Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
7711
2024-07-15 09:46
setup.exe
6a3939be71bff89a00b8d66c0cdae6d2
Malicious Library
PE File
PE32
Checks debugger
WMI
Creates executable files
RWX flags setting
unpack itself
Checks Bios
anti-virtualization
ComputerName
3.6
ZeroCERT
7712
2024-07-15 09:39
Rrobknnz-TPBA.exe
54b737b86fddcb3ca236a6cf743e66e7
Generic Malware
Antivirus
PE File
.NET EXE
PE32
VirusTotal
Malware
Buffer PE
PDB
suspicious privilege
Check memory
Checks debugger
buffers extracted
Creates shortcut
unpack itself
suspicious process
AppData folder
Windows
ComputerName
Cryptographic key
6.0
M
54
ZeroCERT
7713
2024-07-15 09:38
Milieuskadeligst.exe
99af50ba5059f85a1c8bd15ecf23fb3b
Malicious Library
PE File
PE64
VirusTotal
Malware
suspicious privilege
MachineGuid
Check memory
Checks debugger
unpack itself
2.6
M
50
ZeroCERT
7714
2024-07-15 09:37
Eflbu.exe
e3dc222d0a34c4b230f538a67bb7265d
Malicious Library
PE File
.NET EXE
PE32
VirusTotal
Malware
Buffer PE
suspicious privilege
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
ComputerName
Cryptographic key
4.8
M
63
ZeroCERT
7715
2024-07-15 09:36
Trkyzwvg-TG-R.exe
42208ec96d3a525eb6c8fb7039dc680a
Generic Malware
.NET framework(MSIL)
Antivirus
PE File
.NET EXE
PE32
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
powershell.exe wrote
suspicious process
AppData folder
Windows
ComputerName
Cryptographic key
5.4
M
58
ZeroCERT
7716
2024-07-15 09:35
AntiVirus2.exe
e81179996dbd2490c45ca13d80eae0a8
PE File
.NET EXE
PE32
VirusTotal
Malware
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
DNS
Cryptographic key
1
Info
×
64.7.198.198
4.6
M
58
ZeroCERT
7717
2024-07-15 09:33
PDF.FaturaDetay_202407.exe
3a2ba5be087162cfdb5d49ac32edd534
Emotet
Generic Malware
Malicious Library
Antivirus
UPX
Confuser .NET
.NET framework(MSIL)
AntiDebug
AntiVM
DllRegisterServer
dll
PE File
PE32
MZP Format
PowerShell
CAB
.NET EXE
VirusTotal
Malware
powershell
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
Creates shortcut
Creates executable files
unpack itself
powershell.exe wrote
Check virtual network interfaces
suspicious process
anti-virtualization
installed browsers check
Tofsee
Windows
Browser
ComputerName
Cryptographic key
2
Info
×
smtp.mail.ru(94.100.180.160)
217.69.139.160
2
Info
×
SURICATA Applayer Detect protocol only one direction
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
11.6
M
43
ZeroCERT
7718
2024-07-15 09:32
pqjvyogm.exe
6498c822022751dbe8abb655e6ac9db0
PE File
.NET EXE
PE32
VirusTotal
Malware
MachineGuid
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
DNS
Cryptographic key
1
Info
×
141.95.12.235
3.8
M
49
ZeroCERT
7719
2024-07-15 09:31
vikis.txt.vbs
26a4c267e7169f70a2f810854c0214cd
Generic Malware
Antivirus
PowerShell
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
Cryptographic key
crashed
6.2
M
10
ZeroCERT
7720
2024-07-15 09:30
217.exe
42e2d273ee6215957f2b979737a74b45
Generic Malware
Malicious Library
UPX
PE File
PE32
OS Processor Check
VirusTotal
Malware
unpack itself
crashed
1.8
M
26
ZeroCERT
7721
2024-07-15 09:30
1PDF.FaturaDetay_202407.exe
d8bf792f818877bf4848fde9511caeb8
Emotet
Generic Malware
Malicious Library
Antivirus
UPX
Confuser .NET
.NET framework(MSIL)
AntiDebug
AntiVM
DllRegisterServer
dll
PE File
PE32
MZP Format
PowerShell
CAB
.NET EXE
VirusTotal
Malware
powershell
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
Creates shortcut
Creates executable files
unpack itself
powershell.exe wrote
Check virtual network interfaces
suspicious process
AntiVM_Disk
anti-virtualization
VM Disk Size Check
installed browsers check
Tofsee
Windows
Browser
ComputerName
Cryptographic key
crashed
2
Info
×
smtp.mail.ru(217.69.139.160)
94.100.180.160
2
Info
×
SURICATA Applayer Detect protocol only one direction
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
13.6
M
44
ZeroCERT
7722
2024-07-15 09:29
SIP.03746.XSLSX.exe
a3e681364daaa68ce0177581573f483f
Emotet
Generic Malware
Malicious Library
Antivirus
UPX
Confuser .NET
.NET framework(MSIL)
AntiDebug
AntiVM
DllRegisterServer
dll
PE File
PE32
MZP Format
PowerShell
CAB
.NET EXE
VirusTotal
Malware
powershell
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
Creates shortcut
Creates executable files
unpack itself
powershell.exe wrote
Check virtual network interfaces
suspicious process
suspicious TLD
anti-virtualization
installed browsers check
Tofsee
Windows
Browser
ComputerName
Cryptographic key
3
Info
×
smtp.mail.ru(94.100.180.160)
94.100.180.160
217.69.139.160
2
Info
×
SURICATA Applayer Detect protocol only one direction
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
12.2
38
ZeroCERT
7723
2024-07-15 09:28
nlb.txt.vbs
afd1fa691ac9b0ab5b39fd8a0d0e40d7
Generic Malware
Antivirus
PowerShell
VirusTotal
Malware
powershell
AutoRuns
suspicious privilege
Malicious Traffic
Check memory
Checks debugger
buffers extracted
Creates shortcut
Creates executable files
unpack itself
Check virtual network interfaces
suspicious process
WriteConsoleW
Tofsee
Windows
ComputerName
DNS
Cryptographic key
1
Keyword trend analysis
×
Info
×
https://paste.ee/d/V3Lmu/0
2
Info
×
paste.ee(104.21.84.67) - mailcious
172.67.187.200 - mailcious
3
Info
×
ET INFO Pastebin-like Service Domain in DNS Lookup (paste .ee)
ET POLICY Pastebin-style Service (paste .ee) in TLS SNI
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
10.6
M
10
ZeroCERT
7724
2024-07-15 09:27
dmi.txt.vbs
7e4e5ec429a0738c15593112bcf50406
Generic Malware
Antivirus
PowerShell
VirusTotal
Malware
powershell
suspicious privilege
Check memory
Checks debugger
Creates shortcut
unpack itself
suspicious process
WriteConsoleW
Windows
ComputerName
Cryptographic key
1
Keyword trend analysis
×
Info
×
http://38.22.104.227:666/tnttawy.jpg
6.2
M
23
ZeroCERT
7725
2024-07-15 09:21
nlb.txt.vbs
afd1fa691ac9b0ab5b39fd8a0d0e40d7
Antivirus
VirusTotal
Malware
0.6
M
10
ZeroCERT
First
Previous
511
512
513
514
515
516
517
518
519
520
Next
Last
Total : 53,759cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword