Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
49111
2024-10-21 15:00
w.exe
d4826d365cf4dd98966196f868817394
Malicious Library
Malicious Packer
Antivirus
.NET framework(MSIL)
UPX
PE File
.NET EXE
PE32
OS Processor Check
VirusTotal
Malware
Check memory
Checks debugger
unpack itself
2.0
M
61
ZeroCERT
49112
2024-10-21 17:05
00000000.exe
cd415bfdf24a89a41789a86b67d07bea
Gen1
Generic Malware
Malicious Packer
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
PDB
1.4
M
53
ZeroCERT
49113
2024-10-21 17:05
SoftWall.exe
f7c9ceb8ad6ca3b2a1e0e264cd3673ae
Generic Malware
Malicious Library
Downloader
Malicious Packer
UPX
PE File
ftp
PE64
OS Processor Check
VirusTotal
Malware
PDB
1.8
45
ZeroCERT
49114
2024-10-21 17:07
11wY50tpm.exe
3b38690db145fd74d4d52bab2ac78074
Malicious Library
Downloader
VMProtect
PE File
PE64
VirusTotal
Malware
2.0
M
35
ZeroCERT
49115
2024-10-21 17:07
p90.dll
b1834e1ac5d374dbdfc865de566834b9
XMRig Miner
Generic Malware
Malicious Library
Malicious Packer
UPX
PE File
DLL
PE64
DllRegisterServer
dll
OS Processor Check
VirusTotal
Malware
Checks debugger
unpack itself
ComputerName
2.0
37
ZeroCERT
49116
2024-10-21 17:09
1.exe
2d019540d9821037f1c96050cf7f551b
Emotet
Gen1
Generic Malware
Malicious Library
UPX
Antivirus
PE File
PE64
CAB
VirusTotal
Malware
powershell
AutoRuns
PDB
suspicious privilege
MachineGuid
Check memory
Checks debugger
Creates shortcut
Creates executable files
unpack itself
Windows utilities
suspicious process
Windows
ComputerName
Remote Code Execution
Cryptographic key
6.0
M
17
ZeroCERT
49117
2024-10-21 17:11
scbronkz.dll
ccf473cc10b909c51907438f45273063
Generic Malware
Malicious Library
UPX
PE File
DLL
PE64
OS Processor Check
VirusTotal
Malware
unpack itself
crashed
2.0
M
42
ZeroCERT
49118
2024-10-21 17:14
esphvcionbronkz.exe
2852f7c19b7367e02b916508c9e8d215
Malicious Library
VMProtect
PE File
PE64
VirusTotal
Malware
1.8
M
21
ZeroCERT
49119
2024-10-21 17:16
11wY50spoofer.exe
366820e26797d49013c1d0e21beb26cb
Malicious Library
Downloader
VMProtect
PE File
PE64
VirusTotal
Malware
2.2
M
49
ZeroCERT
49120
2024-10-22 05:33
CShield.dll
db5198ea4d04bad9c91dc04ba2033579
Malicious Library
PE File
DLL
PE32
Check memory
crashed
1.0
M
guest
49121
2024-10-22 09:55
FORGREECEEEOOOOMPDW-constraint...
50b077ebb8d0ec5ccfa4c82bc511f5d6
Generic Malware
Antivirus
Hide_URL
PowerShell
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
Check virtual network interfaces
suspicious process
WriteConsoleW
Windows
Advertising
Google
ComputerName
Cryptographic key
2
Keyword trend analysis
×
Info
×
http://mondayyyyvbsgreeceee.duckdns.org/droidlatestttttt875869.txt
https://drive.google.com/uc?export=download&id=1-Wdgeq0fX9aApdlSW9dln1Pc_KEGpfHp
1
Info
×
drive.google.com(142.250.76.142) - mailcious
6.6
9
ZeroCERT
49122
2024-10-22 09:58
P4.exe
51927f923d06e3219f61615b9526a663
Malicious Library
UPX
PE File
PE32
MZP Format
JPEG Format
.NET EXE
DLL
VirusTotal
Malware
AutoRuns
Check memory
Checks debugger
Creates executable files
unpack itself
AppData folder
Windows
Advertising
Google
ComputerName
DNS
DDNS
crashed
keylogger
3
Info
×
docs.google.com(172.217.25.174) - mailcious
xred.mooo.com() - mailcious
freedns.afraid.org(69.42.215.252)
1
Info
×
ET INFO DYNAMIC_DNS Query to Abused Domain *.mooo.com
7.0
65
ZeroCERT
49123
2024-10-22 09:58
mysq1.exe
fa2efb3b704384a5fe40b382738657c1
Malicious Library
Malicious Packer
UPX
PE File
PE64
VirusTotal
Malware
crashed
1.4
11
ZeroCERT
49124
2024-10-22 14:51
build.exe
0f0d9c2f1a7d16b87a8b6be05c9d12c3
Generic Malware
Malicious Library
Admin Tool (Sysinternals etc ...)
Malicious Packer
UPX
PE File
ftp
PE64
OS Processor Check
VirusTotal
Malware
PDB
1.8
32
ZeroCERT
49125
2024-10-23 09:08
win78MPDW-constraints.vbs
d62f25ced5ad03573d59a9d6fe47faef
Generic Malware
Antivirus
Hide_URL
PowerShell
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
Check virtual network interfaces
suspicious process
WriteConsoleW
Windows
Advertising
Google
ComputerName
Cryptographic key
2
Keyword trend analysis
×
Info
×
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
http://198.46.178.134/madamwebbbbbbbbbbase6444.txt
1
Info
×
drive.google.com(142.250.76.142) - mailcious
10.0
5
ZeroCERT
First
Previous
3271
3272
3273
3274
3275
3276
3277
3278
3279
3280
Next
Last
Total : 49,283cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword