa46979218fa4c

    SHA1

    591285020e8525ca51d1021ef8b4267d22b07329

    SHA256

    b36a5d808f8e64ba0635c72c7c9049453a98edf160083df05a0311dff471030f

    SHA512

    8afcfdf2d745cc634fa9440b7792b5d1477b1a15838a787aab9f4be4ee5cf0b81e08f4322a96ece37ff31f19fa4bf1f74463b3c908f0d532d1b25cee0d59bd3e

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\AutoUpdateUtil.dll

    Filesize

    198KB

    MD5

    bf5e773b31cea30b6a8388c719cf0342

    SHA1

    db300c09fce3c878225146f0ef1d07dcc15e54af

    SHA256

    7a7e10507d07f8da2866233143e77ce7a3590c745300f08334d8e6308ab39115

    SHA512

    52d37d86de26635caf46f49fd3c03d2530b57402a3dfbb21e6281c0331ec6e53a730ef0ab55c39d56eaf92308fe2efeb8c1ea4cfe1fed0b03f459fbe450e7a06

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\Download\AutoUpdate.xml

    Filesize

    21KB

    MD5

    742b0f22be7780fbf4623afd7f54845d

    SHA1

    f68e3da90c24d41007b9c922c3eba4867dbfd52f

    SHA256

    3c53d406e5c109299a01ced00cacd6bb4e95527a8569d5256ec946151d5427ae

    SHA512

    738fad21a69c2dbe9c45bd254630a177082cf0343b1f8324b8a702bbb90ea13937cf8c9a0bda13827ea615b7a2a25cf894e362e9cd89aa7cb2e5e08518e4cb78

  • C:\Users\Admin\AppData\Roaming\TeraBox\AutoUpdate\config.ini

    Filesize

    52B

    MD5

    5cc36a5a9945e4fbda1cc8b475f98ea9

    SHA1

    16ff4141e975705252b9c556c5da8c84e7dbc74e

    SHA256

    61d88eb427ba7668f56c7391410c4de3a8e17cde7baba80291f8a06efafbef7c

    SHA512

    8b451ca92dd61ace8fc6cc4bcfc09499aa3c006803a7bdca1bdac9ee40a7b8fc9311e28078f07fbe4fbf1d40d71ffcebcf49a440ca0c6c100391fea4ee888a9e

  • C:\Users\Admin\AppData\Roaming\TeraBox\Bull140U.dll

    Filesize

    3.2MB

    MD5

    aed059c46be32077f7b63ab9349eee76

    SHA1

    cc84ed3fe63e110f489111d7acefe9effb389aac

    SHA256

    b7234ea6641f484834412a6edf820a56b7b26257e8780bff70f1c9d7cf02b9ee

    SHA512

    f829e6d503f88f3cb50c1142a024368ca8cd787a9a85f6955fa5092cb5c06f679bdf5377718f97e1077a89a8606c3698839e344524f9d43629cdf02a4306da27

  • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBox.exe

    Filesize

    6.3MB

    MD5

    117c541f80c5e6706e722f9431d9fef6

    SHA1

    d19eb357c221f4802e0c342da69bcdd463400b80

    SHA256

    e6435157581258557202d04b08ebda3c87d52e5354ccc33825d80673c6b16e30

    SHA512

    8239044b8b08d5743d09118c5db1a0e5dac8b77482b8d9b6146130df397d4a1b00427b6049bc82f14e6f6cf67a5dc8cdc3387931e28544277fe4fd9c912c0328

  • C:\Users\Admin\AppData\Roaming\TeraBox\TeraBoxWebService.exe

    Filesize

    1.1MB

    MD5

    1e77999ac64fd309a200921c646ef7c0

    SHA1

    53679977c98b484e24e7d8c0810c695c99c98be5

    SHA256

    5700ddbcd18561e1bd14c1de034fff226038e36e3bfd2451b5678fd6028d5aab

    SHA512

    e1cd7332d9aaf6dd1de0cd053e47d54334b6fadd2fdf78fba33420cd9437d3ace463222bd62ef974a68ac0f752d052f73e45a92899e0ff4a926612ee07d34b17

  • C:\Users\Admin\AppData\Roaming\TeraBox\VersionInfo

    Filesize

    192B

    MD5

    aef980496e31ca94eddcff0044a32549

    SHA1

    ed3f1474c6c8b09c8da07bbac61f5c03aa60d992

    SHA256

    7c71738efeb52cc51e923b4aa64fa29af5a99f60802fd922394e7ad30d25574f

    SHA512

    5144db5524ddf448a7764b7c5c9312c335a4b19365ba813303a0dd1abdbe2a6fc74291bf39df27416cd7503cd3ba85eaaca5e4a3c59c44e655292dadf4b31fbc

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunDb.dll

    Filesize

    777KB

    MD5

    2858917ba572bb6c9ae5f6d3f6dacefd

    SHA1

    32f7e70fdbbab4076f562016735c65d59e84389c

    SHA256

    cbb041c110915067896baaf87738d8f06fb4d6afece8e76b189ff14537dcbf5b

    SHA512

    09003219620543a20edc634c0d4125d700d2b3c703ab9298dfac44c7b1cd2c25dd2db5a7c12713986e1bd871667be170bb9bd9655350f9ba961c94bf0cea5a43

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunDls.dll

    Filesize

    2.1MB

    MD5

    cfc32dd40b7abaa38ba2c2ab0feaaf9e

    SHA1

    ca1a9ce7f862ec7915443a6c37297be19cbc2507

    SHA256

    04aa450c5ee8db022e6d6cc035b77bd4ce17ae7e4aa8cf9e3b1bad5ae564ceef

    SHA512

    fdd3d346651ec67949b43b714eb6296ad6b253b3bfb0d2d550162f10a110051026fbc58dccc557a4f92d4d76e0c00845b60f619187f804014d46be873dba6407

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunLogic.dll

    Filesize

    6.3MB

    MD5

    2f049c2ca3d1446cd944993e8734bf0b

    SHA1

    5afdff83485216268af0efa397399b2d8722b496

    SHA256

    efb6eda25f1c82605caf839f45ab63fea5ad33ee36c891051d25b8309bb7e7c4

    SHA512

    08920358699849bdb309b18a56b4351aae58e3de5657e56d3c7e12bc4e7101a317a94147ee27ebb396922cf2b6db43237d646386e4aeca1e5d0ebaaf7d2dc4ac

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin.dll

    Filesize

    378KB

    MD5

    4fffd9ffde2d48f474f9280c944b6940

    SHA1

    2dc56ab63e3241eadbb3e39ef697d2d468d4a57e

    SHA256

    635e8364383318f04667524663191e03fbcab9359006a1e829902bce7e19544d

    SHA512

    d40e5ff0a2f1a8ff38c159c149bb71456f59b9ca277b0e8a2c88e61b258db8142c7ab942817a0c28cac47635cfc300b10dd955fdf1bcb8078122a6d66cd10f85

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunOfficeAddin64.dll

    Filesize

    491KB

    MD5

    aa257db82af0ce00192bfc3a72c47d56

    SHA1

    bbfa65b9512dbca06985fca1534c1178b331ab7b

    SHA256

    1083ea29c46cc3fdd3324a1887b6e3489e98076e9cc1b941f363ebd2225cbbff

    SHA512

    b45706e23f8f394e2693c49ad1410ddd3012fda01c3d88778f9d8c0ecf23b498fcd9e75d2eb45bb7032ec940bd81f568ace9830d0ef634d989f7408b03104b78

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunShellExt64.dll

    Filesize

    1011KB

    MD5

    3a70aef3153e58a9624ef1bcaa63fbbb

    SHA1

    9f6a9f877a2153294687cdc5e661c6c539b3136d

    SHA256

    aede12d6e7221cdf81ca4dd73c7961a7d5bd4313f7793f5437a64ac271844317

    SHA512

    4d131f536f560207f7d259144327625d7c352c93979f663212d0fc430840757239e9be9c7030bc1826765d078fdaa9cb730e0cf2d217ff8203f6742547ffdaac

  • C:\Users\Admin\AppData\Roaming\TeraBox\YunUtilityService.exe

    Filesize

    111KB

    MD5

    666302bb1ecf9edb2445d390e52c737e

    SHA1

    df8272fcabaa673bfe2e135d9f351f5ec366f077

    SHA256

    48a15f0945dd83ec074066e7a47131f1f48e85e31fb26280c8a70753d7584b2b

    SHA512

    ad0850f7d8985dca12cb06b2837c3791e75aba35e74243f13e143c423b116338b4ff5531e2f77b5c778a83926f5dc5ce801f23013ca1e5334ceca36ebd302e6a

  • C:\Users\Admin\AppData\Roaming\TeraBox\chrome_elf.dll

    Filesize

    845KB

    MD5

    17ec5dcc1961b82709a9bfa3e66251f8

    SHA1

    4c42d6b31615a678893f45c4ca53f21df45ecf10

    SHA256

    434ecac3c4e433671df7ee0678459775404065a13ddce238f0372d756e58d33f

    SHA512

    1a6cdd8a33707739c85ee98f111e46d7a1efdbe9d32daed8906f0062a6deadda829bb809bf937221b8db4bb9b3006d8f2e62000f4f2e7bbc7ff5106ebc5c59f6

  • C:\Users\Admin\AppData\Roaming\TeraBox\minosagent.dll

    Filesize

    2.9MB

    MD5

    216a2dd23f95bdd63cd88a50eb7e69bd

    SHA1

    9c63635c26e276179f8dba9e02079bb3170b0321

    SHA256

    63da24020a82333c79806f3f8aa92fb9103f20b0b90ab095ee52601f6b154ada

    SHA512

    390ff16e8b0c07c1bda03584096404bdd22d69a0eb39a76fc6155c81584e1a7737f8f9d359a7be8e861bcfb02ced46950a8ef6c20a896774647086c21ee7edf0

  • C:\Users\Admin\AppData\Roaming\TeraBox\module\TeraBoxModuleList.db

    Filesize

    16KB

    MD5

    0ea82ee4ea2091fd430c45dbf62894b1

    SHA1

    36d18fb92a5f5704803543ee0aedd84fadae382a

    SHA256

    3009fcfc02003af64d2a4d1cea439d2ae67ad75a19302e3ae0416534e0882ee4

    SHA512

    cedd747c6315b9540aadfb39b17932c43753aff429813f4dfee65534fbd0b9f6b07f02cee1a441d6e89177a94c2ce417b4846b6d1ff156252bf46411d2b5f9e3

  • C:\Users\Admin\AppData\Roaming\TeraBox\msvcp140.dll

    Filesize

    429KB

    MD5

    1d8c79f293ca86e8857149fb4efe4452

    SHA1

    7474e7a5cb9c79c4b99fdf9fb50ef3011bef7e8f

    SHA256

    c09b126e7d4c1e6efb3ffcda2358252ce37383572c78e56ca97497a7f7c793e4

    SHA512

    83c4d842d4b07ba5cec559b6cd1c22ab8201941a667e7b173c405d2fc8862f7e5d9703e14bd7a1babd75165c30e1a2c95f9d1648f318340ea5e2b145d54919b1

  • C:\Users\Admin\AppData\Roaming\TeraBox\resource.db

    Filesize

    52KB

    MD5

    4f65b8cb550d59fba5834981da06c7fe

    SHA1

    131633f01a736283ea057fd4f6a1f59df3152880

    SHA256

    eaea3e43ac1b3afea07a20b9f838194fc3a730ad88ef431ea243f00211a614cc

    SHA512

    32da2b87ff33f8815907f8bef6a55d2771d313d54732eb87276c1241742cd2e78bbbcbbacd1410ab4bee353670ee7170b67bd623d127eedb3302264fa02bc604

  • C:\Users\Admin\AppData\Roaming\TeraBox\uninst.exe

    Filesize

    697KB

    MD5

    af58fb8e4130fd3779a743f05a17524d

    SHA1

    c1b1d0e256a58c3f148d818aa79b2a7429e8a8ea

    SHA256

    e02a12cda93ff7f02539661d5e7459550cb2c72047c034e357af3d641785ab5f

    SHA512

    27a7681a07d6c3f3f5f18ab8c9ad3fafd2352c6fd10e00544b51bf7314e5e603e556b153ffdfdfa0ccaa0110a53022ea535549de8886f689ff9ebbec25262480

  • C:\Users\Admin\AppData\Roaming\TeraBox\updateagent.dll

    Filesize

    1.1MB

    MD5

    1605626fc49e04528739581c8805e227

    SHA1

    c3a3f8b626b99c5c8ca41b5fa181681f571f4825

    SHA256

    8ed13ef0a5372d46ecfa82dd66e3f8bb963c3db7d9442d11ac33aa9ad34d37e6

    SHA512

    975e211ec53d54d434692c48cbb86bb843f314bd2c6ac5dbeed6155097c7a7a59cb7e3df119ce463c2895755be9ded6012bab59b2a7b7dd22dc6acc600a7ef8a

  • C:\Users\Admin\AppData\Roaming\TeraBox\users\localdata.dat

    Filesize

    135B

    MD5

    8b33ee873631b455610c30e89b783c93

    SHA1

    bb735c65e56e7345e9cc863756ec6269a4e02a42

    SHA256

    85479aace7f91dc6f7a84250c2e573ff4d32e7fbeed1224a430337b29d4c3b54

    SHA512

    587a49bea7edbec0f34bf68cfa5087fb83e1892a3a78f8abe4be349bcd202ed19eec6a762ab2ebe6aadcaf91a1fd5f46024e3099e13ed1f52c9fe5860c7f7902

  • C:\Users\Admin\AppData\Roaming\TeraBox\vcruntime140.dll

    Filesize

    83KB

    MD5

    b77eeaeaf5f8493189b89852f3a7a712

    SHA1

    c40cf51c2eadb070a570b969b0525dc3fb684339

    SHA256

    b7c13f8519340257ba6ae3129afce961f137e394dde3e4e41971b9f912355f5e

    SHA512

    a09a1b60c9605969a30f99d3f6215d4bf923759b4057ba0a5375559234f17d47555a84268e340ffc9ad07e03d11f40dd1f3fb5da108d11eb7f7933b7d87f2de3

  • C:\Users\Admin\AppData\Roaming\TeraBox\xImage.dll

    Filesize

    1.1MB

    MD5

    7b55c620df65a511e22d806b4308af20

    SHA1

    4198b85a0cba2ba7f38b3da17befd81514f8cfae

    SHA256

    11803dc90d659c40cd118fbee6c73b8d572515db05b57c5ddcde796ef1e3d81a

    SHA512

    18a3fe0c7275f5e9daf6811232e629646f186dad8773d2515d1e9de3cfdb75929eb6354e4db79be5f678d6c5da4c92bb7d7b563bed8838d5ad35570cb6cee3c2

  • memory/2180-347-0x0000000003270000-0x0000000003271000-memory.dmp

    Filesize

    4KB

  • memory/2180-346-0x0000000003240000-0x0000000003241000-memory.dmp

    Filesize

    4KB

  • memory/2180-345-0x0000000003230000-0x0000000003231000-memory.dmp

    Filesize

    4KB

  • memory/2180-344-0x00000000010A0000-0x00000000010A1000-memory.dmp

    Filesize

    4KB

  • memory/2180-348-0x0000000003280000-0x0000000003281000-memory.dmp

    Filesize

    4KB

  • memory/2180-351-0x0000000065B50000-0x0000000066F7C000-memory.dmp

    Filesize

    20.2MB

  • memory/2180-349-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/2180-350-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/4232-96-0x00000000031B0000-0x00000000031C0000-memory.dmp

    Filesize

    64KB

  • memory/4232-17-0x00000000031B0000-0x00000000031C0000-memory.dmp

    Filesize

    64KB