Vault Professional 2012 Win32 Bit Torrent
LINK > https://byltly.com/2tsQZf
This Potentially Unwanted Application drops the following files: %Application Data%\\BitTorrent\\BitTorrent.exe%Application Data%\\BitTorrent\\bittorrent.lng%Application Data%\\BitTorrent\\bittorrent.lng.new%Application Data%\\BitTorrent\\settings.dat.new%Application Data%\\BitTorrent\\updates.dat%Application Data%\\Microsoft\\Windows\\Start Menu\\BitTorrent.lnk%Desktop%\\BitTorrent.lnk%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\br.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\de.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\en.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\es.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\fr.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\it.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\ko.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\pt.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\i18n\\ru.json%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\images\\bt_icon_48px.png%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\images\\loading.gif%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\images\\main_bittorrent.ico%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\images\\main_icon.png%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\images\\main_utorrent.ico%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\index.hta%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\install.{Random Numbers}.zip%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\scripts\\common.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\scripts\\es5-shim.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\scripts\\initialize.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\scripts\\install.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\scripts\\uninstall.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\shell_scripts\\check_if_cscript_is_working.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\shell_scripts\\shell_install_offer.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\shell_scripts\\shell_ping_after_close.js%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\styles\\common.css%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\styles\\installer.css%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\HTA\\uninstall.hta%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\index.hta.log%User Temp%\\{Random Characters}.tmp.{Random Numbers}\\sideLog.logC:\\hydra_tmp_{Random Numbers}\\BitTorrent.lnk(Note: %Application Data% is the current user's Application Data folder, which is usually C:\\Documents and Settings\\{user name}\\Application Data on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\\Users\\{user name}\\AppData\\Roaming on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).. %Desktop% is the current user's desktop, which is usually C:\\Documents and Settings\\{User Name}\\Desktop on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\\Users\\{user name}\\Desktop on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).. %User Temp% is the current user's Temp folder, which is usually C:\\Documents and Settings\\{user name}\\Local Settings\\Temp on Windows 2000(32-bit), XP, and Server 2003(32-bit), or C:\\Users\\{user name}\\AppData\\Local\\Temp on Windows Vista, 7, 8, 8.1, 2008(64-bit), 2012(64-bit) and 10(64-bit).) 1e1e36bf2d