Malware Analysis Report

2025-04-14 02:51

Sample ID 240603-jlhkgagd4s
Target 90fe189b8be15b6576f09f0b2e983496_JaffaCakes118
SHA256 d7a8fb3b22a43fcbd321540ed9a7a00a37c5cfddd1e1c799af71e9f7f912f9ba
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

d7a8fb3b22a43fcbd321540ed9a7a00a37c5cfddd1e1c799af71e9f7f912f9ba

Threat Level: No (potentially) malicious behavior was detected

The file 90fe189b8be15b6576f09f0b2e983496_JaffaCakes118 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-03 07:45

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-03 07:45

Reported

2024-06-03 07:47

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

155s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90fe189b8be15b6576f09f0b2e983496_JaffaCakes118.html

Signatures

N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90fe189b8be15b6576f09f0b2e983496_JaffaCakes118.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4816 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4876 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5272 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5572 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=5752 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5320 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=6136 --field-trial-handle=2292,i,2103142837140538807,15881446839139365070,262144 --variations-seed-version /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 13.107.9.158:443 business.bing.com tcp
US 8.8.8.8:53 jnmautos.com udp
US 8.8.8.8:53 jnmautos.com udp
GB 51.140.242.104:443 nav-edge.smartscreen.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
BE 23.55.97.181:443 www.microsoft.com tcp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
GB 104.91.71.140:443 bzib.nelreports.net tcp
US 8.8.8.8:53 i1.wp.com udp
US 8.8.8.8:53 i1.wp.com udp
GB 216.58.201.106:80 ajax.googleapis.com tcp
GB 216.58.201.106:80 ajax.googleapis.com tcp
US 192.0.77.2:80 i1.wp.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
US 8.8.8.8:53 164.189.21.2.in-addr.arpa udp
US 8.8.8.8:53 158.9.107.13.in-addr.arpa udp
US 8.8.8.8:53 104.242.140.51.in-addr.arpa udp
US 8.8.8.8:53 181.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 106.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 2.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 140.71.91.104.in-addr.arpa udp
US 8.8.8.8:53 www.microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 c.s-microsoft.com udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 edgestatic.azureedge.net udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 13.107.253.64:443 edgestatic.azureedge.net tcp
US 13.107.253.64:443 edgestatic.azureedge.net tcp
US 13.107.253.64:443 edgestatic.azureedge.net tcp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 13.107.253.64:443 edgestatic.azureedge.net tcp
US 13.107.246.64:443 wcpstatic.microsoft.com tcp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
GB 96.16.110.114:80 tcp
US 8.8.8.8:53 nw-umwatson.events.data.microsoft.com udp
US 104.208.16.94:443 nw-umwatson.events.data.microsoft.com tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 94.16.208.104.in-addr.arpa udp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 13.107.253.64:443 edgestatic.azureedge.net tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
NL 23.62.61.160:443 www.bing.com tcp
US 8.8.8.8:53 160.61.62.23.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
US 8.8.8.8:53 s0.wp.com udp
US 8.8.8.8:53 s0.wp.com udp
US 8.8.8.8:53 maps.google.com udp
US 8.8.8.8:53 maps.google.com udp
US 8.8.8.8:53 maps.google.com udp
US 192.0.77.32:80 s0.wp.com tcp
GB 216.58.213.14:80 maps.google.com tcp
GB 216.58.213.14:80 maps.google.com tcp
US 8.8.8.8:53 227.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:443 www.google.com udp
GB 142.250.187.196:443 www.google.com tcp
US 8.8.8.8:53 s.gravatar.com udp
US 8.8.8.8:53 s.gravatar.com udp
US 8.8.8.8:53 stats.wp.com udp
US 8.8.8.8:53 stats.wp.com udp
US 192.0.73.2:80 s.gravatar.com tcp
US 192.0.76.3:80 stats.wp.com tcp
US 8.8.8.8:53 s.gravatar.com udp
US 8.8.8.8:53 s.gravatar.com udp
US 192.0.73.2:443 s.gravatar.com tcp
US 8.8.8.8:53 maps.gstatic.com udp
US 8.8.8.8:53 maps.gstatic.com udp
US 8.8.8.8:53 maps.googleapis.com udp
US 8.8.8.8:53 maps.googleapis.com udp
GB 172.217.169.42:443 maps.googleapis.com tcp
GB 172.217.16.227:443 maps.gstatic.com tcp
GB 172.217.169.42:443 maps.googleapis.com udp
GB 172.217.169.42:443 maps.googleapis.com udp
US 8.8.8.8:53 32.77.0.192.in-addr.arpa udp
US 8.8.8.8:53 14.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 2.73.0.192.in-addr.arpa udp
US 8.8.8.8:53 3.76.0.192.in-addr.arpa udp
US 8.8.8.8:53 227.16.217.172.in-addr.arpa udp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
GB 216.58.212.234:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 234.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 pixel.wp.com udp
GB 216.58.213.14:80 www.google-analytics.com tcp
US 192.0.76.3:445 pixel.wp.com tcp
US 8.8.8.8:53 pixel.wp.com udp
NL 23.62.61.171:443 www.bing.com tcp
US 8.8.8.8:53 171.61.62.23.in-addr.arpa udp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
US 8.8.8.8:53 174.117.168.52.in-addr.arpa udp
HK 156.234.247.68:80 jnmautos.com tcp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-03 07:45

Reported

2024-06-03 07:47

Platform

win7-20231129-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90fe189b8be15b6576f09f0b2e983496_JaffaCakes118.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423562585" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3873F9C1-217D-11EF-932B-4E2C21FEB07B} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\90fe189b8be15b6576f09f0b2e983496_JaffaCakes118.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 jnmautos.com udp
US 8.8.8.8:53 s0.wp.com udp
US 8.8.8.8:53 i1.wp.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 stats.wp.com udp
US 8.8.8.8:53 s.gravatar.com udp
US 192.0.73.2:80 s.gravatar.com tcp
US 192.0.77.32:80 s0.wp.com tcp
US 192.0.77.2:80 i1.wp.com tcp
GB 172.217.16.234:80 ajax.googleapis.com tcp
US 192.0.73.2:80 s.gravatar.com tcp
GB 172.217.16.234:80 ajax.googleapis.com tcp
US 192.0.77.2:80 i1.wp.com tcp
US 192.0.76.3:80 stats.wp.com tcp
US 192.0.76.3:80 stats.wp.com tcp
US 192.0.77.32:80 s0.wp.com tcp
US 192.0.73.2:443 s.gravatar.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
US 8.8.8.8:53 www.microsoft.com udp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 jnmautos.com tcp
HK 156.234.247.68:80 tcp

Files

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar1386.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 5a227957b315a40ca4cedf02e58ee20f
SHA1 807fd67d9e63ab14bc9346e91bf023e8dddfde98
SHA256 b8ab6b0311ae72d22527d74079b5b763c782b93ebff9a805caa546aaf0e5c58e
SHA512 ca471ba8667f9ffff096ed9fd1423dcc2d45312cedcbf7848782065db4d2d6017ab17dd90181f8dacc2e97783a9c2f85f5cea8902b0cc8e9747f70865b7f738e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 010aea6aed34313b960a5be6b6763c56
SHA1 b51bd20e67fda2f2f8df2bcdd6b2a4b8b22caed6
SHA256 44da1f87559e887e241a9190af6d8382827df724805a82d22aef91d05c04edc9
SHA512 e4e00e664c986efbfb5e310bac4100d3e8f82feaaeb878343f5d91d0892a7caa7e83b71aa6214006dfeab4b2d20a88ae8ec33a486190285f485c546e9f49f4b9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1244a6d9c259d834076e5b68b46e3d61
SHA1 4bfa3216930f044717bbcb15884fa333dc646f06
SHA256 a865c30d96cd1324f6fd463554f4066501e7b4a4c8979e566687b1899789d74d
SHA512 0f82662ed0aeb8231980878097b07d68de6936601bc115ab19aaeee485ac31c4a747df552d1cc58d680a5956fe44940214cfc592728fc4a059a166da79c6d34d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6b0423e45fcc556e0f1f710ca8263768
SHA1 0a57af3ae9a6b48320988067e1793120a75e449f
SHA256 6043d38d7a8d3c454d8a7945e3d1ce95d5d8257bd43927760db926ce5f8ab392
SHA512 f87158e9aba05ed3689bd54aed12006d7d9176e728fc0a25cc08af5c5efaca31ade016c877a1c4f5b1b62558e7c52dbc0caa4a6ac586a297a69e2e8b4dff7f81

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 72689bf4b3f5343ef978f94492288ac7
SHA1 7503030acf1be732defc48fd94d61b26ace6794f
SHA256 9c5c3d5a7c41209017345ab32f3436965fe51c007ab4e7e400c1443d45d8553e
SHA512 30e49395cb8282f5545b76863da220fc56d5a49544f779b9a052fd631b9bd139de104cefe259d2ea6e31fd5f062f6dd75496b40148951b47a7cb04861a2bf71c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8d71d211dbd812f19d7b88e43bf56c26
SHA1 bddd2bfdf2c7ee3db9a5fba2d90b69fcf3e06cbd
SHA256 af9650c00a5fffd13e3475846e8ef3025de25213cba65c3e8e5ad6072bfc0abe
SHA512 4cc82e3ec2fe540c91a341c2a76a4cdc9e62d67336beb24699630722d53aa9bd7cbf3d9a2ea984b4da8537a0156bc49025a05f17ed6dbede3091eaa577dbd9fa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0f2958122dfe3395d1ce5c5430f654f9
SHA1 30cffd03104f63d716fb1ba578cdd01ea43869a8
SHA256 14d3acb1e1fcd8ba3290cf3e6dea688ff39255e9d6ac5e63314649386d7831c5
SHA512 a75b13b3c0fa6f37afc4c0d7b0654ad36c2fad018256da32fb593f4ec9a6ea2a1939f0635b2fefc7074c2d374b98565a93847f9aeacbfe18b22809877d070f99

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 493fce4205870cc613927c57d8692cd4
SHA1 4e403239d49fe5fd6f8f05578bd2a9f89f43b959
SHA256 220ab20c4ba05d0c68ebf9f975b98c85e5197baee5dfdc8efb1ee8b48ac95832
SHA512 1bf51ab8fe24331a50c3268fd80f59f890d0c23ebd7260fe5f8d975b359eeb70905bc7b30dd89316fa103a41f4e96f1dafeb0dcecc144bbe4ae94dfbe9e01bc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 6b75ee38be74b31754043aee508f0338
SHA1 d5ca375dd69479343521e2c4bae7c7c0e42aed3d
SHA256 258acc316a6cd25ac23016ecabe39553e3a6bbeb412f0c084db044a5c982a4b6
SHA512 1f01268773c6852db9f0bb082ff8d1ae723926fe733cd5d18dfc3270f251a8dce33575a99123497c4a6ea25b0da6f76f83a8c51c88ae8dbcbdfda0669fa08a7e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 d5400bb35394d180b1dc0f6a4c96b910
SHA1 3fce828ee7363ddd818f90bf99d4c43df236d042
SHA256 b79b315ddd1fd2288546a53753b17582bf732b6975fb5d114eb947e90fd055a9
SHA512 0ad088fc84a1803412b452b4a1f6612adb30e77264f2d3ceae1c1db408e93db73c341ae3e056d15ea3e9525bc6795a4cb613d06de31f919628fc9fcac182d7a0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c15b10b99ffd5f3c641a41c3b750523c
SHA1 0b00694d72e3eb1e656739fd1b9ac760b70c5eb2
SHA256 ccef79f3e907502cda44cc7494ad29e592505b43b11e2ffe3e445047b106e3b5
SHA512 aa746909bc4bea638cae9b79d4fab5cc67a724eafb284faaf4d367c6074824c6f28c549598703ff558564353766144678288fa0d1f166392c8b04ecd95e506c4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 86502cef527603c224ba087419665262
SHA1 066e6807205074675bd0cb512a69b93f62e2afc4
SHA256 e1f0cecc00b277a8d291d2a9de949c4c96b9f8b7af687f2d8694065b4104457b
SHA512 3d99b7656b64d502e62a751c4a2890b2c70b96051942e3ca433ccd18af2a4de724beffe0a3c88524f39aadf163ac74a24ae237258f69fd687ef09a7e07d31d7e