File name:

Installler--md48pk.exe

Full analysis: https://app.any.run/tasks/129e3239-9011-4fb4-aee9-6ac4d70ccfb3
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: November 15, 2020, 13:39:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
stealer
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

B879B0D052AE800BA6D380F6CE92ADDC

SHA1:

19C6D2E26A83261308AA627DA101D408BF964CDD

SHA256:

26019A30D52EAA0A4151C5DF56D7370BA65F874F30FE01C8C42A82017FF4103A

SSDEEP:

24576:dQULDNmBkOModxkzf+GN5TNczyLyIhndRsU0oSCXvox8jxQS92yZVgu+YUX8mNgU:dQULJskOMoAjJTmzyLRhdRsU/SB8jxQX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs app for hidden code execution

      • cmd.exe (PID: 3120)
      • cmd.exe (PID: 564)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2044)
      • cmd.exe (PID: 1340)
    • Application was dropped or rewritten from another process

      • netFilterService.com (PID: 3644)
      • netFilterService.com (PID: 2208)
      • File.exe (PID: 2508)
      • wininit.com (PID: 2292)
      • wininit.com (PID: 2632)
    • Stealing of credential data

      • ftp.exe (PID: 2920)
    • Actions looks like stealing of personal data

      • ftp.exe (PID: 2920)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Installler--md48pk.exe (PID: 2452)
      • cmd.exe (PID: 3120)
      • File.exe (PID: 2508)
      • ftp.exe (PID: 2920)
      • cmd.exe (PID: 564)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 2044)
      • ftp.exe (PID: 2920)
      • cmd.exe (PID: 1340)
    • Drop AutoIt3 executable file

      • cmd.exe (PID: 2044)
      • cmd.exe (PID: 1340)
    • Starts CertUtil for decode files

      • cmd.exe (PID: 2044)
      • cmd.exe (PID: 564)
      • cmd.exe (PID: 1340)
    • Application launched itself

      • cmd.exe (PID: 3120)
      • cmd.exe (PID: 564)
      • netFilterService.com (PID: 3644)
      • wininit.com (PID: 2292)
    • Starts application with an unusual extension

      • netFilterService.com (PID: 3644)
      • cmd.exe (PID: 2044)
      • cmd.exe (PID: 1340)
      • wininit.com (PID: 2292)
    • Reads Internet Cache Settings

      • ftp.exe (PID: 2920)
    • Reads the cookies of Mozilla Firefox

      • ftp.exe (PID: 2920)
    • Starts CMD.EXE for self-deleting

      • ftp.exe (PID: 2920)
    • Reads the cookies of Google Chrome

      • ftp.exe (PID: 2920)
    • Searches for installed software

      • ftp.exe (PID: 2920)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2560)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2560)
    • Manual execution by user

      • WINWORD.EXE (PID: 2560)
      • ftp.exe (PID: 2920)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:10:14 07:50:27+02:00
PEType: PE32
LinkerVersion: 11
CodeSize: 26112
InitializedDataSize: 1507328
UninitializedDataSize: -
EntryPoint: 0x67cc
OSVersion: 6.3
ImageVersion: 6.3
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 10.78.3066.43080
ProductVersionNumber: 10.78.3066.43080
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Uwz68 Dskosru Bujigflzih
FileVersion: 10.78.3066.43080 (lxcaujh_sjn.769111-2404)
InternalName: Cssbnci
LegalCopyright: © Microsoft Corporation. Kvh Vjvrbu Yknhqyhe.
OriginalFileName: UJDSFZL.EXE .LTJ
ProductName: Internet Explorer
ProductVersion: 10.78.3066.43080

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 14-Oct-2013 05:50:27
Detected languages:
  • English - United States
  • Russian - Russia
Debug artifacts:
  • wextract.pdb
CompanyName: Microsoft Corporation
FileDescription: Uwz68 Dskosru Bujigflzih
FileVersion: 10.78.3066.43080 (lxcaujh_sjn.769111-2404)
InternalName: Cssbnci
LegalCopyright: © Microsoft Corporation. Kvh Vjvrbu Yknhqyhe.
OriginalFilename: UJDSFZL.EXE .LTJ
ProductName: Internet Explorer
ProductVersion: 10.78.3066.43080

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 14-Oct-2013 05:50:27
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000065CC
0x00006600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.3849
.data
0x00008000
0x00001A8C
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.17593
.idata
0x0000A000
0x00001078
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.04858
.rsrc
0x0000C000
0x0016D589
0x0016D600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.95699
.reloc
0x0017A000
0x000013AE
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
3.72277

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.08125
1537
Latin 1 / Western European
English - United States
RT_MANIFEST
2
0.852141
17448
UNKNOWN
English - United States
RT_ICON
3
7.58769
1309
UNKNOWN
English - United States
RT_ICON
63
3.37777
134
Latin 1 / Western European
Russian - Russia
RT_STRING
76
3.71806
1326
Latin 1 / Western European
Russian - Russia
RT_STRING
77
3.99175
1426
Latin 1 / Western European
Russian - Russia
RT_STRING
80
3.95581
1202
Latin 1 / Western European
Russian - Russia
RT_STRING
83
3.84767
1086
Latin 1 / Western European
Russian - Russia
RT_STRING
85
3.6985
764
Latin 1 / Western European
Russian - Russia
RT_STRING
2001
3.91005
860
Latin 1 / Western European
Russian - Russia
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
Cabinet.dll
GDI32.dll
KERNEL32.dll
USER32.dll
VERSION.dll
msvcrt.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
58
Monitored processes
21
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start installler--md48pk.exe no specs cmd.exe no specs cmd.exe ping.exe no specs certutil.exe no specs netfilterservice.com no specs ping.exe no specs netfilterservice.com no specs ftp.exe winword.exe no specs file.exe no specs cmd.exe no specs cmd.exe no specs timeout.exe no specs certutil.exe no specs cmd.exe ping.exe no specs certutil.exe no specs wininit.com no specs ping.exe no specs wininit.com no specs

Process information

PID
CMD
Path
Indicators
Parent process
564cmd /c certutil -decode 3-95 3-9 & cmd < 3-9C:\Windows\system32\cmd.exeFile.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
688ping -n 1 KkksUzX.KkksUzXC:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
1340cmd C:\Windows\system32\cmd.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1720ping 127.0.0.1 -n 3C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2044C:\Windows\system32\cmd.exe C:\Windows\system32\cmd.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2076ping -n 1 BZrmAlRzl.BZrmAlRzlC:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2208C:\Users\admin\AppData\Local\Temp\IXP000.TMP\netFilterService.com XC:\Users\admin\AppData\Local\Temp\IXP000.TMP\netFilterService.comnetFilterService.com
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 1
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\netfilterservice.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2292wininit.com eC:\Users\admin\AppData\Local\Temp\IXP001.TMP\wininit.comcmd.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 1
Modules
Images
c:\users\admin\appdata\local\temp\ixp001.tmp\wininit.com
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2348timeout 2 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
2440certutil -decode 49-6 XC:\Windows\system32\certutil.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\certutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
Total events
2 158
Read events
1 828
Write events
181
Delete events
149

Modification events

(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:'d>
Value:
27643E00000A0000010000000000000000000000
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(2560) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
Executable files
6
Suspicious files
6
Text files
125
Unknown types
12

Dropped files

PID
Process
Filename
Type
2560WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR8897.tmp.cvr
MD5:
SHA256:
2452Installler--md48pk.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\4-3binary
MD5:
SHA256:
2044cmd.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\netFilterService.comexecutable
MD5:
SHA256:
2452Installler--md48pk.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\76-4text
MD5:
SHA256:
2452Installler--md48pk.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\49-36binary
MD5:
SHA256:
2560WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\resultscanon.rtf.LNKlnk
MD5:
SHA256:
2560WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
2560WINWORD.EXEC:\Users\admin\Desktop\~$sultscanon.rtfpgc
MD5:
SHA256:
2920ftp.exeC:\Users\admin\AppData\Local\Temp\QjpVFjo\8uywAg.tmpsqlite
MD5:
SHA256:
2560WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
4
DNS requests
7
Threats
19

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2920
ftp.exe
POST
200
95.213.224.122:80
http://kirraadd06.top/index.php
RU
text
2 b
malicious
2920
ftp.exe
POST
200
193.106.175.25:80
http://moraatwoo04.top/index.php
RU
text
3 b
malicious
2920
ftp.exe
GET
302
47.254.173.45:80
http://frttload05.top/download.php?file=lm.exe
US
malicious
2920
ftp.exe
GET
47.254.173.45:80
http://frttload05.top/downfiles/lm.exe
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2920
ftp.exe
95.213.224.122:80
kirraadd06.top
OOO Network of data-centers Selectel
RU
malicious
2920
ftp.exe
193.106.175.25:80
moraatwoo04.top
IQHost Ltd
RU
malicious
47.254.173.45:80
frttload05.top
Alibaba (China) Technology Co., Ltd.
US
malicious
2920
ftp.exe
47.254.173.45:80
frttload05.top
Alibaba (China) Technology Co., Ltd.
US
malicious

DNS requests

Domain
IP
Reputation
KkksUzX.KkksUzX
unknown
DzhaQACnaAnJVRPH.DzhaQACnaAnJVRPH
unknown
kirraadd06.top
  • 95.213.224.122
malicious
moraatwoo04.top
  • 193.106.175.25
malicious
frttload05.top
  • 47.254.173.45
malicious
BZrmAlRzl.BZrmAlRzl
unknown
OxhAbVfodSJENVDzeHgpqcPrNyLp.OxhAbVfodSJENVDzeHgpqcPrNyLp
unknown

Threats

PID
Process
Class
Message
1044
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
2920
ftp.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
2920
ftp.exe
A Network Trojan was detected
STEALER [PTsecurity] Possible Exfiltration Action (POST Zip Archive)
2920
ftp.exe
A Network Trojan was detected
STEALER [PTsecurity] Possible Exfiltration Action (POST Zip Archive)
2920
ftp.exe
A Network Trojan was detected
ET TROJAN Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
2920
ftp.exe
A Network Trojan was detected
STEALER [PTsecurity] Possible Exfiltration Action (POST Zip Archive)
2920
ftp.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
2920
ftp.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
2920
ftp.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
2920
ftp.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
8 ETPRO signatures available at the full report
No debug info