IOC Report
mc-fw-host.exe

loading gifFilesProcessesURLsMemdumps1020102Label

Files

File Path
Type
Category
Malicious
Download
mc-fw-host.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
C:\ProgramData\McAfee\wps\log\dbg.etl
data
dropped
C:\ProgramData\McAfee\wps\log\wps.etl
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\mc-fw-host.exe
C:\Users\user\Desktop\mc-fw-host.exe
malicious

URLs

Name
IP
Malicious
http://www.mcafee.com
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
7FF76F401000
unkown
page execute read
19E873F0000
heap
page read and write
7FF76F400000
unkown
page readonly
7FF76F5EF000
unkown
page read and write
19E874C8000
heap
page read and write
19E874DE000
heap
page read and write
7FF76F5F2000
unkown
page readonly
19E87715000
heap
page read and write
51B13FE000
stack
page read and write
7FF76F5E3000
unkown
page write copy
19E874FB000
heap
page read and write
7FF76F5DD000
unkown
page read and write
7FF76F5E1000
unkown
page write copy
7FF76F400000
unkown
page readonly
7FF76F5E1000
unkown
page read and write
51B11FD000
stack
page read and write
7FF76F55C000
unkown
page readonly
7FF76F5F4000
unkown
page readonly
7FF76F602000
unkown
page readonly
51B12FE000
stack
page read and write
19E874C0000
heap
page read and write
19E874E3000
heap
page read and write
7FF76F5F4000
unkown
page readonly
19E874FC000
heap
page read and write
19E87710000
heap
page read and write
19E874E3000
heap
page read and write
19E87460000
heap
page read and write
19E874F5000
heap
page read and write
7FF76F55C000
unkown
page readonly
7FF76F401000
unkown
page execute read
7FF76F5DD000
unkown
page write copy
51B10FA000
stack
page read and write
7FF76F601000
unkown
page write copy
19E87480000
heap
page read and write
There are 24 hidden memdumps, click here to show them.