File name:

MDE_File_Sample_dd86f9d881a4247c5f8beaf49199fbedb50bfc49 (1).zip

Full analysis: https://app.any.run/tasks/ca752fae-f926-4346-8b2a-34ea47150842
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: October 30, 2025, 19:21:16
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
adware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

9B493F10784A9A83F4D64008E2B10B8E

SHA1:

BFB7995B470C78E8645BB036787AB28C3EA9EA09

SHA256:

C51A3CA3E927CDC5FA50BEDCB87D34375D1469CCC76A3753F4F6457439D90604

SSDEEP:

98304:l/zER7t6ERHd2MNjF6bAmK2L45fyA8pUv045HpdW7ulpelQPWsFso0e63jbSH2As:JVqeugc6hqQ/dQQWaenHXW9unkqpM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ADWARE has been detected (SURICATA)

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • Registers / Runs the DLL via REGSVR32.EXE

      • uninstall.exe (PID: 6660)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • filezilla.exe (PID: 2168)
    • Application launched itself

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
    • The process creates files with name similar to system file names

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • uninstall.exe (PID: 6660)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
      • uninstall.exe (PID: 6660)
    • Executable content was dropped or overwritten

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • uninstall.exe (PID: 6660)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
    • Access to an unwanted program domain was detected

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • There is functionality for taking screenshot (YARA)

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 6176)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1880)
    • Manual execution by a user

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 1880)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • Reads the computer name

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • uninstall.exe (PID: 6660)
      • filezilla.exe (PID: 2168)
    • FileZilla executable

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • Checks supported languages

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • uninstall.exe (PID: 6660)
      • filezilla.exe (PID: 2168)
    • Process checks computer location settings

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
    • Create files in a temporary directory

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • uninstall.exe (PID: 6660)
      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7424)
    • Checks proxy server information

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • Reads the software policy settings

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • Reads the machine GUID from the registry

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
    • Creates files or folders in the user directory

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
      • filezilla.exe (PID: 2168)
    • Creates files in the program directory

      • filezilla_3.69.3_win64_sponsored2-setup.exe (PID: 7196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2025:10:30 19:17:58
ZipCRC: 0xc8851c58
ZipCompressedSize: 12853751
ZipUncompressedSize: 12879984
ZipFileName: filezilla_3.69.3_win64_sponsored2-setup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
172
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe filezilla_3.69.3_win64_sponsored2-setup.exe #ADWARE filezilla_3.69.3_win64_sponsored2-setup.exe uninstall.exe regsvr32.exe no specs slui.exe no specs regsvr32.exe no specs filezilla.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1828"C:\WINDOWS\system32\regsvr32.exe" /s /u "C:\Program Files\FileZilla FTP Client\fzshellext_64.dll"C:\Windows\System32\regsvr32.exeuninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1880"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\MDE_File_Sample_dd86f9d881a4247c5f8beaf49199fbedb50bfc49 (1).zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2168"C:\Program Files\FileZilla FTP Client\filezilla.exe" C:\Program Files\FileZilla FTP Client\filezilla.exefilezilla_3.69.3_win64_sponsored2-setup.exe
User:
admin
Company:
FileZilla Project
Integrity Level:
MEDIUM
Description:
FileZilla FTP Client
Version:
3, 69, 3, 0
Modules
Images
c:\program files\filezilla ftp client\filezilla.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
3516C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6176"C:\WINDOWS\system32\regsvr32.exe" /s "C:\Program Files\FileZilla FTP Client\fzshellext_64.dll"C:\Windows\System32\regsvr32.exefilezilla_3.69.3_win64_sponsored2-setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6660"C:\Program Files\FileZilla FTP Client\uninstall.exe" /frominstall /keepstartmenudir _?=C:\Program Files\FileZilla FTP ClientC:\Program Files\FileZilla FTP Client\uninstall.exe
filezilla_3.69.3_win64_sponsored2-setup.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
HIGH
Description:
FileZilla FTP Client
Exit code:
0
Version:
3.65.0
Modules
Images
c:\program files\filezilla ftp client\uninstall.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7196"C:\Users\admin\Desktop\filezilla_3.69.3_win64_sponsored2-setup.exe" /UAC:70054 /NCRC C:\Users\admin\Desktop\filezilla_3.69.3_win64_sponsored2-setup.exe
filezilla_3.69.3_win64_sponsored2-setup.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
HIGH
Description:
FileZilla FTP Client
Exit code:
0
Version:
3.69.3
Modules
Images
c:\users\admin\desktop\filezilla_3.69.3_win64_sponsored2-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7424"C:\Users\admin\Desktop\filezilla_3.69.3_win64_sponsored2-setup.exe" C:\Users\admin\Desktop\filezilla_3.69.3_win64_sponsored2-setup.exe
explorer.exe
User:
admin
Company:
Tim Kosse
Integrity Level:
MEDIUM
Description:
FileZilla FTP Client
Exit code:
0
Version:
3.69.3
Modules
Images
c:\users\admin\desktop\filezilla_3.69.3_win64_sponsored2-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
8 893
Read events
8 831
Write events
45
Delete events
17

Modification events

(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\MDE_File_Sample_dd86f9d881a4247c5f8beaf49199fbedb50bfc49 (1).zip
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1880) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
38
Suspicious files
122
Text files
715
Unknown types
3

Dropped files

PID
Process
Filename
Type
7424filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nsi3CDC.tmp\UAC.dllexecutable
MD5:ADB29E6B186DAA765DC750128649B63D
SHA256:2F7F8FC05DC4FD0D5CDA501B47E4433357E887BBFED7292C028D99C73B52DC08
7196filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nsz3FF9.tmp\UserInfo.dllexecutable
MD5:E6F30908ABFC6F53B7C3C36DAEC4586D
SHA256:E0DC3112796DBAA37F25AB54B7FAC2FBF791CBC6E36A84FC61C6423B84A3677B
7424filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nsi3CDC.tmp\System.dllexecutable
MD5:9B38A1B07A0EBC5C7E59E63346ECC2DB
SHA256:C881253DAFCF1322A771139B1A429EC1E78C507CA81A218A20DC1A4B25ABBFE7
1880WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb1880.22556\filezilla_3.69.3_win64_sponsored2-setup.exeexecutable
MD5:B50441B16022E354DDE581F26FB16D86
SHA256:9D4427F0840B8C3A0426AAEC545F2EFB3C8E8F2D5D7DB9A0CDC48E34B4097898
7196filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\AvastLogo[1].bmpimage
MD5:3944AC469603D2D37D4D07D2A4461E03
SHA256:99F62EAB1E884811C056FD7441249C4D0A41B34386D8B8B03F20CA0113F9FA48
7196filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nsy573D.tmpimage
MD5:3944AC469603D2D37D4D07D2A4461E03
SHA256:99F62EAB1E884811C056FD7441249C4D0A41B34386D8B8B03F20CA0113F9FA48
7196filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nsz3FF9.tmp\INetC.dllexecutable
MD5:640BFF73A5F8E37B202D911E4749B2E9
SHA256:C1E568E25EC111184DEB1B87CFDA4BFEC529B1ABEAB39B66539D998012F33502
7424filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nsi3CDC.tmp\UserInfo.dllexecutable
MD5:E6F30908ABFC6F53B7C3C36DAEC4586D
SHA256:E0DC3112796DBAA37F25AB54B7FAC2FBF791CBC6E36A84FC61C6423B84A3677B
7196filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nst4B54.tmpexecutable
MD5:F03205B2487FBDA78C05FE108B8D672E
SHA256:03617EF6705ECD575F209B1023C85E9F5E3AC174E2E2DE088553A4536CB930AE
7196filezilla_3.69.3_win64_sponsored2-setup.exeC:\Users\admin\AppData\Local\Temp\nsz3FF9.tmp\nsDialogs.dllexecutable
MD5:8F0E7415F33843431DF308BB8E06AF81
SHA256:BB49F15FA83452370047A7801E39FC7F64E70C7545B8999BB85AA4749EAA048B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
31
DNS requests
20
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
832
lsass.exe
GET
200
18.245.38.235:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
whitelisted
6016
MoUsoCoreWorker.exe
GET
200
2.16.164.123:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
POST
200
13.226.244.85:80
http://api.playanext.com/httpapi
unknown
whitelisted
832
lsass.exe
GET
200
18.245.65.219:80
http://ocsp.r2m03.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQqHI%2BsdmapawQncL1rpCEZZ8gTSAQUVdkYX9IczAHhWLS%2Bq9lVQgHXLgICEApmLDZVoNqSy8s4lLHxtx8%3D
unknown
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
POST
200
13.226.244.85:80
http://api.playanext.com/httpapi
unknown
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
POST
200
13.226.244.85:80
http://api.playanext.com/httpapi
unknown
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
POST
200
13.226.244.85:80
http://api.playanext.com/httpapi
unknown
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
POST
200
13.226.244.85:80
http://api.playanext.com/httpapi
unknown
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
POST
200
13.226.244.85:80
http://api.playanext.com/httpapi
unknown
whitelisted
1340
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6016
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2980
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6016
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6016
MoUsoCoreWorker.exe
2.16.164.123:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6016
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5948
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
13.226.244.85:80
api.playanext.com
AMAZON-02
US
whitelisted
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
99.84.152.40:443
offers.playanext.com
AMAZON-02
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 2.16.164.123
  • 2.16.164.82
  • 2.16.164.113
  • 2.16.164.129
  • 2.16.164.128
  • 2.16.164.24
  • 2.16.164.26
  • 2.16.164.89
  • 2.16.164.121
whitelisted
api.playanext.com
  • 13.226.244.85
  • 13.226.244.76
  • 13.226.244.105
  • 13.226.244.16
whitelisted
offers.playanext.com
  • 99.84.152.40
  • 99.84.152.82
  • 99.84.152.106
  • 99.84.152.119
unknown
ocsp.rootca1.amazontrust.com
  • 18.245.38.235
whitelisted
ocsp.r2m03.amazontrust.com
  • 18.245.65.219
whitelisted
files.playanext.com
  • 18.66.147.113
  • 18.66.147.52
  • 18.66.147.61
  • 18.66.147.111
unknown
login.live.com
  • 40.126.31.71
  • 40.126.31.2
  • 40.126.31.67
  • 20.190.159.2
  • 40.126.31.3
  • 40.126.31.1
  • 40.126.31.69
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 23.63.118.230
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Driver Updater Setup Process
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Driver Updater Setup Process
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Driver Updater Setup Process
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Driver Updater Setup Process
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Driver Updater Setup Process
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Driver Updater Setup Process
7196
filezilla_3.69.3_win64_sponsored2-setup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Driver Updater Setup Process
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
No debug info