00000004.00000003.347389084.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000004.00000003.347389084.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000004.00000003.347389084.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.354187401.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.354187401.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.354187401.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000005.00000003.322255740.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000005.00000003.322255740.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000005.00000003.322255740.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000002.817394092.0000000001379000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif_1 | Yara detected Ursnif | Joe Security | |
00000005.00000003.322346163.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000005.00000003.322346163.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000005.00000003.322346163.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000004.00000003.347438026.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000004.00000003.347438026.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000004.00000003.347438026.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000004.00000003.347208366.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000004.00000003.347208366.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000004.00000003.347208366.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000005.00000003.322130590.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000005.00000003.322130590.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000005.00000003.322130590.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.343566603.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.343566603.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.343566603.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.343497649.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.343497649.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.343497649.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000004.00000003.347419865.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000004.00000003.347419865.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000004.00000003.347419865.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000005.00000002.817370838.0000000004B09000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif_1 | Yara detected Ursnif | Joe Security | |
00000005.00000003.322318617.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000005.00000003.322318617.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000005.00000003.322318617.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.343438473.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.343438473.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.343438473.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.354124347.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.354124347.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.354124347.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.353972705.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.353972705.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.353972705.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000004.00000003.347302093.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000004.00000003.347302093.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000004.00000003.347302093.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000002.817516370.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000002.817516370.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000002.817516370.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000004.00000003.347451141.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000004.00000003.347451141.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000004.00000003.347451141.0000000004EA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.343171916.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.343171916.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.343171916.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.354053342.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.354053342.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.354053342.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.343329790.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.343329790.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.343329790.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.354175000.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.354175000.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.354175000.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000005.00000003.322083374.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000005.00000003.322083374.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000005.00000003.322083374.0000000004FF8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.354150298.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.354150298.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.354150298.0000000004F88000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
|
00000004.00000002.817337923.00000000049B9000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif_1 | Yara detected Ursnif | Joe Security | |
00000000.00000003.343470122.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.343470122.0000000001AC8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost
|