Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
3796
2024-05-28 09:58
applovin_exo_ic_skip_previous....
502d9d6e632de992a431618fcc3f6947
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
3797
2024-05-28 09:57
applovin_exo_ic_skip_previous....
502d9d6e632de992a431618fcc3f6947
Downloader
Create Service
Socket
DGA
Http API
ScreenShot
Escalate priviledges
Steal credential
PWS
Hijack Network
Sniff Audio
HTTP
DNS
Code injection
Internet API
persistence
FTP
KeyLogger
P2P
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
3798
2024-05-28 09:57
applovin_exo_ic_speed.xml
38afc050777f4820124521f888a0561f
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
3799
2024-05-28 09:57
3.exe
dba41f91114792a95067817ad837f4ab
Generic Malware
Malicious Library
PE File
PE32
VirusTotal
Malware
unpack itself
1.6
M
25
ZeroCERT
3800
2024-05-28 09:56
Setup.exe
ae47c12b9320e702a9ce243193494554
Generic Malware
Malicious Library
UPX
AntiDebug
AntiVM
PE File
PE32
FTP Client Info Stealer
VirusTotal
Malware
Telegram
MachineGuid
Code Injection
Malicious Traffic
Check memory
WMI
unpack itself
Windows utilities
Collect installed applications
suspicious process
AppData folder
sandbox evasion
WriteConsoleW
anti-virtualization
installed browsers check
Tofsee
Windows
Browser
ComputerName
DNS
Software
2
Keyword trend analysis
×
Info
×
https://steamcommunity.com/profiles/76561199689717899
https://t.me/copterwin
5
Info
×
t.me(149.154.167.99) - mailcious
steamcommunity.com(104.106.57.101) - mailcious
149.154.167.99 - mailcious
37.27.34.12
23.1.179.144 - mailcious
3
Info
×
ET INFO TLS Handshake Failure
ET INFO Observed Telegram Domain (t .me in TLS SNI)
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
10.8
M
18
ZeroCERT
3801
2024-05-28 09:55
applovin_exo_ic_settings.xml
62e17c87882af2b994f9054d0b3fd4d9
Downloader
Create Service
Socket
DGA
Http API
ScreenShot
Escalate priviledges
Steal credential
PWS
Hijack Network
Sniff Audio
HTTP
DNS
Code injection
Internet API
persistence
FTP
KeyLogger
P2P
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
3802
2024-05-28 09:55
applovin_exo_ic_settings.xml
62e17c87882af2b994f9054d0b3fd4d9
Downloader
Create Service
Socket
DGA
Http API
ScreenShot
Escalate priviledges
Steal credential
PWS
Hijack Network
Sniff Audio
HTTP
DNS
Code injection
Internet API
persistence
FTP
KeyLogger
P2P
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
3803
2024-05-28 09:54
s.exe
bc6d39d7372c8f38fcc60cf3ce2a48f1
Generic Malware
Malicious Library
Downloader
Malicious Packer
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
Check memory
unpack itself
crashed
2.0
M
51
ZeroCERT
3804
2024-05-28 09:54
applovin_exo_ic_skip_next.xml
4663384a093d8077e134a4eb66aa6c82
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
3805
2024-05-28 09:54
applovin_exo_ic_skip_next.xml
4663384a093d8077e134a4eb66aa6c82
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
3806
2024-05-28 09:51
applovin_exo_ic_rewind.xml
848904b2849c8ba0d3b780401ba616a7
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
3807
2024-05-28 09:50
applovin_exo_ic_play_circle_fi...
93728177a4e72b4085403c4b6351fd01
Downloader
Create Service
Socket
DGA
Http API
ScreenShot
Escalate priviledges
Steal credential
PWS
Hijack Network
Sniff Audio
HTTP
DNS
Code injection
Internet API
persistence
FTP
KeyLogger
P2P
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
3808
2024-05-28 09:50
rooming.hta
5f0dd9ef756c02785e681153c17ee786
Generic Malware
Antivirus
PowerShell
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
RWX flags setting
unpack itself
powershell.exe wrote
Check virtual network interfaces
suspicious process
WriteConsoleW
Tofsee
Windows
ComputerName
DNS
Cryptographic key
3
Info
×
foundationforwomenshealth.com(148.251.146.162) - mailcious
23.52.33.11
148.251.146.162 - mailcious
3
Info
×
SURICATA TLS invalid record type
SURICATA TLS invalid record/traffic
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
7.6
M
ZeroCERT
3809
2024-05-28 09:49
applovin_exo_ic_rewind.xml
848904b2849c8ba0d3b780401ba616a7
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
3810
2024-05-28 09:47
applovin_exo_ic_play_circle_fi...
93728177a4e72b4085403c4b6351fd01
Downloader
Create Service
Socket
DGA
Http API
ScreenShot
Escalate priviledges
Steal credential
PWS
Hijack Network
Sniff Audio
HTTP
DNS
Code injection
Internet API
persistence
FTP
KeyLogger
P2P
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
First
Previous
251
252
253
254
255
256
257
258
259
260
Next
Last
Total : 48,345cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword