URL:

http://updates.frescologic.com/FL2000/FL2000-2.1.34054.0.exe

Full analysis: https://app.any.run/tasks/858efbd5-dddb-48d1-8075-4d4a68d3e077
Verdict: Malicious activity
Analysis date: August 03, 2021, 10:15:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

934A0B124B1DED19DB42F003BDF34134

SHA1:

90EAF88E56A0A17B735C563C5A324B2373003B0C

SHA256:

63A7016F52AA98E80C6D15FFEE63D6B5CA53CAB0A0A71DF5AE932E95CEDDC0F4

SSDEEP:

3:N1KLQRAMDXxJZM6lGcPgVJ:CUdLxY0YVJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • FL2000-2.1.34054.0.exe (PID: 3924)
      • FL2000-2.1.34054.0.exe (PID: 3136)
      • devcon.exe (PID: 2228)
      • devcon.exe (PID: 4024)
      • devcon.exe (PID: 2624)
      • flvga_tray.exe (PID: 2564)
    • Drops executable file immediately after starts

      • MsiExec.exe (PID: 2392)
      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • xcopy.exe (PID: 2576)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 3320)
    • Executes PowerShell scripts

      • cmd.exe (PID: 2716)
      • cmd.exe (PID: 3668)
    • Loads the Task Scheduler DLL interface

      • FL2000-2.1.34054.0.exe (PID: 3924)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 1568)
      • iexplore.exe (PID: 3372)
      • FL2000-2.1.34054.0.exe (PID: 3924)
      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
      • DrvInst.exe (PID: 2396)
      • MsiExec.exe (PID: 2392)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • xcopy.exe (PID: 2576)
    • Drops a file that was compiled in debug mode

      • iexplore.exe (PID: 1568)
      • iexplore.exe (PID: 3372)
      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
      • DrvInst.exe (PID: 2396)
      • MsiExec.exe (PID: 2392)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • xcopy.exe (PID: 2576)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1568)
    • Reads the computer name

      • FL2000-2.1.34054.0.exe (PID: 3924)
      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • powershell.exe (PID: 2604)
      • powershell.exe (PID: 3912)
      • devcon.exe (PID: 4024)
      • devcon.exe (PID: 2228)
      • DrvInst.exe (PID: 3612)
      • devcon.exe (PID: 2624)
      • flvga_tray.exe (PID: 2564)
    • Creates files in the user directory

      • FL2000-2.1.34054.0.exe (PID: 3924)
      • powershell.exe (PID: 2604)
      • powershell.exe (PID: 3912)
    • Checks supported languages

      • FL2000-2.1.34054.0.exe (PID: 3924)
      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • cmd.exe (PID: 2052)
      • cmd.exe (PID: 2716)
      • powershell.exe (PID: 2604)
      • cmd.exe (PID: 3668)
      • powershell.exe (PID: 3912)
      • devcon.exe (PID: 4024)
      • devcon.exe (PID: 2228)
      • flvga_tray.exe (PID: 2564)
      • DrvInst.exe (PID: 3612)
      • devcon.exe (PID: 2624)
    • Reads Environment values

      • FL2000-2.1.34054.0.exe (PID: 3924)
      • vssvc.exe (PID: 2472)
    • Executed as Windows Service

      • msiexec.exe (PID: 3320)
      • vssvc.exe (PID: 2472)
    • Reads Windows owner or organization settings

      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
    • Reads the Windows organization settings

      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
    • Application launched itself

      • msiexec.exe (PID: 3320)
      • cmd.exe (PID: 2052)
    • Drops a file with too old compile date

      • msiexec.exe (PID: 3320)
      • MsiExec.exe (PID: 2392)
    • Creates a directory in Program Files

      • msiexec.exe (PID: 3320)
    • Creates files in the program directory

      • msiexec.exe (PID: 3320)
    • Executed via COM

      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • DrvInst.exe (PID: 3612)
    • Creates files in the Windows directory

      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • xcopy.exe (PID: 2576)
      • DrvInst.exe (PID: 3612)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • DrvInst.exe (PID: 3612)
    • Creates a software uninstall entry

      • MsiExec.exe (PID: 2392)
      • msiexec.exe (PID: 3320)
    • Searches for installed software

      • msiexec.exe (PID: 3320)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 3472)
      • DrvInst.exe (PID: 876)
      • DrvInst.exe (PID: 3612)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 3320)
      • cmd.exe (PID: 2052)
    • Reads the date of Windows installation

      • powershell.exe (PID: 2604)
      • powershell.exe (PID: 3912)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2052)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3372)
    • Checks supported languages

      • iexplore.exe (PID: 3372)
      • iexplore.exe (PID: 1568)
      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
      • MsiExec.exe (PID: 120)
      • vssvc.exe (PID: 2472)
      • MsiExec.exe (PID: 2164)
      • MsiExec.exe (PID: 2392)
      • xcopy.exe (PID: 2576)
      • sc.exe (PID: 2672)
      • sc.exe (PID: 2776)
      • timeout.exe (PID: 2168)
      • taskmgr.exe (PID: 2512)
    • Reads the computer name

      • iexplore.exe (PID: 1568)
      • iexplore.exe (PID: 3372)
      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
      • MsiExec.exe (PID: 120)
      • vssvc.exe (PID: 2472)
      • MsiExec.exe (PID: 2164)
      • MsiExec.exe (PID: 2392)
      • sc.exe (PID: 2672)
      • sc.exe (PID: 2776)
      • taskmgr.exe (PID: 2512)
    • Changes internet zones settings

      • iexplore.exe (PID: 3372)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 3372)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3372)
      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 876)
      • DrvInst.exe (PID: 3472)
      • devcon.exe (PID: 4024)
      • DrvInst.exe (PID: 3612)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3372)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3372)
      • msiexec.exe (PID: 3096)
      • msiexec.exe (PID: 3320)
      • DrvInst.exe (PID: 2396)
      • DrvInst.exe (PID: 876)
      • DrvInst.exe (PID: 3472)
      • devcon.exe (PID: 4024)
      • DrvInst.exe (PID: 3612)
    • Manual execution by user

      • taskmgr.exe (PID: 2512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
69
Monitored processes
28
Malicious processes
11
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start iexplore.exe iexplore.exe fl2000-2.1.34054.0.exe no specs fl2000-2.1.34054.0.exe msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs msiexec.exe no specs msiexec.exe drvinst.exe drvinst.exe drvinst.exe cmd.exe no specs xcopy.exe cmd.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs sc.exe no specs sc.exe no specs devcon.exe no specs devcon.exe no specs drvinst.exe no specs timeout.exe no specs devcon.exe no specs flvga_tray.exe no specs taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120C:\Windows\system32\MsiExec.exe -Embedding D086B127272424D78927F817A7290553 CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows� installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
876DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{0e46b115-1c46-17df-03dc-357fa9164674}\fresco_iddcx.inf" "0" "61394d9b3" "000005D0" "WinSta0\Default" "00000574" "208" "C:\Program Files\Fresco Logic\Fresco Logic USB Display Driver\fresco_iddcx"C:\Windows\system32\DrvInst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1568"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3372 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\sechost.dll
c:\windows\system32\version.dll
2052C:\Windows\system32\cmd.exe /c ""C:\Program Files\Fresco Logic\Fresco Logic USB Display Driver\post_install.cmd""C:\Windows\system32\cmd.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\cmd.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2164C:\Windows\system32\MsiExec.exe -Embedding E12EBBC05E0FE84E8C9FE95FC95CFC18C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows� installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
2168timeout /t 1 /nobreakC:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ws2_32.dll
2228.\devcon\x86\devcon.exe disable =DisplayC:\Program Files\Fresco Logic\Fresco Logic USB Display Driver\devcon\x86\devcon.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
1
Version:
10.0.14393.0 (rs1_release.160715-1616)
Modules
Images
c:\program files\fresco logic\fresco logic usb display driver\devcon\x86\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2392C:\Windows\system32\MsiExec.exe -Embedding A17DA7B259C252B6CFCE767100A86E74 E Global\MSI0000C:\Windows\system32\MsiExec.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows� installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2396DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{30b8af2a-e698-7708-020a-bb412aafb830}\FL2000.inf" "0" "6c2ff297b" "000005CC" "WinSta0\Default" "00000544" "208" "C:\Program Files\Fresco Logic\Fresco Logic USB Display Driver\FL2000"C:\Windows\system32\DrvInst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
2472C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft� Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
33 776
Read events
33 103
Write events
644
Delete events
29

Modification events

(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30902352
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30902352
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3372) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
63
Suspicious files
44
Text files
14
Unknown types
33

Dropped files

PID
Process
Filename
Type
3924FL2000-2.1.34054.0.exeC:\Users\admin\AppData\Roaming\Fresco Logic\Fresco Logic USB Display Driver 2.1.34054.0\install\holder0.aiph
MD5:
SHA256:
3372iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF6B4FF791FE20C0A8.TMPgmc
MD5:
SHA256:
1568iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\FL2000-2.1.34054.0[1].exeexecutable
MD5:
SHA256:
3320msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3924FL2000-2.1.34054.0.exeC:\Users\admin\AppData\Local\Temp\tinE752.tmp.parthtml
MD5:
SHA256:
3924FL2000-2.1.34054.0.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\60Y648D5.txttext
MD5:
SHA256:
3924FL2000-2.1.34054.0.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\EBEOVIAY.txttext
MD5:
SHA256:
3924FL2000-2.1.34054.0.exeC:\Users\admin\AppData\Local\Temp\tinE752.tmphtml
MD5:
SHA256:
3372iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{C4A992D8-F443-11EB-A15C-12A9866C77DE}.datbinary
MD5:
SHA256:
3372iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\FL2000-2.1.34054.0.exeexecutable
MD5:18B0139CA76E7447BC64F9A812F4A9F2
SHA256:5E0590D6DCCC198B427C7C51CA5CC50448C2D4AAAE275322B1378D78058750E7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
16
DNS requests
9
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
FL2000-2.1.34054.0.exe
GET
200
172.217.18.100:80
http://www.google.com/
US
html
13.6 Kb
malicious
1568
iexplore.exe
GET
200
52.218.221.155:80
http://updates.frescologic.com/FL2000/FL2000-2.1.34054.0.exe
US
executable
7.69 Mb
shared
3372
iexplore.exe
GET
200
2.16.186.89:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?2d9a1cfa2a755b44
unknown
compressed
4.70 Kb
whitelisted
3924
FL2000-2.1.34054.0.exe
GET
200
52.92.164.233:80
http://updates.frescologic.com/FL2000/FL2000_Updates.txt
US
text
1.79 Kb
shared
3372
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
3372
iexplore.exe
GET
200
2.16.186.89:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c8d4d2aacb6de78d
unknown
compressed
4.70 Kb
whitelisted
3372
iexplore.exe
GET
200
2.16.186.89:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?cf4b7aa6a1e0fa15
unknown
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1568
iexplore.exe
52.218.221.155:80
updates.frescologic.com
Amazon.com, Inc.
US
suspicious
20.73.194.208:443
US
whitelisted
3924
FL2000-2.1.34054.0.exe
52.92.164.233:80
updates.frescologic.com
US
malicious
3924
FL2000-2.1.34054.0.exe
172.217.18.100:80
www.google.com
Google Inc.
US
whitelisted
3372
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3372
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3372
iexplore.exe
2.16.186.89:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
1360
svchost.exe
20.73.194.208:443
US
whitelisted

DNS requests

Domain
IP
Reputation
updates.frescologic.com
  • 52.218.221.155
  • 52.92.164.233
shared
www.google.com
  • 172.217.18.100
malicious
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ctldl.windowsupdate.com
  • 2.16.186.89
  • 2.16.186.66
  • 2.16.186.72
  • 2.16.186.56
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
1568
iexplore.exe
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
1568
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2 ETPRO signatures available at the full report
No debug info