Overview
overview
5Static
static
4TeraBox_sl....1.exe
windows7-x64
4TeraBox_sl....1.exe
windows10-2004-x64
4$PLUGINSDI...UI.dll
windows7-x64
3$PLUGINSDI...UI.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...sW.dll
windows7-x64
3$PLUGINSDI...sW.dll
windows10-2004-x64
3$TEMP/kernel.dll
windows7-x64
1$TEMP/kernel.dll
windows10-2004-x64
1AppUtil.dll
windows7-x64
1AppUtil.dll
windows10-2004-x64
1AutoUpdate...il.dll
windows7-x64
1AutoUpdate...il.dll
windows10-2004-x64
3AutoUpdate...te.exe
windows7-x64
1AutoUpdate...te.exe
windows10-2004-x64
1BugReport.exe
windows7-x64
3BugReport.exe
windows10-2004-x64
5Bull140U.dll
windows7-x64
1Bull140U.dll
windows10-2004-x64
1ChromeNati...st.exe
windows7-x64
1ChromeNati...st.exe
windows10-2004-x64
1HelpUtility.exe
windows7-x64
1HelpUtility.exe
windows10-2004-x64
1TeraBox.exe
windows7-x64
5TeraBox.exe
windows10-2004-x64
5TeraBoxHost.exe
windows7-x64
1TeraBoxHost.exe
windows10-2004-x64
1TeraBoxRender.exe
windows7-x64
1TeraBoxRender.exe
windows10-2004-x64
1TeraBoxWebService.exe
windows7-x64
1TeraBoxWebService.exe
windows10-2004-x64
1Analysis
-
max time kernel
17s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 11:54
Behavioral task
behavioral1
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
TeraBox_sl_b_1.31.0.1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/NsisInstallUI.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsProcessW.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$TEMP/kernel.dll
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
$TEMP/kernel.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
AppUtil.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
AppUtil.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
AutoUpdate/AutoUpdateUtil.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
AutoUpdate/Autoupdate.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
AutoUpdate/Autoupdate.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
BugReport.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
BugReport.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Bull140U.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
Bull140U.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
ChromeNativeMessagingHost.exe
Resource
win7-20240419-en
Behavioral task
behavioral22
Sample
ChromeNativeMessagingHost.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
HelpUtility.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
HelpUtility.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
TeraBox.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
TeraBox.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
TeraBoxHost.exe
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
TeraBoxHost.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
TeraBoxRender.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
TeraBoxRender.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
TeraBoxWebService.exe
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
TeraBoxWebService.exe
Resource
win10v2004-20240611-en
General
-
Target
AutoUpdate/Autoupdate.exe
-
Size
2.8MB
-
MD5
94c5b0443f1c39b71b22931509bf1985
-
SHA1
35cb27275187b8c0da72d00b8551aaf2c1059794
-
SHA256
7260c2623c4277b045d97e87a677d41bbfd11647109a4d648c311310889cebfb
-
SHA512
a08a897095239f367c51b36724f54aa961420e07f76185075902efd7ee023eb8f0a6c8b49769158fbf9372377028182515995b0ac0b7277e12a2640a3e6a3721
-
SSDEEP
49152:57L6oPOReVwkTVcXj/SZTLvIkP4qgh7Xufw58hG7UB:57NQeZVcX7aIFqgtX8S
Malware Config
Signatures
-
Modifies registry class 1 IoCs
Processes:
TeraBoxRender.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2447855248-390457009-3660902674-1000\{EA3240DA-AD49-41E7-9B38-61DB1D8FE83B} TeraBoxRender.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
Autoupdate.exeTeraBox.exeTeraBoxRender.exeTeraBoxRender.exeTeraBoxRender.exeTeraBoxRender.exepid process 4768 Autoupdate.exe 4768 Autoupdate.exe 3120 TeraBox.exe 3120 TeraBox.exe 3120 TeraBox.exe 3120 TeraBox.exe 4252 TeraBoxRender.exe 4252 TeraBoxRender.exe 432 TeraBoxRender.exe 432 TeraBoxRender.exe 2400 TeraBoxRender.exe 2400 TeraBoxRender.exe 5096 TeraBoxRender.exe 5096 TeraBoxRender.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Autoupdate.exedescription pid process Token: SeDebugPrivilege 4768 Autoupdate.exe Token: SeIncreaseQuotaPrivilege 4768 Autoupdate.exe Token: SeAssignPrimaryTokenPrivilege 4768 Autoupdate.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
TeraBox.exepid process 3120 TeraBox.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
TeraBox.exepid process 3120 TeraBox.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
TeraBox.exedescription pid process target process PID 3120 wrote to memory of 4252 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 4252 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 4252 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 432 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 432 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 432 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 3048 3120 TeraBox.exe TeraBoxWebService.exe PID 3120 wrote to memory of 3048 3120 TeraBox.exe TeraBoxWebService.exe PID 3120 wrote to memory of 3048 3120 TeraBox.exe TeraBoxWebService.exe PID 3120 wrote to memory of 5096 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 5096 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 5096 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 2400 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 2400 3120 TeraBox.exe TeraBoxRender.exe PID 3120 wrote to memory of 2400 3120 TeraBox.exe TeraBoxRender.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"C:\Users\Admin\AppData\Local\Temp\AutoUpdate\Autoupdate.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\TeraBox.exeC:\Users\Admin\AppData\Local\Temp\TeraBox.exe NoUpdate2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2600,4891713641100355134,17185425372873863011,131072 --enable-features=CastMediaRouteProvider --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=2612 /prefetch:23⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2600,4891713641100355134,17185425372873863011,131072 --enable-features=CastMediaRouteProvider --lang=en-US --service-sandbox-type=network --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=3088 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxWebService.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2600,4891713641100355134,17185425372873863011,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2600,4891713641100355134,17185425372873863011,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe-PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.3120.0.221480552\849736101 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.181" -PcGuid "TBIMXV2-O_0BCCC98050D944D7834B9CCB7964E586-C_0-D_DD00013-M_FA8F9E8C279D-V_50F51BF8" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1502 -PluginPath "C:\Users\Admin\AppData\Local\Temp\kernel.dll" -ChannelName terabox.3120.0.221480552\849736101 -QuitEventName TERABOX_KERNEL_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.181" -PcGuid "TBIMXV2-O_0BCCC98050D944D7834B9CCB7964E586-C_0-D_DD00013-M_FA8F9E8C279D-V_50F51BF8" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe" -PluginId 1501 -PluginPath "C:\Users\Admin\AppData\Local\Temp\module\VastPlayer\VastPlayer.dll" -ChannelName terabox.3120.1.1632673368\419707479 -QuitEventName TERABOX_VIDEO_PLAY_SDK_997C8EFA-C5ED-47A0-A6A8-D139CD6017F4 -TeraBoxId "" -IP "10.127.0.181" -PcGuid "TBIMXV2-O_0BCCC98050D944D7834B9CCB7964E586-C_0-D_DD00013-M_FA8F9E8C279D-V_50F51BF8" -Version "1.31.0.1" -DiskApiHttps 0 -StatisticHttps 0 -ReportCrash 13⤵
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=renderer --no-sandbox --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --field-trial-handle=2600,4891713641100355134,17185425372873863011,131072 --enable-features=CastMediaRouteProvider --lang=en-US --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --disable-extensions --ppapi-flash-path="C:\Users\Admin\AppData\Local\Temp\pepflashplayer.dll" --ppapi-flash-version=20.0.0.306 --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:13⤵
-
C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe"C:\Users\Admin\AppData\Local\Temp\TeraBoxRender.exe" --type=gpu-process --field-trial-handle=2600,4891713641100355134,17185425372873863011,131072 --enable-features=CastMediaRouteProvider --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres\locales" --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --log-severity=disable --resources-dir-path="C:\Users\Admin\AppData\Local\Temp\browserres" --user-agent="Mozilla/5.0; (Windows NT 10.0; WOW64); AppleWebKit/537.36; (KHTML, like Gecko); Chrome/86.0.4240.198; Safari/537.36; terabox;1.31.0.1;PC;PC-Windows;10.0.19041;WindowsTeraBox" --lang=en-US --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAIAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --log-file="C:\Users\Admin\AppData\Local\Temp\debug.log" --mojo-platform-channel-handle=4812 /prefetch:23⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AutoUpdate\config.iniFilesize
164B
MD56c8c15503374b81aa3333e557e384a15
SHA1ba3d1c4055e2e138034b2dab2ae6c04bf8800f00
SHA2562394225d5b03473c4e5e40b887aad4942b4c7811d2218cf69203ec65e7b45c92
SHA5124ef4e4b6881dda9964a916e151efff84db2ea3bf0140f8ea9771faffbb79e7d9957977211dcdf482b69c361ea6ffe96e74dc6723dcc789f964b6c0543a63ca0c
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Cache\f_000055Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-indexFilesize
624B
MD52d47e7c860f00818f2b99920a73178b3
SHA1822179c1dc884399c81750a73692c6574d1c9121
SHA256fb5799544640981c7f3d23842336157c0fa0b05a1e10c15cf06e67724d6b2567
SHA51285faea4e9e3fa35929a3f5336cc88d9fa6461932ec83b60881bfb911cb032eeb2b6ef207f51f947218f8e00381429588128e48594409c6d3bb57a84fee4071b8
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Code Cache\js\index-dir\the-real-index~RFe586741.TMPFilesize
48B
MD52df6d62340f91bcf1bf4cc15577cd0f9
SHA1519383b625eea027c6d75aed86fd7c606f1696f6
SHA256605cca05e171b217a087af045145b51ae20399904f1a09a09e5b67127a620ef0
SHA512ea380c9cabd7ae551c990ef09765b74b34255e7004ffec686035c9434aa2f6eea7b3173c7ef8e4e7994f6e7c134b07918e3e28b2b7c8a2303da53be7e36c24f2
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\IndexedDB\https_www.terabox.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent StateFilesize
59B
MD54bf40875c4a013e74e8285ce033dd7d7
SHA16702d3f707393770fbf9550e118a4b2e4eb289ed
SHA256757ec562e86f7e5da285f173e2facaec9b19dadbbbde3ba3bd6ef48d004fc4c4
SHA512bbb5d5dc8983454ba0a394a530be044496ab3a13038f5dc5d805f6012c5952253258ccae726ef0f7edf77156503d5287c01472f39bb00082049b9669c4831c59
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent StateFilesize
1KB
MD544ec1ebf48c7962caa3b8b96e76ca54f
SHA1b025c32e1389d702725be3363c10cb8bd84fe8ff
SHA25655090b705872d34754abddd3a6949e91a27fc41f27a879748dd43b1de1eef72a
SHA5125f95c5a69aa26ad355dcf9ff0c8a5a689aaa73530da422627f79285fde9cbd5bd9e492b6afa32a9fc2f458ebbacb0e923e75aa50fc4ebe62b8f1a050d82557b2
-
C:\Users\Admin\AppData\Local\Temp\TeraBox\browsercache\Network Persistent State~RFe57fde8.TMPFilesize
59B
MD578bfcecb05ed1904edce3b60cb5c7e62
SHA1bf77a7461de9d41d12aa88fba056ba758793d9ce
SHA256c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572
SHA5122420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73
-
memory/2192-283-0x0000000003290000-0x0000000003291000-memory.dmpFilesize
4KB
-
memory/2192-282-0x0000000003280000-0x0000000003281000-memory.dmpFilesize
4KB
-
memory/2192-293-0x0000000065A00000-0x0000000066E2C000-memory.dmpFilesize
20.2MB
-
memory/2192-281-0x0000000002AE0000-0x0000000002AE1000-memory.dmpFilesize
4KB
-
memory/2192-284-0x00000000032C0000-0x00000000032C1000-memory.dmpFilesize
4KB
-
memory/2192-285-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/2192-289-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2192-286-0x00000000032E0000-0x00000000032E1000-memory.dmpFilesize
4KB
-
memory/3120-355-0x00000000009E0000-0x0000000001041000-memory.dmpFilesize
6.4MB
-
memory/3120-10-0x00000000009EA000-0x00000000009EB000-memory.dmpFilesize
4KB
-
memory/3120-30-0x00000000009E0000-0x0000000001041000-memory.dmpFilesize
6.4MB