Create Interactive Tour

Windows Analysis Report
qqt.exe

Overview

General Information

Sample Name:qqt.exe
Analysis ID:774755
MD5:992289cd321a673f91d8b4912189ecf6
SHA1:27e54853a094a9d1858072b6490c757553a2d16a
SHA256:294968ed52a1aaa45c63ae810180dff853b852b055b103cde3c54f792d4cd5e2
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Machine Learning detection for sample
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality for execution timing, often used to detect debuggers

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • qqt.exe (PID: 6044 cmdline: C:\Users\user\Desktop\qqt.exe MD5: 992289CD321A673F91D8B4912189ECF6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
qqt.exeSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x2fd9:$s1: \xE1\xFD\xFD\xF9\xB3\xA6\xA6
  • 0x3355:$s1: \xE1\xFD\xFD\xF9\xB3\xA6\xA6
qqt.exeMALWARE_Win_SlackBotDetects SlackBotditekSHen
  • 0x2ec5:$x2: slackbot
  • 0x31ba:$s1: cpu: %lumhz %s, uptime: %u+%.2u:%.2u, os: %s
  • 0x322f:$s2: %s, running for %u+%.2u:%.2u
  • 0x32ee:$s3: PONG :%s
  • 0x3339:$s4: PRIVMSG %s :%s
  • 0x337f:$s5: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)
  • 0x2f30:$m1: saving %s to %s
  • 0x2f52:$m2: visit number %u failed
  • 0x2fa1:$m3: sending %s packets of %s bytes to %s with a delay of %s
  • 0x300e:$m4: file executed
  • 0x2f7e:$m5: packets sent
  • 0x2efb:$m6: upgrading to %s
  • 0x318b:$m7: rebooting...
  • 0x3178:$c1: !@remove
  • 0x3181:$c2: !@restart
  • 0x3198:$c3: !@reboot
  • 0x31a1:$c4: !@rndnick
  • 0x31b3:$c5: !@exit
  • 0x3218:$c6: !@sysinfo
  • 0x314f:$c8: !@login
  • 0x301c:$c9: !@run
SourceRuleDescriptionAuthorStrings
0.0.qqt.exe.400000.0.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x3a11:$s1: \xE1\xFD\xFD\xF9\xB3\xA6\xA6
  • 0x3d8d:$s1: \xE1\xFD\xFD\xF9\xB3\xA6\xA6
0.2.qqt.exe.400000.0.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
  • 0x3a11:$s1: \xE1\xFD\xFD\xF9\xB3\xA6\xA6
  • 0x3d8d:$s1: \xE1\xFD\xFD\xF9\xB3\xA6\xA6
0.0.qqt.exe.400000.0.unpackMALWARE_Win_SlackBotDetects SlackBotditekSHen
  • 0x38fd:$x2: slackbot
  • 0x3bf2:$s1: cpu: %lumhz %s, uptime: %u+%.2u:%.2u, os: %s
  • 0x3c67:$s2: %s, running for %u+%.2u:%.2u
  • 0x3d26:$s3: PONG :%s
  • 0x3d71:$s4: PRIVMSG %s :%s
  • 0x3db7:$s5: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)
  • 0x3968:$m1: saving %s to %s
  • 0x398a:$m2: visit number %u failed
  • 0x39d9:$m3: sending %s packets of %s bytes to %s with a delay of %s
  • 0x3a46:$m4: file executed
  • 0x39b6:$m5: packets sent
  • 0x3933:$m6: upgrading to %s
  • 0x3bc3:$m7: rebooting...
  • 0x3bb0:$c1: !@remove
  • 0x3bb9:$c2: !@restart
  • 0x3bd0:$c3: !@reboot
  • 0x3bd9:$c4: !@rndnick
  • 0x3beb:$c5: !@exit
  • 0x3c50:$c6: !@sysinfo
  • 0x3b87:$c8: !@login
  • 0x3a54:$c9: !@run
0.2.qqt.exe.400000.0.unpackMALWARE_Win_SlackBotDetects SlackBotditekSHen
  • 0x38fd:$x2: slackbot
  • 0x3bf2:$s1: cpu: %lumhz %s, uptime: %u+%.2u:%.2u, os: %s
  • 0x3c67:$s2: %s, running for %u+%.2u:%.2u
  • 0x3d26:$s3: PONG :%s
  • 0x3d71:$s4: PRIVMSG %s :%s
  • 0x3db7:$s5: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)
  • 0x3968:$m1: saving %s to %s
  • 0x398a:$m2: visit number %u failed
  • 0x39d9:$m3: sending %s packets of %s bytes to %s with a delay of %s
  • 0x3a46:$m4: file executed
  • 0x39b6:$m5: packets sent
  • 0x3933:$m6: upgrading to %s
  • 0x3bc3:$m7: rebooting...
  • 0x3bb0:$c1: !@remove
  • 0x3bb9:$c2: !@restart
  • 0x3bd0:$c3: !@reboot
  • 0x3bd9:$c4: !@rndnick
  • 0x3beb:$c5: !@exit
  • 0x3c50:$c6: !@sysinfo
  • 0x3b87:$c8: !@login
  • 0x3a54:$c9: !@run
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: qqt.exeAvira: detected
Source: qqt.exeReversingLabs: Detection: 88%
Source: qqt.exeVirustotal: Detection: 77%Perma Link
Source: qqt.exeJoe Sandbox ML: detected
Source: 0.0.qqt.exe.400000.0.unpackAvira: Label: BDS/Slackbot.B
Source: 0.2.qqt.exe.400000.0.unpackAvira: Label: BDS/Slackbot.B
Source: qqt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Referer: http://testirc.8866.org18000/ads.cgiUser-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)Host: www.mmbest.com
Source: global trafficHTTP traffic detected: HTTP/1.1 503 Service UnavailableDate: Wed, 28 Dec 2022 09:44:37 GMTServer: ApacheContent-Length: 428Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 35 30 33 20 53 65 72 76 69 63 65 20 55 6e 61 76 61 69 6c 61 62 6c 65 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 53 65 72 76 69 63 65 20 55 6e 61 76 61 69 6c 61 62 6c 65 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 73 65 72 76 65 72 20 69 73 20 74 65 6d 70 6f 72 61 72 69 6c 79 20 75 6e 61 62 6c 65 20 74 6f 20 73 65 72 76 69 63 65 20 79 6f 75 72 0a 72 65 71 75 65 73 74 20 64 75 65 20 74 6f 20 6d 61 69 6e 74 65 6e 61 6e 63 65 20 64 6f 77 6e 74 69 6d 65 20 6f 72 20 63 61 70 61 63 69 74 79 0a 70 72 6f 62 6c 65 6d 73 2e 20 50 6c 65 61 73 65 20 74 72 79 20 61 67 61 69 6e 20 6c 61 74 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 35 30 33 20 53 65 72 76 69 63 65 20 55 6e 61 76 61 69 6c 61 62 6c 65 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>503 Service Unavailable</title></head><body><h1>Service Unavailable</h1><p>The server is temporarily unable to service yourrequest due to maintenance downtime or capacityproblems. Please try again later.</p><p>Additionally, a 503 Service Unavailableerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
Source: qqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://testirc.8866.org18000/ads.cgi
Source: qqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://testirc.8866.orgX
Source: qqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mmbest.com
Source: qqt.exe, 00000000.00000002.640986088.000000000071B000.00000004.00000020.00020000.00000000.sdmp, qqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mmbest.com/
Source: qqt.exe, 00000000.00000002.640986088.000000000071B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mmbest.com/b
Source: unknownDNS traffic detected: queries for: slack.isfs.org.hk
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_00403068 InternetOpenA,1001C489,InternetCanonicalizeUrlA,InternetOpenUrlA,CreateFileA,InternetReadFile,WriteFile,CloseHandle,InternetCloseHandle,InternetCloseHandle,
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Referer: http://testirc.8866.org18000/ads.cgiUser-Agent: Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)Host: www.mmbest.com
Source: qqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

System Summary

barindex
Source: qqt.exe, type: SAMPLEMatched rule: Detects SlackBot Author: ditekSHen
Source: 0.0.qqt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects SlackBot Author: ditekSHen
Source: 0.2.qqt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects SlackBot Author: ditekSHen
Source: qqt.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: qqt.exe, type: SAMPLEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
Source: qqt.exe, type: SAMPLEMatched rule: MALWARE_Win_SlackBot author = ditekSHen, description = Detects SlackBot
Source: 0.0.qqt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
Source: 0.2.qqt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
Source: 0.0.qqt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SlackBot author = ditekSHen, description = Detects SlackBot
Source: 0.2.qqt.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SlackBot author = ditekSHen, description = Detects SlackBot
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_004012FB GetVersionExA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_004016EA
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_004016EA
Source: C:\Users\user\Desktop\qqt.exeCode function: String function: 00403614 appears 38 times
Source: qqt.exeReversingLabs: Detection: 88%
Source: qqt.exeVirustotal: Detection: 77%
Source: C:\Users\user\Desktop\qqt.exeFile read: C:\Users\user\Desktop\qqt.exeJump to behavior
Source: qqt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\qqt.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\qqt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_004012FB GetVersionExA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,
Source: classification engineClassification label: mal68.winEXE@1/0@28/2
Source: C:\Users\user\Desktop\qqt.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\qqt.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\qqt.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\qqt.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\qqt.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
Source: C:\Users\user\Desktop\qqt.exe TID: 6024Thread sleep time: -150000s >= -30000s
Source: C:\Users\user\Desktop\qqt.exe TID: 6040Thread sleep time: -105000s >= -30000s
Source: C:\Users\user\Desktop\qqt.exe TID: 6020Thread sleep time: -3600000s >= -30000s
Source: C:\Users\user\Desktop\qqt.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_004013DC rdtsc
Source: C:\Users\user\Desktop\qqt.exeAPI call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\qqt.exeAPI call chain: ExitProcess graph end node
Source: qqt.exe, 00000000.00000002.640986088.000000000071B000.00000004.00000020.00020000.00000000.sdmp, qqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: qqt.exe, 00000000.00000002.640986088.000000000071B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW?
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_0040216C mov eax, dword ptr fs:[00000030h]
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_004013DC rdtsc
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_00401386 cpuid
Source: C:\Users\user\Desktop\qqt.exeCode function: 0_2_004016EA 1001C4C5,closesocket,1001F498,1001F498,1001C489,1001C489,1001E69C,1001F498,1001E6C4,1001E6C4,1001E6C4,1001E6C4,1001E6C4,1001E6C4,1001E6C4,1001C489,1001C489,CreateThread,CloseHandle,1001E6C4,1001F498,1001E6C4,1001C489,1001E6C4,1001E6C4,1001E6C4,1001F498,1001C489,1001E65C,1001E6C4,1001E6C4,1001E5C5,1001E6C4,1001FA40,1001E5C5,1001E6C4,1001E6C4,1001E6C4,1001E6C4,GetVersionExA,1001E5C5,GetTickCount,1001E5C5,1001E6C4,1001E6C4,1001E6C4,1001E6C4,1001E6C4,CreateProcessA,1001E6C4,RegOpenKeyExA,RegDeleteValueA,RegCloseKey,1001E6C4,1001E6C4,1001C489,1001E6C4,1001E6C4,Sleep,1001E6C4,1001E6C4,1001E5C5,1001E6C4,1001E6C4,1001E6C4,1001E6C4,1001E6C4,1001C489,1001F498,1001F498,1001E6C4,1001E6C4,1001E6C4,1001E6C4,closesocket,RtlExitUserThread,1001E6C4,1001E6C4,1001E6C4,1001C489,1001C489,1001C489,1001C489,1001C489,CreateThread,CloseHandle,1001E6C4,1001C489,1001C489,1001C489,CreateThread,CloseHandle,1001E6C4,1001BBAA,1001BBAA,1001E5C5,1001E5C5,CreateThread,CloseHandle,1001E6C4,10012B86,1001BBAA,1001E6C4,1001C489,1001C489,1001C489,CreateThread,CloseHandle,1001E6C4,CreateProcessA,1001E6C4,1001C489,1001C489,CreateThread,CloseHandle,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception1
Access Token Manipulation
1
Virtualization/Sandbox Evasion
1
Input Capture
11
Security Software Discovery
Remote Services1
Input Capture
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
System Shutdown/Reboot
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Access Token Manipulation
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
Exfiltration Over Bluetooth4
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer13
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 774755 Sample: qqt.exe Startdate: 28/12/2022 Architecture: WINDOWS Score: 68 14 Malicious sample detected (through community Yara rule) 2->14 16 Antivirus / Scanner detection for submitted sample 2->16 18 Multi AV Scanner detection for submitted file 2->18 20 Machine Learning detection for sample 2->20 5 qqt.exe 12 2->5         started        process3 dnsIp4 8 www.mmbest.com 184.168.111.40, 49696, 80 AS-26496-GO-DADDY-COM-LLCUS United States 5->8 10 192.168.2.1 unknown unknown 5->10 12 2 other IPs or domains 5->12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
qqt.exe88%ReversingLabsWin32.Backdoor.SlackBot
qqt.exe77%VirustotalBrowse
qqt.exe100%AviraBDS/Slackbot.B
qqt.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
0.0.qqt.exe.400000.0.unpack100%AviraBDS/Slackbot.BDownload File
0.2.qqt.exe.400000.0.unpack100%AviraBDS/Slackbot.BDownload File
SourceDetectionScannerLabelLink
www.mmbest.com0%VirustotalBrowse
slack.isfs.org.hk0%VirustotalBrowse
testirc.88cc.org0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://testirc.8866.orgX0%Avira URL Cloudsafe
http://www.mmbest.com/b0%Avira URL Cloudsafe
http://www.mmbest.com0%Avira URL Cloudsafe
http://testirc.8866.org18000/ads.cgi0%Avira URL Cloudsafe
http://www.mmbest.com/0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.mmbest.com
184.168.111.40
truefalseunknown
slack.isfs.org.hk
unknown
unknownfalseunknown
testirc.88cc.org
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
http://www.mmbest.com/false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.mmbest.comqqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://testirc.8866.orgXqqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://testirc.8866.org18000/ads.cgiqqt.exe, 00000000.00000002.640767059.00000000006B8000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.mmbest.com/bqqt.exe, 00000000.00000002.640986088.000000000071B000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
184.168.111.40
www.mmbest.comUnited States
26496AS-26496-GO-DADDY-COM-LLCUSfalse
IP
192.168.2.1
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:774755
Start date and time:2022-12-28 10:43:44 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 26s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:qqt.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:15
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal68.winEXE@1/0@28/2
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 95.7% (good quality ratio 93.6%)
  • Quality average: 62.2%
  • Quality standard deviation: 28.6%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 8.238.190.126, 8.238.88.248, 8.238.88.254, 8.238.189.126, 67.26.73.254
  • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.287761822211928
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.94%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • VXD Driver (31/22) 0.00%
File name:qqt.exe
File size:16521
MD5:992289cd321a673f91d8b4912189ecf6
SHA1:27e54853a094a9d1858072b6490c757553a2d16a
SHA256:294968ed52a1aaa45c63ae810180dff853b852b055b103cde3c54f792d4cd5e2
SHA512:a36cea6129bdec5d5492fdd3911d1bf293a6f85167b1ef0fd0ada7e10cc489857d9760d416ee554f325ad17ae639576849aa50e619aeddc625ba4cfba3b28514
SSDEEP:384:av4MQf6NXzzh638w9Gs/4sY2DxLm5qDriGJhqhaYx/16TzY20hWe:avP26RzVXw95wsY21S5qDriGJhqhai6y
TLSH:BD72C7073A5826BAE21540F112A55F739FFFD0B2B2BED61EC7D0485374A9A42EB1C10E
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n.:.................(...................@....@..........................p.............................................
Icon Hash:00828e8e8686b000
Entrypoint:0x4011cb
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x3ADD6EC8 [Wed Apr 18 10:39:04 2001 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:1
OS Version Minor:0
File Version Major:1
File Version Minor:0
Subsystem Version Major:1
Subsystem Version Minor:0
Import Hash:7b7e8665f226bbab519d75c7e411307b
Instruction
mov eax, dword ptr fs:[00000000h]
push ebp
mov ebp, esp
push FFFFFFFFh
push 0040501Ch
push 0040109Ah
push eax
mov dword ptr fs:[00000000h], esp
sub esp, 10h
push ebx
push esi
push edi
mov dword ptr [ebp-18h], esp
push 00405028h
push 00405024h
push 00405020h
call 00007F13FCA9281Ch
push dword ptr [00405028h]
push dword ptr [00405024h]
push dword ptr [00405020h]
mov dword ptr [00405014h], esp
call 00007F13FCA9071Fh
add esp, 18h
xor ecx, ecx
mov dword ptr [ebp-04h], ecx
push eax
call 00007F13FCA92815h
leave
ret
add byte ptr [eax], al
mov dword ptr fs:[00000000h], eax
ret
add byte ptr [ebp-77h], dl
in eax, 51h
push ebx
push esi
push edi
call 00007F13FCA926B9h
push eax
call 00007F13FCA92857h
call 00007F13FCA9282Eh
mov ecx, 00000006h
cdq
idiv ecx
mov edi, edx
add edi, 03h
mov dword ptr [ebp-04h], edi
push edi
call 00007F13FCA927F4h
add esp, 08h
mov ebx, eax
xor esi, esi
jmp 00007F13FCA904D0h
push 00000010h
call 00007F13FCA927B4h
add esp, 04h
call 00007F13FCA92800h
mov ecx, 0000001Ah
cdq
idiv ecx
add edx, 61h
mov byte ptr [ebx+esi], dl
inc esi
cmp esi, dword ptr [ebp-04h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x60000x8cc.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x26380x2638False0.4965249386753884data5.87745190991952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.bss0x40000x8c0x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.data0x50000x7b00x7b0False0.45985772357723576data4.5802244272545956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x60000x8cc0x8ccFalse0.34147424511545293data4.092541381538277IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
DLLImport
KERNEL32.DLLExitProcess, ExitThread, GetCurrentProcess, GetCurrentThread, GetFileSize, GetModuleHandleA, CloseHandle, GetPriorityClass, GetProcAddress, GetTempPathA, GetThreadPriority, GetTickCount, GetVersionExA, GetWindowsDirectoryA, CopyFileA, CreateFileA, ReadFile, RtlUnwind, RtlZeroMemory, SetFilePointer, SetPriorityClass, SetThreadPriority, Sleep, CreateProcessA, WriteFile, CreateThread
ADVAPI32.DLLAdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCloseKey, RegCreateKeyExA, RegDeleteValueA, RegOpenKeyExA, RegSetValueExA
CRTDLL.DLL__GetMainArgs, _sleep, atoi, exit, free, malloc, memcpy, raise, rand, signal, sprintf, srand, strcat, strchr, strcmp, strtok, time
USER32.DLLExitWindowsEx
WININET.DLLInternetCanonicalizeUrlA, InternetCloseHandle, InternetOpenA, InternetOpenUrlA, InternetReadFile
wsock32.dllWSACleanup, WSAStartup, closesocket, connect, gethostbyname, htons, inet_addr, recv, send, sendto, socket
  • Total Packets: 33
  • 80 (HTTP)
  • 53 (DNS)
TimestampSource PortDest PortSource IPDest IP
Dec 28, 2022 10:44:37.569188118 CET4969680192.168.2.3184.168.111.40
Dec 28, 2022 10:44:37.824807882 CET8049696184.168.111.40192.168.2.3
Dec 28, 2022 10:44:37.824932098 CET4969680192.168.2.3184.168.111.40
Dec 28, 2022 10:44:37.825572014 CET4969680192.168.2.3184.168.111.40
Dec 28, 2022 10:44:38.080954075 CET8049696184.168.111.40192.168.2.3
Dec 28, 2022 10:44:42.112258911 CET8049696184.168.111.40192.168.2.3
Dec 28, 2022 10:44:42.112301111 CET8049696184.168.111.40192.168.2.3
Dec 28, 2022 10:44:42.112400055 CET4969680192.168.2.3184.168.111.40
Dec 28, 2022 10:44:42.112540960 CET4969680192.168.2.3184.168.111.40
Dec 28, 2022 10:44:42.367985010 CET8049696184.168.111.40192.168.2.3
TimestampSource PortDest PortSource IPDest IP
Dec 28, 2022 10:44:37.418152094 CET6270453192.168.2.38.8.8.8
Dec 28, 2022 10:44:37.419379950 CET5892153192.168.2.38.8.8.8
Dec 28, 2022 10:44:37.437489033 CET53627048.8.8.8192.168.2.3
Dec 28, 2022 10:44:37.464479923 CET53589218.8.8.8192.168.2.3
Dec 28, 2022 10:44:37.500787020 CET4997753192.168.2.38.8.8.8
Dec 28, 2022 10:44:37.547466993 CET53499778.8.8.8192.168.2.3
Dec 28, 2022 10:44:52.520175934 CET5799053192.168.2.38.8.8.8
Dec 28, 2022 10:44:52.524137974 CET5238753192.168.2.38.8.8.8
Dec 28, 2022 10:44:52.541759014 CET53523878.8.8.8192.168.2.3
Dec 28, 2022 10:44:52.568533897 CET53579908.8.8.8192.168.2.3
Dec 28, 2022 10:45:07.611567974 CET5692453192.168.2.38.8.8.8
Dec 28, 2022 10:45:07.612471104 CET6062553192.168.2.38.8.8.8
Dec 28, 2022 10:45:07.629235029 CET53569248.8.8.8192.168.2.3
Dec 28, 2022 10:45:07.688540936 CET53606258.8.8.8192.168.2.3
Dec 28, 2022 10:45:22.677541018 CET4930253192.168.2.38.8.8.8
Dec 28, 2022 10:45:22.695127964 CET53493028.8.8.8192.168.2.3
Dec 28, 2022 10:45:22.706145048 CET5397553192.168.2.38.8.8.8
Dec 28, 2022 10:45:23.749110937 CET5397553192.168.2.38.8.8.8
Dec 28, 2022 10:45:23.757155895 CET53539758.8.8.8192.168.2.3
Dec 28, 2022 10:45:23.856141090 CET53539758.8.8.8192.168.2.3
Dec 28, 2022 10:45:37.742923021 CET5113953192.168.2.38.8.8.8
Dec 28, 2022 10:45:37.760622978 CET53511398.8.8.8192.168.2.3
Dec 28, 2022 10:45:38.774471045 CET5295553192.168.2.38.8.8.8
Dec 28, 2022 10:45:38.818486929 CET53529558.8.8.8192.168.2.3
Dec 28, 2022 10:45:52.802243948 CET6058253192.168.2.38.8.8.8
Dec 28, 2022 10:45:52.819704056 CET53605828.8.8.8192.168.2.3
Dec 28, 2022 10:45:53.837867975 CET5713453192.168.2.38.8.8.8
Dec 28, 2022 10:45:53.973509073 CET53571348.8.8.8192.168.2.3
Dec 28, 2022 10:46:08.014050007 CET6205053192.168.2.38.8.8.8
Dec 28, 2022 10:46:08.031747103 CET53620508.8.8.8192.168.2.3
Dec 28, 2022 10:46:08.997812033 CET5604253192.168.2.38.8.8.8
Dec 28, 2022 10:46:09.222395897 CET53560428.8.8.8192.168.2.3
Dec 28, 2022 10:46:23.089586973 CET5963653192.168.2.38.8.8.8
Dec 28, 2022 10:46:23.107839108 CET53596368.8.8.8192.168.2.3
Dec 28, 2022 10:46:24.624712944 CET5563853192.168.2.38.8.8.8
Dec 28, 2022 10:46:24.698832989 CET53556388.8.8.8192.168.2.3
Dec 28, 2022 10:46:38.141551018 CET5770453192.168.2.38.8.8.8
Dec 28, 2022 10:46:38.159111977 CET53577048.8.8.8192.168.2.3
Dec 28, 2022 10:46:39.711909056 CET6532053192.168.2.38.8.8.8
Dec 28, 2022 10:46:39.762845993 CET53653208.8.8.8192.168.2.3
Dec 28, 2022 10:46:53.215997934 CET6076753192.168.2.38.8.8.8
Dec 28, 2022 10:46:53.233850002 CET53607678.8.8.8192.168.2.3
Dec 28, 2022 10:46:54.781390905 CET6510753192.168.2.38.8.8.8
Dec 28, 2022 10:46:54.855417967 CET53651078.8.8.8192.168.2.3
Dec 28, 2022 10:47:08.272275925 CET5384853192.168.2.38.8.8.8
Dec 28, 2022 10:47:08.289781094 CET53538488.8.8.8192.168.2.3
Dec 28, 2022 10:47:09.865703106 CET5757153192.168.2.38.8.8.8
Dec 28, 2022 10:47:09.917429924 CET53575718.8.8.8192.168.2.3
Dec 28, 2022 10:47:23.321495056 CET5869153192.168.2.38.8.8.8
Dec 28, 2022 10:47:23.341784954 CET53586918.8.8.8192.168.2.3
Dec 28, 2022 10:47:24.926841974 CET5330553192.168.2.38.8.8.8
Dec 28, 2022 10:47:25.003083944 CET53533058.8.8.8192.168.2.3
Dec 28, 2022 10:47:38.374828100 CET5943353192.168.2.38.8.8.8
Dec 28, 2022 10:47:38.395253897 CET53594338.8.8.8192.168.2.3
Dec 28, 2022 10:47:40.021456957 CET6074953192.168.2.38.8.8.8
Dec 28, 2022 10:47:40.226613045 CET53607498.8.8.8192.168.2.3
TimestampSource IPDest IPChecksumCodeType
Dec 28, 2022 10:45:23.856251001 CET192.168.2.38.8.8.8d045(Port unreachable)Destination Unreachable
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Dec 28, 2022 10:44:37.418152094 CET192.168.2.38.8.8.80x7e5fStandard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:44:37.419379950 CET192.168.2.38.8.8.80x57d7Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:44:37.500787020 CET192.168.2.38.8.8.80x2bdfStandard query (0)www.mmbest.comA (IP address)IN (0x0001)false
Dec 28, 2022 10:44:52.520175934 CET192.168.2.38.8.8.80x1e9Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:44:52.524137974 CET192.168.2.38.8.8.80x864bStandard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:07.611567974 CET192.168.2.38.8.8.80x1af9Standard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:07.612471104 CET192.168.2.38.8.8.80xab4Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:22.677541018 CET192.168.2.38.8.8.80xb00fStandard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:22.706145048 CET192.168.2.38.8.8.80x9a3eStandard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:23.749110937 CET192.168.2.38.8.8.80x9a3eStandard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:37.742923021 CET192.168.2.38.8.8.80x2cbaStandard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:38.774471045 CET192.168.2.38.8.8.80xe555Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:52.802243948 CET192.168.2.38.8.8.80x4fffStandard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:53.837867975 CET192.168.2.38.8.8.80x4263Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:08.014050007 CET192.168.2.38.8.8.80x3582Standard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:08.997812033 CET192.168.2.38.8.8.80x195cStandard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:23.089586973 CET192.168.2.38.8.8.80xd814Standard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:24.624712944 CET192.168.2.38.8.8.80xc013Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:38.141551018 CET192.168.2.38.8.8.80x9e5fStandard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:39.711909056 CET192.168.2.38.8.8.80x2b6fStandard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:53.215997934 CET192.168.2.38.8.8.80x74edStandard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:54.781390905 CET192.168.2.38.8.8.80x81edStandard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:08.272275925 CET192.168.2.38.8.8.80x7336Standard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:09.865703106 CET192.168.2.38.8.8.80x2700Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:23.321495056 CET192.168.2.38.8.8.80xcbc9Standard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:24.926841974 CET192.168.2.38.8.8.80x82b0Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:38.374828100 CET192.168.2.38.8.8.80x8b43Standard query (0)slack.isfs.org.hkA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:40.021456957 CET192.168.2.38.8.8.80xfe33Standard query (0)testirc.88cc.orgA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Dec 28, 2022 10:44:37.437489033 CET8.8.8.8192.168.2.30x7e5fName error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:44:37.464479923 CET8.8.8.8192.168.2.30x57d7Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:44:37.547466993 CET8.8.8.8192.168.2.30x2bdfNo error (0)www.mmbest.com184.168.111.40A (IP address)IN (0x0001)false
Dec 28, 2022 10:44:52.541759014 CET8.8.8.8192.168.2.30x864bName error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:44:52.568533897 CET8.8.8.8192.168.2.30x1e9Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:07.629235029 CET8.8.8.8192.168.2.30x1af9Name error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:07.688540936 CET8.8.8.8192.168.2.30xab4Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:22.695127964 CET8.8.8.8192.168.2.30xb00fName error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:23.757155895 CET8.8.8.8192.168.2.30x9a3eName error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:23.856141090 CET8.8.8.8192.168.2.30x9a3eName error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:37.760622978 CET8.8.8.8192.168.2.30x2cbaName error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:38.818486929 CET8.8.8.8192.168.2.30xe555Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:52.819704056 CET8.8.8.8192.168.2.30x4fffName error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:45:53.973509073 CET8.8.8.8192.168.2.30x4263Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:08.031747103 CET8.8.8.8192.168.2.30x3582Name error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:09.222395897 CET8.8.8.8192.168.2.30x195cName error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:23.107839108 CET8.8.8.8192.168.2.30xd814Name error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:24.698832989 CET8.8.8.8192.168.2.30xc013Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:38.159111977 CET8.8.8.8192.168.2.30x9e5fName error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:39.762845993 CET8.8.8.8192.168.2.30x2b6fName error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:53.233850002 CET8.8.8.8192.168.2.30x74edName error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:46:54.855417967 CET8.8.8.8192.168.2.30x81edName error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:08.289781094 CET8.8.8.8192.168.2.30x7336Name error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:09.917429924 CET8.8.8.8192.168.2.30x2700Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:23.341784954 CET8.8.8.8192.168.2.30xcbc9Name error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:25.003083944 CET8.8.8.8192.168.2.30x82b0Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:38.395253897 CET8.8.8.8192.168.2.30x8b43Name error (3)slack.isfs.org.hknonenoneA (IP address)IN (0x0001)false
Dec 28, 2022 10:47:40.226613045 CET8.8.8.8192.168.2.30xfe33Name error (3)testirc.88cc.orgnonenoneA (IP address)IN (0x0001)false
  • testirc.8866.org18000
    • www.mmbest.com
No statistics
Target ID:0
Start time:10:44:37
Start date:28/12/2022
Path:C:\Users\user\Desktop\qqt.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\qqt.exe
Imagebase:0x400000
File size:16521 bytes
MD5 hash:992289CD321A673F91D8B4912189ECF6
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

No disassembly