00000000.00000002.513518394.00000000004E6000.00000040.00000020.00020000.00000000.sdmp | Windows_Trojan_RedLineStealer_ed346e4c | unknown | unknown | - 0x5a70:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
|
00000000.00000002.513718671.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp | Windows_Trojan_Smokeloader_3687686f | unknown | unknown | - 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
|
00000000.00000002.513908853.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000002.513908853.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000002.513908853.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406328098.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406328098.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406328098.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406192981.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406192981.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406192981.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406310298.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406310298.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406310298.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406101502.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406101502.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406101502.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406169699.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406169699.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406169699.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406228836.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406228836.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406228836.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406261787.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406261787.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406261787.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.406142288.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.406142288.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x1228:$a1: /C ping localhost -n %u && del "%s"
- 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xa9c:$a5: filename="%.4u.%lu"
- 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe6d:$a9: &whoami=%s
- 0xe56:$a10: %u.%u_%u_%u_x%u
- 0xd63:$a11: size=%u&hash=0x%08x
- 0xb1d:$a12: &uptime=%u
- 0x6fb:$a13: %systemroot%\system32\c_1252.nls
- 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.406142288.0000000002CA8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1cc0:$a9: Software\AppDataLow\Software\Microsoft\
|
Process Memory Space: Server.exe PID: 5744 | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
Process Memory Space: Server.exe PID: 5744 | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x46e:$a5: filename="%.4u.%lu"
- 0x624:$a5: filename="%.4u.%lu"
- 0x809b:$a5: filename="%.4u.%lu"
- 0x8251:$a5: filename="%.4u.%lu"
- 0x21:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x7c4e:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x195:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x56e:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x726:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x7dc2:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x819b:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x8353:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xaed3:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xafb4:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xb156:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xd0fe:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xd1df:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xd443:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x986:$a9: &whoami=%s
- 0x85b3:$a9: &whoami=%s
- 0x96f:$a10: %u.%u_%u_%u_x%u
|
Process Memory Space: Server.exe PID: 5744 | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0x515:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x6cd:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x8142:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x82fa:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x21:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x7e:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x7c4e:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x7cab:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x43a:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x5f0:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x8067:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x821d:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x820:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xaf9:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x844d:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x8726:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x8c2:$a9: Software\AppDataLow\Software\Microsoft\
- 0xb96:$a9: Software\AppDataLow\Software\Microsoft\
- 0x16fd:$a9: Software\AppDataLow\Software\Microsoft\
- 0x174c:$a9: Software\AppDataLow\Software\Microsoft\
- 0x84ef:$a9: Software\AppDataLow\Software\Microsoft\
|
Click to see the 27 entries |