Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
49351
2024-11-11 09:43
Atualizador_Fiscal_NFe.msi
61b54e1bd417282f38e537804fd1d1db
Generic Malware
Malicious Library
MSOffice File
CAB
OS Processor Check
VirusTotal
Malware
Buffer PE
suspicious privilege
Check memory
Checks debugger
buffers extracted
unpack itself
AntiVM_Disk
VM Disk Size Check
ComputerName
4
Info
×
ocsp.digicert.com(152.195.38.76) -
ps.pndsn.com(18.179.18.154) -
crl3.digicert.com(152.195.38.76) -
agent-api.atera.com(20.37.139.187) -
4.2
23
ZeroCERT
49352
2024-11-11 09:44
rubeus.exe
d3cb670bc75962b199e6613752b78a47
Generic Malware
Malicious Library
Malicious Packer
PE File
.NET EXE
PE32
VirusTotal
Malware
PDB
Check memory
Checks debugger
unpack itself
2.2
59
ZeroCERT
49353
2024-11-11 09:44
main.exe
4054233ef6205f36c696ab115691a830
Hide_EXE
Malicious Library
Malicious Packer
UPX
PE File
PE32
VirusTotal
Malware
crashed
2.0
50
ZeroCERT
49354
2024-11-11 09:44
Responder.exe
c808d2ed8bb6b2e3c06c907a01b73d06
Gen1
Generic Malware
Malicious Library
UPX
PE File
PE32
DLL
OS Processor Check
.NET DLL
VirusTotal
Malware
Creates executable files
AppData folder
WriteConsoleW
2.6
44
ZeroCERT
49355
2024-11-11 09:46
ZF3dxapdNLa4lNL.doc
1b78b5dae336b9bb76e7724fc9e49509
MS_RTF_Obfuscation_Objects
RTF File
doc
VirusTotal
Malware
buffers extracted
exploit crash
unpack itself
Exploit
DNS
crashed
1
Info
×
87.120.84.38 -
4.8
35
ZeroCERT
49356
2024-11-11 09:47
remcos_a.exe
910327e1694532d09255bd8873c2265b
Themida
Malicious Packer
Anti_VM
PE File
PE32
VirusTotal
Malware
Checks debugger
unpack itself
Checks Bios
Detects VMWare
VMware
anti-virtualization
Windows
DNS
DDNS
crashed
keylogger
2
Info
×
ms-office1.duckdns.org() -
ms-office.duckdns.org(194.59.31.120) -
2
Info
×
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
7.0
52
ZeroCERT
49357
2024-11-11 09:48
GreenField.docx
18208ba6920a74e8ca7bd244571ae383
PE File
.NET EXE
PE32
VirusTotal
Malware
PDB
Check memory
Checks debugger
unpack itself
ComputerName
2.4
48
ZeroCERT
49358
2024-11-11 09:49
ChromeSetup.exe
de04168171981a90f56a126ec055ba19
Malicious Library
PE File
.NET EXE
PE32
VirusTotal
Malware
suspicious privilege
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
Cryptographic key
5.2
51
ZeroCERT
49359
2024-11-11 09:50
ChromeSetup.exe
de04168171981a90f56a126ec055ba19
Malicious Library
PE File
.NET EXE
PE32
VirusTotal
Malware
suspicious privilege
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
Cryptographic key
5.2
51
ZeroCERT
49360
2024-11-11 09:51
build.exe
32bd212358faf07219b8aee96bf42a78
Generic Malware
Malicious Library
PE File
PE64
VirusTotal
Malware
Check memory
unpack itself
1
Info
×
sokopar55.store(172.67.191.62) -
2.2
52
ZeroCERT
49361
2024-11-11 09:52
MajesticExec.exe
1963ce8f3f680d344d195bc27449b9a7
Generic Malware
Malicious Packer
PE File
PE64
VirusTotal
Malware
1.8
45
ZeroCERT
49362
2024-11-11 09:54
asd.exe
c52e39baa318823a55e073d708c51c17
Suspicious_Script_Bin
AntiDebug
AntiVM
MSOffice File
VirusTotal
Malware
Code Injection
RWX flags setting
unpack itself
Windows utilities
suspicious process
Windows
crashed
4.4
9
ZeroCERT
49363
2024-11-11 09:58
app.ocx
5ded21fda5b017a2deb5c5a885aceb80
Gen1
Generic Malware
Malicious Library
ASPack
UPX
Anti_VM
PE File
PE64
OS Processor Check
DLL
ZIP Format
VirusTotal
Malware
Check memory
Checks debugger
Creates executable files
unpack itself
2.2
19
ZeroCERT
49364
2024-11-11 09:58
MajesticExec.exe
1963ce8f3f680d344d195bc27449b9a7
Generic Malware
Malicious Packer
PE File
PE64
VirusTotal
Malware
1.8
45
ZeroCERT
49365
2024-11-11 10:00
mesh.exe
0d6e405856f8687fb1a06645a85bb0f3
Generic Malware
Malicious Library
UPX
PE File
PE64
OS Processor Check
VirusTotal
Malware
PDB
MachineGuid
Check memory
Checks debugger
unpack itself
Windows utilities
suspicious process
Windows
ComputerName
Remote Code Execution
crashed
4.0
42
ZeroCERT
First
Previous
3291
3292
3293
3294
3295
Last
Total : 49,422cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword