Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
1
2021-11-01 11:25
askinstall25.exe
867f1890d45a83e6c39f629212f52949
AgentTesla
Gen2
Trojan_PWS_Stealer
BitCoin
browser
info stealer
Credential
User Data
Generic Malware
Google
Chrome
Malicious Packer
Malicious Library
SQLite Cookie
UPX
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Code injection
Browser Info Stealer
VirusTotal
Malware
suspicious privilege
Code Injection
Malicious Traffic
Checks debugger
WMI
Creates executable files
ICMP traffic
exploit crash
unpack itself
Windows utilities
suspicious process
malicious URLs
suspicious TLD
WriteConsoleW
installed browsers check
Tofsee
Windows
Exploit
Browser
ComputerName
Remote Code Execution
DNS
crashed
4
Keyword trend analysis
×
Info
×
http://www.jjnices.top/Home/Index/lkdinl
http://www.iyiqian.com/ - rule_id: 2326
https://iplogger.org/1b4887
https://www.listincode.com/ - rule_id: 2327
8
Info
×
www.listincode.com(149.28.253.196) - mailcious
www.jjnices.top(91.210.171.115)
www.iyiqian.com(103.155.92.58) - mailcious
iplogger.org(88.99.66.31) - mailcious
149.28.253.196
103.155.92.58 - mailcious
88.99.66.31 - mailcious
91.210.171.115
3
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO HTTP Request to a *.top domain
ET DNS Query to a *.top domain - Likely Hostile
2
Info
×
http://www.iyiqian.com/
https://www.listincode.com/
12.0
M
40
ZeroCERT
2
2021-11-01 11:17
askinstall60.exe
3d3d006726a944136a63820c48a81ee5
Gen2
Trojan_PWS_Stealer
Credential
User Data
Generic Malware
Malicious Packer
Malicious Library
SQLite Cookie
UPX
PE File
OS Processor Check
PE32
PNG Format
Browser Info Stealer
VirusTotal
Malware
suspicious privilege
MachineGuid
Code Injection
Malicious Traffic
Checks debugger
WMI
Creates executable files
ICMP traffic
exploit crash
Windows utilities
suspicious process
WriteConsoleW
installed browsers check
Tofsee
Windows
Exploit
Browser
ComputerName
Remote Code Execution
DNS
crashed
4
Keyword trend analysis
×
Info
×
http://www.jjnices.top/Home/Index/lkdinl
http://www.iyiqian.com/ - rule_id: 2326
https://iplogger.org/1mxKf7
https://www.listincode.com/ - rule_id: 2327
8
Info
×
www.listincode.com(149.28.253.196) - mailcious
www.jjnices.top(91.210.171.115)
www.iyiqian.com(103.155.92.58) - mailcious
iplogger.org(88.99.66.31) - mailcious
149.28.253.196
103.155.92.58 - mailcious
88.99.66.31 - mailcious
91.210.171.115
3
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET DNS Query to a *.top domain - Likely Hostile
ET INFO HTTP Request to a *.top domain
2
Info
×
http://www.iyiqian.com/
https://www.listincode.com/
10.0
M
42
ZeroCERT
First
1
Last
Total : 2cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword