00000000.00000002.509856527.0000000000850000.00000040.00000020.00020000.00000000.sdmp | Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown | - 0x58a1:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
|
00000000.00000002.509728577.0000000000780000.00000040.00001000.00020000.00000000.sdmp | Windows_Trojan_Smokeloader_3687686f | unknown | unknown | - 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
|
00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439407520.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439271373.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439423736.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439453495.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439387430.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000002.510107149.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439306585.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439442593.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.439341989.0000000002F18000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
|
Process Memory Space: server.exe PID: 6020 | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
Process Memory Space: server.exe PID: 6020 | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x8e9:$a5: filename="%.4u.%lu"
- 0xa9f:$a5: filename="%.4u.%lu"
- 0x154bd:$a5: filename="%.4u.%lu"
- 0x15673:$a5: filename="%.4u.%lu"
- 0x49c:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x15070:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x610:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x9e9:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xba1:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x14c40:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x14d21:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x14ec3:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x151e4:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x155bd:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x15775:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x1db0d:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x1dbee:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x1de52:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe01:$a9: &whoami=%s
- 0x159d5:$a9: &whoami=%s
- 0xdea:$a10: %u.%u_%u_%u_x%u
|
Process Memory Space: server.exe PID: 6020 | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0x990:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0xb48:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x15564:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x1571c:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x49c:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x4f9:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x15070:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x150cd:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x8b5:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xa6b:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x15489:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x1563f:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xc9b:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xf74:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x1586f:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x15b48:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd3d:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1011:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1b4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1b9a:$a9: Software\AppDataLow\Software\Microsoft\
- 0x15911:$a9: Software\AppDataLow\Software\Microsoft\
|
Click to see the 27 entries |