Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
38791
2021-11-05 03:45
monitor.bytes
b7b72dea02a7a301ecac42a47ca8f25a
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
3.8
guest
38792
2021-11-05 03:45
commoninc.bytes
f48a588b2d239cb5c8ea9ffcfdd8a30b
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.2
guest
38793
2021-11-05 03:45
md5.bytes
fe0ce4cafefde55959b6031e0ae32ad7
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
38794
2021-11-05 03:44
copyclassfunction.bytes
22c510bcd8c165d4fa0cd64490516c85
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
3.8
guest
38795
2021-11-05 03:43
typecheck.bytes
584de4e6b6ec0e0dce154120afeb73af
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.2
guest
38796
2021-11-05 03:42
luawrapfiles.bytes
d674e2610f6b78d9dafbcabe25edfe70
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
3.8
guest
38797
2021-11-05 03:42
memorydump.bytes
a62c187a2f9e9586b13fd22553a6bd63
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
38798
2021-11-05 03:41
commonclientdefs.bytes
eb901f00be8d5dac1a9f7902aa3936b0
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
3.8
guest
38799
2021-11-05 03:40
luaprofiler.bytes
32452897194b25b15f27893bf8cd0e99
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
5.2
guest
38800
2021-11-05 03:40
luapanda.bytes
ed634369512b4ed16ff2ce8441e8e821
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
38801
2021-11-05 03:39
common.bytes
bf5460d3d9c1bb2d6b8aa12f3db8b092
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
3.8
guest
38802
2021-11-05 03:38
gacconfig.bytes
f8a68ae046ae3bf4d09074131f49d9de
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.2
guest
38803
2021-11-05 03:38
classscript.bytes
52636e2354ea0e4f6848633556235257
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
3.8
guest
38804
2021-11-05 03:37
copyclassfunction.bytes
22c510bcd8c165d4fa0cd64490516c85
Create Service
DGA
Socket
Steal credential
DNS
Internet API
Hijack Network
Code injection
Sniff Audio
HTTP
KeyLogger
FTP
Escalate priviledges
Downloader
ScreenShot
Http API
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
38805
2021-11-05 03:36
debuggermgrinc.bytes
d99b84ec646e545c6c3bea4d03cb7d7f
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
3.8
guest
First
Previous
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
Next
Last
Total : 53,690cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword