Analysis Overview
SHA256
42d498fc9985f478cc9045a7e6f72062d4c7d30ede5c4d6b1c2ce2ad58aeeded
Threat Level: Known bad
The file aaa8ae0f89bde2fc6451b82db2141362.exe was found to be: Known bad.
Malicious Activity Summary
Modifies visiblity of hidden/system files in Explorer
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Adds Run key to start application
Enumerates physical storage devices
Unsigned PE
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-01-07 19:37
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-01-07 19:37
Reported
2024-01-07 19:39
Platform
win7-20231129-en
Max time kernel
7s
Max time network
122s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\rienoel.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\rienoel.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\rienoel = "C:\\Users\\Admin\\rienoel.exe /h" | C:\Users\Admin\rienoel.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\rienoel = "C:\\Users\\Admin\\rienoel.exe /D" | C:\Users\Admin\rienoel.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\rienoel = "C:\\Users\\Admin\\rienoel.exe /V" | C:\Users\Admin\rienoel.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\rienoel.exe | N/A |
| N/A | N/A | C:\Users\Admin\rienoel.exe | N/A |
| N/A | N/A | C:\Users\Admin\rienoel.exe | N/A |
| N/A | N/A | C:\Users\Admin\rienoel.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe | N/A |
| N/A | N/A | C:\Users\Admin\rienoel.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe
"C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe"
C:\Users\Admin\rienoel.exe
"C:\Users\Admin\rienoel.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ns1.codeconline.biz | udp |
| US | 8.8.8.8:53 | ns1.player1523.com | udp |
Files
C:\Users\Admin\rienoel.exe
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\rienoel.exe
| MD5 | d1bd92be4fccdcf47f6a9f5f2f9e0ffa |
| SHA1 | 49520487acbe087f4c641749697e5e5dfce81e99 |
| SHA256 | 6a38c06866e7c7f96d439971484292708a8494c80d82f29802f2ca99ba0511f1 |
| SHA512 | fc5d63bb714d6f1ff735361d7a97cd5fb60fae42d59df47fbc55c7f62e87bd236c1c9293ef3acdc8fcf55a3521a1e5789a5c1df26a192dfacea18aea35318af2 |
\Users\Admin\rienoel.exe
| MD5 | 210403750ee958248ba3d2feea8442af |
| SHA1 | 411bbb9f16f1fad0aba870396e75cab55c6c2a59 |
| SHA256 | f8613e936a4ffe1f58e2e8a1d32872702ed8c1ec525e5dfc91462f71087286b3 |
| SHA512 | 4d34ff230aaf91f85122d8343b28dcaa653573eeade03842011f48c6d649c1a98220cf72cade92bc233bb79feb31792cc51b078d4f09b641be51c31a3e9ad1fc |
Analysis: behavioral2
Detonation Overview
Submitted
2024-01-07 19:37
Reported
2024-01-07 19:39
Platform
win10v2004-20231222-en
Max time kernel
144s
Max time network
121s
Command Line
Signatures
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\gwquey.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\gwquey.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /L" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /o" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /M" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /u" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /Q" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /F" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /v" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /l" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /t" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /B" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /b" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /m" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /w" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /A" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /G" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /S" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /V" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /p" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /Y" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /H" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /q" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /n" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /y" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /I" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /h" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /e" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /N" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /W" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /D" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /f" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /z" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /J" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /C" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /K" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /T" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /d" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /k" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /j" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /s" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /P" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /X" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /O" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /U" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /E" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /g" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /c" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /i" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /R" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /a" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /Z" | C:\Users\Admin\gwquey.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gwquey = "C:\\Users\\Admin\\gwquey.exe /x" | C:\Users\Admin\gwquey.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe | N/A |
| N/A | N/A | C:\Users\Admin\gwquey.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe
"C:\Users\Admin\AppData\Local\Temp\aaa8ae0f89bde2fc6451b82db2141362.exe"
C:\Users\Admin\gwquey.exe
"C:\Users\Admin\gwquey.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 146.78.124.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 65.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 4.181.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 158.240.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ns1.codeconline.biz | udp |
| US | 8.8.8.8:53 | ns1.player1523.com | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.126.166.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 183.1.37.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 119.110.54.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 60.178.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.71.91.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 47.179.17.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.56:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| N/A | 52.111.227.11:443 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 104.91.71.140:80 | tcp | |
| GB | 104.91.71.140:80 | tcp | |
| GB | 104.91.71.140:80 | tcp | |
| GB | 104.91.71.140:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| N/A | 96.17.179.145:80 | tcp | |
| GB | 104.91.71.140:80 | tcp | |
| GB | 104.91.71.140:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 104.91.71.140:80 | tcp | |
| GB | 104.91.71.140:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 104.91.71.134:80 | tcp | |
| GB | 104.91.71.134:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 96.17.179.56:80 | tcp | |
| GB | 104.91.71.134:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| US | 8.8.8.8:53 | udp | |
| N/A | 20.223.36.55:443 | tcp | |
| N/A | 20.223.36.55:443 | tcp | |
| N/A | 20.223.36.55:443 | tcp | |
| GB | 104.91.71.134:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| US | 204.79.197.200:443 | tcp | |
| US | 204.79.197.200:443 | tcp | |
| US | 204.79.197.200:443 | tcp | |
| US | 204.79.197.200:443 | tcp | |
| US | 204.79.197.200:443 | tcp | |
| US | 192.229.221.95:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 104.91.71.134:80 | tcp | |
| GB | 104.91.71.134:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| US | 8.8.8.8:53 | udp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp | |
| GB | 96.17.179.59:80 | tcp |
Files
C:\Users\Admin\gwquey.exe
| MD5 | 3fcb3338099491701f282c4a46de9ebc |
| SHA1 | 4aa696034961502a84401d9cf9bba5fe90132448 |
| SHA256 | e178df541b5285f7345879a31b0e90e8cae67211199bda4d96638d537c9f8170 |
| SHA512 | 54331bb7e0ce49be8708bce13091cebcfd351d6a40756dad978c98a1cbac3dd6fb979a733db77c7c3181c35c4339039c692779632be5651078ec4b0069fe71de |