Malware Analysis Report

2025-08-05 15:54

Sample ID 240602-3qw37sbd9z
Target 8fd8506e8750348ded49f32c17bd5979_JaffaCakes118
SHA256 0e0f30d80494374fec6d0f4caed2870588981e2294ea0389ff6f256006b9c8b9
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

0e0f30d80494374fec6d0f4caed2870588981e2294ea0389ff6f256006b9c8b9

Threat Level: No (potentially) malicious behavior was detected

The file 8fd8506e8750348ded49f32c17bd5979_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-02 23:43

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 23:43

Reported

2024-06-02 23:46

Platform

win7-20240508-en

Max time kernel

149s

Max time network

148s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fd8506e8750348ded49f32c17bd5979_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1B1A391-2139-11EF-906B-FA9381F5F0AB} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423533690" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8fd8506e8750348ded49f32c17bd5979_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 img1.jiehun.cn udp
US 8.8.8.8:53 t.cn udp
CN 125.74.110.35:80 img1.jiehun.cn tcp
CN 125.74.110.35:80 img1.jiehun.cn tcp
CN 39.105.18.168:80 t.cn tcp
CN 39.105.18.168:80 t.cn tcp
CN 125.74.110.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 www.googleadsl.com udp
US 170.178.222.41:80 www.googleadsl.com tcp
US 170.178.222.41:80 www.googleadsl.com tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
CN 39.105.18.168:80 t.cn tcp
US 170.178.222.41:80 www.googleadsl.com tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 hm.baidu.com udp
CN 123.235.31.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 www.jiehun.cn udp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 61.160.251.208:80 www.jiehun.cn tcp
CN 61.160.251.208:80 www.jiehun.cn tcp
CN 111.45.11.83:80 hm.baidu.com tcp
CN 111.45.11.83:80 hm.baidu.com tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 183.240.98.228:80 hm.baidu.com tcp
CN 183.240.98.228:80 hm.baidu.com tcp
CN 61.160.251.208:80 www.jiehun.cn tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 14.215.182.140:80 hm.baidu.com tcp
CN 14.215.182.140:80 hm.baidu.com tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
CN 14.215.183.79:80 hm.baidu.com tcp
CN 14.215.183.79:80 hm.baidu.com tcp
CN 175.4.51.35:80 img1.jiehun.cn tcp
CN 175.4.51.35:80 img1.jiehun.cn tcp
CN 111.45.3.198:80 hm.baidu.com tcp
CN 111.45.3.198:80 hm.baidu.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab233A.tmp

MD5 29f65ba8e88c063813cc50a4ea544e93
SHA1 05a7040d5c127e68c25d81cc51271ffb8bef3568
SHA256 1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512 e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar23DF.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b83ffc2be22e1fe39275611b8351c498
SHA1 985582eed096f0ea4af8256aa1038740d76d06dd
SHA256 9ab7eaceea5368e499d4cfcf1735b27c6e2c212bab6a3861bd258bfee01b561a
SHA512 ba1c2796ef490ae9b20d9101f3a8e2fc6516f3f3855271f8ccffa1f57d3545a04457d9eb4ed4788b9274d459cc4569db86c0a4f47a9e138c9fb522e6313fcc98

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 40a6f7b8c081aab79d224ad74bcb7ec2
SHA1 f067ab187454aafcce311e3f313c0d9ba2d5bbd1
SHA256 1ba8e4408f82ca8f61c5b5766e966d33ed77666acfa45b5dc55d7d4b4de99cbd
SHA512 d08c62bbcecd24f47a8ff50c25ef0dfe702a0d3351727eb3ad8673039bc0deaa2134bce92a3845ab1bfca57c39ab6c87f68b44ba9c357cf4d3b98659673fc040

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e269650dfed6ce687821c64e1ee20ba4
SHA1 74a6923cab00840c158befa2503af2749054c9e9
SHA256 057fc5836c6d022bea301893dc4791fd04dd04c77f6b800858b6f4bdb9591c9f
SHA512 8534db30aca6f44cad613dbfaf35495b2fd3f3901fb6890028cdb23c0604292e1d7016ef1921f7adaf5f4f7a87891c243b75a7a5121839b89914335a071f1874

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 d7aa65742ecb55b60a64afad03ab8c2c
SHA1 ea45d75b4fe20d498562287dbbc0e483887db366
SHA256 90a931a595404ec14af77075b655115b7e67035e67e7b81562cdffae67eda802
SHA512 9d2f2a13cd92ef5a7e62e795af67bbd0245d1ecd616780a9a8f78bfbdcda0b1e3625a22ba57be6c71648cf1fa4c96c137179a526c7e5b330cd8d420f8bd3b35a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 34990bb95b693208588d4c717f24d159
SHA1 f1000ba01b02019c447b6d6d099d4811218c8451
SHA256 ca2dac11893373ea36be943dc9e91b61a33b9f5715231fb3a83cdf5d2b32acf6
SHA512 34d620c2ef97aa0c9d446d8fc040a2b9040ed8767a238eca8ee67aff2b8d19bb371e7503fc43231ac4bbb357e3cec9540f697fd64836240c798cb35db80e2c80

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 abc96df7aceea46689e02a3d83644e7a
SHA1 59e3d41ab1eec0f38954b6eb84485df197b7b95a
SHA256 3c6888739e4529ba3cc51c8842af683407f61140d5bc1b65d7a9dd8c72554f20
SHA512 388f8c22afd44e0d17301a94f02112dc7e9aa5b8e50631752cd8540ff7b01b7b0ce0b40ab2efbb4325385c4fd8f3691521122e76c80539725c6f76428ad3e5a9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 46591d064113f3329919fe7abf8e9668
SHA1 8d442db394083e97e110c269d20589b0cabb39cd
SHA256 6392887c150d36904d18cbfd2da647cd240a7b093c45b621d5a7c887bfa403ff
SHA512 6c788102d2e6c1f69c57143b3d0676602c8e38f0fe0df2b9058caf8fb1d87e1e50fa41c8875af0337e7b35ad56627d1670a95ac038455e763139cf58bc25c55b

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 23:43

Reported

2024-06-02 23:46

Platform

win10v2004-20240226-en

Max time kernel

151s

Max time network

156s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8fd8506e8750348ded49f32c17bd5979_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8fd8506e8750348ded49f32c17bd5979_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=3932 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3848 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4692 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=3596 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3588 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5712 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 13.107.6.158:443 business.bing.com tcp
GB 51.11.108.188:443 nav-edge.smartscreen.microsoft.com tcp
GB 51.11.108.188:443 nav-edge.smartscreen.microsoft.com tcp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
GB 104.91.71.140:443 bzib.nelreports.net tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 t.cn udp
US 8.8.8.8:53 t.cn udp
US 8.8.8.8:53 img1.jiehun.cn udp
US 8.8.8.8:53 img1.jiehun.cn udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.googleadsl.com udp
US 8.8.8.8:53 www.googleadsl.com udp
US 8.8.8.8:53 188.108.11.51.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 158.6.107.13.in-addr.arpa udp
US 8.8.8.8:53 164.189.21.2.in-addr.arpa udp
BE 23.55.97.181:443 www.microsoft.com tcp
CN 39.105.18.168:80 t.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 39.105.18.168:80 t.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 181.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 www.googleadsl.com udp
US 8.8.8.8:53 www.googleadsl.com udp
US 170.178.222.41:80 www.googleadsl.com tcp
US 170.178.222.41:80 www.googleadsl.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 nw-umwatson.events.data.microsoft.com udp
US 20.189.173.21:443 nw-umwatson.events.data.microsoft.com tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 21.173.189.20.in-addr.arpa udp
CN 124.239.243.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
CN 150.138.188.35:80 img1.jiehun.cn tcp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
CN 125.74.110.35:80 img1.jiehun.cn tcp
CN 125.74.110.35:80 img1.jiehun.cn tcp
CN 125.74.110.35:80 img1.jiehun.cn tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
CN 124.239.243.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
GB 92.123.142.114:443 www.bing.com tcp
US 8.8.8.8:53 114.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 hm.baidu.com udp
US 8.8.8.8:53 hm.baidu.com udp
US 8.8.8.8:53 www.jiehun.cn udp
US 8.8.8.8:53 www.jiehun.cn udp
CN 61.160.251.208:80 www.jiehun.cn tcp
CN 61.160.251.208:80 www.jiehun.cn tcp
CN 14.215.183.79:80 hm.baidu.com tcp
NL 52.142.223.178:80 tcp
CN 14.215.183.79:80 hm.baidu.com tcp
N/A 224.0.0.251:5353 udp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 125.74.110.35:80 img1.jiehun.cn tcp
CN 125.74.110.35:80 img1.jiehun.cn tcp
CN 125.74.110.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
CN 111.45.3.198:80 hm.baidu.com tcp
CN 111.45.3.198:80 hm.baidu.com tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 123.235.31.35:80 img1.jiehun.cn tcp
CN 111.45.11.83:80 hm.baidu.com tcp
CN 111.45.11.83:80 hm.baidu.com tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
CN 171.214.23.35:80 img1.jiehun.cn tcp
GB 92.123.142.114:443 www.bing.com tcp
CN 183.240.98.228:80 hm.baidu.com tcp
CN 183.240.98.228:80 hm.baidu.com tcp
CN 175.4.51.35:80 img1.jiehun.cn tcp
CN 175.4.51.35:80 img1.jiehun.cn tcp
CN 175.4.51.35:80 img1.jiehun.cn tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
CN 171.214.24.35:80 img1.jiehun.cn tcp
US 8.8.8.8:53 67.112.168.52.in-addr.arpa udp
CN 14.215.182.140:80 hm.baidu.com tcp
CN 14.215.182.140:80 hm.baidu.com tcp
N/A 180.97.64.35:80 tcp
N/A 180.97.64.35:80 tcp
N/A 180.97.64.35:80 tcp

Files

N/A