IOC Report
https://cgigroup.blob.core.windows.net/cgi-protective-monitoring-service/tools/get-stinger.html

loading gif

Files

File Path
Type
Category
Malicious
C:\ProgramData\mcafee.ico
MS Windows icon resource - 3 icons, 48x48, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Users\user\AppData\Local\Temp\nwg5202.tmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nwg553E.tmp
ASCII text
dropped
C:\Users\user\AppData\Local\mcafee-stinger\avvdat.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Downloads\McAfeeStinger.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Downloads\Unconfirmed 115533.crdownload (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Downloads\bedb9404-1434-4489-b3f3-9a06b7c9028e.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Downloads\McAfeeStinger.exe
"C:\Users\user\Downloads\McAfeeStinger.exe"
malicious
C:\Users\user\Downloads\McAfeeStinger.exe
"C:\Users\user\Downloads\McAfeeStinger.exe" --update
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1688,16494396912243797666,5406229403683992866,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2008 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://cgigroup.blob.core.windows.net/cgi-protective-monitoring-service/tools/get-stinger.html"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1688,16494396912243797666,5406229403683992866,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6108 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1688,16494396912243797666,5406229403683992866,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3884 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1688,16494396912243797666,5406229403683992866,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3784 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1688,16494396912243797666,5406229403683992866,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4080 /prefetch:8

URLs

Name
IP
Malicious
https://cgigroup.blob.core.windows.net/cgi-protective-monitoring-service/tools/get-stinger.html
malicious
https://downloadcenter.trellix.com/products/mcafee-avert/Stinger/stinger64.exe
unknown
https://www.mcafee.com/favicon.ico32
unknown
https://www.mcafee.com/favicon.icoB_;
unknown
http://www.quovadis.bm0
unknown
https://docs.rs/getrandom#nodejs-es-module-supportC:
unknown
https://pam.mcafee.com
unknown
https://www.mcafee.com/favicon.icositexml
unknown
https://ocsp.quovadisoffshore.com0
unknown
https://www.mcafee.com/favicon.ico
unknown
https://downloadcenter.trellix.com/products/mcafee-avert/Stinger/stinger64.exei
unknown
https://www.mcafee.com/favicon.ico3
unknown
https://download.nai.com/products/commonupdater/avvdat.ini
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.253.122.106
www.mcafee.com
unknown
downloadcenter.trellix.com
unknown
download.nai.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.11.20
unknown
unknown
malicious
172.253.122.106
www.google.com
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
17CF52EE000
heap
page read and write
7FF6ACC4F000
unkown
page readonly
29714129000
heap
page read and write
6BE4AFE000
stack
page read and write
FB098FE000
stack
page read and write
FB091FE000
stack
page read and write
17CF1E94000
heap
page read and write
2971406A000
heap
page read and write
17CF1E80000
heap
page read and write
17CF0117000
heap
page read and write
29714020000
remote allocation
page read and write
17CF00FB000
heap
page read and write
17CF1F7E000
heap
page read and write
7FF6ACC4F000
unkown
page readonly
17CF0177000
heap
page read and write
FB08BFE000
stack
page read and write
17CF0196000
heap
page read and write
FB08FFF000
stack
page read and write
297140D8000
heap
page read and write
29714063000
heap
page read and write
7FF6ACCBF000
unkown
page write copy
29714121000
heap
page read and write
6BE5CFF000
stack
page read and write
FB097FF000
stack
page read and write
17CF7CA0000
heap
page read and write
29714129000
heap
page read and write
FB07BFF000
stack
page read and write
17CF5EA0000
heap
page read and write
7FF6ACCC0000
unkown
page readonly
17CF1E07000
heap
page read and write
17CF0040000
heap
page read and write
FB085FE000
stack
page read and write
17CF1E26000
heap
page read and write
FB07FFE000
stack
page read and write
FB071FE000
stack
page read and write
6BE3392000
stack
page read and write
17CF0200000
remote allocation
page read and write
7FF6ACC4F000
unkown
page readonly
FB073FE000
stack
page read and write
17CF1E0D000
heap
page read and write
29714117000
heap
page read and write
FB081FF000
stack
page read and write
6BE38FE000
stack
page read and write
17CF01A2000
heap
page read and write
29714130000
heap
page read and write
FB095FB000
stack
page read and write
7FF6ACCC0000
unkown
page readonly
FB070F2000
stack
page read and write
7FF6ACB80000
unkown
page readonly
6BE4EFA000
stack
page read and write
17CF1E84000
heap
page read and write
FB077FF000
stack
page read and write
6BE37FE000
stack
page read and write
17CF019F000
heap
page read and write
29713F60000
heap
page read and write
17CF1E84000
heap
page read and write
6BE40FE000
stack
page read and write
17CF0200000
remote allocation
page read and write
FB093FE000
stack
page read and write
6BE50FE000
stack
page read and write
17CF1E7C000
heap
page read and write
17CF019A000
heap
page read and write
7FF6ACB80000
unkown
page readonly
FB089FC000
stack
page read and write
7FF6ACB81000
unkown
page execute read
17CF1F00000
heap
page read and write
6BE48FF000
stack
page read and write
2971409C000
heap
page read and write
6BE3AFF000
stack
page read and write
17CF011B000
heap
page read and write
17CF01A7000
heap
page read and write
FB079FE000
stack
page read and write
6BE5DFF000
stack
page read and write
7FF6ACB81000
unkown
page execute read
29713E20000
heap
page read and write
17CF1E21000
heap
page read and write
17CF1E94000
heap
page read and write
297140D8000
heap
page read and write
17CEFFB0000
heap
page read and write
6BE5BFF000
stack
page read and write
17CF0197000
heap
page read and write
7FF6ACCC0000
unkown
page readonly
17CF0175000
heap
page read and write
FB072FE000
stack
page read and write
29714084000
heap
page read and write
6BE56FF000
stack
page read and write
17CF1E1D000
heap
page read and write
29714119000
heap
page read and write
29714129000
heap
page read and write
17CF00B0000
heap
page read and write
6BE4CFC000
stack
page read and write
17CF0315000
heap
page read and write
7FF6ACCBF000
unkown
page write copy
6BE42FB000
stack
page read and write
17CF1E88000
heap
page read and write
17CF68A0000
heap
page read and write
6BE36FE000
stack
page read and write
17CF1E8C000
heap
page read and write
29714125000
heap
page read and write
7FF6ACCC0000
unkown
page readonly
17CF0310000
heap
page read and write
17CF00E6000
heap
page read and write
29714255000
heap
page read and write
6BE54FD000
stack
page read and write
6BE44FF000
stack
page read and write
297140C4000
heap
page read and write
7FF6ACB80000
unkown
page readonly
29714020000
remote allocation
page read and write
17CF2300000
heap
page read and write
29714099000
heap
page read and write
17CF48EE000
heap
page read and write
17CF1E98000
heap
page read and write
17CF2EFD000
heap
page read and write
17CF72A0000
heap
page read and write
17CF0200000
remote allocation
page read and write
17CF1E01000
heap
page read and write
17CF0193000
heap
page read and write
6BE5EFF000
stack
page read and write
2971403C000
heap
page read and write
FB07DFE000
stack
page read and write
297140C4000
heap
page read and write
2971406D000
heap
page read and write
17CF5CEE000
heap
page read and write
6BE58FE000
stack
page read and write
17CF02C0000
heap
page read and write
17CF2103000
heap
page read and write
FB08DFA000
stack
page read and write
7FF6ACB80000
unkown
page readonly
17CF00F9000
heap
page read and write
17CF38FD000
heap
page read and write
17CF2701000
heap
page read and write
17CF00B9000
heap
page read and write
6BE46FE000
stack
page read and write
7FF6ACB81000
unkown
page execute read
29714230000
heap
page read and write
17CF3EEE000
heap
page read and write
7FF6ACB81000
unkown
page execute read
17CF0154000
heap
page read and write
6BE52FE000
stack
page read and write
29714030000
heap
page read and write
6BE3EFE000
stack
page read and write
17CF1E0E000
heap
page read and write
17CF01A6000
heap
page read and write
17CF1F01000
heap
page read and write
7FF6ACCBF000
unkown
page read and write
6BE3CFE000
stack
page read and write
FB075FF000
stack
page read and write
2971407E000
heap
page read and write
29714020000
remote allocation
page read and write
17CEFE70000
heap
page read and write
17CF1E90000
heap
page read and write
6BE5AFB000
stack
page read and write
29714250000
heap
page read and write
17CF1E00000
heap
page read and write
7FF6ACC4F000
unkown
page readonly
7FF6ACCBF000
unkown
page read and write
FB087FF000
stack
page read and write
FB083FE000
stack
page read and write
17CF00E2000
heap
page read and write
There are 149 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://cgigroup.blob.core.windows.net/cgi-protective-monitoring-service/tools/get-stinger.html
https://cgigroup.blob.core.windows.net/cgi-protective-monitoring-service/tools/get-stinger.html