Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
2326
2024-07-11 13:26
cldapi.dll
01616e91c5618d727f6a8110a582e3ff
Malicious Packer
UPX
PE File
DLL
PE64
OS Processor Check
VirusTotal
Malware
PDB
0.8
M
7
ZeroCERT
2327
2024-07-11 13:26
Pillager32.exe
d50a3bd841116bf8e7b37268a56a5caf
Malicious Library
Malicious Packer
PE File
.NET EXE
PE32
JPEG Format
ZIP Format
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
PDB
suspicious privilege
Check memory
Checks debugger
unpack itself
Collect installed applications
installed browsers check
Browser
Email
Software
crashed
5.6
M
51
ZeroCERT
2328
2024-07-11 13:24
krpt.dll
d4ef22f79c607984534fb8a21fce15ac
Generic Malware
Malicious Library
UPX
PE File
DLL
PE32
OS Processor Check
VirusTotal
Malware
Checks debugger
unpack itself
1.2
M
18
ZeroCERT
2329
2024-07-11 13:24
gg.exe
282895a5fdd5a9c87ef8ddefba4e07aa
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
0.4
M
7
ZeroCERT
2330
2024-07-11 13:22
parent.exe
79f0217feda3db821ac7c89d9c31ec7f
Generic Malware
PE File
PE32
VirusTotal
Malware
PDB
WriteConsoleW
0.8
2
ZeroCERT
2331
2024-07-11 13:22
get.exe
abd6cc945e157b48ef90264ae5f68baa
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
2.6
M
46
ZeroCERT
2332
2024-07-11 13:20
winws.exe
1625c2e651375de754d82329b5e8b924
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
PE64
VirusTotal
Malware
crashed
1.2
18
ZeroCERT
2333
2024-07-11 13:20
gpp.exe
783540957edcf666dd295ac4835f51e8
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
WriteConsoleW
2.0
7
ZeroCERT
2334
2024-07-11 13:18
gg.dll
fb440753675363fa570a94c2f907034f
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
DLL
PE64
OS Processor Check
VirusTotal
Malware
Checks debugger
crashed
1.6
M
39
ZeroCERT
2335
2024-07-11 13:17
goo.exe
8bd9ba6bf43c3664ac3179f8aaaf780b
Malicious Library
Malicious Packer
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
WriteConsoleW
2.4
21
ZeroCERT
2336
2024-07-11 09:36
see.exe
99c32c0ce5e09149ee86bf2e314bf389
RedLine stealer
ILProtector Packer
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
suspicious privilege
Check memory
Checks debugger
unpack itself
Windows
Cryptographic key
2.6
M
47
ZeroCERT
2337
2024-07-11 09:33
payload.exe
98cfc67eed512ad39df7bcc60ca10812
PE File
PE64
VirusTotal
Malware
PDB
unpack itself
DNS
crashed
2
Info
×
194.187.251.115 - mailcious
3.115.14.110
3.2
M
20
ZeroCERT
2338
2024-07-11 09:31
igcc.exe
7e2daf9fd0579b5b81c5898a2e10ed2e
Client SW User Data Stealer
Backdoor
RemcosRAT
browser
info stealer
Google
Chrome
User Data
Downloader
Malicious Library
Admin Tool (Sysinternals etc ...)
.NET framework(MSIL)
Create Service
Socket
ScreenShot
Escalate priviledges
PWS
Sniff Audio
DNS
Inter
Remcos
VirusTotal
Malware
Buffer PE
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
DNS
Cryptographic key
DDNS
keylogger
1
Keyword trend analysis
×
Info
×
http://geoplugin.net/json.gp
4
Info
×
geoplugin.net(178.237.33.50)
sembe.duckdns.org(194.187.251.115) - mailcious
178.237.33.50
194.187.251.115 - mailcious
3
Info
×
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
ET JA3 Hash - Remcos 3.x/4.x TLS Connection
12.0
M
53
ZeroCERT
2339
2024-07-11 09:29
f.exe
79f198f849919600241b898f482d197f
Malicious Library
Malicious Packer
UPX
Anti_VM
PE File
PE64
OS Processor Check
VirusTotal
Malware
WriteConsoleW
1.6
M
16
ZeroCERT
2340
2024-07-11 09:26
builds.exe
4022bc5f1dcdf1a90d117aa67917cc41
Generic Malware
Malicious Library
Antivirus
UPX
AntiDebug
AntiVM
PE File
PE32
OS Processor Check
FTP Client Info Stealer
VirusTotal
Malware
Telegram
MachineGuid
Code Injection
Malicious Traffic
Check memory
WMI
unpack itself
Windows utilities
Collect installed applications
suspicious process
AppData folder
sandbox evasion
WriteConsoleW
anti-virtualization
installed browsers check
Tofsee
Windows
Browser
ComputerName
DNS
Software
2
Keyword trend analysis
×
Info
×
https://steamcommunity.com/profiles/76561199735694209
https://t.me/puffclou
5
Info
×
t.me(149.154.167.99) - mailcious
steamcommunity.com(23.76.43.59) - mailcious
149.154.167.99 - mailcious
104.75.41.21 - mailcious
65.109.241.221
3
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO Observed Telegram Domain (t .me in TLS SNI)
ET INFO TLS Handshake Failure
11.6
M
45
ZeroCERT
First
Previous
151
152
153
154
155
156
157
158
159
160
Next
Last
Total : 48,289cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword