Home
Favorites
Tools
Dr.Zero Chatbot
Notifications
Guide
2020-06-10
Version history
2020-06-10
login
popup
Submissions
10
15
20
50
Request
Connection
hash(md5,sha256)
Signature
PE API
Tag or IDS
Icon
user nickname
Date range button:
Date range picker
First seen:
Last seen:
No
Date
Request
Urls
Hosts
IDS
Rule
Score
Zero
VT
Player
Etc
11101
2021-08-09 23:32
common.bytes
bf5460d3d9c1bb2d6b8aa12f3db8b092
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
11102
2021-08-09 23:33
AXX.exe
63cbf77b6342a627ca96c0e5021794a4
Generic Malware
Malicious Packer
SMTP
KeyLogger
AntiDebug
AntiVM
.NET EXE
PE File
PE32
Browser Info Stealer
FTP Client Info Stealer
VirusTotal
Email Client Info Stealer
Malware
suspicious privilege
Code Injection
Malicious Traffic
Check memory
Checks debugger
buffers extracted
unpack itself
Check virtual network interfaces
IP Check
Tofsee
Windows
Browser
Email
ComputerName
DNS
DDNS
Software
crashed
keylogger
2
Keyword trend analysis
×
Info
×
http://checkip.dyndns.org/
https://freegeoip.app/xml/175.208.134.150
4
Info
×
freegeoip.app(172.67.188.154)
checkip.dyndns.org(193.122.6.168)
193.122.6.168
172.67.188.154
3
Info
×
ET INFO DYNAMIC_DNS Query to *.dyndns. Domain
ET POLICY External IP Lookup - checkip.dyndns.org
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
13.4
M
26
ZeroCERT
11103
2021-08-09 23:34
commoninc.bytes
6a241669c8ceb81eae1ca0917ff85a39
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
11104
2021-08-09 23:34
commonclientdefs.bytes
5b7ff62cbac906a934443c076e88ec7a
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
11105
2021-08-09 23:34
vbc.exe
0941a59548b4f95082dfa17f85c6557c
AgentTesla
RAT
PWS
.NET framework
Gen2
Emotet
Gen1
browser
info stealer
Generic Malware
NSIS
Google
Chrome
User Data
UPX
Malicious Library
Malicious Packer
Admin Tool (Sysinternals etc ...)
Anti_VM
Socket
Create Service
Sniff Audio
Escalate priviledges
Ke
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
Creates executable files
unpack itself
Windows utilities
Checks Bios
Detects VirtualBox
suspicious process
AppData folder
WriteConsoleW
VMware
anti-virtualization
installed browsers check
Windows
Browser
ComputerName
DNS
Cryptographic key
Software
1
Info
×
45.137.22.101
15.4
M
56
ZeroCERT
11106
2021-08-09 23:35
debuggermgr.bytes
32f505a4e730f77c0c107882dcfb3770
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
11107
2021-08-09 23:35
nvcontainer1.exe
32bba43c8b2558806371cbed0682d89a
RAT
PWS
.NET framework
Generic Malware
UPX
AntiDebug
AntiVM
.NET EXE
PE File
PE32
VirusTotal
Malware
AutoRuns
suspicious privilege
Code Injection
Check memory
Checks debugger
buffers extracted
unpack itself
Windows
crashed
8.6
M
20
ZeroCERT
11108
2021-08-09 23:36
copyclassfunction.bytes
22c510bcd8c165d4fa0cd64490516c85
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
11109
2021-08-09 23:37
debuggermgrinc.bytes
d99b84ec646e545c6c3bea4d03cb7d7f
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
11110
2021-08-09 23:38
luaprofiler.bytes
32452897194b25b15f27893bf8cd0e99
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
1
Info
×
104.21.19.200
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.2
guest
11111
2021-08-09 23:39
typecheck.bytes
584de4e6b6ec0e0dce154120afeb73af
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
11112
2021-08-09 23:39
luapanda.bytes
ed634369512b4ed16ff2ce8441e8e821
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
ET INFO TLS Handshake Failure
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
5.8
guest
11113
2021-08-09 23:40
md5.bytes
fe0ce4cafefde55959b6031e0ae32ad7
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
Windows
Exploit
DNS
crashed
3.8
guest
11114
2021-08-09 23:41
memorydump.bytes
a62c187a2f9e9586b13fd22553a6bd63
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
1
Info
×
172.67.188.154
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.2
guest
11115
2021-08-09 23:41
luawrapfiles.bytes
03e76da0dbde0c8b741e05aa6febbed1
DGA
DNS
Socket
Create Service
Sniff Audio
Escalate priviledges
KeyLogger
Code injection
HTTP
Hijack Network
Internet API
FTP
ScreenShot
Http API
Steal credential
Downloader
P2P
persistence
AntiDebug
AntiVM
MSOffice File
Code Injection
RWX flags setting
exploit crash
unpack itself
Windows utilities
malicious URLs
Tofsee
Windows
Exploit
DNS
crashed
2
Info
×
SSLBL: Malicious JA3 SSL-Client Fingerprint detected (Tofsee)
ET INFO TLS Handshake Failure
4.8
guest
First
Previous
741
742
743
744
745
746
747
748
749
750
Next
Last
Total : 49,427cnts
Delete
×
Do you want to delete it?
View
×
Insert
×
http
domains
hosts
ips
Memo
Tag
Alert
×
Insert error....
keyword