IOC Report
http://ser0xen.com/sucklemydicknigger.exe

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\Unconfirmed 610443.crdownload
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Downloads\sucklemydicknigger.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
Chrome Cache Entry: 49
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2yhrblrj.rxc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ckvnfmyb.uhl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sjcz55c3.nyc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zcdlqbls.lzq.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Downloads\sucklemydicknigger.exe
"C:\Users\user\Downloads\sucklemydicknigger.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Downloads\sucklemydicknigger.exe'
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1976,i,9986206320547753570,420349288583730614,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://ser0xen.com/sucklemydicknigger.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4872 --field-trial-handle=1976,i,9986206320547753570,420349288583730614,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://ser0xen.com/sucklemydicknigger.exe
malicious
http://ser0xen.com/sucklemydicknigger.exe
18.224.107.108
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ser0xen.com/sucklemydicknigger.exe
18.224.107.108
https://github.com/Pester/Pester
unknown
https://ser0xen.com/pl.txt
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ser0xen.com
18.224.107.108
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
142.250.184.196
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
142.250.184.196
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.4
unknown
unknown
18.224.107.108
ser0xen.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
F72000
unkown
page readonly
malicious
1B18296F000
trusted library allocation
page read and write
1B182CDB000
trusted library allocation
page read and write
1C114000
heap
page read and write
7FFD997E0000
trusted library allocation
page read and write
1B182955000
trusted library allocation
page read and write
7FFD99B00000
trusted library allocation
page read and write
35A863B000
stack
page read and write
1B1800F0000
heap
page read and write
35A84F9000
stack
page read and write
1B182CD7000
trusted library allocation
page read and write
1B180370000
trusted library section
page read and write
149D000
heap
page read and write
145E000
heap
page read and write
1B181BE0000
trusted library allocation
page read and write
7FFD997E4000
trusted library allocation
page read and write
1940000
heap
page read and write
1B192077000
trusted library allocation
page read and write
1B180153000
heap
page read and write
1B191DEF000
trusted library allocation
page read and write
1B19A2C0000
heap
page read and write
1B182DA2000
trusted library allocation
page read and write
35A883C000
stack
page read and write
7FFD99A50000
trusted library allocation
page read and write
35A958E000
stack
page read and write
1B19A5D0000
trusted library allocation
page read and write
13181000
trusted library allocation
page read and write
35A948C000
stack
page read and write
2FF0000
heap
page read and write
1B181E17000
trusted library allocation
page read and write
1B180197000
heap
page read and write
1B182FF2000
trusted library allocation
page read and write
35A930E000
stack
page read and write
1B19A4FB000
heap
page read and write
7FFD99BD0000
trusted library allocation
page read and write
7FFD998C6000
trusted library allocation
page execute and read and write
35A938E000
stack
page read and write
7DF41EFA0000
trusted library allocation
page execute and read and write
7FFD99C10000
trusted library allocation
page read and write
35A958C000
stack
page read and write
7FFD999A0000
trusted library allocation
page execute and read and write
1B183098000
trusted library allocation
page read and write
1BAF0000
heap
page execute and read and write
1945000
heap
page read and write
1690000
heap
page read and write
7FFD99B40000
trusted library allocation
page read and write
7FFD99B34000
trusted library allocation
page read and write
1B182959000
trusted library allocation
page read and write
1B192068000
trusted library allocation
page read and write
35A7FEE000
stack
page read and write
1B19206F000
trusted library allocation
page read and write
35A7F6E000
stack
page read and write
1464000
heap
page read and write
7FFD99800000
trusted library allocation
page read and write
7FFD998A0000
trusted library allocation
page execute and read and write
1B181D80000
heap
page execute and read and write
1B183671000
trusted library allocation
page read and write
7FFD9983C000
trusted library allocation
page execute and read and write
7FFD999E0000
trusted library allocation
page read and write
7FFD997F0000
trusted library allocation
page read and write
1436000
heap
page read and write
1B18014D000
heap
page read and write
1B183691000
trusted library allocation
page read and write
7FFD99B10000
trusted library allocation
page read and write
7DF41EF90000
trusted library allocation
page execute and read and write
7FFD99AB0000
trusted library allocation
page read and write
179E000
stack
page read and write
162E000
stack
page read and write
1B19A3FB000
heap
page read and write
1B1803B5000
heap
page read and write
1B182CEC000
trusted library allocation
page read and write
145C000
heap
page read and write
35A827E000
stack
page read and write
13188000
trusted library allocation
page read and write
7FFD99A00000
trusted library allocation
page read and write
7FFD997E2000
trusted library allocation
page read and write
F70000
unkown
page readonly
1B19A15A000
heap
page read and write
1B19206D000
trusted library allocation
page read and write
7FFD99A40000
trusted library allocation
page read and write
7FFD99AA0000
trusted library allocation
page read and write
1B192088000
trusted library allocation
page read and write
1B181B60000
heap
page readonly
7FFD99A70000
trusted library allocation
page read and write
1BF0F000
stack
page read and write
35A83F7000
stack
page read and write
1B181C40000
heap
page read and write
1B19A503000
heap
page read and write
7FFD9983C000
trusted library allocation
page execute and read and write
1B191F29000
trusted library allocation
page read and write
1B19A3EA000
heap
page read and write
35A87BE000
stack
page read and write
7FFD99890000
trusted library allocation
page read and write
7FFD999F0000
trusted library allocation
page read and write
1B182965000
trusted library allocation
page read and write
7FF4808E0000
trusted library allocation
page execute and read and write
1930000
trusted library allocation
page read and write
7FFD99B50000
trusted library allocation
page read and write
1B182CDF000
trusted library allocation
page read and write
35A9409000
stack
page read and write
35A837F000
stack
page read and write
1462000
heap
page read and write
1B181BA0000
trusted library allocation
page read and write
F70000
unkown
page readonly
7FFD99A10000
trusted library allocation
page read and write
1B181C55000
heap
page read and write
13E0000
heap
page read and write
1B19A50F000
heap
page read and write
1B18016D000
heap
page read and write
7FFD99C30000
trusted library allocation
page read and write
2F63000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
7FFD99B60000
trusted library allocation
page read and write
1470000
heap
page read and write
35A85B7000
stack
page read and write
7DF41EF80000
trusted library allocation
page execute and read and write
1B1827BC000
trusted library allocation
page read and write
3070000
heap
page read and write
1B18019A000
heap
page read and write
7FFD99800000
trusted library allocation
page read and write
7FFD9989C000
trusted library allocation
page execute and read and write
1B1803A0000
trusted library allocation
page read and write
1B19A500000
heap
page read and write
1B19A120000
heap
page read and write
1B181FB7000
trusted library allocation
page read and write
7FFD9999A000
trusted library allocation
page read and write
7FFD999D0000
trusted library allocation
page execute and read and write
3181000
trusted library allocation
page read and write
7FFD99B30000
trusted library allocation
page read and write
7FFD999C2000
trusted library allocation
page read and write
7FFD997ED000
trusted library allocation
page execute and read and write
1B180110000
heap
page read and write
1B180380000
trusted library allocation
page read and write
1B1803B0000
heap
page read and write
F7C000
unkown
page readonly
1C110000
heap
page read and write
1B1831BF000
trusted library allocation
page read and write
13183000
trusted library allocation
page read and write
35A847D000
stack
page read and write
7FFD99AE0000
trusted library allocation
page read and write
1B182CD2000
trusted library allocation
page read and write
7FFD99980000
trusted library allocation
page read and write
7FFD99B48000
trusted library allocation
page read and write
1B70D000
stack
page read and write
7FFD997FD000
trusted library allocation
page execute and read and write
1B183696000
trusted library allocation
page read and write
35A893C000
stack
page read and write
1B180157000
heap
page read and write
7FFD997ED000
trusted library allocation
page execute and read and write
7FFD99900000
trusted library allocation
page execute and read and write
7FFD99A20000
trusted library allocation
page read and write
14F0000
heap
page read and write
1B180330000
trusted library section
page read and write
7FFD999B0000
trusted library allocation
page execute and read and write
7FFD99C00000
trusted library allocation
page execute and read and write
1B19A170000
heap
page read and write
1B19A4F0000
heap
page read and write
1B180350000
heap
page read and write
1B180195000
heap
page read and write
7FFD99A60000
trusted library allocation
page read and write
1BCFE000
stack
page read and write
1300000
heap
page read and write
7FFD99C50000
trusted library allocation
page read and write
7FFD99B70000
trusted library allocation
page read and write
1B182969000
trusted library allocation
page read and write
1B19A1B3000
heap
page read and write
149F000
heap
page read and write
1BE0F000
stack
page read and write
1B180118000
heap
page read and write
7FFD99B39000
trusted library allocation
page read and write
7FFD997F2000
trusted library allocation
page read and write
7FFD99896000
trusted library allocation
page read and write
7FFD999C4000
trusted library allocation
page read and write
1B18364C000
trusted library allocation
page read and write
1400000
heap
page read and write
7FFD997E4000
trusted library allocation
page read and write
7FFD997FB000
trusted library allocation
page read and write
1B191D91000
trusted library allocation
page read and write
7FFD99900000
trusted library allocation
page execute and read and write
1B182CE3000
trusted library allocation
page read and write
1B19A5E0000
heap
page read and write
1C10B000
stack
page read and write
7FFD99AF0000
trusted library allocation
page read and write
1B19A226000
heap
page execute and read and write
143C000
heap
page read and write
1B19A3A0000
heap
page execute and read and write
7FFD99890000
trusted library allocation
page read and write
1C00E000
stack
page read and write
7FFD999C8000
trusted library allocation
page read and write
7FFD99A30000
trusted library allocation
page read and write
35A82F9000
stack
page read and write
1B1830FE000
trusted library allocation
page read and write
1B181B70000
trusted library allocation
page read and write
12F1000
stack
page read and write
7FFD99C20000
trusted library allocation
page read and write
35A86BA000
stack
page read and write
7FFD99A90000
trusted library allocation
page read and write
1B1836AD000
trusted library allocation
page read and write
1B180340000
heap
page read and write
14A4000
heap
page read and write
7FFD99BE0000
trusted library allocation
page read and write
35A7EE3000
stack
page read and write
35A853E000
stack
page read and write
1B19A1FC000
heap
page read and write
1430000
heap
page read and write
1670000
trusted library allocation
page read and write
7FFD99AC0000
trusted library allocation
page read and write
1B19A3D0000
heap
page read and write
317F000
stack
page read and write
1B19A4D2000
heap
page read and write
7FFD997E3000
trusted library allocation
page execute and read and write
1B181D91000
trusted library allocation
page read and write
7FFD99B4C000
trusted library allocation
page read and write
1B1802E0000
heap
page read and write
7FFD997E3000
trusted library allocation
page execute and read and write
1B19A176000
heap
page read and write
1B19A220000
heap
page execute and read and write
1B180345000
heap
page read and write
7FFD99A80000
trusted library allocation
page read and write
1630000
heap
page read and write
145A000
heap
page read and write
7FFD99B13000
trusted library allocation
page read and write
1B19A1CA000
heap
page read and write
1695000
heap
page read and write
7FFD99BF0000
trusted library allocation
page read and write
1B180300000
heap
page read and write
7FFD99C40000
trusted library allocation
page read and write
1B1830D7000
trusted library allocation
page read and write
7FFD998C6000
trusted library allocation
page execute and read and write
1473000
heap
page read and write
7FFD99980000
trusted library allocation
page read and write
2F80000
heap
page execute and read and write
35A873F000
stack
page read and write
7FFD99AD0000
trusted library allocation
page read and write
1BBFD000
stack
page read and write
1B19A50C000
heap
page read and write
1B19A1FE000
heap
page read and write
7FFD99991000
trusted library allocation
page read and write
1B192097000
trusted library allocation
page read and write
35A88BE000
stack
page read and write
1508000
heap
page read and write
7FFD997F0000
trusted library allocation
page read and write
35A950C000
stack
page read and write
1B18297D000
trusted library allocation
page read and write
There are 234 hidden memdumps, click here to show them.