Windows
Analysis Report
qqt.exe
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
qqt.exe (PID: 6044 cmdline:
C:\Users\u ser\Deskto p\qqt.exe MD5: 992289CD321A673F91D8B4912189ECF6)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
MALWARE_Win_SlackBot | Detects SlackBot | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
SUSP_XORed_URL_in_EXE | Detects an XORed URL in an executable | Florian Roth |
| |
MALWARE_Win_SlackBot | Detects SlackBot | ditekSHen |
| |
MALWARE_Win_SlackBot | Detects SlackBot | ditekSHen |
|
- • AV Detection
- • Compliance
- • Networking
- • Key, Mouse, Clipboard, Microphone and Screen Capturing
- • System Summary
- • Malware Analysis System Evasion
- • Anti Debugging
- • Language, Device and Operating System Detection
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | Code function: |
Source: | HTTP traffic detected: |
Source: | Binary or memory string: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: |
Source: | Key value queried: |
Source: | Code function: |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Decision node followed by non-executed suspicious API: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Last function: |
Source: | Code function: |
Source: | API call chain: | ||
Source: | API call chain: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | 1 Access Token Manipulation | 1 Virtualization/Sandbox Evasion | 1 Input Capture | 11 Security Software Discovery | Remote Services | 1 Input Capture | Exfiltration Over Other Network Medium | 1 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | 1 System Shutdown/Reboot |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Access Token Manipulation | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | Exfiltration Over Bluetooth | 4 Ingress Tool Transfer | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 1 Remote System Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 3 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 1 Obfuscated Files or Information | NTDS | 12 System Information Discovery | Distributed Component Object Model | Input Capture | Scheduled Transfer | 13 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
88% | ReversingLabs | Win32.Backdoor.SlackBot | ||
77% | Virustotal | Browse | ||
100% | Avira | BDS/Slackbot.B | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | BDS/Slackbot.B | Download File | ||
100% | Avira | BDS/Slackbot.B | Download File |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.mmbest.com | 184.168.111.40 | true | false |
| unknown |
slack.isfs.org.hk | unknown | unknown | false |
| unknown |
testirc.88cc.org | unknown | unknown | false |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
184.168.111.40 | www.mmbest.com | United States | 26496 | AS-26496-GO-DADDY-COM-LLCUS | false |
IP |
---|
192.168.2.1 |
Joe Sandbox Version: | 36.0.0 Rainbow Opal |
Analysis ID: | 774755 |
Start date and time: | 2022-12-28 10:43:44 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | qqt.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal68.winEXE@1/0@28/2 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis
(whitelisted): MpCmdRun.exe, a udiodg.exe, WMIADAP.exe, SgrmB roker.exe, conhost.exe, backgr oundTaskHost.exe, svchost.exe - Excluded IPs from analysis (wh
itelisted): 8.238.190.126, 8.2 38.88.248, 8.238.88.254, 8.238 .189.126, 67.26.73.254 - Excluded domains from analysis
(whitelisted): fg.download.wi ndowsupdate.com.c.footprint.ne t, fs.microsoft.com, ctldl.win dowsupdate.com, wu-bg-shim.tra fficmanager.net - Not all processes where analyz
ed, report is missing behavior information - Report size getting too big, t
oo many NtOpenKeyEx calls foun d. - Report size getting too big, t
oo many NtQueryValueKey calls found.
File type: | |
Entropy (8bit): | 5.287761822211928 |
TrID: |
|
File name: | qqt.exe |
File size: | 16521 |
MD5: | 992289cd321a673f91d8b4912189ecf6 |
SHA1: | 27e54853a094a9d1858072b6490c757553a2d16a |
SHA256: | 294968ed52a1aaa45c63ae810180dff853b852b055b103cde3c54f792d4cd5e2 |
SHA512: | a36cea6129bdec5d5492fdd3911d1bf293a6f85167b1ef0fd0ada7e10cc489857d9760d416ee554f325ad17ae639576849aa50e619aeddc625ba4cfba3b28514 |
SSDEEP: | 384:av4MQf6NXzzh638w9Gs/4sY2DxLm5qDriGJhqhaYx/16TzY20hWe:avP26RzVXw95wsY21S5qDriGJhqhai6y |
TLSH: | BD72C7073A5826BAE21540F112A55F739FFFD0B2B2BED61EC7D0485374A9A42EB1C10E |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n.:.................(...................@....@..........................p............................................. |
Icon Hash: | 00828e8e8686b000 |
Entrypoint: | 0x4011cb |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x3ADD6EC8 [Wed Apr 18 10:39:04 2001 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 1 |
OS Version Minor: | 0 |
File Version Major: | 1 |
File Version Minor: | 0 |
Subsystem Version Major: | 1 |
Subsystem Version Minor: | 0 |
Import Hash: | 7b7e8665f226bbab519d75c7e411307b |
Instruction |
---|
mov eax, dword ptr fs:[00000000h] |
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 0040501Ch |
push 0040109Ah |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 10h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
push 00405028h |
push 00405024h |
push 00405020h |
call 00007F13FCA9281Ch |
push dword ptr [00405028h] |
push dword ptr [00405024h] |
push dword ptr [00405020h] |
mov dword ptr [00405014h], esp |
call 00007F13FCA9071Fh |
add esp, 18h |
xor ecx, ecx |
mov dword ptr [ebp-04h], ecx |
push eax |
call 00007F13FCA92815h |
leave |
ret |
add byte ptr [eax], al |
mov dword ptr fs:[00000000h], eax |
ret |
add byte ptr [ebp-77h], dl |
in eax, 51h |
push ebx |
push esi |
push edi |
call 00007F13FCA926B9h |
push eax |
call 00007F13FCA92857h |
call 00007F13FCA9282Eh |
mov ecx, 00000006h |
cdq |
idiv ecx |
mov edi, edx |
add edi, 03h |
mov dword ptr [ebp-04h], edi |
push edi |
call 00007F13FCA927F4h |
add esp, 08h |
mov ebx, eax |
xor esi, esi |
jmp 00007F13FCA904D0h |
push 00000010h |
call 00007F13FCA927B4h |
add esp, 04h |
call 00007F13FCA92800h |
mov ecx, 0000001Ah |
cdq |
idiv ecx |
add edx, 61h |
mov byte ptr [ebx+esi], dl |
inc esi |
cmp esi, dword ptr [ebp-04h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6000 | 0x8cc | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2638 | 0x2638 | False | 0.4965249386753884 | data | 5.87745190991952 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.bss | 0x4000 | 0x8c | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.data | 0x5000 | 0x7b0 | 0x7b0 | False | 0.45985772357723576 | data | 4.5802244272545956 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x6000 | 0x8cc | 0x8cc | False | 0.34147424511545293 | data | 4.092541381538277 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
DLL | Import |
---|---|
KERNEL32.DLL | ExitProcess, ExitThread, GetCurrentProcess, GetCurrentThread, GetFileSize, GetModuleHandleA, CloseHandle, GetPriorityClass, GetProcAddress, GetTempPathA, GetThreadPriority, GetTickCount, GetVersionExA, GetWindowsDirectoryA, CopyFileA, CreateFileA, ReadFile, RtlUnwind, RtlZeroMemory, SetFilePointer, SetPriorityClass, SetThreadPriority, Sleep, CreateProcessA, WriteFile, CreateThread |
ADVAPI32.DLL | AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCloseKey, RegCreateKeyExA, RegDeleteValueA, RegOpenKeyExA, RegSetValueExA |
CRTDLL.DLL | __GetMainArgs, _sleep, atoi, exit, free, malloc, memcpy, raise, rand, signal, sprintf, srand, strcat, strchr, strcmp, strtok, time |
USER32.DLL | ExitWindowsEx |
WININET.DLL | InternetCanonicalizeUrlA, InternetCloseHandle, InternetOpenA, InternetOpenUrlA, InternetReadFile |
wsock32.dll | WSACleanup, WSAStartup, closesocket, connect, gethostbyname, htons, inet_addr, recv, send, sendto, socket |
- Total Packets: 33
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2022 10:44:37.569188118 CET | 49696 | 80 | 192.168.2.3 | 184.168.111.40 |
Dec 28, 2022 10:44:37.824807882 CET | 80 | 49696 | 184.168.111.40 | 192.168.2.3 |
Dec 28, 2022 10:44:37.824932098 CET | 49696 | 80 | 192.168.2.3 | 184.168.111.40 |
Dec 28, 2022 10:44:37.825572014 CET | 49696 | 80 | 192.168.2.3 | 184.168.111.40 |
Dec 28, 2022 10:44:38.080954075 CET | 80 | 49696 | 184.168.111.40 | 192.168.2.3 |
Dec 28, 2022 10:44:42.112258911 CET | 80 | 49696 | 184.168.111.40 | 192.168.2.3 |
Dec 28, 2022 10:44:42.112301111 CET | 80 | 49696 | 184.168.111.40 | 192.168.2.3 |
Dec 28, 2022 10:44:42.112400055 CET | 49696 | 80 | 192.168.2.3 | 184.168.111.40 |
Dec 28, 2022 10:44:42.112540960 CET | 49696 | 80 | 192.168.2.3 | 184.168.111.40 |
Dec 28, 2022 10:44:42.367985010 CET | 80 | 49696 | 184.168.111.40 | 192.168.2.3 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2022 10:44:37.418152094 CET | 62704 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:44:37.419379950 CET | 58921 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:44:37.437489033 CET | 53 | 62704 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:44:37.464479923 CET | 53 | 58921 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:44:37.500787020 CET | 49977 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:44:37.547466993 CET | 53 | 49977 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:44:52.520175934 CET | 57990 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:44:52.524137974 CET | 52387 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:44:52.541759014 CET | 53 | 52387 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:44:52.568533897 CET | 53 | 57990 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:07.611567974 CET | 56924 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:07.612471104 CET | 60625 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:07.629235029 CET | 53 | 56924 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:07.688540936 CET | 53 | 60625 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:22.677541018 CET | 49302 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:22.695127964 CET | 53 | 49302 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:22.706145048 CET | 53975 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:23.749110937 CET | 53975 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:23.757155895 CET | 53 | 53975 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:23.856141090 CET | 53 | 53975 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:37.742923021 CET | 51139 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:37.760622978 CET | 53 | 51139 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:38.774471045 CET | 52955 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:38.818486929 CET | 53 | 52955 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:52.802243948 CET | 60582 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:52.819704056 CET | 53 | 60582 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:45:53.837867975 CET | 57134 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:45:53.973509073 CET | 53 | 57134 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:08.014050007 CET | 62050 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:08.031747103 CET | 53 | 62050 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:08.997812033 CET | 56042 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:09.222395897 CET | 53 | 56042 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:23.089586973 CET | 59636 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:23.107839108 CET | 53 | 59636 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:24.624712944 CET | 55638 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:24.698832989 CET | 53 | 55638 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:38.141551018 CET | 57704 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:38.159111977 CET | 53 | 57704 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:39.711909056 CET | 65320 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:39.762845993 CET | 53 | 65320 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:53.215997934 CET | 60767 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:53.233850002 CET | 53 | 60767 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:46:54.781390905 CET | 65107 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:46:54.855417967 CET | 53 | 65107 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:47:08.272275925 CET | 53848 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:47:08.289781094 CET | 53 | 53848 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:47:09.865703106 CET | 57571 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:47:09.917429924 CET | 53 | 57571 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:47:23.321495056 CET | 58691 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:47:23.341784954 CET | 53 | 58691 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:47:24.926841974 CET | 53305 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:47:25.003083944 CET | 53 | 53305 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:47:38.374828100 CET | 59433 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:47:38.395253897 CET | 53 | 59433 | 8.8.8.8 | 192.168.2.3 |
Dec 28, 2022 10:47:40.021456957 CET | 60749 | 53 | 192.168.2.3 | 8.8.8.8 |
Dec 28, 2022 10:47:40.226613045 CET | 53 | 60749 | 8.8.8.8 | 192.168.2.3 |
Timestamp | Source IP | Dest IP | Checksum | Code | Type |
---|---|---|---|---|---|
Dec 28, 2022 10:45:23.856251001 CET | 192.168.2.3 | 8.8.8.8 | d045 | (Port unreachable) | Destination Unreachable |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 28, 2022 10:44:37.418152094 CET | 192.168.2.3 | 8.8.8.8 | 0x7e5f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:44:37.419379950 CET | 192.168.2.3 | 8.8.8.8 | 0x57d7 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:44:37.500787020 CET | 192.168.2.3 | 8.8.8.8 | 0x2bdf | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:44:52.520175934 CET | 192.168.2.3 | 8.8.8.8 | 0x1e9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:44:52.524137974 CET | 192.168.2.3 | 8.8.8.8 | 0x864b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:07.611567974 CET | 192.168.2.3 | 8.8.8.8 | 0x1af9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:07.612471104 CET | 192.168.2.3 | 8.8.8.8 | 0xab4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:22.677541018 CET | 192.168.2.3 | 8.8.8.8 | 0xb00f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:22.706145048 CET | 192.168.2.3 | 8.8.8.8 | 0x9a3e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:23.749110937 CET | 192.168.2.3 | 8.8.8.8 | 0x9a3e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:37.742923021 CET | 192.168.2.3 | 8.8.8.8 | 0x2cba | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:38.774471045 CET | 192.168.2.3 | 8.8.8.8 | 0xe555 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:52.802243948 CET | 192.168.2.3 | 8.8.8.8 | 0x4fff | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:53.837867975 CET | 192.168.2.3 | 8.8.8.8 | 0x4263 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:08.014050007 CET | 192.168.2.3 | 8.8.8.8 | 0x3582 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:08.997812033 CET | 192.168.2.3 | 8.8.8.8 | 0x195c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:23.089586973 CET | 192.168.2.3 | 8.8.8.8 | 0xd814 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:24.624712944 CET | 192.168.2.3 | 8.8.8.8 | 0xc013 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:38.141551018 CET | 192.168.2.3 | 8.8.8.8 | 0x9e5f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:39.711909056 CET | 192.168.2.3 | 8.8.8.8 | 0x2b6f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:53.215997934 CET | 192.168.2.3 | 8.8.8.8 | 0x74ed | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:54.781390905 CET | 192.168.2.3 | 8.8.8.8 | 0x81ed | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:08.272275925 CET | 192.168.2.3 | 8.8.8.8 | 0x7336 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:09.865703106 CET | 192.168.2.3 | 8.8.8.8 | 0x2700 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:23.321495056 CET | 192.168.2.3 | 8.8.8.8 | 0xcbc9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:24.926841974 CET | 192.168.2.3 | 8.8.8.8 | 0x82b0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:38.374828100 CET | 192.168.2.3 | 8.8.8.8 | 0x8b43 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:40.021456957 CET | 192.168.2.3 | 8.8.8.8 | 0xfe33 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 28, 2022 10:44:37.437489033 CET | 8.8.8.8 | 192.168.2.3 | 0x7e5f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:44:37.464479923 CET | 8.8.8.8 | 192.168.2.3 | 0x57d7 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:44:37.547466993 CET | 8.8.8.8 | 192.168.2.3 | 0x2bdf | No error (0) | 184.168.111.40 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2022 10:44:52.541759014 CET | 8.8.8.8 | 192.168.2.3 | 0x864b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:44:52.568533897 CET | 8.8.8.8 | 192.168.2.3 | 0x1e9 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:07.629235029 CET | 8.8.8.8 | 192.168.2.3 | 0x1af9 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:07.688540936 CET | 8.8.8.8 | 192.168.2.3 | 0xab4 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:22.695127964 CET | 8.8.8.8 | 192.168.2.3 | 0xb00f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:23.757155895 CET | 8.8.8.8 | 192.168.2.3 | 0x9a3e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:23.856141090 CET | 8.8.8.8 | 192.168.2.3 | 0x9a3e | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:37.760622978 CET | 8.8.8.8 | 192.168.2.3 | 0x2cba | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:38.818486929 CET | 8.8.8.8 | 192.168.2.3 | 0xe555 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:52.819704056 CET | 8.8.8.8 | 192.168.2.3 | 0x4fff | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:45:53.973509073 CET | 8.8.8.8 | 192.168.2.3 | 0x4263 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:08.031747103 CET | 8.8.8.8 | 192.168.2.3 | 0x3582 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:09.222395897 CET | 8.8.8.8 | 192.168.2.3 | 0x195c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:23.107839108 CET | 8.8.8.8 | 192.168.2.3 | 0xd814 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:24.698832989 CET | 8.8.8.8 | 192.168.2.3 | 0xc013 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:38.159111977 CET | 8.8.8.8 | 192.168.2.3 | 0x9e5f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:39.762845993 CET | 8.8.8.8 | 192.168.2.3 | 0x2b6f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:53.233850002 CET | 8.8.8.8 | 192.168.2.3 | 0x74ed | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:46:54.855417967 CET | 8.8.8.8 | 192.168.2.3 | 0x81ed | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:08.289781094 CET | 8.8.8.8 | 192.168.2.3 | 0x7336 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:09.917429924 CET | 8.8.8.8 | 192.168.2.3 | 0x2700 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:23.341784954 CET | 8.8.8.8 | 192.168.2.3 | 0xcbc9 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:25.003083944 CET | 8.8.8.8 | 192.168.2.3 | 0x82b0 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:38.395253897 CET | 8.8.8.8 | 192.168.2.3 | 0x8b43 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2022 10:47:40.226613045 CET | 8.8.8.8 | 192.168.2.3 | 0xfe33 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Target ID: | 0 |
Start time: | 10:44:37 |
Start date: | 28/12/2022 |
Path: | C:\Users\user\Desktop\qqt.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 16521 bytes |
MD5 hash: | 992289CD321A673F91D8B4912189ECF6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |