Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
16
2025-04-09 10:01
Microsoft-Order.pdf.lnk
8b68173e0f5484fc965d50770f71a08d
Generic Malware
Antivirus
AntiDebug
AntiVM
Lnk Format
GIF Format
VirusTotal
Malware
suspicious privilege
Code Injection
Check memory
Checks debugger
Creates shortcut
unpack itself
suspicious process
Windows
ComputerName
Cryptographic key
4.4
31
ZeroCERT
17
2025-04-09 10:01
Gutschein20.pdf.lnk
db44d7799b322fed3f2e4313b7db20af
Generic Malware
Antivirus
AntiDebug
AntiVM
Lnk Format
GIF Format
VirusTotal
Malware
powershell
suspicious privilege
Code Injection
Check memory
Checks debugger
Creates shortcut
unpack itself
powershell.exe wrote
suspicious process
WriteConsoleW
Windows
ComputerName
Cryptographic key
5.0
26
ZeroCERT
18
2025-04-09 09:30
Sewi.exe.0021aed8_00123400.exe
b7200b147304d0bc49cf8385434791c6
Generic Malware
Malicious Library
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
crashed
2.0
40
guest
19
2025-04-09 09:30
Sewi.exe.0021aed8_00123400.exe
b7200b147304d0bc49cf8385434791c6
Generic Malware
Malicious Library
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
crashed
2.0
40
guest
20
2025-04-09 09:30
Sewi.exe.0021aed8_00123400.exe
b7200b147304d0bc49cf8385434791c6
Generic Malware
Malicious Library
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
crashed
2.0
40
guest
21
2025-04-09 05:15
psg3.es
9d7f49fbe95b8ed8e9895764429020e9
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
22
2025-04-09 00:05
Section_0_.text.dll.2025-04-08...
12e732df48d6cb7fae9b36365735b0a8
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
23
2025-04-08 23:03
iexplore.exe.00_000c5e00.exe
44c58df79e48e0460f692708558da2b0
Gen1
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
PE32
PDB
RCE
0.6
guest
24
2025-04-08 21:23
Section_0_.text.dll.2025-04-08...
36ce402c8dbfcb607b14e1f6174bfed0
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
25
2025-04-08 21:17
Section_0_.text.dll.2025-04-08...
36ce402c8dbfcb607b14e1f6174bfed0
AntiDebug
AntiVM
Email Client Info Stealer
suspicious privilege
Checks debugger
Creates shortcut
unpack itself
installed browsers check
Browser
Email
ComputerName
3.4
guest
26
2025-04-08 21:11
Section_0_.text.dll
c4a53b8c0687db6b2db68c2b307bda06
guest
27
2025-04-08 20:01
Tellimine_554399744002227748.i...
99dfdb455a6c1d016dee409a9ee999e3
Process Kill
Generic Malware
Malicious Library
FindFirstVolume
CryptGenKey
AntiDebug
AntiVM
Device_File_Check
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
1.8
13
guest
28
2025-04-08 09:32
700815a50547b01b29cf3a1ca55d7a...
33d5132d6c41b72b5faa7697a5e74e8e
AntiDebug
AntiVM
ftp
MSOffice File
Code Injection
RWX flags setting
unpack itself
Windows utilities
Tofsee
Windows
1
Keyword trend analysis
×
Info
×
http://cacerts.digicert.com/DigiCertGlobalRootG2.crt
2
Info
×
cacerts.digicert.com(23.36.55.181)
118.214.79.16
1
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
2.6
ZeroCERT
29
2025-04-08 09:31
Statements and Invoice 5400981...
18f42eda13f0234cbd82047e874d7823
VirusTotal
Malware
VBScript
wscript.exe payload download
Tofsee
Cloudflare
DNS
Dropper
1
Keyword trend analysis
×
Info
×
https://dat-voip-sit-cio.trycloudflare.com/V8.ps1
2
Info
×
dat-voip-sit-cio.trycloudflare.com(104.16.230.132) - mailcious
104.16.230.132 - mailcious
4
Info
×
ET HUNTING TryCloudFlare Domain in TLS SNI
ET INFO Observed trycloudflare .com Domain in TLS SNI
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET POLICY Observed DNS Query to Commonly Abused Cloudflare Domain (trycloudflare .com)
10.0
M
9
ZeroCERT
30
2025-04-08 09:30
RE_00739403029489392_PDF.wsf
0949e0e5da1e9cc08407bdc02920e270
Generic Malware
Antivirus
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
WMI
Creates shortcut
unpack itself
Windows utilities
suspicious process
WriteConsoleW
Windows
ComputerName
Cloudflare
DNS
Cryptographic key
1
Keyword trend analysis
×
Info
×
https://bufing-portfolio-eventually-quote.trycloudflare.com/Rev.bat
2
Info
×
bufing-portfolio-eventually-quote.trycloudflare.com(104.16.230.132) - mailcious
104.16.231.132 - malware
1
Info
×
ET POLICY Observed DNS Query to Commonly Abused Cloudflare Domain (trycloudflare .com)
7.2
6
ZeroCERT
First
Previous
1
2
3
4
5
6
7
8
9
10
Next
Last
Total : 52,360cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword