IOC Report
LockyRansom.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LockyRansom.exe
"C:\Users\user\Desktop\LockyRansom.exe"
malicious

URLs

Name
IP
Malicious
http://46.17.44.153/imageload.cgi
46.17.44.153
malicious
http://37.143.9.154/imageload.cgi
37.143.9.154
malicious
http://46.183.165.45/imageload.cgi
46.183.165.45
malicious
http://185.179.190.31/imageload.cgi
185.179.190.31
malicious
http://46.17.44.153/imageload.cgi0.31/imageload.cgi
unknown
http://37.143.9.154/imageload.cgiC
unknown
http://37.143.9.154/imageload.cgiy
unknown
http://46.17.44.1531oad.cgi%880
unknown
https://www.torproject.org/download/download-easy.html
unknown
http://46.17.44.153/imageload.cgiL
unknown
http://46.183.165.45/imageload.cgia-deddda976288
unknown
http://46.17.44.153/imageload.cgiV
unknown
http://37.143.9.154/imag=
unknown
http://46.17.44.153/imageload.cgiP
unknown
http://185.179.190.31/imageload.cgir
unknown
http://37.143.9.154/imageload.cgii
unknown
http://37.143.9.154/imageload.cgilh
unknown
http://46.17.44.153/imageload.cgiy3
unknown
http://46.17.44.153
unknown
http://185.179.190.31/imageload.cgin
unknown
http://37.143.9.154/imageload.cgid
unknown
http://46.17.44.153/
unknown
http://46.17.44.153/imageload.cgii
unknown
http://46.17.44.153/imageload.cgik
unknown
http://37.143.9.154/imageload.cgiP
unknown
http://46.183.165.45/
unknown
http://46.17.44.153/imageload.cgi0
unknown
There are 17 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
46.17.44.153
unknown
Russian Federation
malicious
46.183.165.45
unknown
Russian Federation
malicious
37.143.9.154
unknown
Russian Federation
malicious
185.179.190.31
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
73A000
heap
page read and write
5E1000
direct allocation
page read and write
400000
unkown
page readonly
730000
heap
page read and write
1F0000
heap
page read and write
2A3D000
stack
page read and write
19A000
stack
page read and write
401000
unkown
page execute read
6A0000
direct allocation
page read and write
5C0000
direct allocation
page execute and read and write
27BF000
stack
page read and write
635000
heap
page read and write
496000
unkown
page write copy
5D0000
direct allocation
page read and write
293E000
stack
page read and write
BC0000
heap
page read and write
A0F000
stack
page read and write
486000
unkown
page readonly
239E000
stack
page read and write
9B000
stack
page read and write
4D6000
unkown
page readonly
487000
unkown
page execute and write copy
400000
unkown
page readonly
5F0000
heap
page read and write
78C000
heap
page read and write
401000
unkown
page execute
496000
unkown
page write copy
478000
unkown
page readonly
47F000
unkown
page read and write
28FE000
stack
page read and write
235F000
stack
page read and write
27FE000
stack
page read and write
630000
heap
page read and write
78E000
heap
page read and write
5B0000
heap
page read and write
414000
unkown
page execute and write copy
9CE000
stack
page read and write
495000
unkown
page execute and read and write
483000
unkown
page readonly
231E000
stack
page read and write
23B0000
heap
page read and write
73E000
heap
page read and write
40F000
unkown
page execute and write copy
277E000
stack
page read and write
273F000
stack
page read and write
690000
heap
page execute and read and write
4D6000
unkown
page readonly
610000
heap
page read and write
There are 38 hidden memdumps, click here to show them.