Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML.

 
Alt 22.02.2015, 14:09   #1
jesses
 
Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs) - Standard

Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)



Hallo, ich suche Hilfe bei meinem Problem mit dem Browser. Ich habe einen Firefox (v35.0.1). Die Startseite lässt sich nicht mehr umstellen, sie springt immer auf
Code:
ATTFilter
hxxp://search.fbdownloader.com/?channel=fpo_nt
         
. Zudem werden Webseiten öfters auf Werbeseiten umgeleitet wenn ich auf Links klicke, oder sogar Werbung in neuen Tabs geöffnent. Ich weiß nicht, ob diese Information wichtig ist, aber manchmal ist meine Internetverbindung einfach weg (Wlan laut windows nur eingeschränkt verbunden). Nach "Trennen" und wieder "Verbinden" geht es wieder)

Außerdem würde ich gern wissen, ob ich einen Trojaner oÄ. auf diesem Laptop habe und mich so vielleicht jemand ausspionieren kann.

Ich habe die Anleitung für Hilfesuchende nach bestem Wissen befolgt. Ich habe McAfee installiert, wo ich nicht genau weiß ob ich das richtig ausgeschaltet habe (und falls nicht, wie ich das mache).

Hier meine Logs:
(weil zu lang, in neuen posts)

Im Vorraus schon vielen Dank für die Hilfe


FRST Logfile:

FRST Logfile:
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 21-02-2015
Ran by Jessica (administrator) on JESSICA-PC on 22-02-2015 12:57:18
Running from C:\Users\Jessica\Downloads
Loaded Profiles: Jessica (Available profiles: Jessica)
Platform: Microsoft Windows 7 Home Premium  Service Pack 1 (X86) OS Language: Deutsch (Deutschland)
Internet Explorer Version 11 (Default browser: FF)
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(NVIDIA Corporation) C:\Windows\System32\nvvsvc.exe
(NVIDIA Corporation) C:\Windows\System32\nvvsvc.exe
() C:\Program Files\ICQ6Toolbar\ICQ Service.exe
(McAfee, Inc.) C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
(McAfee, Inc.) C:\Windows\System32\mfevtps.exe
() C:\Program Files\Samsung Casual Games\GameConsole\OberonGameConsoleService.exe
() C:\Windows\System32\Rezip.exe
() C:\Program Files\CyberLink\Shared files\RichVideo.exe
(Iminent) C:\Program Files\Common Files\Umbrella\umbrella.exe
() C:\Program Files\Web Assistant\ExtensionUpdaterService.exe
(McAfee, Inc.) C:\Program Files\McAfee\MSC\McAPExe.exe
(McAfee, Inc.) C:\Program Files\Common Files\McAfee\AMCore\mcshield.exe
(McAfee, Inc.) C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe
(McAfee, Inc.) C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe
(Microsoft Corporation) C:\Windows\System32\rundll32.exe
(Samsung Electronics Co., Ltd.) C:\Program Files\Samsung\EasySpeedUpManager\EasySpeedUpManager.exe
(Samsung Electronics Co., Ltd.) C:\Program Files\Samsung\Easy Display Manager\dmhkcore.exe
(SAMSUNG Electronics) C:\Program Files\Samsung\Samsung Support Center\SSCKbdHk.exe
(SEC) C:\Program Files\Samsung\Samsung Recovery Solution 4\WCScheduler.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
(CyberLink) C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe
(CyberLink Corp.) C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe
(Iminent) C:\Program Files\Iminent\Iminent.exe
(Iminent) C:\Program Files\Iminent\Iminent.Messengers.exe
(Oracle Corporation) C:\Program Files\Common Files\Java\Java Update\jusched.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
(McAfee, Inc.) C:\Program Files\McAfee Security Scan\3.8.150\SSScheduler.exe
(Dropbox, Inc.) C:\Users\Jessica\AppData\Roaming\Dropbox\bin\Dropbox.exe
(Microsoft Corporation) C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE
(McAfee, Inc.) C:\Program Files\Common Files\McAfee\CSP\1.3.336.0\McCSPServiceHost.exe
(McAfee, Inc.) C:\Program Files\Common Files\McAfee\Platform\McUICnt.exe
(Mozilla Corporation) C:\Program Files\Mozilla Firefox\firefox.exe
(McAfee, Inc.) C:\Program Files\McAfee\SiteAdvisor\saUI.exe
(McAfee, Inc.) C:\Program Files\McAfee\VirusScan\mcods.exe
(Microsoft Corporation) C:\Windows\System32\rundll32.exe
() C:\Users\Jessica\Downloads\Defogger.exe


==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe [8120864 2009-12-15] (Realtek Semiconductor)
HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1578280 2009-10-10] (Synaptics Incorporated)
HKLM\...\Run: [UpdateLBPShortCut] => C:\Program Files\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe [222504 2009-05-19] (CyberLink Corp.)
HKLM\...\Run: [CLMLServer] => C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe [103720 2009-06-03] (CyberLink)
HKLM\...\Run: [UpdateP2GoShortCut] => C:\Program Files\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe [222504 2009-05-19] (CyberLink Corp.)
HKLM\...\Run: [UpdatePDRShortCut] => C:\Program Files\CyberLink\PowerDirector\MUITransfer\MUIStartMenu.exe [222504 2008-01-04] (CyberLink Corp.)
HKLM\...\Run: [RemoteControl8] => C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe [91432 2009-04-15] (CyberLink Corp.)
HKLM\...\Run: [PDVD8LanguageShortcut] => C:\Program Files\CyberLink\PowerDVD8\Language\Language.exe [50472 2009-04-15] (CyberLink Corp.)
HKLM\...\Run: [UpdatePPShortCut] => C:\Program Files\CyberLink\PowerProducer\MUITransfer\MUIStartMenu.exe [218408 2008-12-03] (CyberLink Corp.)
HKLM\...\Run: [UpdatePSTShortCut] => C:\Program Files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe [210216 2009-07-21] (CyberLink Corp.)
HKLM\...\Run: [APLangApp] => C:\Program Files\AnyPC Client\APLangApp.exe [13312 2009-11-20] (DoctorSoft)
HKLM\...\Run: [NvCplDaemon] => RUNDLL32.EXE C:\windows\system32\NvCpl.dll,NvStartup
HKLM\...\Run: [UCam_Menu] => C:\Program Files\CyberLink\YouCam\MUITransfer\MUIStartMenu.exe [222504 2009-05-19] (CyberLink Corp.)
HKLM\...\Run: [mcui_exe] => C:\Program Files\McAfee.com\Agent\mcagent.exe [514832 2014-10-06] (McAfee, Inc.)
HKLM\...\Run: [Iminent] => C:\Program Files\Iminent\Iminent.exe [1074736 2013-07-02] (Iminent)
HKLM\...\Run: [IminentMessenger] => C:\Program Files\Iminent\Iminent.Messengers.exe [884784 2013-07-02] (Iminent)
HKLM\...\Run: [SunJavaUpdateSched] => C:\Program Files\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
HKLM\...\Run: [mcpltui_exe] => C:\Program Files\Common Files\McAfee\Platform\mcuicnt.exe [499352 2014-09-17] (McAfee, Inc.)
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [EA Core] => "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [SSync] => C:\Users\Jessica\AppData\Roaming\SSync\SSync.exe [36864 2013-04-09] ()
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [OMESupervisor] => C:\Users\Jessica\AppData\Local\omesuperv.exe [2239256 2013-12-24] ()
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [swg] => C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2010-03-05] (Google Inc.)
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [SCheck] => C:\Users\Jessica\AppData\Roaming\SCheck\SCheck.exe [37376 2013-12-09] ()
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [Snoozer] => C:\Users\Jessica\AppData\Roaming\Snz\Snz.exe [1641116 2015-02-18] ()
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [DataMgr] => C:\Users\Jessica\AppData\Roaming\DataMgr\DataMgr.exe [168848 2013-06-26] (HTTO Group, Ltd.)
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [Intermediate] => C:\Users\Jessica\AppData\Roaming\Intermediate\Intermediate.exe [37376 2013-12-09] ()
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\MountPoints2: F - F:\setup_vmc_lite.exe /checkApplicationPresence
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\MountPoints2: {a253fd9b-317b-11df-a1e6-806e6f6e6963} - E:\Autorun.exe
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\MountPoints2: {faa0af6a-d47c-11df-8cb9-00245487e561} - F:\setup_vmc_lite.exe /checkApplicationPresence
HKU\S-1-5-18\...\RunOnce: [SPReview] => C:\windows\System32\SPReview\SPReview.exe [280576 2013-03-20] (Microsoft Corporation)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\McAfee Security Scan Plus.lnk
ShortcutTarget: McAfee Security Scan Plus.lnk -> C:\Program Files\McAfee Security Scan\3.8.150\SSScheduler.exe (McAfee, Inc.)
Startup: C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk
ShortcutTarget: Dropbox.lnk -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.)
Startup: C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2007 Bildschirmausschnitt- und Startprogramm.lnk
ShortcutTarget: OneNote 2007 Bildschirmausschnitt- und Startprogramm.lnk -> C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE (Microsoft Corporation)
ShellIconOverlayIdentifiers: [DropboxExt1] -> {FB314ED9-A251-47B7-93E1-CDD82E34AF8B} => C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.)
ShellIconOverlayIdentifiers: [DropboxExt2] -> {FB314EDA-A251-47B7-93E1-CDD82E34AF8B} => C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.)
ShellIconOverlayIdentifiers: [DropboxExt3] -> {FB314EDB-A251-47B7-93E1-CDD82E34AF8B} => C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.)

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.google.com/ig/redirectdomain?brand=smsn&bmod=smsn
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\Software\Microsoft\Internet Explorer\Main,ICQ Search = hxxp://search.icq.com/search/results.php?q={searchTerms}&ch_id=osd
HKU\S-1-5-21-2339853823-2107313754-116825072-1001\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://search.fbdownloader.com/?channel=fpo
URLSearchHook: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 - Default Value = {855F3B16-6D32-4fe6-8A56-BBB695989046}
URLSearchHook: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 - ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Program Files\ICQ6Toolbar\ICQToolBar.dll (ICQ)
URLSearchHook: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 - McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
SearchScopes: HKLM -> DefaultScope {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7SMSN
SearchScopes: HKLM -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7SMSN
SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> DefaultScope {95B7759C-8C7F-4BF1-B163-73684A933233} URL = hxxp://search.fbdownloader.com/search.php?channel=fpo&q={searchTerms}
SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {6552C7DD-90A4-4387-B795-F8F96747DE19} URL = hxxp://search.icq.com/search/results.php?q={searchTerms}&ch_id=osd
SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7SMSN_de___DE401
SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {95B7759C-8C7F-4BF1-B163-73684A933233} URL = hxxp://search.fbdownloader.com/search.php?channel=fpo&q={searchTerms}
SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {BC72CD84-CE4D-47EC-BBFE-F8F58A00E455} URL = https://de.search.yahoo.com/search?fr=mcafee&type=B011DE532D20140115&p={SearchTerms}
SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {CFF4DB9B-135F-47c0-9269-B4C6572FD61A} URL = hxxp://mystart.incredibar.com/mb139/?search={searchTerms}&loc=IB_DS&a=6OyBVFejmS&i=26
BHO: MSS+ Identifier -> {0E8A89AD-95D7-40EB-8D9D-083EF7066A01} -> C:\Program Files\McAfee Security Scan\3.8.150\McAfeeMSS_IE.dll (McAfee, Inc.)
BHO: Adobe PDF Link Helper -> {18DF081C-E8AD-4283-A596-FA578C2EBDC3} -> C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (Adobe Systems Incorporated)
BHO: McAfee Phishing Filter -> {27B4851A-3207-45A2-B947-BE8AFE6163AB} -> c:\progra~1\mcafee\msk\mskapbho.dll No File
BHO: DownloadnSave Class -> {3013CC39-DFA7-4D19-A172-3FE22E46D439} -> C:\ProgramData\DownloadnSave\bhoclass.dll ()
BHO: Web Assistant -> {336D0C35-8A85-403a-B9D2-65C292C39087} -> C:\Program Files\Web Assistant\Extension32.dll ()
BHO: PiccShare BHO -> {553318DA-D010-469E-84B1-496563CAE1C0} -> C:\Users\Jessica\AppData\Local\ext_piccshare\ext_piccshare.dll (HTTO Group, Ltd)
BHO: No Name -> {5C255C8A-E604-49b4-9D64-90988571CECB} ->  No File
BHO: Incredibar.com Helper Object -> {6E13DDE1-2B6E-46CE-8B66-DC8BF36F6B99} -> C:\Program Files\Incredibar.com\incredibar\1.5.11.14\bh\incredibar.dll (Montera Technologeis LTD)
BHO: Java(tm) Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Windows Live Anmelde-Hilfsprogramm -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation)
BHO: IMinent WebBooster (BHO) -> {A09AB6EB-31B5-454C-97EC-9B294D92EE2A} -> C:\Program Files\Iminent\Minibar.InternetExplorer.BHOx86.dll (SIEN)
BHO: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
BHO: Skype Plug-In -> {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} -> C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.)
BHO: McAfee SiteAdvisor BHO -> {B164E929-A1B6-4A06-B104-2CD0E90A88FF} -> c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
BHO: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO: ChromeFrame BHO -> {ECB3C477-1A0A-44BD-BB57-78F9EFE34FA7} -> C:\Program Files\Google\Chrome Frame\Application\32.0.1700.107\npchrome_frame.dll (Google Inc.)
BHO: DVDVideoSoft WebPageAdjuster Class -> {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} -> C:\Program Files\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll (DVDVideoSoft Ltd.)
Toolbar: HKLM - McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
Toolbar: HKLM - Incredibar Toolbar - {F9639E4A-801B-4843-AEE3-03D9DA199E77} - C:\Program Files\Incredibar.com\incredibar\1.5.11.14\incredibarTlbr.dll (Montera Technologeis LTD)
Toolbar: HKLM - ICQToolBar - {855F3B16-6D32-4FE6-8A56-BBB695989046} - C:\Program Files\ICQ6Toolbar\ICQToolBar.dll (ICQ)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
Toolbar: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
DPF: {02BCC737-B171-4746-94C9-0D8A0B2C0089} hxxp://office.microsoft.com/sites/production/ieawsdc32.cab
DPF: {C345E174-3E87-4F41-A01C-B066A90A49B4} hxxp://trial.trymicrosoftoffice.com/trialoaa/buymsoffice_assets/framework/microsoft/wrc32.ocx
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
Handler: gcf - {9875BFAF-B04D-445E-8A69-BE36838CDE3E} - C:\Program Files\Google\Chrome Frame\Application\32.0.1700.107\npchrome_frame.dll (Google Inc.)
Handler: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\Program Files\Windows Live\Messenger\msgrapp.14.0.8089.0726.dll (Microsoft Corporation)
Handler: ms-itss - {0A9007C0-4076-11D3-8789-0000F8105754} - C:\Program Files\Common Files\Microsoft Shared\Information Retrieval\msitss.dll (Microsoft Corporation)
Handler: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\Program Files\Windows Live\Messenger\msgrapp.14.0.8089.0726.dll (Microsoft Corporation)
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.)
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.)
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files\Common Files\Skype\Skype4COM.dll (Skype Technologies)
Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\Program Files\McAfee\MSC\McSnIePl.dll (McAfee, Inc.)
Tcpip\Parameters: [DhcpNameServer] 192.168.178.1

FireFox:
========
FF ProfilePath: C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default
FF DefaultSearchEngine: Search
FF DefaultSearchUrl: hxxp://search.fbdownloader.com/search.php?channel=fpo&q=
FF SearchEngineOrder.1: Sichere Suche
FF SelectedSearchEngine: Search
FF Homepage: https://www.google.de/?gws_rd=ssl
FF Keyword.URL: hxxp://search.fbdownloader.com/search.php?channel=fpo&q=
FF Plugin: @adobe.com/FlashPlayer -> C:\windows\system32\Macromed\Flash\NPSWF32_16_0_0_305.dll ()
FF Plugin: @Google.com/GoogleEarthPlugin -> C:\Program Files\Google\Google Earth\plugin\npgeplugin.dll (Google)
FF Plugin: @java.com/DTPlugin,version=10.45.2 -> C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.45.2 -> C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @mcafee.com/MSC,version=10 -> c:\PROGRA~1\mcafee\msc\NPMCSN~1.DLL ()
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files\Microsoft Silverlight\3.0.40624.0\npctrl.dll ( Microsoft Corporation)
FF Plugin: @microsoft.com/OfficeLive,version=1.3 -> C:\Program Files\Microsoft\Office Live\npOLW.dll (Microsoft Corp.)
FF Plugin: @microsoft.com/WLPG,version=14.0.8081.0709 -> C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin: @tools.google.com/Google Update;version=3 -> C:\Program Files\Google\Update\1.3.26.9\npGoogleUpdate3.dll (Google Inc.)
FF Plugin: @tools.google.com/Google Update;version=9 -> C:\Program Files\Google\Update\1.3.26.9\npGoogleUpdate3.dll (Google Inc.)
FF Plugin: Adobe Reader -> C:\Program Files\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF Plugin HKU\S-1-5-21-2339853823-2107313754-116825072-1001: bebomedia.com/OfferMosquitoIEHelper -> C:\Users\Jessica\AppData\Local\ext_offermosquito\npOfferMosquitoIEHelper.dll (Bebo Media Ltd)
FF Plugin ProgramFiles/Appdata: C:\Program Files\mozilla firefox\plugins\nppdf32.dll (Adobe Systems Inc.)
FF SearchPlugin: C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\searchplugins\fbdownloader_search.xml
FF SearchPlugin: C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\searchplugins\search.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\McSiteAdvisor.xml
FF Extension: Iminent - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\firefoxmini@go.im.xpi [2014-08-10]
FF Extension: OfferMosquito - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\om@offermosquito.com.xpi [2013-12-19]
FF Extension: Simple New Tab - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\snt@simplenewtab.com.xpi [2014-12-24]
FF Extension: Adblock Plus - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2014-03-29]
FF HKLM\...\Firefox\Extensions: [{4ED1F68A-5463-4931-9384-8FFF5ED91D92}] - C:\Program Files\McAfee\SiteAdvisor
FF Extension: McAfee SiteAdvisor - C:\Program Files\McAfee\SiteAdvisor [2010-03-05]
FF HKLM\...\Firefox\Extensions: [{336D0C35-8A85-403a-B9D2-65C292C39087}] - C:\Program Files\Web Assistant\Firefox
FF Extension: Web Assistant - C:\Program Files\Web Assistant\Firefox [2012-05-15]
FF HKLM\...\Firefox\Extensions: [{ACAA314B-EEBA-48e4-AD47-84E31C44796C}] - C:\Program Files\Common Files\DVDVideoSoft\plugins\ff
FF Extension: DVDVideoSoft YouTube MP3 and Video Download - C:\Program Files\Common Files\DVDVideoSoft\plugins\ff [2013-02-14]
FF HKLM\...\Thunderbird\Extensions: [msktbird@mcafee.com] - C:\Program Files\McAfee\MSK
FF Extension: McAfee Anti-Spam Thunderbird Extension - C:\Program Files\McAfee\MSK [2010-03-05]
FF HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Firefox\Extensions: [{e4f94d1e-2f53-401e-8885-681602c0ddd8}] - C:\ProgramData\McAfee Security Scan\Extensions\{e4f94d1e-2f53-401e-8885-681602c0ddd8}.xpi
FF Extension: No Name - C:\ProgramData\McAfee Security Scan\Extensions\{e4f94d1e-2f53-401e-8885-681602c0ddd8}.xpi [2014-04-04]

Chrome: 
=======
CHR StartupUrls: Default -> "http:\/\/search.fbdownloader.com\/?channel=fpo"
CHR DefaultSuggestURL: Default -> 
CHR Plugin: (Remoting Viewer) - internal-remoting-viewer
CHR Plugin: (Native Client) - C:\Program Files\Google\Chrome\Application\40.0.2214.111\ppGoogleNaClPluginChrome.dll No File
CHR Plugin: (Chrome PDF Viewer) - C:\Program Files\Google\Chrome\Application\40.0.2214.111\pdf.dll ()
CHR Plugin: (Shockwave Flash) - C:\Program Files\Google\Chrome\Application\40.0.2214.111\gcswf32.dll No File
CHR Plugin: (Shockwave Flash) - C:\windows\system32\Macromed\Flash\NPSWF32_11_2_202_235.dll No File
CHR Plugin: (Injovo Extension Plugin) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlnembnfbcpjnepmfjmngjenhhajpdfd\2.0.0.430_0\npbrowserext.dll No File
CHR Plugin: (McAfee SiteAdvisor) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\fheoggkfdfchfphceeifdbepaooicaho\3.41.123.2_0\McChPlg.dll No File
CHR Plugin: (McAfee SiteAdvisor) - C:\Program Files\McAfee\SiteAdvisor\npmcffplg32.dll (McAfee, Inc.)
CHR Plugin: (Adobe Acrobat) - C:\Program Files\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll No File
CHR Plugin: (Google Earth Plugin) - C:\Program Files\Google\Google Earth\plugin\npgeplugin.dll (Google)
CHR Plugin: (Google Update) - C:\Program Files\Google\Update\1.3.21.111\npGoogleUpdate3.dll No File
CHR Plugin: (Silverlight Plug-In) - C:\Program Files\Microsoft Silverlight\3.0.40624.0\npctrl.dll ( Microsoft Corporation)
CHR Plugin: (Microsoft Office Live Plug-in for Firefox) - C:\Program Files\Microsoft\Office Live\npOLW.dll (Microsoft Corp.)
CHR Plugin: (Windows Live® Photo Gallery) - C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
CHR Plugin: (McAfee SecurityCenter) - c:\progra~1\mcafee\msc\npmcsn~1.dll ()
CHR Profile: C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (Love 3) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\agljhkifkkcfncajnfokkhioadolnkho [2011-10-25]
CHR Extension: (YouTube) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2011-12-16]
CHR Extension: (Google Search) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2011-12-16]
CHR Extension: (SiteAdvisor) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\fheoggkfdfchfphceeifdbepaooicaho [2011-10-24]
CHR Extension: (OfferMosquito) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\gbmdkmlcnbapgegninelmjbfibaghdmk [2013-07-20]
CHR Extension: (Iminent) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\igdhbblpcellaljokkpfhcjlagemhgjl [2013-07-23]
CHR Extension: (Any New Tab) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfenflmklmpohipcckmagnmbmbibnolo [2013-12-07]
CHR Extension: (Gmail) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2011-12-16]
CHR Extension: (Simple New Tab) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\pmgkeimkiojpjcoiiipekfjaopchhjga [2013-12-25]
CHR HKLM\...\Chrome\Extension: [bopakagnckmlgajfccecajhnimjiiedh] - hxxp://clients2.google.com/service/update2/crx
CHR HKLM\...\Chrome\Extension: [dlnembnfbcpjnepmfjmngjenhhajpdfd] - C:\Program Files\Web Assistant\source.crx [2012-05-15]
CHR HKLM\...\Chrome\Extension: [ebdkldcjjkfbcjdhfkmdlnppdmjdpnoo] - C:\ProgramData\DownloadnSave\ebdkldcjjkfbcjdhfkmdlnppdmjdpnoo.crx [2012-05-15]
CHR HKLM\...\Chrome\Extension: [fheoggkfdfchfphceeifdbepaooicaho] - C:\Program Files\McAfee\SiteAdvisor\McChPlg.crx [2015-02-14]
CHR HKU\S-1-5-21-2339853823-2107313754-116825072-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [docfnddcclkgokdfpnmngpiliiachclb] - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\ext_piccshare\ext_piccshare.crx [2013-06-26]
CHR HKU\S-1-5-21-2339853823-2107313754-116825072-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [gbmdkmlcnbapgegninelmjbfibaghdmk] - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\ext_offermosquito\ext_offermosquito.crx [2013-12-19]
CHR HKU\S-1-5-21-2339853823-2107313754-116825072-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [nikpibnbobmbdbheedjfogjlikpgpnhp] - C:\Program Files\Common Files\DVDVideoSoft\plugins\DVDVideoSoftBrowserExtension.crx [2013-02-14]

========================== Services (Whitelisted) =================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 HomeNetSvc; C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.)
R2 ICQ Service; C:\Program Files\ICQ6Toolbar\ICQ Service.exe [247608 2010-11-21] ()
R2 McAfee SiteAdvisor Service; C:\Program Files\McAfee\SiteAdvisor\McSACore.exe [132160 2015-02-12] (McAfee, Inc.)
R2 McAPExe; C:\Program Files\McAfee\MSC\McAPExe.exe [529216 2014-10-06] (McAfee, Inc.)
S3 McComponentHostService; C:\Program Files\McAfee Security Scan\3.8.150\McCHSvc.exe [235696 2014-04-09] (McAfee, Inc.)
R2 mccspsvc; C:\Program Files\Common Files\McAfee\CSP\1.3.336.0\McCSPServiceHost.exe [338160 2014-11-21] (McAfee, Inc.)
R2 McMPFSvc; C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.)
R2 McNaiAnn; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.)
R3 McODS; C:\Program Files\McAfee\VirusScan\mcods.exe [471560 2014-12-03] (McAfee, Inc.)
R2 mcpltsvc; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.)
R2 McProxy; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.)
R2 mfecore; C:\Program Files\Common Files\McAfee\AMCore\mcshield.exe [661088 2014-11-06] (McAfee, Inc.)
R2 mfefire; C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe [171368 2014-10-01] (McAfee, Inc.)
R2 mfevtp; C:\windows\system32\mfevtps.exe [179608 2014-10-01] (McAfee, Inc.)
R2 MSK80Service; C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.)
R2 OberonGameConsoleService; C:\Program Files\Samsung Casual Games\GameConsole\OberonGameConsoleService.exe [44312 2009-08-13] ()
R2 Rezip; C:\windows\SYSTEM32\Rezip.exe [311296 2009-03-05] () [File not signed]
R2 RichVideo; C:\Program Files\CyberLink\Shared files\RichVideo.exe [247152 2009-07-07] ()
R2 SProtection; C:\Program Files\Common Files\Umbrella\umbrella.exe [3767936 2014-12-18] (Iminent)
R2 Web Assistant Updater; C:\Program Files\Web Assistant\ExtensionUpdaterService.exe [185856 2012-05-01] () [File not signed]
S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [680960 2013-05-27] (Microsoft Corporation)

==================== Drivers (Whitelisted) ====================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R3 cfwids; C:\windows\System32\drivers\cfwids.sys [62840 2014-10-01] (McAfee, Inc.)
S3 HipShieldK; C:\windows\System32\drivers\HipShieldK.sys [147912 2013-09-23] (McAfee, Inc.)
R3 mfeapfk; C:\windows\System32\drivers\mfeapfk.sys [135880 2014-10-01] (McAfee, Inc.)
R3 mfeavfk; C:\windows\System32\drivers\mfeavfk.sys [238312 2014-10-01] (McAfee, Inc.)
S3 mfebopk; C:\windows\System32\drivers\mfebopk.sys [67824 2014-10-01] (McAfee, Inc.)
R3 mfefirek; C:\windows\System32\drivers\mfefirek.sys [371712 2014-10-01] (McAfee, Inc.)
R0 mfehidk; C:\windows\System32\drivers\mfehidk.sys [575992 2014-10-01] (McAfee, Inc.)
R3 mfencbdc; C:\windows\System32\DRIVERS\mfencbdc.sys [352360 2014-09-19] (McAfee, Inc.)
S3 mfencrk; C:\windows\System32\DRIVERS\mfencrk.sys [81304 2014-09-19] (McAfee, Inc.)
R0 mfewfpk; C:\windows\System32\drivers\mfewfpk.sys [217232 2014-10-01] (McAfee, Inc.)
R3 yukonw7; C:\windows\System32\DRIVERS\yk62x86.sys [315392 2009-09-28] ()
S3 ZTEusbnet; C:\windows\System32\DRIVERS\ZTEusbnet.sys [110592 2009-04-09] (ZTE Corporation)
S3 ZTEusbvoice; C:\windows\System32\DRIVERS\ZTEusbvoice.sys [105344 2009-04-09] (ZTE Incorporated)

==================== NetSvcs (Whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)


==================== One Month Created Files and Folders ========

(If an entry is included in the fixlist, the file\folder will be moved.)

2015-02-22 12:57 - 2015-02-22 12:58 - 00029242 _____ () C:\Users\Jessica\Downloads\FRST.txt
2015-02-22 12:56 - 2015-02-22 12:57 - 00000000 ____D () C:\FRST
2015-02-22 12:55 - 2015-02-22 12:56 - 00000476 _____ () C:\Users\Jessica\Downloads\defogger_disable.log
2015-02-22 12:55 - 2015-02-22 12:55 - 00000000 _____ () C:\Users\Jessica\defogger_reenable
2015-02-22 12:49 - 2015-02-22 12:49 - 00380416 _____ () C:\Users\Jessica\Downloads\vnrfyu79.exe
2015-02-22 12:48 - 2015-02-22 12:48 - 01126400 _____ (Farbar) C:\Users\Jessica\Downloads\FRST.exe
2015-02-22 12:48 - 2015-02-22 12:48 - 00050477 _____ () C:\Users\Jessica\Downloads\Defogger.exe
2015-02-21 21:16 - 2015-02-21 21:16 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\McAfee
2015-02-18 19:03 - 2015-02-18 19:03 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Snz
2015-02-18 12:42 - 2015-01-23 04:43 - 00620032 _____ (Microsoft Corporation) C:\windows\system32\jscript9diag.dll
2015-02-18 12:42 - 2015-01-23 04:17 - 04300800 _____ (Microsoft Corporation) C:\windows\system32\jscript9.dll
2015-02-14 12:25 - 2015-01-15 08:46 - 00136640 _____ (Microsoft Corporation) C:\windows\system32\Drivers\ksecpkg.sys
2015-02-14 12:25 - 2015-01-15 08:46 - 00067520 _____ (Microsoft Corporation) C:\windows\system32\Drivers\ksecdd.sys
2015-02-14 12:25 - 2015-01-15 08:43 - 00100352 _____ (Microsoft Corporation) C:\windows\system32\sspicli.dll
2015-02-14 12:25 - 2015-01-15 08:43 - 00015872 _____ (Microsoft Corporation) C:\windows\system32\sspisrv.dll
2015-02-14 12:25 - 2015-01-15 08:42 - 01061376 _____ (Microsoft Corporation) C:\windows\system32\lsasrv.dll
2015-02-14 12:25 - 2015-01-15 08:42 - 00050176 _____ (Microsoft Corporation) C:\windows\system32\auditpol.exe
2015-02-14 12:25 - 2015-01-15 08:42 - 00022528 _____ (Microsoft Corporation) C:\windows\system32\lsass.exe
2015-02-14 12:25 - 2015-01-15 08:42 - 00022016 _____ (Microsoft Corporation) C:\windows\system32\secur32.dll
2015-02-14 12:25 - 2015-01-15 08:39 - 00146432 _____ (Microsoft Corporation) C:\windows\system32\msaudite.dll
2015-02-14 12:25 - 2015-01-15 08:39 - 00060416 _____ (Microsoft Corporation) C:\windows\system32\msobjs.dll
2015-02-14 12:25 - 2015-01-15 08:37 - 00686080 _____ (Microsoft Corporation) C:\windows\system32\adtschema.dll
2015-02-14 12:25 - 2015-01-15 05:21 - 00369968 _____ (Microsoft Corporation) C:\windows\system32\Drivers\cng.sys
2015-02-14 12:25 - 2015-01-09 02:45 - 02380288 _____ (Microsoft Corporation) C:\windows\system32\win32k.sys
2015-02-14 12:24 - 2015-02-04 03:54 - 00482304 _____ (Microsoft Corporation) C:\windows\system32\generaltel.dll
2015-02-14 12:24 - 2015-02-04 03:53 - 00767488 _____ (Microsoft Corporation) C:\windows\system32\appraiser.dll
2015-02-14 12:24 - 2015-02-04 03:53 - 00621056 _____ (Microsoft Corporation) C:\windows\system32\invagent.dll
2015-02-14 12:24 - 2015-02-04 03:53 - 00325632 _____ (Microsoft Corporation) C:\windows\system32\devinv.dll
2015-02-14 12:24 - 2015-02-04 03:53 - 00202752 _____ (Microsoft Corporation) C:\windows\system32\aepdu.dll
2015-02-14 12:24 - 2015-02-04 03:53 - 00159744 _____ (Microsoft Corporation) C:\windows\system32\aepic.dll
2015-02-14 12:24 - 2015-02-04 03:49 - 00886784 _____ (Microsoft Corporation) C:\windows\system32\aeinv.dll
2015-02-14 12:24 - 2015-01-28 00:36 - 01167520 _____ (Microsoft Corporation) C:\windows\system32\aitstatic.exe
2015-02-14 12:24 - 2015-01-14 06:44 - 03972544 _____ (Microsoft Corporation) C:\windows\system32\ntkrnlpa.exe
2015-02-14 12:24 - 2015-01-14 06:44 - 03917760 _____ (Microsoft Corporation) C:\windows\system32\ntoskrnl.exe
2015-02-14 12:24 - 2014-11-26 04:32 - 00571904 _____ (Microsoft Corporation) C:\windows\system32\oleaut32.dll
2015-02-14 12:24 - 2014-10-04 02:42 - 03221504 _____ (Microsoft Corporation) C:\windows\system32\mstscax.dll
2015-02-14 12:24 - 2014-10-04 02:42 - 00131584 _____ (Microsoft Corporation) C:\windows\system32\aaclient.dll
2015-02-14 12:23 - 2015-01-14 06:09 - 00342712 _____ (Microsoft Corporation) C:\windows\system32\iedkcs32.dll
2015-02-14 12:23 - 2015-01-12 03:25 - 19740160 _____ (Microsoft Corporation) C:\windows\system32\mshtml.dll
2015-02-14 12:23 - 2015-01-12 03:21 - 02724864 _____ (Microsoft Corporation) C:\windows\system32\mshtml.tlb
2015-02-14 12:23 - 2015-01-12 03:21 - 00004096 _____ (Microsoft Corporation) C:\windows\system32\ieetwcollectorres.dll
2015-02-14 12:23 - 2015-01-12 03:08 - 00503296 _____ (Microsoft Corporation) C:\windows\system32\vbscript.dll
2015-02-14 12:23 - 2015-01-12 03:07 - 00062464 _____ (Microsoft Corporation) C:\windows\system32\iesetup.dll
2015-02-14 12:23 - 2015-01-12 03:07 - 00047616 _____ (Microsoft Corporation) C:\windows\system32\ieetwproxystub.dll
2015-02-14 12:23 - 2015-01-12 03:05 - 00064000 _____ (Microsoft Corporation) C:\windows\system32\MshtmlDac.dll
2015-02-14 12:23 - 2015-01-12 03:02 - 02277888 _____ (Microsoft Corporation) C:\windows\system32\iertutil.dll
2015-02-14 12:23 - 2015-01-12 03:00 - 00047104 _____ (Microsoft Corporation) C:\windows\system32\jsproxy.dll
2015-02-14 12:23 - 2015-01-12 02:59 - 00030720 _____ (Microsoft Corporation) C:\windows\system32\iernonce.dll
2015-02-14 12:23 - 2015-01-12 02:57 - 00478208 _____ (Microsoft Corporation) C:\windows\system32\ieui.dll
2015-02-14 12:23 - 2015-01-12 02:55 - 00115712 _____ (Microsoft Corporation) C:\windows\system32\ieUnatt.exe
2015-02-14 12:23 - 2015-01-12 02:55 - 00102912 _____ (Microsoft Corporation) C:\windows\system32\ieetwcollector.exe
2015-02-14 12:23 - 2015-01-12 02:48 - 00667648 _____ (Microsoft Corporation) C:\windows\system32\MsSpellCheckingFacility.exe
2015-02-14 12:23 - 2015-01-12 02:45 - 00418304 _____ (Microsoft Corporation) C:\windows\system32\dxtmsft.dll
2015-02-14 12:23 - 2015-01-12 02:40 - 00060416 _____ (Microsoft Corporation) C:\windows\system32\JavaScriptCollectionAgent.dll
2015-02-14 12:23 - 2015-01-12 02:36 - 00168960 _____ (Microsoft Corporation) C:\windows\system32\msrating.dll
2015-02-14 12:23 - 2015-01-12 02:35 - 00076288 _____ (Microsoft Corporation) C:\windows\system32\mshtmled.dll
2015-02-14 12:23 - 2015-01-12 02:33 - 00285696 _____ (Microsoft Corporation) C:\windows\system32\dxtrans.dll
2015-02-14 12:23 - 2015-01-12 02:23 - 02052608 _____ (Microsoft Corporation) C:\windows\system32\inetcpl.cpl
2015-02-14 12:23 - 2015-01-12 02:23 - 00688640 _____ (Microsoft Corporation) C:\windows\system32\msfeeds.dll
2015-02-14 12:23 - 2015-01-12 02:23 - 00684544 _____ (Microsoft Corporation) C:\windows\system32\ie4uinit.exe
2015-02-14 12:23 - 2015-01-12 02:22 - 01155072 _____ (Microsoft Corporation) C:\windows\system32\mshtmlmedia.dll
2015-02-14 12:23 - 2015-01-12 02:14 - 12829184 _____ (Microsoft Corporation) C:\windows\system32\ieframe.dll
2015-02-14 12:23 - 2015-01-12 02:00 - 01888256 _____ (Microsoft Corporation) C:\windows\system32\wininet.dll
2015-02-14 12:23 - 2015-01-12 01:56 - 01307136 _____ (Microsoft Corporation) C:\windows\system32\urlmon.dll
2015-02-14 12:23 - 2015-01-12 01:55 - 00710144 _____ (Microsoft Corporation) C:\windows\system32\ieapfltr.dll
2015-02-14 12:23 - 2015-01-10 07:27 - 00550912 _____ (Microsoft Corporation) C:\windows\system32\kerberos.dll
2015-02-14 12:23 - 2015-01-10 07:27 - 00259584 _____ (Microsoft Corporation) C:\windows\system32\msv1_0.dll
2015-02-14 12:23 - 2015-01-10 07:27 - 00248832 _____ (Microsoft Corporation) C:\windows\system32\schannel.dll
2015-02-14 12:23 - 2015-01-10 07:27 - 00221184 _____ (Microsoft Corporation) C:\windows\system32\ncrypt.dll
2015-02-14 12:23 - 2015-01-10 07:27 - 00172032 _____ (Microsoft Corporation) C:\windows\system32\wdigest.dll
2015-02-14 12:23 - 2015-01-10 07:27 - 00065536 _____ (Microsoft Corporation) C:\windows\system32\TSpkg.dll
2015-02-14 12:23 - 2015-01-10 07:27 - 00017408 _____ (Microsoft Corporation) C:\windows\system32\credssp.dll
2015-02-14 12:22 - 2015-01-13 03:49 - 01230336 _____ (Microsoft Corporation) C:\windows\system32\WindowsCodecs.dll
2015-02-14 12:22 - 2014-12-12 06:07 - 01174528 _____ (Microsoft Corporation) C:\windows\system32\crypt32.dll
2015-02-14 12:22 - 2014-12-08 03:46 - 00308224 _____ (Microsoft Corporation) C:\windows\system32\scesrv.dll
2015-02-14 12:22 - 2014-07-07 02:40 - 00179200 _____ (Microsoft Corporation) C:\windows\system32\wintrust.dll
2015-02-14 12:22 - 2014-07-07 02:40 - 00143872 _____ (Microsoft Corporation) C:\windows\system32\cryptsvc.dll
2015-01-27 18:18 - 2015-01-27 18:18 - 00000000 ____D () C:\Program Files\Mozilla Firefox

==================== One Month Modified Files and Folders =======

(If an entry is included in the fixlist, the file\folder will be moved.)

2015-02-22 12:58 - 2010-03-05 05:29 - 02031858 _____ () C:\windows\WindowsUpdate.log
2015-02-22 12:55 - 2010-09-25 18:25 - 00000000 ____D () C:\Users\Jessica
2015-02-22 12:55 - 2009-07-14 05:34 - 00023328 ____H () C:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2015-02-22 12:55 - 2009-07-14 05:34 - 00023328 ____H () C:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2015-02-22 12:38 - 2012-04-15 15:20 - 00000884 _____ () C:\windows\Tasks\Adobe Flash Player Updater.job
2015-02-21 21:09 - 2012-06-15 13:41 - 00000000 ___RD () C:\Users\Jessica\Dropbox
2015-02-21 21:09 - 2012-06-15 13:38 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Dropbox
2015-02-21 21:07 - 2010-09-25 18:25 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CyberLink DVD Suite
2015-02-21 21:06 - 2009-07-14 05:53 - 00000006 ____H () C:\windows\Tasks\SA.DAT
2015-02-21 21:06 - 2009-07-14 05:39 - 00194739 _____ () C:\windows\setupact.log
2015-02-20 18:10 - 2010-12-31 17:22 - 00002121 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2015-02-18 19:03 - 2013-07-20 19:27 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\DataMgr
2015-02-18 19:01 - 2014-12-08 18:36 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\FBDownloader
2015-02-18 12:37 - 2010-03-05 05:43 - 00000000 ____D () C:\Program Files\Common Files\McAfee
2015-02-15 18:01 - 2009-07-14 05:33 - 00346000 _____ () C:\windows\system32\FNTCACHE.DAT
2015-02-15 17:59 - 2010-03-05 06:55 - 00802060 _____ () C:\windows\PFRO.log
2015-02-15 17:58 - 2014-12-13 11:27 - 00000000 ____D () C:\windows\system32\appraiser
2015-02-15 17:58 - 2014-05-19 18:43 - 00000000 ___SD () C:\windows\system32\CompatTel
2015-02-15 17:58 - 2009-07-14 03:37 - 00000000 ____D () C:\windows\system32\de-DE
2015-02-15 17:31 - 2014-03-04 08:40 - 113756392 _____ (Microsoft Corporation) C:\windows\system32\MRT.exe
2015-02-15 17:31 - 2014-03-04 08:40 - 00000000 ____D () C:\windows\system32\MRT
2015-02-14 12:00 - 2012-06-15 13:41 - 00001025 _____ () C:\Users\Jessica\Desktop\Dropbox.lnk
2015-02-14 12:00 - 2012-06-15 13:39 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Dropbox
2015-02-07 09:33 - 2012-04-15 15:20 - 00701616 _____ (Adobe Systems Incorporated) C:\windows\system32\FlashPlayerApp.exe
2015-02-07 09:33 - 2011-05-21 06:18 - 00071344 _____ (Adobe Systems Incorporated) C:\windows\system32\FlashPlayerCPLApp.cpl
2015-02-07 09:08 - 2014-05-13 16:52 - 00001098 _____ () C:\windows\Tasks\GoogleUpdateTaskMachineUA1cf6ec357c82803.job
2015-02-07 09:08 - 2010-09-25 19:59 - 00001094 _____ () C:\windows\Tasks\GoogleUpdateTaskMachineCore.job
2015-02-03 21:25 - 2009-07-14 03:37 - 00000000 ____D () C:\windows\Microsoft.NET
2015-02-03 18:43 - 2014-11-08 17:10 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service
2015-01-25 19:15 - 2009-07-26 21:06 - 01593888 _____ () C:\windows\system32\PerfStringBackup.INI

==================== Files in the root of some directories =======

2013-06-26 07:53 - 2013-06-26 07:53 - 0044216 _____ () C:\Users\Jessica\AppData\Local\ext_piccshare_uninst.exe
2013-12-24 20:45 - 2013-12-24 20:45 - 2239256 _____ () C:\Users\Jessica\AppData\Local\omesuperv.exe
2011-02-22 18:35 - 2011-02-22 18:35 - 0000056 ____H () C:\ProgramData\ezsidmv.dat
2010-09-25 18:26 - 2009-08-17 05:54 - 0131368 _____ () C:\ProgramData\FullRemove.exe
2010-03-05 05:36 - 2010-03-05 05:37 - 0000109 _____ () C:\ProgramData\{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}.log
2010-03-05 05:35 - 2010-03-05 05:35 - 0000106 _____ () C:\ProgramData\{2BF2E31F-B8BB-40A7-B650-98D28E0F7D47}.log
2010-03-05 05:32 - 2010-03-05 05:33 - 0000105 _____ () C:\ProgramData\{40BF1E83-20EB-11D8-97C5-0009C5020658}.log
2010-03-05 05:36 - 2010-03-05 05:36 - 0000110 _____ () C:\ProgramData\{B7A0CE06-068E-11D6-97FD-0050BACBF861}.log
2010-03-05 05:31 - 2010-03-05 05:32 - 0000107 _____ () C:\ProgramData\{C59C179C-668D-49A9-B6EA-0121CCFC1243}.log
2010-03-05 05:33 - 2010-03-05 05:35 - 0000110 _____ () C:\ProgramData\{CB099890-1D5F-11D5-9EA9-0050BAE317E1}.log

Some content of TEMP:
====================
C:\Users\Jessica\AppData\Local\Temp\0a50e25a83046228c11dcaa7eeed09bb.exe
C:\Users\Jessica\AppData\Local\Temp\abd2bca3e572e998a09f73c81b93454a.exe
C:\Users\Jessica\AppData\Local\Temp\AlawarGameBoxSetup.exe
C:\Users\Jessica\AppData\Local\Temp\AskSLib.dll
C:\Users\Jessica\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpbu8a3e.dll
C:\Users\Jessica\AppData\Local\Temp\EAD1026.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1045.exe
C:\Users\Jessica\AppData\Local\Temp\EAD10F0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD11BB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1209.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1228.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1248.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1276.exe
C:\Users\Jessica\AppData\Local\Temp\EAD12C4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1332.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1341.exe
C:\Users\Jessica\AppData\Local\Temp\EAD138.exe
C:\Users\Jessica\AppData\Local\Temp\EAD13FC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD141C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD142B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD145A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1479.exe
C:\Users\Jessica\AppData\Local\Temp\EAD14C7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD14D7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1582.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1592.exe
C:\Users\Jessica\AppData\Local\Temp\EAD15B1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD15D0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD15FF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD160F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD162E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD167C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1776.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1812.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1850.exe
C:\Users\Jessica\AppData\Local\Temp\EAD186F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1959.exe
C:\Users\Jessica\AppData\Local\Temp\EAD195A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD196.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1978.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1998.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1A53.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1B0E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1B0F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1BC9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1C75.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1C94.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1CB3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1CD2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1E2A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1E2B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1E4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1E68.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1F33.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1F71.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1F90.exe
C:\Users\Jessica\AppData\Local\Temp\EAD1FEE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD203C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD207A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD208A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD20B9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2184.exe
C:\Users\Jessica\AppData\Local\Temp\EAD21B2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD21B3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD222.exe
C:\Users\Jessica\AppData\Local\Temp\EAD22CB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD231.exe
C:\Users\Jessica\AppData\Local\Temp\EAD232.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2348.exe
C:\Users\Jessica\AppData\Local\Temp\EAD23B5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD23B6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2403.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2413.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2432.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2461.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2470.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2490.exe
C:\Users\Jessica\AppData\Local\Temp\EAD24CE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD256A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD256B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2589.exe
C:\Users\Jessica\AppData\Local\Temp\EAD258A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD25C8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD260.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2616.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2644.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2654.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2683.exe
C:\Users\Jessica\AppData\Local\Temp\EAD26B2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD26C1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD271F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2720.exe
C:\Users\Jessica\AppData\Local\Temp\EAD278C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD27F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2857.exe
C:\Users\Jessica\AppData\Local\Temp\EAD28A5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD28F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD29BE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2A2B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2AA9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2AD6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2AE7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2AF6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2B53.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2BA1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2BB1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2BE0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2BFF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2C1E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2C1F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2C8D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2D08.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2D37.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2D46.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2D75.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2DD3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2E11.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2E21.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2E40.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2E50.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2E6F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2EAD.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2EC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2ECC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2ECD.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2F1B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD2FF5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3062.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3091.exe
C:\Users\Jessica\AppData\Local\Temp\EAD30A0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD312D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD31C9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD31E8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3255.exe
C:\Users\Jessica\AppData\Local\Temp\EAD32B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD32C3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3330.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3542.exe
C:\Users\Jessica\AppData\Local\Temp\EAD366A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD369.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3764.exe
C:\Users\Jessica\AppData\Local\Temp\EAD382F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD386D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD389C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3967.exe
C:\Users\Jessica\AppData\Local\Temp\EAD39E4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3A13.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3A41.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3A70.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3AFC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3B2B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3B5A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3BB8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3C15.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3D1E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3D6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3DBA.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3EE3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3F02.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3F40.exe
C:\Users\Jessica\AppData\Local\Temp\EAD3FDC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4059.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4088.exe
C:\Users\Jessica\AppData\Local\Temp\EAD40D8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4153.exe
C:\Users\Jessica\AppData\Local\Temp\EAD41EF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD421E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD421F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD424.exe
C:\Users\Jessica\AppData\Local\Temp\EAD427B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD429A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD42F8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD434.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4385.exe
C:\Users\Jessica\AppData\Local\Temp\EAD43B3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD43E2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD445F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD44B0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD44DC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD453.exe
C:\Users\Jessica\AppData\Local\Temp\EAD45F4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD463.exe
C:\Users\Jessica\AppData\Local\Temp\EAD472.exe
C:\Users\Jessica\AppData\Local\Temp\EAD473.exe
C:\Users\Jessica\AppData\Local\Temp\EAD473C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4816.exe
C:\Users\Jessica\AppData\Local\Temp\EAD48C3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4910.exe
C:\Users\Jessica\AppData\Local\Temp\EAD494F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4B32.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4BED.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4C2C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4C6B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4C7A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4D06.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4D16.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4E0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4EF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4F28.exe
C:\Users\Jessica\AppData\Local\Temp\EAD4FF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5012.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5022.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5023.exe
C:\Users\Jessica\AppData\Local\Temp\EAD507F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD50ED.exe
C:\Users\Jessica\AppData\Local\Temp\EAD512B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD514A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5179.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5188.exe
C:\Users\Jessica\AppData\Local\Temp\EAD531E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD539B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD53D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5438.exe
C:\Users\Jessica\AppData\Local\Temp\EAD54D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD55C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD55FB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD56F5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD583D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD58D8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5917.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5965.exe
C:\Users\Jessica\AppData\Local\Temp\EAD59A3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5A6E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5AA.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5AAC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5B0B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5C90.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5CA7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5CAF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5DB8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5DB9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5DC8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5E36.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5E37.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5ED2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5F1F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5F4E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5FAC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD5FCB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6028.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6067.exe
C:\Users\Jessica\AppData\Local\Temp\EAD60D5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6113.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6151.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6180.exe
C:\Users\Jessica\AppData\Local\Temp\EAD619F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD61FC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD625A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6306.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6392.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6547.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6557.exe
C:\Users\Jessica\AppData\Local\Temp\EAD66CD.exe
C:\Users\Jessica\AppData\Local\Temp\EAD66DD.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6769.exe
C:\Users\Jessica\AppData\Local\Temp\EAD67A7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD685.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6882.exe
C:\Users\Jessica\AppData\Local\Temp\EAD68A1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD68A2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD68C0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD692D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD694.exe
C:\Users\Jessica\AppData\Local\Temp\EAD694D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6A08.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6A56.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6A75.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6AD3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6C1B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6C39.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6C68.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6CB6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6DBF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6DDF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6DEE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6E1D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6ED9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6FA3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD6FC2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD702.exe
C:\Users\Jessica\AppData\Local\Temp\EAD703F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7196.exe
C:\Users\Jessica\AppData\Local\Temp\EAD730D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7445.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7500.exe
C:\Users\Jessica\AppData\Local\Temp\EAD75F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7657.exe
C:\Users\Jessica\AppData\Local\Temp\EAD76E3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD76E4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7741.exe
C:\Users\Jessica\AppData\Local\Temp\EAD78B7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD78D7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7A9C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7ACA.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7AD9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7B47.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7C5F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7D2A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD7F8B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD80B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD80F1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD813F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD818D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD81EB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD821A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8258.exe
C:\Users\Jessica\AppData\Local\Temp\EAD82A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD82B6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD82C5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8352.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8353.exe
C:\Users\Jessica\AppData\Local\Temp\EAD83A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD83B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD83BF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD842C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD847A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD849.exe
C:\Users\Jessica\AppData\Local\Temp\EAD85A3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8600.exe
C:\Users\Jessica\AppData\Local\Temp\EAD868D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD87C5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD87E4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8880.exe
C:\Users\Jessica\AppData\Local\Temp\EAD88AF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD896A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD89D7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD89F6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8A35.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8AC1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8B3E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8B5D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8BCE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8CF3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8D21.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8D6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8DFC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8E0B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8E79.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8F15.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8F34.exe
C:\Users\Jessica\AppData\Local\Temp\EAD8F63.exe
C:\Users\Jessica\AppData\Local\Temp\EAD906C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD90E9.exe
C:\Users\Jessica\AppData\Local\Temp\EAD91A4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD91A5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9201.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9211.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9212.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9230.exe
C:\Users\Jessica\AppData\Local\Temp\EAD928E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD933.exe
C:\Users\Jessica\AppData\Local\Temp\EAD93B6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD93F5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9404.exe
C:\Users\Jessica\AppData\Local\Temp\EAD94A0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD94B0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD94CF.exe
C:\Users\Jessica\AppData\Local\Temp\EAD94FE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD955B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD959A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD95F7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9617.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9674.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9675.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9693.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9694.exe
C:\Users\Jessica\AppData\Local\Temp\EAD96D2.exe
C:\Users\Jessica\AppData\Local\Temp\EAD96E1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9701.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9702.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9710.exe
C:\Users\Jessica\AppData\Local\Temp\EAD972F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD977D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD97BC.exe
C:\Users\Jessica\AppData\Local\Temp\EAD97CB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD97EB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD980A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9887.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9888.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9896.exe
C:\Users\Jessica\AppData\Local\Temp\EAD991.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9951.exe
C:\Users\Jessica\AppData\Local\Temp\EAD99CE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD99ED.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9A0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9A2D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9A5B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9A5C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9A89.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9AC8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9AF7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9B45.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9B64.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9B65.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9B93.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9BD1.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9BF0.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9C.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9C00.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9C01.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9C2F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9C4E.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9C6D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9CDB.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9D.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9D47.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9DB5.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9DC7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9DE3.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9DE4.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9E13.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9E22.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9E23.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9E51.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9E7F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9E9F.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9EAE.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9F2B.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9F69.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9F79.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9F89.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9F8A.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9FA8.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9FD7.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9FE6.exe
C:\Users\Jessica\AppData\Local\Temp\EAD9FF6.exe
C:\Users\Jessica\AppData\Local\Temp\EADA005.exe
C:\Users\Jessica\AppData\Local\Temp\EADA006.exe
C:\Users\Jessica\AppData\Local\Temp\EADA015.exe
C:\Users\Jessica\AppData\Local\Temp\EADA0E.exe
C:\Users\Jessica\AppData\Local\Temp\EADA0E0.exe
C:\Users\Jessica\AppData\Local\Temp\EADA0EF.exe
C:\Users\Jessica\AppData\Local\Temp\EADA11E.exe
C:\Users\Jessica\AppData\Local\Temp\EADA14D.exe
C:\Users\Jessica\AppData\Local\Temp\EADA18B.exe
C:\Users\Jessica\AppData\Local\Temp\EADA1D.exe
C:\Users\Jessica\AppData\Local\Temp\EADA1D9.exe
C:\Users\Jessica\AppData\Local\Temp\EADA1E9.exe
C:\Users\Jessica\AppData\Local\Temp\EADA1F9.exe
C:\Users\Jessica\AppData\Local\Temp\EADA227.exe
C:\Users\Jessica\AppData\Local\Temp\EADA275.exe
C:\Users\Jessica\AppData\Local\Temp\EADA285.exe
C:\Users\Jessica\AppData\Local\Temp\EADA2C3.exe
C:\Users\Jessica\AppData\Local\Temp\EADA2E3.exe
C:\Users\Jessica\AppData\Local\Temp\EADA2E4.exe
C:\Users\Jessica\AppData\Local\Temp\EADA2F2.exe
C:\Users\Jessica\AppData\Local\Temp\EADA321.exe
C:\Users\Jessica\AppData\Local\Temp\EADA331.exe
C:\Users\Jessica\AppData\Local\Temp\EADA340.exe
C:\Users\Jessica\AppData\Local\Temp\EADA36F.exe
C:\Users\Jessica\AppData\Local\Temp\EADA3AD.exe
C:\Users\Jessica\AppData\Local\Temp\EADA3CD.exe
C:\Users\Jessica\AppData\Local\Temp\EADA3DC.exe
C:\Users\Jessica\AppData\Local\Temp\EADA3EC.exe
C:\Users\Jessica\AppData\Local\Temp\EADA40B.exe
C:\Users\Jessica\AppData\Local\Temp\EADA449.exe
C:\Users\Jessica\AppData\Local\Temp\EADA478.exe
C:\Users\Jessica\AppData\Local\Temp\EADA497.exe
C:\Users\Jessica\AppData\Local\Temp\EADA4A7.exe
C:\Users\Jessica\AppData\Local\Temp\EADA4B7.exe
C:\Users\Jessica\AppData\Local\Temp\EADA4F5.exe
C:\Users\Jessica\AppData\Local\Temp\EADA514.exe
C:\Users\Jessica\AppData\Local\Temp\EADA524.exe
C:\Users\Jessica\AppData\Local\Temp\EADA543.exe
C:\Users\Jessica\AppData\Local\Temp\EADA544.exe
C:\Users\Jessica\AppData\Local\Temp\EADA553.exe
C:\Users\Jessica\AppData\Local\Temp\EADA562.exe
C:\Users\Jessica\AppData\Local\Temp\EADA563.exe
C:\Users\Jessica\AppData\Local\Temp\EADA5B0.exe
C:\Users\Jessica\AppData\Local\Temp\EADA5C.exe
C:\Users\Jessica\AppData\Local\Temp\EADA5C0.exe
C:\Users\Jessica\AppData\Local\Temp\EADA5FE.exe
C:\Users\Jessica\AppData\Local\Temp\EADA61D.exe
C:\Users\Jessica\AppData\Local\Temp\EADA64C.exe
C:\Users\Jessica\AppData\Local\Temp\EADA64D.exe
C:\Users\Jessica\AppData\Local\Temp\EADA67B.exe
C:\Users\Jessica\AppData\Local\Temp\EADA67C.exe
C:\Users\Jessica\AppData\Local\Temp\EADA68B.exe
C:\Users\Jessica\AppData\Local\Temp\EADA69A.exe
C:\Users\Jessica\AppData\Local\Temp\EADA6D9.exe
C:\Users\Jessica\AppData\Local\Temp\EADA6DA.exe
C:\Users\Jessica\AppData\Local\Temp\EADA6DB.exe
C:\Users\Jessica\AppData\Local\Temp\EADA717.exe
C:\Users\Jessica\AppData\Local\Temp\EADA746.exe
C:\Users\Jessica\AppData\Local\Temp\EADA765.exe
C:\Users\Jessica\AppData\Local\Temp\EADA784.exe
C:\Users\Jessica\AppData\Local\Temp\EADA785.exe
C:\Users\Jessica\AppData\Local\Temp\EADA7B.exe
C:\Users\Jessica\AppData\Local\Temp\EADA7B3.exe
C:\Users\Jessica\AppData\Local\Temp\EADA7C3.exe
C:\Users\Jessica\AppData\Local\Temp\EADA87E.exe
C:\Users\Jessica\AppData\Local\Temp\EADA87F.exe
C:\Users\Jessica\AppData\Local\Temp\EADA88D.exe
C:\Users\Jessica\AppData\Local\Temp\EADA8FB.exe
C:\Users\Jessica\AppData\Local\Temp\EADA8FC.exe
C:\Users\Jessica\AppData\Local\Temp\EADA939.exe
C:\Users\Jessica\AppData\Local\Temp\EADA93A.exe
C:\Users\Jessica\AppData\Local\Temp\EADA958.exe
C:\Users\Jessica\AppData\Local\Temp\EADA997.exe
C:\Users\Jessica\AppData\Local\Temp\EADA998.exe
C:\Users\Jessica\AppData\Local\Temp\EADA9B6.exe
C:\Users\Jessica\AppData\Local\Temp\EADA9C5.exe
C:\Users\Jessica\AppData\Local\Temp\EADA9E5.exe
C:\Users\Jessica\AppData\Local\Temp\EADA9F4.exe
C:\Users\Jessica\AppData\Local\Temp\EADA9F5.exe
C:\Users\Jessica\AppData\Local\Temp\EADAA13.exe
C:\Users\Jessica\AppData\Local\Temp\EADAA14.exe
C:\Users\Jessica\AppData\Local\Temp\EADAA15.exe
C:\Users\Jessica\AppData\Local\Temp\EADAA42.exe
C:\Users\Jessica\AppData\Local\Temp\EADAA71.exe
C:\Users\Jessica\AppData\Local\Temp\EADAAA0.exe
C:\Users\Jessica\AppData\Local\Temp\EADAABF.exe
C:\Users\Jessica\AppData\Local\Temp\EADAACF.exe
C:\Users\Jessica\AppData\Local\Temp\EADAADE.exe
C:\Users\Jessica\AppData\Local\Temp\EADAB0D.exe
C:\Users\Jessica\AppData\Local\Temp\EADAB4B.exe
C:\Users\Jessica\AppData\Local\Temp\EADAB7A.exe
C:\Users\Jessica\AppData\Local\Temp\EADABC8.exe
C:\Users\Jessica\AppData\Local\Temp\EADABC9.exe
C:\Users\Jessica\AppData\Local\Temp\EADABCA.exe
C:\Users\Jessica\AppData\Local\Temp\EADABCB.exe
C:\Users\Jessica\AppData\Local\Temp\EADABD8.exe
C:\Users\Jessica\AppData\Local\Temp\EADABF7.exe
C:\Users\Jessica\AppData\Local\Temp\EADABF8.exe
C:\Users\Jessica\AppData\Local\Temp\EADABF9.exe
C:\Users\Jessica\AppData\Local\Temp\EADAC07.exe
C:\Users\Jessica\AppData\Local\Temp\EADAC1A.exe
C:\Users\Jessica\AppData\Local\Temp\EADAC26.exe
C:\Users\Jessica\AppData\Local\Temp\EADAC45.exe
C:\Users\Jessica\AppData\Local\Temp\EADAC64.exe
C:\Users\Jessica\AppData\Local\Temp\EADAC83.exe
C:\Users\Jessica\AppData\Local\Temp\EADAC84.exe
C:\Users\Jessica\AppData\Local\Temp\EADACB2.exe
C:\Users\Jessica\AppData\Local\Temp\EADACC2.exe
C:\Users\Jessica\AppData\Local\Temp\EADACD1.exe
C:\Users\Jessica\AppData\Local\Temp\EADACD2.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD00.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD01.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD02.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD1F.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD20.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD2F.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD30.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD5E.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD5F.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD7D.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD7E.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD8D.exe
C:\Users\Jessica\AppData\Local\Temp\EADAD9C.exe
C:\Users\Jessica\AppData\Local\Temp\EADADAC.exe
C:\Users\Jessica\AppData\Local\Temp\EADADCB.exe
C:\Users\Jessica\AppData\Local\Temp\EADADEA.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE09.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE19.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE1A.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE29.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE48.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE49.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE77.exe
C:\Users\Jessica\AppData\Local\Temp\EADAE86.exe
C:\Users\Jessica\AppData\Local\Temp\EADAEC5.exe
C:\Users\Jessica\AppData\Local\Temp\EADAED4.exe
C:\Users\Jessica\AppData\Local\Temp\EADAEE4.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF03.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF13.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF41.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF51.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF52.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF70.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF80.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF81.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF8F.exe
C:\Users\Jessica\AppData\Local\Temp\EADAF9F.exe
C:\Users\Jessica\AppData\Local\Temp\EADAFAF.exe
C:\Users\Jessica\AppData\Local\Temp\EADAFDD.exe
C:\Users\Jessica\AppData\Local\Temp\EADAFDE.exe
C:\Users\Jessica\AppData\Local\Temp\EADAFED.exe
C:\Users\Jessica\AppData\Local\Temp\EADAFFD.exe
C:\Users\Jessica\AppData\Local\Temp\EADAFFE.exe
C:\Users\Jessica\AppData\Local\Temp\EADAFFF.exe
C:\Users\Jessica\AppData\Local\Temp\EADB01C.exe
C:\Users\Jessica\AppData\Local\Temp\EADB03B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB04B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB05A.exe
C:\Users\Jessica\AppData\Local\Temp\EADB05B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB06A.exe
C:\Users\Jessica\AppData\Local\Temp\EADB07B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB0B8.exe
C:\Users\Jessica\AppData\Local\Temp\EADB0B9.exe
C:\Users\Jessica\AppData\Local\Temp\EADB0BA.exe
C:\Users\Jessica\AppData\Local\Temp\EADB0C7.exe
C:\Users\Jessica\AppData\Local\Temp\EADB0C8.exe
C:\Users\Jessica\AppData\Local\Temp\EADB154.exe
C:\Users\Jessica\AppData\Local\Temp\EADB163.exe
C:\Users\Jessica\AppData\Local\Temp\EADB192.exe
C:\Users\Jessica\AppData\Local\Temp\EADB193.exe
C:\Users\Jessica\AppData\Local\Temp\EADB1D1.exe
C:\Users\Jessica\AppData\Local\Temp\EADB1D2.exe
C:\Users\Jessica\AppData\Local\Temp\EADB1F0.exe
C:\Users\Jessica\AppData\Local\Temp\EADB1F1.exe
C:\Users\Jessica\AppData\Local\Temp\EADB1F2.exe
C:\Users\Jessica\AppData\Local\Temp\EADB1FF.exe
C:\Users\Jessica\AppData\Local\Temp\EADB20F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB21F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB220.exe
C:\Users\Jessica\AppData\Local\Temp\EADB23E.exe
C:\Users\Jessica\AppData\Local\Temp\EADB23F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB24D.exe
C:\Users\Jessica\AppData\Local\Temp\EADB26.exe
C:\Users\Jessica\AppData\Local\Temp\EADB2BB.exe
C:\Users\Jessica\AppData\Local\Temp\EADB2BC.exe
C:\Users\Jessica\AppData\Local\Temp\EADB2CA.exe
C:\Users\Jessica\AppData\Local\Temp\EADB2F9.exe
C:\Users\Jessica\AppData\Local\Temp\EADB309.exe
C:\Users\Jessica\AppData\Local\Temp\EADB318.exe
C:\Users\Jessica\AppData\Local\Temp\EADB328.exe
C:\Users\Jessica\AppData\Local\Temp\EADB329.exe
C:\Users\Jessica\AppData\Local\Temp\EADB347.exe
C:\Users\Jessica\AppData\Local\Temp\EADB357.exe
C:\Users\Jessica\AppData\Local\Temp\EADB366.exe
C:\Users\Jessica\AppData\Local\Temp\EADB376.exe
C:\Users\Jessica\AppData\Local\Temp\EADB385.exe
C:\Users\Jessica\AppData\Local\Temp\EADB3A5.exe
C:\Users\Jessica\AppData\Local\Temp\EADB3A6.exe
C:\Users\Jessica\AppData\Local\Temp\EADB3D3.exe
C:\Users\Jessica\AppData\Local\Temp\EADB3E3.exe
C:\Users\Jessica\AppData\Local\Temp\EADB3F3.exe
C:\Users\Jessica\AppData\Local\Temp\EADB402.exe
C:\Users\Jessica\AppData\Local\Temp\EADB403.exe
C:\Users\Jessica\AppData\Local\Temp\EADB412.exe
C:\Users\Jessica\AppData\Local\Temp\EADB441.exe
C:\Users\Jessica\AppData\Local\Temp\EADB450.exe
C:\Users\Jessica\AppData\Local\Temp\EADB46F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB47F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB48F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB49E.exe
C:\Users\Jessica\AppData\Local\Temp\EADB49F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB4AE.exe
C:\Users\Jessica\AppData\Local\Temp\EADB50B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB53A.exe
C:\Users\Jessica\AppData\Local\Temp\EADB53B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB53C.exe
C:\Users\Jessica\AppData\Local\Temp\EADB54A.exe
C:\Users\Jessica\AppData\Local\Temp\EADB55.exe
C:\Users\Jessica\AppData\Local\Temp\EADB579.exe
C:\Users\Jessica\AppData\Local\Temp\EADB598.exe
C:\Users\Jessica\AppData\Local\Temp\EADB5A7.exe
C:\Users\Jessica\AppData\Local\Temp\EADB5B7.exe
C:\Users\Jessica\AppData\Local\Temp\EADB5D6.exe
C:\Users\Jessica\AppData\Local\Temp\EADB5D7.exe
C:\Users\Jessica\AppData\Local\Temp\EADB5D8.exe
C:\Users\Jessica\AppData\Local\Temp\EADB5E6.exe
C:\Users\Jessica\AppData\Local\Temp\EADB634.exe
C:\Users\Jessica\AppData\Local\Temp\EADB635.exe
C:\Users\Jessica\AppData\Local\Temp\EADB653.exe
C:\Users\Jessica\AppData\Local\Temp\EADB672.exe
C:\Users\Jessica\AppData\Local\Temp\EADB691.exe
C:\Users\Jessica\AppData\Local\Temp\EADB6A1.exe
C:\Users\Jessica\AppData\Local\Temp\EADB6A2.exe
C:\Users\Jessica\AppData\Local\Temp\EADB6C0.exe
C:\Users\Jessica\AppData\Local\Temp\EADB6C1.exe
C:\Users\Jessica\AppData\Local\Temp\EADB6EF.exe
C:\Users\Jessica\AppData\Local\Temp\EADB6FF.exe
C:\Users\Jessica\AppData\Local\Temp\EADB700.exe
C:\Users\Jessica\AppData\Local\Temp\EADB71E.exe
C:\Users\Jessica\AppData\Local\Temp\EADB72D.exe
C:\Users\Jessica\AppData\Local\Temp\EADB73D.exe
C:\Users\Jessica\AppData\Local\Temp\EADB74D.exe
C:\Users\Jessica\AppData\Local\Temp\EADB75C.exe
C:\Users\Jessica\AppData\Local\Temp\EADB75D.exe
C:\Users\Jessica\AppData\Local\Temp\EADB75E.exe
C:\Users\Jessica\AppData\Local\Temp\EADB78B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB78C.exe
C:\Users\Jessica\AppData\Local\Temp\EADB78D.exe
C:\Users\Jessica\AppData\Local\Temp\EADB79B.exe
C:\Users\Jessica\AppData\Local\Temp\EADB7AA.exe
C:\Users\Jessica\AppData\Local\Temp\EADB7C9.exe
C:\Users\Jessica\AppData\Local\Temp\EADB7E9.exe
C:\Users\Jessica\AppData\Local\Temp\EADB7F8.exe
C:\Users\Jessica\AppData\Local\Temp\EADB7F9.exe
C:\Users\Jessica\AppData\Local\Temp\EADB817.exe
C:\Users\Jessica\AppData\Local\Temp\EADB827.exe
C:\Users\Jessica\AppData\Local\Temp\EADB828.exe
C:\Users\Jessica\AppData\Local\Temp\EADB837.exe
C:\Users\Jessica\AppData\Local\Temp\EADB846.exe
C:\Users\Jessica\AppData\Local\Temp\EADB856.exe
C:\Users\Jessica\AppData\Local\Temp\EADB8A4.exe
C:\Users\Jessica\AppData\Local\Temp\EADB8C3.exe
C:\Users\Jessica\AppData\Local\Temp\EADB8E2.exe
C:\Users\Jessica\AppData\Local\Temp\EADB8E3.exe
C:\Users\Jessica\AppData\Local\Temp\EADB902.exe
C:\Users\Jessica\AppData\Local\Temp\EADB911.exe
C:\Users\Jessica\AppData\Local\Temp\EADB912.exe
C:\Users\Jessica\AppData\Local\Temp\EADB96F.exe
C:\Users\Jessica\AppData\Local\Temp\EADB970.exe
C:\Users\Jessica\AppData\Local\Temp\EADB97E.exe
C:\Users\Jessica\AppData\Local\Temp\EADB99D.exe
C:\Users\Jessica\AppData\Local\Temp\EADB9BD.exe
C:\Users\Jessica\AppData\Local\Temp\EADB9FB.exe
C:\Users\Jessica\AppData\Local\Temp\EADBA1A.exe
C:\Users\Jessica\AppData\Local\Temp\EADBA3.exe
C:\Users\Jessica\AppData\Local\Temp\EADBA68.exe
C:\Users\Jessica\AppData\Local\Temp\EADBA97.exe
C:\Users\Jessica\AppData\Local\Temp\EADBAA7.exe
C:\Users\Jessica\AppData\Local\Temp\EADBAA8.exe
C:\Users\Jessica\AppData\Local\Temp\EADBAB6.exe
C:\Users\Jessica\AppData\Local\Temp\EADBAB7.exe
C:\Users\Jessica\AppData\Local\Temp\EADBAB8.exe
C:\Users\Jessica\AppData\Local\Temp\EADBAC6.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB04.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB33.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB34.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB43.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB62.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB81.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB91.exe
C:\Users\Jessica\AppData\Local\Temp\EADBB92.exe
C:\Users\Jessica\AppData\Local\Temp\EADBBB0.exe
C:\Users\Jessica\AppData\Local\Temp\EADBBBF.exe
C:\Users\Jessica\AppData\Local\Temp\EADBBCF.exe
C:\Users\Jessica\AppData\Local\Temp\EADBBD0.exe
C:\Users\Jessica\AppData\Local\Temp\EADBBDF.exe
C:\Users\Jessica\AppData\Local\Temp\EADBBEE.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC1D.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC1E.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC3C.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC6B.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC7B.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC8A.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC9A.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC9B.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC9C.exe
C:\Users\Jessica\AppData\Local\Temp\EADBC9D.exe
C:\Users\Jessica\AppData\Local\Temp\EADBCB9.exe
C:\Users\Jessica\AppData\Local\Temp\EADBCD8.exe
C:\Users\Jessica\AppData\Local\Temp\EADBCD9.exe
C:\Users\Jessica\AppData\Local\Temp\EADBCDA.exe
C:\Users\Jessica\AppData\Local\Temp\EADBCF7.exe
C:\Users\Jessica\AppData\Local\Temp\EADBD26.exe
C:\Users\Jessica\AppData\Local\Temp\EADBD36.exe
C:\Users\Jessica\AppData\Local\Temp\EADBD37.exe
C:\Users\Jessica\AppData\Local\Temp\EADBD45.exe
C:\Users\Jessica\AppData\Local\Temp\EADBD74.exe
C:\Users\Jessica\AppData\Local\Temp\EADBD93.exe
C:\Users\Jessica\AppData\Local\Temp\EADBDA3.exe
C:\Users\Jessica\AppData\Local\Temp\EADBDA4.exe
C:\Users\Jessica\AppData\Local\Temp\EADBDB3.exe
C:\Users\Jessica\AppData\Local\Temp\EADBDB4.exe
C:\Users\Jessica\AppData\Local\Temp\EADBDF1.exe
C:\Users\Jessica\AppData\Local\Temp\EADBE01.exe
C:\Users\Jessica\AppData\Local\Temp\EADBE4F.exe
C:\Users\Jessica\AppData\Local\Temp\EADBE50.exe
C:\Users\Jessica\AppData\Local\Temp\EADBE6E.exe
C:\Users\Jessica\AppData\Local\Temp\EADBE7D.exe
C:\Users\Jessica\AppData\Local\Temp\EADBECB.exe
C:\Users\Jessica\AppData\Local\Temp\EADBF0A.exe
C:\Users\Jessica\AppData\Local\Temp\EADBF29.exe
C:\Users\Jessica\AppData\Local\Temp\EADBF58.exe
C:\Users\Jessica\AppData\Local\Temp\EADBFB5.exe
C:\Users\Jessica\AppData\Local\Temp\EADBFD5.exe
C:\Users\Jessica\AppData\Local\Temp\EADBFE4.exe
C:\Users\Jessica\AppData\Local\Temp\EADC01.exe
C:\Users\Jessica\AppData\Local\Temp\EADC042.exe
C:\Users\Jessica\AppData\Local\Temp\EADC051.exe
C:\Users\Jessica\AppData\Local\Temp\EADC0FD.exe
C:\Users\Jessica\AppData\Local\Temp\EADC0FE.exe
C:\Users\Jessica\AppData\Local\Temp\EADC10.exe
C:\Users\Jessica\AppData\Local\Temp\EADC11C.exe
C:\Users\Jessica\AppData\Local\Temp\EADC11D.exe
C:\Users\Jessica\AppData\Local\Temp\EADC14B.exe
C:\Users\Jessica\AppData\Local\Temp\EADC15B.exe
C:\Users\Jessica\AppData\Local\Temp\EADC1A9.exe
C:\Users\Jessica\AppData\Local\Temp\EADC1D7.exe
C:\Users\Jessica\AppData\Local\Temp\EADC1D8.exe
C:\Users\Jessica\AppData\Local\Temp\EADC216.exe
C:\Users\Jessica\AppData\Local\Temp\EADC235.exe
C:\Users\Jessica\AppData\Local\Temp\EADC245.exe
C:\Users\Jessica\AppData\Local\Temp\EADC246.exe
C:\Users\Jessica\AppData\Local\Temp\EADC283.exe
C:\Users\Jessica\AppData\Local\Temp\EADC2A2.exe
C:\Users\Jessica\AppData\Local\Temp\EADC2A3.exe
C:\Users\Jessica\AppData\Local\Temp\EADC2B2.exe
C:\Users\Jessica\AppData\Local\Temp\EADC2E1.exe
C:\Users\Jessica\AppData\Local\Temp\EADC2E2.exe
C:\Users\Jessica\AppData\Local\Temp\EADC30.exe
C:\Users\Jessica\AppData\Local\Temp\EADC31.exe
C:\Users\Jessica\AppData\Local\Temp\EADC31F.exe
C:\Users\Jessica\AppData\Local\Temp\EADC32.exe
C:\Users\Jessica\AppData\Local\Temp\EADC33E.exe
C:\Users\Jessica\AppData\Local\Temp\EADC33F.exe
C:\Users\Jessica\AppData\Local\Temp\EADC37D.exe
C:\Users\Jessica\AppData\Local\Temp\EADC3CB.exe
C:\Users\Jessica\AppData\Local\Temp\EADC3CC.exe
C:\Users\Jessica\AppData\Local\Temp\EADC3DA.exe
C:\Users\Jessica\AppData\Local\Temp\EADC3EA.exe
C:\Users\Jessica\AppData\Local\Temp\EADC3EB.exe
C:\Users\Jessica\AppData\Local\Temp\EADC3EC.exe
C:\Users\Jessica\AppData\Local\Temp\EADC457.exe
C:\Users\Jessica\AppData\Local\Temp\EADC4B5.exe
C:\Users\Jessica\AppData\Local\Temp\EADC4C4.exe
C:\Users\Jessica\AppData\Local\Temp\EADC4D4.exe
C:\Users\Jessica\AppData\Local\Temp\EADC551.exe
C:\Users\Jessica\AppData\Local\Temp\EADC560.exe
C:\Users\Jessica\AppData\Local\Temp\EADC57F.exe
C:\Users\Jessica\AppData\Local\Temp\EADC5AE.exe
C:\Users\Jessica\AppData\Local\Temp\EADC5CD.exe
C:\Users\Jessica\AppData\Local\Temp\EADC5E.exe
C:\Users\Jessica\AppData\Local\Temp\EADC5ED.exe
C:\Users\Jessica\AppData\Local\Temp\EADC5FC.exe
C:\Users\Jessica\AppData\Local\Temp\EADC60C.exe
C:\Users\Jessica\AppData\Local\Temp\EADC61B.exe
C:\Users\Jessica\AppData\Local\Temp\EADC62B.exe
C:\Users\Jessica\AppData\Local\Temp\EADC62C.exe
C:\Users\Jessica\AppData\Local\Temp\EADC62D.exe
C:\Users\Jessica\AppData\Local\Temp\EADC65A.exe
C:\Users\Jessica\AppData\Local\Temp\EADC65B.exe
C:\Users\Jessica\AppData\Local\Temp\EADC669.exe
C:\Users\Jessica\AppData\Local\Temp\EADC66A.exe
C:\Users\Jessica\AppData\Local\Temp\EADC6A8.exe
C:\Users\Jessica\AppData\Local\Temp\EADC6C7.exe
C:\Users\Jessica\AppData\Local\Temp\EADC6C8.exe
C:\Users\Jessica\AppData\Local\Temp\EADC6D7.exe
C:\Users\Jessica\AppData\Local\Temp\EADC734.exe
C:\Users\Jessica\AppData\Local\Temp\EADC744.exe
C:\Users\Jessica\AppData\Local\Temp\EADC763.exe
C:\Users\Jessica\AppData\Local\Temp\EADC773.exe
C:\Users\Jessica\AppData\Local\Temp\EADC774.exe
C:\Users\Jessica\AppData\Local\Temp\EADC775.exe
C:\Users\Jessica\AppData\Local\Temp\EADC782.exe
C:\Users\Jessica\AppData\Local\Temp\EADC792.exe
C:\Users\Jessica\AppData\Local\Temp\EADC7B1.exe
C:\Users\Jessica\AppData\Local\Temp\EADC7B2.exe
C:\Users\Jessica\AppData\Local\Temp\EADC7B3.exe
C:\Users\Jessica\AppData\Local\Temp\EADC7E0.exe
C:\Users\Jessica\AppData\Local\Temp\EADC7FF.exe
C:\Users\Jessica\AppData\Local\Temp\EADC800.exe
C:\Users\Jessica\AppData\Local\Temp\EADC802.exe
C:\Users\Jessica\AppData\Local\Temp\EADC81E.exe
C:\Users\Jessica\AppData\Local\Temp\EADC84D.exe
C:\Users\Jessica\AppData\Local\Temp\EADC85D.exe
C:\Users\Jessica\AppData\Local\Temp\EADC86C.exe
C:\Users\Jessica\AppData\Local\Temp\EADC88B.exe
C:\Users\Jessica\AppData\Local\Temp\EADC89B.exe
C:\Users\Jessica\AppData\Local\Temp\EADC8D9.exe
C:\Users\Jessica\AppData\Local\Temp\EADC927.exe
C:\Users\Jessica\AppData\Local\Temp\EADC928.exe
C:\Users\Jessica\AppData\Local\Temp\EADC966.exe
C:\Users\Jessica\AppData\Local\Temp\EADC975.exe
C:\Users\Jessica\AppData\Local\Temp\EADC9B4.exe
C:\Users\Jessica\AppData\Local\Temp\EADC9D3.exe
C:\Users\Jessica\AppData\Local\Temp\EADC9F2.exe
C:\Users\Jessica\AppData\Local\Temp\EADCA31.exe
C:\Users\Jessica\AppData\Local\Temp\EADCA50.exe
C:\Users\Jessica\AppData\Local\Temp\EADCA51.exe
C:\Users\Jessica\AppData\Local\Temp\EADCA8E.exe
C:\Users\Jessica\AppData\Local\Temp\EADCAAD.exe
C:\Users\Jessica\AppData\Local\Temp\EADCAAE.exe
C:\Users\Jessica\AppData\Local\Temp\EADCAFB.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB0B.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB1B.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB2A.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB2B.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB3A.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB59.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB5A.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB69.exe
C:\Users\Jessica\AppData\Local\Temp\EADCB88.exe
C:\Users\Jessica\AppData\Local\Temp\EADCBC6.exe
C:\Users\Jessica\AppData\Local\Temp\EADCBC7.exe
C:\Users\Jessica\AppData\Local\Temp\EADCC05.exe
C:\Users\Jessica\AppData\Local\Temp\EADCC24.exe
C:\Users\Jessica\AppData\Local\Temp\EADCC91.exe
C:\Users\Jessica\AppData\Local\Temp\EADCCCF.exe
C:\Users\Jessica\AppData\Local\Temp\EADCCFE.exe
C:\Users\Jessica\AppData\Local\Temp\EADCD0E.exe
C:\Users\Jessica\AppData\Local\Temp\EADCD4C.exe
C:\Users\Jessica\AppData\Local\Temp\EADCD5C.exe
C:\Users\Jessica\AppData\Local\Temp\EADCD7B.exe
C:\Users\Jessica\AppData\Local\Temp\EADCD8B.exe
C:\Users\Jessica\AppData\Local\Temp\EADCD9A.exe
C:\Users\Jessica\AppData\Local\Temp\EADCDAA.exe
C:\Users\Jessica\AppData\Local\Temp\EADCDAB.exe
C:\Users\Jessica\AppData\Local\Temp\EADCDC9.exe
C:\Users\Jessica\AppData\Local\Temp\EADCDE8.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE07.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE08.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE17.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE18.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE46.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE47.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE65.exe
C:\Users\Jessica\AppData\Local\Temp\EADCE66.exe
C:\Users\Jessica\AppData\Local\Temp\EADCEC3.exe
C:\Users\Jessica\AppData\Local\Temp\EADCEC4.exe
C:\Users\Jessica\AppData\Local\Temp\EADCEF1.exe
C:\Users\Jessica\AppData\Local\Temp\EADCF11.exe
C:\Users\Jessica\AppData\Local\Temp\EADCF30.exe
C:\Users\Jessica\AppData\Local\Temp\EADCF9D.exe
C:\Users\Jessica\AppData\Local\Temp\EADCFAD.exe
C:\Users\Jessica\AppData\Local\Temp\EADCFCC.exe
C:\Users\Jessica\AppData\Local\Temp\EADCFDB.exe
C:\Users\Jessica\AppData\Local\Temp\EADCFEC.exe
C:\Users\Jessica\AppData\Local\Temp\EADCFFB.exe
C:\Users\Jessica\AppData\Local\Temp\EADD02A.exe
C:\Users\Jessica\AppData\Local\Temp\EADD077.exe
C:\Users\Jessica\AppData\Local\Temp\EADD0C5.exe
C:\Users\Jessica\AppData\Local\Temp\EADD0C6.exe
C:\Users\Jessica\AppData\Local\Temp\EADD0D5.exe
C:\Users\Jessica\AppData\Local\Temp\EADD123.exe
C:\Users\Jessica\AppData\Local\Temp\EADD133.exe
C:\Users\Jessica\AppData\Local\Temp\EADD152.exe
C:\Users\Jessica\AppData\Local\Temp\EADD1A0.exe
C:\Users\Jessica\AppData\Local\Temp\EADD1CF.exe
C:\Users\Jessica\AppData\Local\Temp\EADD1D0.exe
C:\Users\Jessica\AppData\Local\Temp\EADD20D.exe
C:\Users\Jessica\AppData\Local\Temp\EADD20E.exe
C:\Users\Jessica\AppData\Local\Temp\EADD23C.exe
C:\Users\Jessica\AppData\Local\Temp\EADD25B.exe
C:\Users\Jessica\AppData\Local\Temp\EADD2A9.exe
C:\Users\Jessica\AppData\Local\Temp\EADD307.exe
C:\Users\Jessica\AppData\Local\Temp\EADD326.exe
C:\Users\Jessica\AppData\Local\Temp\EADD335.exe
C:\Users\Jessica\AppData\Local\Temp\EADD39.exe
C:\Users\Jessica\AppData\Local\Temp\EADD3C2.exe
C:\Users\Jessica\AppData\Local\Temp\EADD3C3.exe
C:\Users\Jessica\AppData\Local\Temp\EADD401.exe
C:\Users\Jessica\AppData\Local\Temp\EADD41F.exe
C:\Users\Jessica\AppData\Local\Temp\EADD420.exe
C:\Users\Jessica\AppData\Local\Temp\EADD48D.exe
C:\Users\Jessica\AppData\Local\Temp\EADD49C.exe
C:\Users\Jessica\AppData\Local\Temp\EADD4AC.exe
C:\Users\Jessica\AppData\Local\Temp\EADD4CB.exe
C:\Users\Jessica\AppData\Local\Temp\EADD538.exe
C:\Users\Jessica\AppData\Local\Temp\EADD598.exe
C:\Users\Jessica\AppData\Local\Temp\EADD5B5.exe
C:\Users\Jessica\AppData\Local\Temp\EADD613.exe
C:\Users\Jessica\AppData\Local\Temp\EADD614.exe
C:\Users\Jessica\AppData\Local\Temp\EADD632.exe
C:\Users\Jessica\AppData\Local\Temp\EADD651.exe
C:\Users\Jessica\AppData\Local\Temp\EADD670.exe
C:\Users\Jessica\AppData\Local\Temp\EADD671.exe
C:\Users\Jessica\AppData\Local\Temp\EADD6AF.exe
C:\Users\Jessica\AppData\Local\Temp\EADD6BE.exe
C:\Users\Jessica\AppData\Local\Temp\EADD6CE.exe
C:\Users\Jessica\AppData\Local\Temp\EADD6ED.exe
C:\Users\Jessica\AppData\Local\Temp\EADD6FD.exe
C:\Users\Jessica\AppData\Local\Temp\EADD74B.exe
C:\Users\Jessica\AppData\Local\Temp\EADD76A.exe
C:\Users\Jessica\AppData\Local\Temp\EADD77.exe
C:\Users\Jessica\AppData\Local\Temp\EADD78.exe
C:\Users\Jessica\AppData\Local\Temp\EADD7A8.exe
C:\Users\Jessica\AppData\Local\Temp\EADD7B8.exe
C:\Users\Jessica\AppData\Local\Temp\EADD7C7.exe
C:\Users\Jessica\AppData\Local\Temp\EADD7C8.exe
C:\Users\Jessica\AppData\Local\Temp\EADD7D7.exe
C:\Users\Jessica\AppData\Local\Temp\EADD7F6.exe
C:\Users\Jessica\AppData\Local\Temp\EADD825.exe
C:\Users\Jessica\AppData\Local\Temp\EADD826.exe
C:\Users\Jessica\AppData\Local\Temp\EADD883.exe
C:\Users\Jessica\AppData\Local\Temp\EADD8F0.exe
C:\Users\Jessica\AppData\Local\Temp\EADD90F.exe
C:\Users\Jessica\AppData\Local\Temp\EADD910.exe
C:\Users\Jessica\AppData\Local\Temp\EADD93E.exe
C:\Users\Jessica\AppData\Local\Temp\EADD94D.exe
C:\Users\Jessica\AppData\Local\Temp\EADD99C.exe
C:\Users\Jessica\AppData\Local\Temp\EADD9CB.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA09.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA0A.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA28.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA29.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA2A.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA6.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA77.exe
C:\Users\Jessica\AppData\Local\Temp\EADDA85.exe
C:\Users\Jessica\AppData\Local\Temp\EADDAD3.exe
C:\Users\Jessica\AppData\Local\Temp\EADDB12.exe
C:\Users\Jessica\AppData\Local\Temp\EADDB22.exe
C:\Users\Jessica\AppData\Local\Temp\EADDB31.exe
C:\Users\Jessica\AppData\Local\Temp\EADDB41.exe
C:\Users\Jessica\AppData\Local\Temp\EADDB6F.exe
C:\Users\Jessica\AppData\Local\Temp\EADDB8F.exe
C:\Users\Jessica\AppData\Local\Temp\EADDB90.exe
C:\Users\Jessica\AppData\Local\Temp\EADDBFC.exe
C:\Users\Jessica\AppData\Local\Temp\EADDC1B.exe
C:\Users\Jessica\AppData\Local\Temp\EADDC1C.exe
C:\Users\Jessica\AppData\Local\Temp\EADDC3A.exe
C:\Users\Jessica\AppData\Local\Temp\EADDC59.exe
C:\Users\Jessica\AppData\Local\Temp\EADDCA7.exe
C:\Users\Jessica\AppData\Local\Temp\EADDCC7.exe
C:\Users\Jessica\AppData\Local\Temp\EADDCE6.exe
C:\Users\Jessica\AppData\Local\Temp\EADDCF5.exe
C:\Users\Jessica\AppData\Local\Temp\EADDD63.exe
C:\Users\Jessica\AppData\Local\Temp\EADDD72.exe
C:\Users\Jessica\AppData\Local\Temp\EADDD82.exe
C:\Users\Jessica\AppData\Local\Temp\EADDDE0.exe
C:\Users\Jessica\AppData\Local\Temp\EADDE0E.exe
C:\Users\Jessica\AppData\Local\Temp\EADDE3D.exe
C:\Users\Jessica\AppData\Local\Temp\EADDE7B.exe
C:\Users\Jessica\AppData\Local\Temp\EADDE9B.exe
C:\Users\Jessica\AppData\Local\Temp\EADDED9.exe
C:\Users\Jessica\AppData\Local\Temp\EADDEE9.exe
C:\Users\Jessica\AppData\Local\Temp\EADDF17.exe
C:\Users\Jessica\AppData\Local\Temp\EADDF56.exe
C:\Users\Jessica\AppData\Local\Temp\EADDF57.exe
C:\Users\Jessica\AppData\Local\Temp\EADDF58.exe
C:\Users\Jessica\AppData\Local\Temp\EADDF75.exe
C:\Users\Jessica\AppData\Local\Temp\EADDF85.exe
C:\Users\Jessica\AppData\Local\Temp\EADDFB4.exe
C:\Users\Jessica\AppData\Local\Temp\EADDFC3.exe
C:\Users\Jessica\AppData\Local\Temp\EADDFF2.exe
C:\Users\Jessica\AppData\Local\Temp\EADE001.exe
C:\Users\Jessica\AppData\Local\Temp\EADE011.exe
C:\Users\Jessica\AppData\Local\Temp\EADE021.exe
C:\Users\Jessica\AppData\Local\Temp\EADE04.exe
C:\Users\Jessica\AppData\Local\Temp\EADE05.exe
C:\Users\Jessica\AppData\Local\Temp\EADE07E.exe
C:\Users\Jessica\AppData\Local\Temp\EADE0FB.exe
C:\Users\Jessica\AppData\Local\Temp\EADE10B.exe
C:\Users\Jessica\AppData\Local\Temp\EADE168.exe
C:\Users\Jessica\AppData\Local\Temp\EADE188.exe
C:\Users\Jessica\AppData\Local\Temp\EADE1C6.exe
C:\Users\Jessica\AppData\Local\Temp\EADE1C7.exe
C:\Users\Jessica\AppData\Local\Temp\EADE1C8.exe
C:\Users\Jessica\AppData\Local\Temp\EADE204.exe
C:\Users\Jessica\AppData\Local\Temp\EADE281.exe
C:\Users\Jessica\AppData\Local\Temp\EADE2BF.exe
C:\Users\Jessica\AppData\Local\Temp\EADE2EE.exe
C:\Users\Jessica\AppData\Local\Temp\EADE31D.exe
C:\Users\Jessica\AppData\Local\Temp\EADE35B.exe
C:\Users\Jessica\AppData\Local\Temp\EADE3A9.exe
C:\Users\Jessica\AppData\Local\Temp\EADE3AA.exe
C:\Users\Jessica\AppData\Local\Temp\EADE42.exe
C:\Users\Jessica\AppData\Local\Temp\EADE493.exe
C:\Users\Jessica\AppData\Local\Temp\EADE4E2.exe
C:\Users\Jessica\AppData\Local\Temp\EADE52.exe
C:\Users\Jessica\AppData\Local\Temp\EADE520.exe
C:\Users\Jessica\AppData\Local\Temp\EADE55E.exe
C:\Users\Jessica\AppData\Local\Temp\EADE59D.exe
C:\Users\Jessica\AppData\Local\Temp\EADE5AC.exe
C:\Users\Jessica\AppData\Local\Temp\EADE5BC.exe
C:\Users\Jessica\AppData\Local\Temp\EADE60A.exe
C:\Users\Jessica\AppData\Local\Temp\EADE619.exe
C:\Users\Jessica\AppData\Local\Temp\EADE629.exe
C:\Users\Jessica\AppData\Local\Temp\EADE658.exe
C:\Users\Jessica\AppData\Local\Temp\EADE6B5.exe
C:\Users\Jessica\AppData\Local\Temp\EADE6D5.exe
C:\Users\Jessica\AppData\Local\Temp\EADE703.exe
C:\Users\Jessica\AppData\Local\Temp\EADE732.exe
C:\Users\Jessica\AppData\Local\Temp\EADE780.exe
C:\Users\Jessica\AppData\Local\Temp\EADE79F.exe
C:\Users\Jessica\AppData\Local\Temp\EADE7AF.exe
C:\Users\Jessica\AppData\Local\Temp\EADE7B0.exe
C:\Users\Jessica\AppData\Local\Temp\EADE7FD.exe
C:\Users\Jessica\AppData\Local\Temp\EADE81D.exe
C:\Users\Jessica\AppData\Local\Temp\EADE84B.exe
C:\Users\Jessica\AppData\Local\Temp\EADE84C.exe
C:\Users\Jessica\AppData\Local\Temp\EADE899.exe
C:\Users\Jessica\AppData\Local\Temp\EADE89A.exe
C:\Users\Jessica\AppData\Local\Temp\EADE8C8.exe
C:\Users\Jessica\AppData\Local\Temp\EADE8D7.exe
C:\Users\Jessica\AppData\Local\Temp\EADE916.exe
C:\Users\Jessica\AppData\Local\Temp\EADE925.exe
C:\Users\Jessica\AppData\Local\Temp\EADE926.exe
C:\Users\Jessica\AppData\Local\Temp\EADE927.exe
C:\Users\Jessica\AppData\Local\Temp\EADE993.exe
C:\Users\Jessica\AppData\Local\Temp\EADE9B2.exe
C:\Users\Jessica\AppData\Local\Temp\EADE9D1.exe
C:\Users\Jessica\AppData\Local\Temp\EADEA1F.exe
C:\Users\Jessica\AppData\Local\Temp\EADEA3E.exe
C:\Users\Jessica\AppData\Local\Temp\EADEA6D.exe
C:\Users\Jessica\AppData\Local\Temp\EADEA7D.exe
C:\Users\Jessica\AppData\Local\Temp\EADEACB.exe
C:\Users\Jessica\AppData\Local\Temp\EADEADA.exe
C:\Users\Jessica\AppData\Local\Temp\EADEAF.exe
C:\Users\Jessica\AppData\Local\Temp\EADEB76.exe
C:\Users\Jessica\AppData\Local\Temp\EADEBC4.exe
C:\Users\Jessica\AppData\Local\Temp\EADEC12.exe
C:\Users\Jessica\AppData\Local\Temp\EADEC22.exe
C:\Users\Jessica\AppData\Local\Temp\EADEC31.exe
C:\Users\Jessica\AppData\Local\Temp\EADEC8F.exe
C:\Users\Jessica\AppData\Local\Temp\EADECAE.exe
C:\Users\Jessica\AppData\Local\Temp\EADECAF.exe
C:\Users\Jessica\AppData\Local\Temp\EADECCE.exe
C:\Users\Jessica\AppData\Local\Temp\EADECE.exe
C:\Users\Jessica\AppData\Local\Temp\EADECED.exe
C:\Users\Jessica\AppData\Local\Temp\EADED1C.exe
C:\Users\Jessica\AppData\Local\Temp\EADED69.exe
C:\Users\Jessica\AppData\Local\Temp\EADED98.exe
C:\Users\Jessica\AppData\Local\Temp\EADEDD7.exe
C:\Users\Jessica\AppData\Local\Temp\EADEDF6.exe
C:\Users\Jessica\AppData\Local\Temp\EADEE25.exe
C:\Users\Jessica\AppData\Local\Temp\EADEE34.exe
C:\Users\Jessica\AppData\Local\Temp\EADEE44.exe
C:\Users\Jessica\AppData\Local\Temp\EADEEA1.exe
C:\Users\Jessica\AppData\Local\Temp\EADEEE.exe
C:\Users\Jessica\AppData\Local\Temp\EADEEEF.exe
C:\Users\Jessica\AppData\Local\Temp\EADEEFF.exe
C:\Users\Jessica\AppData\Local\Temp\EADEF3E.exe
C:\Users\Jessica\AppData\Local\Temp\EADF066.exe
C:\Users\Jessica\AppData\Local\Temp\EADF0A4.exe
C:\Users\Jessica\AppData\Local\Temp\EADF0A5.exe
C:\Users\Jessica\AppData\Local\Temp\EADF0D.exe
C:\Users\Jessica\AppData\Local\Temp\EADF111.exe
C:\Users\Jessica\AppData\Local\Temp\EADF112.exe
C:\Users\Jessica\AppData\Local\Temp\EADF17F.exe
C:\Users\Jessica\AppData\Local\Temp\EADF180.exe
C:\Users\Jessica\AppData\Local\Temp\EADF20B.exe
C:\Users\Jessica\AppData\Local\Temp\EADF269.exe
C:\Users\Jessica\AppData\Local\Temp\EADF2A7.exe
C:\Users\Jessica\AppData\Local\Temp\EADF314.exe
C:\Users\Jessica\AppData\Local\Temp\EADF362.exe
C:\Users\Jessica\AppData\Local\Temp\EADF366.exe
C:\Users\Jessica\AppData\Local\Temp\EADF3FF.exe
C:\Users\Jessica\AppData\Local\Temp\EADF42D.exe
C:\Users\Jessica\AppData\Local\Temp\EADF44C.exe
C:\Users\Jessica\AppData\Local\Temp\EADF4B.exe
C:\Users\Jessica\AppData\Local\Temp\EADF4BA.exe
C:\Users\Jessica\AppData\Local\Temp\EADF4E8.exe
C:\Users\Jessica\AppData\Local\Temp\EADF517.exe
C:\Users\Jessica\AppData\Local\Temp\EADF556.exe
C:\Users\Jessica\AppData\Local\Temp\EADF5C3.exe
C:\Users\Jessica\AppData\Local\Temp\EADF64F.exe
C:\Users\Jessica\AppData\Local\Temp\EADF739.exe
C:\Users\Jessica\AppData\Local\Temp\EADF758.exe
C:\Users\Jessica\AppData\Local\Temp\EADF778.exe
C:\Users\Jessica\AppData\Local\Temp\EADF7D5.exe
C:\Users\Jessica\AppData\Local\Temp\EADF7E5.exe
C:\Users\Jessica\AppData\Local\Temp\EADF804.exe
C:\Users\Jessica\AppData\Local\Temp\EADF805.exe
C:\Users\Jessica\AppData\Local\Temp\EADF814.exe
C:\Users\Jessica\AppData\Local\Temp\EADF833.exe
C:\Users\Jessica\AppData\Local\Temp\EADF862.exe
C:\Users\Jessica\AppData\Local\Temp\EADF871.exe
C:\Users\Jessica\AppData\Local\Temp\EADF881.exe
C:\Users\Jessica\AppData\Local\Temp\EADF8A0.exe
C:\Users\Jessica\AppData\Local\Temp\EADF8BF.exe
C:\Users\Jessica\AppData\Local\Temp\EADF8D.exe
C:\Users\Jessica\AppData\Local\Temp\EADFA26.exe
C:\Users\Jessica\AppData\Local\Temp\EADFA36.exe
C:\Users\Jessica\AppData\Local\Temp\EADFA9.exe
C:\Users\Jessica\AppData\Local\Temp\EADFAA4.exe
C:\Users\Jessica\AppData\Local\Temp\EADFAC2.exe
C:\Users\Jessica\AppData\Local\Temp\EADFAD2.exe
C:\Users\Jessica\AppData\Local\Temp\EADFAE1.exe
C:\Users\Jessica\AppData\Local\Temp\EADFB4E.exe
C:\Users\Jessica\AppData\Local\Temp\EADFB5E.exe
C:\Users\Jessica\AppData\Local\Temp\EADFB8.exe
C:\Users\Jessica\AppData\Local\Temp\EADFB8D.exe
C:\Users\Jessica\AppData\Local\Temp\EADFB9C.exe
C:\Users\Jessica\AppData\Local\Temp\EADFBBC.exe
C:\Users\Jessica\AppData\Local\Temp\EADFCA6.exe
C:\Users\Jessica\AppData\Local\Temp\EADFD03.exe
C:\Users\Jessica\AppData\Local\Temp\EADFD22.exe
C:\Users\Jessica\AppData\Local\Temp\EADFD32.exe
C:\Users\Jessica\AppData\Local\Temp\EADFD51.exe
C:\Users\Jessica\AppData\Local\Temp\EADFD70.exe
C:\Users\Jessica\AppData\Local\Temp\EADFD71.exe
C:\Users\Jessica\AppData\Local\Temp\EADFE7A.exe
C:\Users\Jessica\AppData\Local\Temp\EADFE7B.exe
C:\Users\Jessica\AppData\Local\Temp\EADFE89.exe
C:\Users\Jessica\AppData\Local\Temp\EADFE99.exe
C:\Users\Jessica\AppData\Local\Temp\EADFEC8.exe
C:\Users\Jessica\AppData\Local\Temp\EADFED9.exe
C:\Users\Jessica\AppData\Local\Temp\EADFF16.exe
C:\Users\Jessica\AppData\Local\Temp\EADFF35.exe
C:\Users\Jessica\AppData\Local\Temp\EADFF93.exe
C:\Users\Jessica\AppData\Local\Temp\EADFFA2.exe
C:\Users\Jessica\AppData\Local\Temp\EADFFC1.exe
C:\Users\Jessica\AppData\Local\Temp\EADFFE0.exe
C:\Users\Jessica\AppData\Local\Temp\EADFFF0.exe
C:\Users\Jessica\AppData\Local\Temp\IcqUpdater.exe
C:\Users\Jessica\AppData\Local\Temp\IminentSetup.exe
C:\Users\Jessica\AppData\Local\Temp\installerdll109403.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll109965.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll111213.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll120073.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll1229818.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll125144.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll125487.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll126126.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll126142.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll126672.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll127203.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll127593.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll128919.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll131555.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll132632.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll133302.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll138794.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll138918.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll143115.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll144737.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll146001.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll155938.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll161975.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll163707.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll167342.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll176671.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll176749.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll200102.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll200227.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll254422.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll275965.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll292720.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll306791.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll343841.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll345713.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll369410.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll491137.dll
C:\Users\Jessica\AppData\Local\Temp\installerdll5760274.dll
C:\Users\Jessica\AppData\Local\Temp\jre-7u45-windows-i586-iftw.exe
C:\Users\Jessica\AppData\Local\Temp\jre-8u31-windows-au.exe
C:\Users\Jessica\AppData\Local\Temp\SearchWithGoogleUpdate.exe
C:\Users\Jessica\AppData\Local\Temp\Setup.exe
C:\Users\Jessica\AppData\Local\Temp\SkypeSetup.exe
C:\Users\Jessica\AppData\Local\Temp\UninstallEADM.dll
C:\Users\Jessica\AppData\Local\Temp\ZDATAI50.DLL
C:\Users\Jessica\AppData\Local\Temp\_WUTL95.DLL


==================== Bamital & volsnap Check =================

(There is no automatic fix for files that do not pass verification.)

C:\windows\explorer.exe => File is digitally signed
C:\windows\system32\winlogon.exe => File is digitally signed
C:\windows\system32\wininit.exe => File is digitally signed
C:\windows\system32\svchost.exe => File is digitally signed
C:\windows\system32\services.exe => File is digitally signed
C:\windows\system32\User32.dll => File is digitally signed
C:\windows\system32\userinit.exe => File is digitally signed
C:\windows\system32\rpcss.dll => File is digitally signed
C:\windows\system32\Drivers\volsnap.sys => File is digitally signed


LastRegBack: 2014-10-23 17:07

==================== End Of Log ============================
         
--- --- ---

--- --- ---

 

Themen zu Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)
anleitung, code, dvdvideosoft ltd., eingeschränkt, firefox, internetverbindung, klicke, laptop, links, mcafee, neue, neuen, nicht mehr, problem, seite, startseite, suche, trojaner, umgeleitet, verbindung, webseiten, werbung, wichtig, windows, windows 7, wlan




Ähnliche Themen: Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)


  1. Windows 7 Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 07.09.2015 (10)
  2. Windows 7: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 19.08.2015 (11)
  3. Windows 7: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 15.07.2015 (19)
  4. Windows 7: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 24.04.2015 (31)
  5. Windows 7 : Webseiten sind von werbe adds besetzt und werden ständig zu pop ups umgeleitet
    Log-Analyse und Auswertung - 31.03.2015 (17)
  6. Windows 8.1: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 13.01.2015 (8)
  7. Windows 7: Webseiten werden auf Werbung umgeleitet.
    Plagegeister aller Art und deren Bekämpfung - 25.11.2014 (9)
  8. Windows 7: Webseiten werden auf Werbung umgeleitet.
    Log-Analyse und Auswertung - 12.11.2014 (8)
  9. Windows 7: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 11.09.2014 (13)
  10. Windows 7: Internet Explorer startet automatisch Werbung/ Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 27.07.2014 (7)
  11. Windows 7: Webseiten werden auf Werbung umgeleitet; ständig erscheinende Werbe-Pop-Ups und blau markierte Wörter
    Log-Analyse und Auswertung - 03.07.2014 (18)
  12. Windows 7: Webseiten werden auf Werbung umgeleitet, dauernd neue Tabs und Seiten ohne das ich was mache
    Log-Analyse und Auswertung - 24.06.2014 (35)
  13. Windows 7: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 19.05.2014 (15)
  14. Windows 7: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 17.05.2014 (7)
  15. Windows 7: Webseiten werden auf werbung umgeleitet
    Log-Analyse und Auswertung - 27.10.2013 (9)
  16. Windows 7: Webseiten werden auf Werbung umgeleitet.
    Plagegeister aller Art und deren Bekämpfung - 12.09.2013 (3)
  17. Windows 8: Webseiten werden auf Werbung umgeleitet
    Log-Analyse und Auswertung - 24.08.2013 (5)

Zum Thema Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs) - Hallo, ich suche Hilfe bei meinem Problem mit dem Browser. Ich habe einen Firefox (v35.0.1). Die Startseite lässt sich nicht mehr umstellen, sie springt immer auf Code: Alles auswählen Aufklappen - Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)...
Archiv
Du betrachtest: Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs) auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.