Analysis
-
max time kernel
49s -
max time network
6s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
23/08/2020, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe
Resource
win10
General
-
Target
59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe
-
Size
465KB
-
MD5
b48c54150f2366dd29504dbef0600ab3
-
SHA1
0d8190ac6b0235d881217e8e7e2df8f5426464c3
-
SHA256
59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881
-
SHA512
3d548670df6e9c229a8bcb29093f04d92496dcd01526e3c97e2b74cd683f4b653d9e2a6dd990ce9b62e33ef8899c2e29d979cb3e46dd6c493bdad3e81c1396b6
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-403932158-3302036622-1224131197-1000\bft0pz99-readme.txt
Extracted
C:\$Recycle.Bin\bft0pz99-readme.txt
Extracted
C:\Program Files (x86)\bft0pz99-readme.txt
Extracted
C:\ProgramData\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.en\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.es\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\Proof.fr\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-002C-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0043-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Windows\bft0pz99-readme.txt
Extracted
C:\PerfLogs\Admin\bft0pz99-readme.txt
Extracted
C:\PerfLogs\bft0pz99-readme.txt
Extracted
C:\Program Files\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0044-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Adobe\Acrobat\9.0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Adobe\Acrobat\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Adobe\Color\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Adobe\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\CertificateRevocation\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crowd Deny\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-00A1-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dir\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-00BA-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\bft0pz99-readme.txt
Extracted
C:\Recovery\19050942-cd11-11ea-8b14-46f8a7600ebe\bft0pz99-readme.txt
Extracted
C:\Recovery\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\js\index-dir\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\js\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\1033\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0115-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\wasm\index-dir\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\wasm\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Code Cache\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Local\Microsoft\Windows\GameExplorer\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Local\Microsoft\Windows\History\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Local\Microsoft\Windows\Temporary Internet Files\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Local\Microsoft\Windows\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Local\Microsoft\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Local\Temp\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Local\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Media Center Programs\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Cookies\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Network Shortcuts\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Recent\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Templates\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\Windows\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Local Storage\leveldb\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Local Storage\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\Microsoft\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\Roaming\bft0pz99-readme.txt
Extracted
C:\Users\Default\AppData\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Platform Notifications\bft0pz99-readme.txt
Extracted
C:\Users\Default\Desktop\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Session Storage\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\bft0pz99-readme.txt
Extracted
C:\Users\Default\Documents\bft0pz99-readme.txt
Extracted
C:\Users\Default\Downloads\bft0pz99-readme.txt
Extracted
C:\Users\Default\Favorites\bft0pz99-readme.txt
Extracted
C:\Users\Default\Links\bft0pz99-readme.txt
Extracted
C:\Users\Default\Music\bft0pz99-readme.txt
Extracted
C:\Users\Default\Pictures\bft0pz99-readme.txt
Extracted
C:\Users\Default\Saved Games\bft0pz99-readme.txt
Extracted
C:\Users\Default\Videos\bft0pz99-readme.txt
Extracted
C:\Users\Default\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ECSerivceProvidersConfig\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\FileTypePolicies\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\FontLookupTableCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\InterventionPolicyDatabase\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\MEIPreload\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\OriginTrials\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\PepperFlash\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\pnacl\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Safe Browsing\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SafetyTips\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SSLErrorAssistant\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Subresource Filter\Unindexed Rules\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Subresource Filter\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\TLSDeprecationConfig\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\WidevineCdm\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\Chrome\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Google\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Credentials\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds\Feeds for United States~\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds\Microsoft Feeds~\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\0V5SICB9\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\4AO3J8KQ\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9YXJLNZ8\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\BGF7D1VN\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\G9Q5MRQ4\bft0pz99-readme.txt
Extracted
C:\Users\Public\Desktop\bft0pz99-readme.txt
Extracted
C:\Users\Public\Documents\bft0pz99-readme.txt
Extracted
C:\Users\Public\Downloads\bft0pz99-readme.txt
Extracted
C:\Users\Public\Favorites\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NBP238LH\bft0pz99-readme.txt
Extracted
C:\Users\Public\Libraries\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\PVYCMAJD\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\UBDEWKGM\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\IECompatData\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\28xp72e\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\TabRoaming\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2845162440\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Tiles\pin9728060290\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Tiles\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Tracking Protection\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\Access.en-us\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0117-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\0000863F\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\en-US\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Media Player\Sync Playlists\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Media Player\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\Groove\System\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\Groove\User\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\Groove\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Office\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\PlayReady\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\GameExplorer\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012020072320200724\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\History\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Ringtones\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\25G6S1M0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4YGXBUEA\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B3YTGAQ5\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C6XW8L4H\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QIP5FJKD\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S5IKN59D\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y6XXJ978\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUPYO70K\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\bft0pz99-readme.txt
Extracted
C:\Users\Public\Music\Sample Music\bft0pz99-readme.txt
Extracted
C:\Users\Public\Music\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\WebCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows\bft0pz99-readme.txt
Extracted
C:\Users\Public\Pictures\Sample Pictures\bft0pz99-readme.txt
Extracted
C:\Users\Public\Pictures\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Pictures\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Saved Games\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Searches\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Videos\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Contacts\bft0pz99-readme.txt
Extracted
C:\Users\Public\Recorded TV\Sample Media\bft0pz99-readme.txt
Extracted
C:\Users\Public\Recorded TV\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Desktop\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Backup\new\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Backup\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Media\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Sidebar\Gadgets\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\Windows Sidebar\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Microsoft Help\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\cache2\doomed\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\cache2\entries\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\cache2\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\OfflineCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\safebrowsing\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Microsoft\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Mozilla\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\19\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\26\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48\bft0pz99-readme.txt
Extracted
C:\Users\Public\Videos\Sample Videos\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49\bft0pz99-readme.txt
Extracted
C:\Users\Public\Videos\bft0pz99-readme.txt
Extracted
C:\Users\Public\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0019-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\6\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\startupCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\thumbnails\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2ulz21c5.default-release\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zalsryvg.Admin\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\Security\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Adobe\Acrobat\9.0\Replicate\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Adobe\Acrobat\9.0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\Firefox\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Adobe\Acrobat\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Mozilla\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\cache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\security\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\Deployment\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Adobe\Updater6\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Adobe\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-001A-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Assistance\Client\1.0\en-US\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Assistance\Client\1.0\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Assistance\Client\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Assistance\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Crypto\DSS\MachineKeys\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Crypto\DSS\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Crypto\Keys\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Crypto\RSA\MachineKeys\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Crypto\RSA\S-1-5-18\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Crypto\RSA\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Crypto\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Device\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\en-US\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Task\{07deb856-fc6e-4fb9-8add-d8f2cf8722c9}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\en-US\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Task\{e35be42d-f742-4d96-a50a-1775fb1a7a42}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\Task\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Device Stage\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\DeviceSync\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\DRM\Server\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\DRM\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\eHome\logs\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\eHome\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\IdentityCRL\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Media Player\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\MF\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\MSDN\8.0\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\MSDN\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\NetFramework\BreadcrumbStore\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\NetFramework\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Network\Connections\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Network\Downloader\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Network\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Documents\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-001B-0409-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\OFFICE\UICaptions\1036\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Downloads\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Favorites\Links\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Favorites\Links for United States\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Favorites\Microsoft Websites\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Favorites\MSN Websites\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Favorites\Windows Live\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Favorites\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Links\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\045114287\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\CR_3F444.tmp\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\WPDNSE\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Local\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\Collab\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\bft0pz99-readme.txt
Extracted
C:\Users\Admin\Music\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Media Center Programs\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\AssetCache\AJEYWUNP\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\AssetCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\NativeCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\Flash Player\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Adobe\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Identities\{B448C477-1FC1-4A22-A994-21DE87B30229}\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Identities\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\RJ6SZ7LB\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Macromedia\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\AddIns\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Credentials\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-403932158-3302036622-1224131197-1000\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Document Building Blocks\1033\14\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Document Building Blocks\1033\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Document Building Blocks\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\UserData\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\OFFICE\UICaptions\3082\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\OFFICE\UICaptions\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\OFFICE\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\OfficeSoftwareProtectionPlatform\Cache\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\OfficeSoftwareProtectionPlatform\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\RAC\Outbound\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\RAC\PublishedData\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\RAC\StateData\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\RAC\Temp\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Office\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Proof\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\RAC\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-403932158-3302036622-1224131197-1000\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\UProof\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IECompatCache\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IECompatCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IECompatUACache\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IECompatUACache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IETldCache\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IETldCache\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Network Shortcuts\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\PrivacIE\Low\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\PrivacIE\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Word\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Extensions\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\events\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Crash Reports\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Pending Pings\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\bookmarkbackups\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\crashes\events\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Config\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\GatherLogs\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\crashes\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\datareporting\archived\2020-07\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\datareporting\archived\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\datareporting\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\extensions\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\minidumps\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\security_state\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\sessionstore-backups\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\CiFiles\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\Indexer\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\default\moz-extension+++355a24d0-6cfc-4451-9595-11d186f69ab7^userContextId=4294967295\idb\3647222921wleabcEoxlt-eengsairo.files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\default\moz-extension+++355a24d0-6cfc-4451-9595-11d186f69ab7^userContextId=4294967295\idb\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\default\moz-extension+++355a24d0-6cfc-4451-9595-11d186f69ab7^userContextId=4294967295\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\default\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\PropMap\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\bft0pz99-readme.txt
Extracted
C:\MSOCache\All Users\bft0pz99-readme.txt
Extracted
C:\MSOCache\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\SecStore\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Projects\SystemIndex\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\Projects\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\Windows\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Applications\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\Temp\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\Data\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Search\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\idb\2918063365piupsah.files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\idb\3561288849sdhlie.files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.files\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\idb\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\chrome\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\permanent\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\temporary\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\storage\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2ulz21c5.default-release\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zalsryvg.Admin\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\SystemExtensionsDev\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\Mozilla\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\Roaming\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\jdk1.7.0_80_x64\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\Java\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\Sun\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\LocalLow\bft0pz99-readme.txt
Extracted
C:\Users\Admin\AppData\bft0pz99-readme.txt
Extracted
C:\Users\Admin\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\User Account Pictures\Default Pictures\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\User Account Pictures\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Vault\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\AIT\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Caches\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\DeviceMetadataStore\en-US\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\DeviceMetadataStore\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\DRM\Cache\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\DRM\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\GameExplorer\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Power Efficiency Diagnostics\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Ringtones\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Sqm\Manifest\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Sqm\Sessions\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Sqm\Upload\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Sqm\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\WER\ReportArchive\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\NonCritical_x64_14581a24ae3cd03160d66be822236893de867_cab_048c6d71\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\NonCritical_x64_15ac16619585aa27282df5e4c6acd0916524a313_cab_07d86048\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\NonCritical_x64_3eb5ea8473594499407cacbd9887e2953d50fd80_cab_05849b45\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\WER\ReportQueue\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\WER\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\7-Zip\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Maintenance\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\SharePoint\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Tablet PC\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Microsoft Office\Microsoft Office 2010 Tools\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Microsoft Office\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\VideoLAN\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Java\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Java Development Kit\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Administrative Tools\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Games\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Start Menu\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\Templates\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Definition Updates\Backup\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Definition Updates\Updates\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Quarantine\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Scans\History\CacheManager\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Scans\History\Results\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Scans\History\Service\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\LocalCopy\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Scans\History\Store\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Scans\History\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Scans\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Support\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Definition Updates\{D2B0B133-42ED-44D3-809A-46EBB62BA863}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\Definition Updates\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows Defender\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\ActivityLog\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\en-US\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\Common Coverpages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\Inbox\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\Queue\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\SentItems\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\VirtualInbox\en-US\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\VirtualInbox\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSFax\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\MSScan\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\Windows NT\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\WwanSvc\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Microsoft Help\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Mozilla\updates\308046B0AF4A39CB\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Mozilla\updates\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Mozilla\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\54050A5F8AE7F0C56E553F0090146C17A1D2BF8D\packages\Patch\x64\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\54050A5F8AE7F0C56E553F0090146C17A1D2BF8D\packages\Patch\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\54050A5F8AE7F0C56E553F0090146C17A1D2BF8D\packages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\54050A5F8AE7F0C56E553F0090146C17A1D2BF8D\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}v14.21.27702\packages\vcRuntimeMinimum_amd64\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}v14.21.27702\packages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}v14.21.27702\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{12578975-C765-4BDF-8DDC-3284BC0E855F}v14.21.27702\packages\vcRuntimeAdditional_amd64\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{12578975-C765-4BDF-8DDC-3284BC0E855F}v14.21.27702\packages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{12578975-C765-4BDF-8DDC-3284BC0E855F}v14.21.27702\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\vcRuntimeAdditional_amd64\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\packages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{37B8F9C7-03FB-3253-8781-2517C99D7C00}v11.0.61030\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\vcRuntimeAdditional_amd64\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\packages\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}v12.0.40660\bft0pz99-readme.txt
Extracted
C:\Users\All Users\Package Cache\bft0pz99-readme.txt
Extracted
C:\Users\bft0pz99-readme.txt
Signatures
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CompareUndo.tiff 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Users\Admin\Pictures\TraceMount.tiff 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Users\Admin\Pictures\UnprotectClear.tiff 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bft0pz99-readme.txt 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\bft0pz99-readme.txt 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe -
Drops file in Program Files directory 37 IoCs
description ioc Process File opened for modification C:\Program Files\ImportJoin.dwg 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\MountLimit.emz 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\RegisterRead.vbe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\RemoveExpand.mov 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\SetLock.vbs 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\WatchDismount.cmd 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\ConvertToWait.mp2 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\StartUnblock.asp 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\WatchDeny.eps 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\CloseAssert.htm 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\CloseCopy.bin 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\DisableReset.tiff 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File created C:\Program Files (x86)\bft0pz99-readme.txt 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\CopyWatch.inf 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\EditReceive.html 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\MountWait.jpeg 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\TraceSubmit.TTS 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\UnregisterShow.xlsb 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\UnregisterOptimize.html 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\AssertRepair.potx 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\CheckpointReceive.vstm 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\ConvertFromRestore.mpeg 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\ExportConfirm.mpeg3 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\OptimizeResolve.search-ms 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\ResolveUndo.wma 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\TraceProtect.htm 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File created C:\Program Files\bft0pz99-readme.txt 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\ConfirmExpand.m4v 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\CopyPush.vst 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\ExportRemove.mpv2 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\SendShow.ps1 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\WriteTrace.dxf 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\CompleteLock.ps1xml 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\ClearPing.potm 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\DenyUpdate.xml 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\OpenEnter.asf 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Program Files\SubmitRestart.xhtml 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe -
Drops file in Windows directory 24 IoCs
description ioc Process File opened for modification C:\Windows\twunk_16.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\WindowsShell.Manifest 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\WindowsUpdate.log 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\WMSysPr9.prx 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\PFRO.log 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\Starter.xml 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\Professional.xml 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\twunk_32.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File created C:\Windows\bft0pz99-readme.txt 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\bfsvc.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\HelpPane.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\regedit.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\setupact.log 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\splwow64.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\TSSysprep.log 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\winhlp32.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\write.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\hh.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\notepad.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\fveupdate.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\mib.bin 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\setuperr.log 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\DtcInstall.log 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe File opened for modification C:\Windows\explorer.exe 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 800 powershell.exe 456 powershell.exe 456 powershell.exe 800 powershell.exe -
Suspicious use of AdjustPrivilegeToken 486 IoCs
description pid Process Token: SeDebugPrivilege 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeBackupPrivilege 764 vssvc.exe Token: SeRestorePrivilege 764 vssvc.exe Token: SeAuditPrivilege 764 vssvc.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: 34 800 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: 35 800 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: 35 800 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: 34 800 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: 35 800 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: 34 800 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: 35 800 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: 33 456 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: 34 456 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: 35 456 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: 35 456 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe Token: SeIncreaseQuotaPrivilege 800 powershell.exe Token: SeSecurityPrivilege 800 powershell.exe Token: SeTakeOwnershipPrivilege 800 powershell.exe Token: SeLoadDriverPrivilege 800 powershell.exe Token: SeSystemProfilePrivilege 800 powershell.exe Token: SeSystemtimePrivilege 800 powershell.exe Token: SeProfSingleProcessPrivilege 800 powershell.exe Token: SeIncBasePriorityPrivilege 800 powershell.exe Token: SeCreatePagefilePrivilege 800 powershell.exe Token: SeBackupPrivilege 800 powershell.exe Token: SeRestorePrivilege 800 powershell.exe Token: SeShutdownPrivilege 800 powershell.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeSystemEnvironmentPrivilege 800 powershell.exe Token: SeRemoteShutdownPrivilege 800 powershell.exe Token: SeUndockPrivilege 800 powershell.exe Token: SeManageVolumePrivilege 800 powershell.exe Token: 33 800 powershell.exe Token: 34 800 powershell.exe Token: 35 800 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 628 wrote to memory of 800 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 24 PID 628 wrote to memory of 800 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 24 PID 628 wrote to memory of 800 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 24 PID 628 wrote to memory of 456 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 25 PID 628 wrote to memory of 456 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 25 PID 628 wrote to memory of 456 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 25 PID 628 wrote to memory of 1604 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 29 PID 628 wrote to memory of 1604 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 29 PID 628 wrote to memory of 1604 628 59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe"C:\Users\Admin\AppData\Local\Temp\59316fc8224622a24b95b621828b5704481d6ea5001e00a108f60716210d9881.bin.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden -nologo -enc RwBlAHQALQBDAGkAbQBJAG4AcwB0AGEAbgBjAGUAIABXAGkAbgAzADIAXwBTAGgAYQBkAG8AdwBDAG8AcAB5ACAAfAAgAFIAZQBtAG8AdgBlAC0AQwBpAG0ASQBuAHMAdABhAG4AYwBlAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden -nologo -enc RwBlAHQALQBDAGkAbQBJAG4AcwB0AGEAbgBjAGUAIABXAGkAbgAzADIAXwBTAGgAYQBkAG8AdwBDAG8AcAB5ACAAfAAgAFIAZQBtAG8AdgBlAC0AQwBpAG0ASQBuAHMAdABhAG4AYwBlAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\bft0pz99-readme.txt2⤵PID:1604
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
PID:764