Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
49081
2024-10-21 14:07
reverse.exe
2a18a597200994af2b1eaa57d789f979
Metasploit
Meterpreter
Generic Malware
PE File
PE64
VirusTotal
Malware
DNS
1
Info
×
188.166.177.132 - malware
3.0
M
59
ZeroCERT
49082
2024-10-21 14:08
ncat.exe
b6e0db27c2b3e62db616b0918a5d8ed8
Generic Malware
Malicious Library
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
WriteConsoleW
1.2
38
ZeroCERT
49083
2024-10-21 14:09
rev.exe
ef734216083e11283bcf66e631014748
Malicious Packer
UPX
PE File
PE32
VirusTotal
Malware
unpack itself
DNS
1
Info
×
188.166.177.132 - malware
3.6
M
61
ZeroCERT
49084
2024-10-21 14:10
windows.exe
a94bc986375eba0f2b06f3729a2fd7d6
Malicious Packer
UPX
PE File
PE32
VirusTotal
Malware
unpack itself
DNS
1
Info
×
188.166.177.132 - malware
3.6
M
62
ZeroCERT
49085
2024-10-21 14:12
cred.dll
4e1394044881a2fcd0574aa58f848537
Generic Malware
Malicious Library
UPX
Antivirus
PE File
DLL
PE32
OS Processor Check
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
Cryptocurrency wallets
Cryptocurrency
powershell
suspicious privilege
MachineGuid
Check memory
Checks debugger
Creates shortcut
unpack itself
Windows utilities
powershell.exe wrote
suspicious process
sandbox evasion
installed browsers check
Windows
Browser
Email
ComputerName
DNS
Cryptographic key
Software
1
Info
×
176.111.174.140 - malware
9.8
M
49
ZeroCERT
49086
2024-10-21 14:12
program.exe
7d2eb1b2a364d686f6d4f17cdf626810
Malicious Library
Malicious Packer
UPX
PE File
PE64
VirusTotal
Malware
WriteConsoleW
2.2
M
49
ZeroCERT
49087
2024-10-21 14:14
test.exe
3e5777de48f53f6b3224e29634ca6691
Malicious Packer
UPX
PE File
PE64
VirusTotal
Malware
0.6
M
4
ZeroCERT
49088
2024-10-21 14:16
Sniffthem.exe
d0cce7870080bd889dba1f4cfd2b3b26
Generic Malware
Malicious Library
Malicious Packer
UPX
Http API
Escalate priviledges
HTTP
Code injection
Internet API
persistence
AntiDebug
AntiVM
PE File
PE64
OS Processor Check
Lnk Format
GIF Format
VirusTotal
Malware
Buffer PE
AutoRuns
Code Injection
Checks debugger
buffers extracted
Creates shortcut
Creates executable files
unpack itself
suspicious process
sandbox evasion
Windows
Firefox
Browser
ComputerName
crashed
11.2
M
53
ZeroCERT
49089
2024-10-21 14:18
clip.dll
fc4faaa0d820e943dbf1235a84ae165e
Amadey
Generic Malware
Malicious Library
UPX
PE File
DLL
PE32
OS Processor Check
VirusTotal
Malware
Checks debugger
unpack itself
DNS
1
Info
×
176.111.174.140 - malware
3.4
M
47
ZeroCERT
49090
2024-10-21 14:29
wildfire-test-pe-file.exe
8d608036b37676fd1255599098816c05
Generic Malware
Malicious Library
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
1.2
M
52
ZeroCERT
49091
2024-10-21 14:29
mandayyyyxxxMPDW-constraints.v...
13c59b5d505a28be9383f9be8cf48cb0
Generic Malware
Antivirus
Hide_URL
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
Check virtual network interfaces
suspicious process
WriteConsoleW
Windows
ComputerName
Cryptographic key
1
Keyword trend analysis
×
Info
×
https://raw.githubusercontent.com/CryptersAndToolsOficial/ZIP/refs/heads/main/DetahNote_V.jpg
1
Info
×
raw.githubusercontent.com(185.199.111.133) - malware
6.2
6
ZeroCERT
49092
2024-10-21 14:31
file.exe
0ef3890b051c62c04435a5ab8cb15ec2
Emotet
Gen1
Malicious Library
Malicious Packer
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
buffers extracted
unpack itself
suspicious TLD
DNS
6
Info
×
support.oracle.com(104.75.31.138)
wloppyload.top()
support.apple.com(104.75.8.74)
www.intel.com(104.75.24.141)
help.twitter.com(172.64.151.237)
support.microsoft.com(13.107.246.74)
1
Info
×
ET DNS Query to a *.top domain - Likely Hostile
3.2
M
58
ZeroCERT
49093
2024-10-21 14:32
config_40.ps1
2eb146952746ba301363cf93d128bb65
Generic Malware
Antivirus
VirusTotal
Malware
Check memory
unpack itself
Check virtual network interfaces
WriteConsoleW
Windows
ComputerName
DNS
Cryptographic key
crashed
1
Keyword trend analysis
×
Info
×
http://217.12.206.79/index.php
1
Info
×
217.12.206.79
3.8
8
ZeroCERT
49094
2024-10-21 14:34
ee.exe
ca3793c67c597ad1644a43ede3a94e78
Malicious Library
Malicious Packer
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
VirusTotal
Malware
IP Check
DNS
DoTNet
4
Info
×
freegeoip.net(15.197.148.33)
api.ipify.org(104.26.13.205)
ip-api.com(208.95.112.1)
128.0.1.24
3
Info
×
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
ET INFO External IP Lookup Domain (freegeiop .net in DNS lookup)
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
3.2
65
ZeroCERT
49095
2024-10-21 14:34
ardara.exe
30c6bf614292827bf72ab2a53dde9def
Malicious Library
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
2.0
M
58
ZeroCERT
First
Previous
3271
3272
3273
3274
3275
3276
3277
3278
3279
3280
Next
Last
Total : 49,283cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword