File name:

mb-support.exe

Full analysis: https://app.any.run/tasks/0a45b8d2-4a47-48de-b33d-93c6454aacff
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 22, 2024, 09:39:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
floxif
upx
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8B35B5557ED9D4590A09DCDB62D5E176

SHA1:

911D139C2CB2596B0A1F24A9C4DC3B1D1FE07274

SHA256:

20568D10B096ECC723142018C1927D7BD9E5E489454910F746F2C3B48F732BA9

SSDEEP:

98304:8hUhnNneJkuX4IukycGuahjoGtEpRw9HKEhn0RD6O1JoRzs9Z5PMGxt7ahKzN0Xu:8uT0dS7kJVzKJChu+6mluDwk4v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • FLOXIF has been detected (SURICATA)

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • mb-support.exe (PID: 6604)
    • Drops 7-zip archiver for unpacking

      • mb-support.exe (PID: 6604)
    • Process drops legitimate windows executable

      • mb-support.exe (PID: 6604)
    • Executable content was dropped or overwritten

      • mb-support.exe (PID: 6604)
    • The process drops C-runtime libraries

      • mb-support.exe (PID: 6604)
    • Contacting a server suspected of hosting an CnC

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • Reads security settings of Internet Explorer

      • mb-support.exe (PID: 6724)
    • Checks Windows Trust Settings

      • mb-support.exe (PID: 6724)
    • Adds/modifies Windows certificates

      • mb-support.exe (PID: 6724)
  • INFO

    • Creates files in the program directory

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • UPX packer has been detected

      • mb-support.exe (PID: 6604)
      • mb-support.exe (PID: 6724)
    • Reads the computer name

      • mb-support.exe (PID: 6724)
    • Reads the machine GUID from the registry

      • mb-support.exe (PID: 6724)
    • Reads the software policy settings

      • mb-support.exe (PID: 6724)
    • Checks supported languages

      • mb-support.exe (PID: 6724)
    • Create files in a temporary directory

      • mb-support.exe (PID: 6724)
    • Reads Environment values

      • mb-support.exe (PID: 6724)
    • Checks proxy server information

      • mb-support.exe (PID: 6724)
    • Creates files or folders in the user directory

      • mb-support.exe (PID: 6724)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:18 16:27:35+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 104960
InitializedDataSize: 607744
UninitializedDataSize: -
EntryPoint: 0x14b04
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.9.10.1005
ProductVersionNumber: 1.9.10.1005
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Malwarebytes Support Tool
FileVersion: 1.9.10.1005
LegalCopyright: Copyright (c) 2017, Malwarebytes
OriginalFileName: mb-support.exe
ProductName: Malwarebytes Support Tool
ProductVersion: 1.9.10.1005
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #FLOXIF mb-support.exe #FLOXIF mb-support.exe mb-support.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4020"C:\Users\admin\Desktop\mb-support.exe" C:\Users\admin\Desktop\mb-support.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Malwarebytes Support Tool
Exit code:
3221226540
Version:
1.9.10.1005
Modules
Images
c:\users\admin\desktop\mb-support.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6604"C:\Users\admin\Desktop\mb-support.exe" C:\Users\admin\Desktop\mb-support.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Malwarebytes Support Tool
Exit code:
0
Version:
1.9.10.1005
6724C:\Users\admin\AppData\Local\Temp\mwb4FAA.tmp\mb-support.exe C:\Users\admin\AppData\Local\Temp\mwb4FAA.tmp\mb-support.exe
mbstub.exe
User:
admin
Company:
Malwarebytes Corporation
Integrity Level:
HIGH
Description:
mb-support
Version:
1.9.10.1005
Modules
Images
c:\users\admin\appdata\local\temp\mwb4faa.tmp\mb-support.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
7 427
Read events
7 404
Write events
17
Delete events
6

Modification events

(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6724) mb-support.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates
Operation:delete valueName:F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
Value:
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
Operation:writeName:Blob
Value:
040000000100000010000000BE954F16012122448CA8BC279602ACF50F000000010000003000000041CE925678DFE0CCAA8089263C242B897CA582089D14E5EB685FCA967F36DBD334E97E81FD0E64815F851F914ADE1A1E030000000100000014000000F40042E2E5F7E8EF8189FED15519AECE42C3BFA21D0000000100000010000000E78921F81CEA4D4105D2B5F4AFAE0C78140000000100000014000000C87ED26A852A1BCA1998040727CF50104F68A8A2090000000100000016000000301406082B0601050507030306082B060105050703086200000001000000200000005367F20C7ADE0E2BCA790915056D086B720C33C1FA2A2661ACF787E3292E12700B00000001000000800000004D006900630072006F0073006F006600740020004900640065006E007400690074007900200056006500720069006600690063006100740069006F006E00200052006F006F007400200043006500720074006900660069006300610074006500200041007500740068006F0072006900740079002000320030003200300000001900000001000000100000009F687581F7EF744ECFC12B9CEE6238F12000000001000000D0050000308205CC308203B4A00302010202105498D2D1D45B1995481379C811C08799300D06092A864886F70D01010C05003077310B3009060355040613025553311E301C060355040A13154D6963726F736F667420436F72706F726174696F6E314830460603550403133F4D6963726F736F6674204964656E7469747920566572696669636174696F6E20526F6F7420436572746966696361746520417574686F726974792032303230301E170D3230303431363138333631365A170D3435303431363138343434305A3077310B3009060355040613025553311E301C060355040A13154D6963726F736F667420436F72706F726174696F6E314830460603550403133F4D6963726F736F6674204964656E7469747920566572696669636174696F6E20526F6F7420436572746966696361746520417574686F72697479203230323030820222300D06092A864886F70D01010105000382020F003082020A0282020100B3912A07830667FD9E9DE0C7C0B7A4E642047F0FA6DB5FFBD55AD745A0FB770BF080F3A66D5A4D7953D8A08684574520C7A254FBC7A2BF8AC76E35F3A215C42F4EE34A8596490DFFBE99D814F6BC2707EE429B2BF50B9206E4FD691365A89172F29884EB833D0EE4D771124821CB0DEDF64749B79BF9C9C717B6844FFFB8AC9AD773674985E386BD3740D02586D4DEB5C26D626AD5A978BC2D6F49F9E56C1414FD14C7D3651637DECB6EBC5E298DFD629B152CD605E6B9893233A362C7D7D6526708C42EF4562B9E0B87CCECA7B4A6AAEB05CD1957A53A0B04271C91679E2D622D2F1EBEDAC020CB0419CA33FB89BE98E272A07235BE79E19C836FE46D176F90F33D008675388ED0E0499ABBDBD3F830CAD55788684D72D3BF6D7F71D8FDBD0DAE926448B75B6F7926B5CD9B952184D1EF0F323D7B578CF345074C7CE05E180E35768B6D9ECB3674AB05F8E0735D3256946797250AC6353D9497E7C1448B80FDC1F8F47419E530F606FB21573E061C8B6B158627497B8293CA59E87547E83F38F4C75379A0B6B4E25C51EFBD5F38C113E6780C955A2EC5405928CC0F24C0ECBA0977239938A6B61CDAC7BA20B6D737D87F37AF08E33B71DB6E731B7D9972B0E486335974B516007B506DC68613DAFDC439823D24009A60DABA94C005512C34AC50991387BBB30580B24D30025CB826835DB46373EFAE23954F6028BE37D55BA50203010001A3543052300E0603551D0F0101FF040403020186300F0603551D130101FF040530030101FF301D0603551D0E04160414C87ED26A852A1BCA1998040727CF50104F68A8A2301006092B06010401823715010403020100300D06092A864886F70D01010C05000382020100AF6ADDE619E72D9443194ECBE9509564A50391028BE236803B15A252C21619B66A5A5D744330F49BFF607409B1211E90166DC5248F5C668863F44FCC7DF2124C40108B019FDAA9C8AEF2951BCF9D05EB493E74A0685BE5562C651C827E53DA56D94617799245C4103608522917CB2FA6F27ED469248A1E8FB0730DCC1C4AABB2AAEDA79163016422A832B87E3228B367732D91B4DC31010BF7470AA6F1D74AED5660C42C08A37B40B0BC74275287D6BE88DD378A896E67881DF5C95DA0FEB6AB3A80D71A973C173622411EAC4DD583E63C38BD4F30E954A9D3B604C3327661BBB018C52B18B3C080D5B795B05E514D22FCEC58AAE8D894B4A52EED92DEE7187C2157DD5563F7BF6DCD1FD2A6772870C7E25B3A5B08D25B4EC80096B3E18336AF860A655C74F6EAEC7A6A74A0F04BEEEF94A3AC50F287EDD73A3083C9FB7D57BEE5E3F841CAE564AEB3A3EC58EC859ACCEFB9EAF35618B95C739AAFC577178359DB371A187254A541D2B62375A3439AE5777C9679B7418DBFECDC80A09FD17775585F3513E0251A670B7DCE25FA070AE46121D8D41CE507C63699F496D0C615FE4ECDD7AE8B9DDB16FD04C692BDD488E6A9A3AABBF764383B5FCC0CD035BE741903A6C5AA4CA26136823E1DF32BBC975DDB4B783B2DF53BEF6023E8F5EC0B233695AF9866BF53D37BB8694A2A966669C494C6F45F6EAC98788880065CA2B2EDA2
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2
Operation:writeName:Blob
Value:
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
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
Operation:delete valueName:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Value:
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Operation:writeName:Blob
Value:
0400000001000000100000001BFE69D191B71933A372A80FE155E5B51D0000000100000010000000885010358D29A38F059B028559C95F90620000000100000020000000E793C9B02FD8AA13E21C31228ACCB08119643B749C898964B1746D46C3D4CBD2090000000100000054000000305206082B0601050507030206082B06010505070303060A2B0601040182370A030406082B0601050507030406082B0601050507030606082B0601050507030706082B0601050507030106082B060105050703080F000000010000003000000066B764A96581128168CF208E374DDA479D54E311F32457F4AEE0DBD2A6C8D171D531289E1CD22BFDBBD4CFD9796254830300000001000000140000002B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E190000000100000010000000EA6089055218053DD01E37E1D806EEDF53000000010000004300000030413022060C2B06010401B231010201050130123010060A2B0601040182373C0101030200C0301B060567810C010330123010060A2B0601040182373C0101030200C01400000001000000140000005379BF5AAA2B4ACF5480E1D89BC09DF2B20366CB0B00000001000000100000005300650063007400690067006F0000002000000001000000E2050000308205DE308203C6A003020102021001FD6D30FCA3CA51A81BBC640E35032D300D06092A864886F70D01010C0500308188310B3009060355040613025553311330110603550408130A4E6577204A6572736579311430120603550407130B4A65727365792043697479311E301C060355040A131554686520555345525452555354204E6574776F726B312E302C06035504031325555345525472757374205253412043657274696669636174696F6E20417574686F72697479301E170D3130303230313030303030305A170D3338303131383233353935395A308188310B3009060355040613025553311330110603550408130A4E6577204A6572736579311430120603550407130B4A65727365792043697479311E301C060355040A131554686520555345525452555354204E6574776F726B312E302C06035504031325555345525472757374205253412043657274696669636174696F6E20417574686F7269747930820222300D06092A864886F70D01010105000382020F003082020A028202010080126517360EC3DB08B3D0AC570D76EDCD27D34CAD508361E2AA204D092D6409DCCE899FCC3DA9ECF6CFC1DCF1D3B1D67B3728112B47DA39C6BC3A19B45FA6BD7D9DA36342B676F2A93B2B91F8E26FD0EC162090093EE2E874C918B491D46264DB7FA306F188186A90223CBCFE13F087147BF6E41F8ED4E451C61167460851CB8614543FBC33FE7E6C9CFF169D18BD518E35A6A766C87267DB2166B1D49B7803C0503AE8CCF0DCBC9E4CFEAF0596351F575AB7FFCEF93DB72CB6F654DDC8E7123A4DAE4C8AB75C9AB4B7203DCA7F2234AE7E3B68660144E7014E46539B3360F794BE5337907343F332C353EFDBAAFE744E69C76B8C6093DEC4C70CDFE132AECC933B517895678BEE3D56FE0CD0690F1B0FF325266B336DF76E47FA7343E57E0EA566B1297C3284635589C40DC19354301913ACD37D37A7EB5D3A6C355CDB41D712DAA9490BDFD8808A0993628EB566CF2588CD84B8B13FA4390FD9029EEB124C957CF36B05A95E1683CCB867E2E8139DCC5B82D34CB3ED5BFFDEE573AC233B2D00BF3555740949D849581A7F9236E651920EF3267D1C4D17BCC9EC4326D0BF415F40A94444F499E757879E501F5754A83EFD74632FB1506509E658422E431A4CB4F0254759FA041E93D426464A5081B2DEBE78B7FC6715E1C957841E0F63D6E962BAD65F552EEA5CC62808042539B80E2BA9F24C971C073F0D52F5EDEF2F820F0203010001A3423040301D0603551D0E041604145379BF5AAA2B4ACF5480E1D89BC09DF2B20366CB300E0603551D0F0101FF040403020106300F0603551D130101FF040530030101FF300D06092A864886F70D01010C050003820201005CD47C0DCFF7017D4199650C73C5529FCBF8CF99067F1BDA43159F9E0255579614F1523C27879428ED1F3A0137A276FC5350C0849BC66B4EBA8C214FA28E556291F36915D8BC88E3C4AA0BFDEFA8E94B552A06206D55782919EE5F305C4B241155FF249A6E5E2A2BEE0B4D9F7FF70138941495430709FB60A9EE1CAB128CA09A5EA7986A596D8B3F08FBC8D145AF18156490120F73282EC5E2244EFC58ECF0F445FE22B3EB2F8ED2D9456105C1976FA876728F8B8C36AFBF0D05CE718DE6A66F1F6CA67162C5D8D083720CF16711890C9C134C7234DFBCD571DFAA71DDE1B96C8C3C125D65DABD5712B6436BFFE5DE4D661151CF99AEEC17B6E871918CDE49FEDD3571A21527941CCF61E326BB6FA36725215DE6DD1D0B2E681B3B82AFEC836785D4985174B1B9998089FF7F78195C794A602E9240AE4C372A2CC9C762C80E5DF7365BCAE0252501B4DD1A079C77003FD0DCD5EC3DD4FABB3FCC85D66F7FA92DDFB902F7F5979AB535DAC367B0874AA9289E238EFF5C276BE1B04FF307EE002ED45987CB524195EAF447D7EE6441557C8D590295DD629DC2B9EE5A287484A59BB790C70C07DFF589367432D628C1B0B00BE09C4CC31CD6FCE369B54746812FA282ABD3634470C48DFF2D33BAAD8F7BB57088AE3E19CF4028D8FCC890BB5D9922F552E658C51F883143EE881DD7C68E3C436A1DA718DE7D3D16F162F9CA90A8FD
(PID) Process:(6724) mb-support.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
Operation:writeName:Blob
Value:
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
Executable files
75
Suspicious files
9
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\clean.jsontext
MD5:88D244ABA61404AF38A2B38FEA22B7D8
SHA256:4C5605B89C7C9CE0328FC5BB4D4464CCC0DD3456B6F47F7CC006F45B5AB2DACB
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\ERUNT.LOCtext
MD5:02187B1B6F37B3D0030791C802A6174C
SHA256:FB96FB9575FAD8DF03DF5E48B7EC0BD9A151EBABC9DD949867B087EA925F33DA
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\ERDNTDOS.LOCbinary
MD5:F9650A5C954D2A9F8844DE99E8577F93
SHA256:3C3BA112731C697B8700DE546195C4A02F96F4FE28D39A75551F932985E0C15E
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\mb-support.exe.configxml
MD5:13EA16D9D53C5BDAE98DD95500DCE016
SHA256:31E4268DB7CBFC6F6F833C75332B8F5BE74CA61872AC94FD4CE612567290AF5E
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\ERDNTWIN.LOCtext
MD5:388D865D44EE8069DF8BD12EFEDADB3E
SHA256:9BDFEFD45997B94CFE323D4CE4209941A08061EA364BB969A9D3AFB418B6FE61
6604mb-support.exeC:\Program Files\Common Files\System\symsrv.dllexecutable
MD5:7574CF2C64F35161AB1292E2F532AABF
SHA256:DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\Malwarebytes EULA.rtftext
MD5:51A2CD07C31DCA35BFA81DBD89BEE80F
SHA256:D9B5D2EF035B82722AE426171A46A855066AB6F83DCB2785917BE27A1D441820
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\A1D26E2\FC6E1A0819CC.tmpexecutable
MD5:0060D642D5072EC9BB1C8A4095E6ABB4
SHA256:EF227C2A88CCF04AB9D3792C63BBC392008161037DE212CF89C5F1CB0CF9EFA8
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\7z.dllexecutable
MD5:B36399C9D97B893B50A90BD4F62A6E6F
SHA256:CBD498B53A064EE3433B18FE1EC323D504DDECD9E455B8EB012517C4EFA01923
6604mb-support.exeC:\Users\admin\AppData\Local\Temp\7zSFCEB.tmp\ERDNT.E_Eexecutable
MD5:89AFDD29832AA923926BDD4B5F5243D5
SHA256:A559F249FC0E56BC925609773F6CC9CD1826BF70916BE1D6370CE4707A6DFD84
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
36
DNS requests
24
Threats
12

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
302
192.0.66.233:443
https://ark.mwbsys.com/mbst/latest?semver=1.9.10
unknown
unknown
GET
302
192.0.66.233:443
https://ark.mwbsys.com/mbst/latest?semver=1.9.10
unknown
unknown
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
GET
302
192.0.66.233:443
https://ark.mwbsys.com/mbst/latest
unknown
unknown
GET
99.86.4.118:443
https://cdn.mwbsys.com/packages/mbst.app/d/e/1/4/de14da361ce2cb6402cdb86482b3e0a1/c3d64a69-3c5a-4e8b-8921-8ff8934fca95.exe
unknown
unknown
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
6604
mb-support.exe
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
GET
403
45.33.18.44:80
http://www.aieov.com/logo.gif
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.168.100.255:138
whitelisted
239.255.255.250:1900
whitelisted
45.33.18.44:80
www.aieov.com
Linode, LLC
US
unknown
3.231.51.70:443
ark.mwbsys.com
AMAZON-AES
US
unknown
3412
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6156
mbstub.exe
3.231.51.70:443
ark.mwbsys.com
AMAZON-AES
US
unknown
6604
mb-support.exe
45.33.18.44:80
www.aieov.com
Linode, LLC
US
unknown
6156
mbstub.exe
99.86.4.25:443
cdn.mwbsys.com
AMAZON-02
US
unknown
6156
mbstub.exe
18.245.46.19:443
mbst.mwbsys.com
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.78
whitelisted
5isohu.com
whitelisted
www.aieov.com
  • 45.33.18.44
  • 45.33.30.197
  • 72.14.178.174
  • 45.33.20.235
  • 45.56.79.23
  • 198.58.118.167
  • 45.33.23.183
  • 96.126.123.244
  • 45.79.19.196
  • 45.33.2.79
  • 173.255.194.134
  • 72.14.185.43
unknown
ark.mwbsys.com
  • 44.210.170.131
  • 34.194.130.27
  • 3.231.51.70
whitelisted
cdn.mwbsys.com
  • 99.86.4.35
  • 99.86.4.25
  • 99.86.4.72
  • 99.86.4.118
whitelisted
mbst.mwbsys.com
  • 18.245.46.35
  • 18.245.46.36
  • 18.245.46.120
  • 18.245.46.19
whitelisted
downloads.malwarebytes.com
  • 52.222.214.43
  • 52.222.214.90
  • 52.222.214.121
  • 52.222.214.71
whitelisted
download.bleepingcomputer.com
  • 104.20.185.56
  • 104.20.184.56
  • 172.67.2.229
whitelisted
ocsp.comodoca.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted

Threats

Found threats are available for the paid subscriptions
12 ETPRO signatures available at the full report
Process
Message
mb-support.exe
Application_Startup
mb-support.exe
Starting TaskReadLogFile thread