|
Log-Analyse und Auswertung: Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
22.02.2015, 14:09 | #1 |
| Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs) Hallo, ich suche Hilfe bei meinem Problem mit dem Browser. Ich habe einen Firefox (v35.0.1). Die Startseite lässt sich nicht mehr umstellen, sie springt immer auf Code:
ATTFilter hxxp://search.fbdownloader.com/?channel=fpo_nt Außerdem würde ich gern wissen, ob ich einen Trojaner oÄ. auf diesem Laptop habe und mich so vielleicht jemand ausspionieren kann. Ich habe die Anleitung für Hilfesuchende nach bestem Wissen befolgt. Ich habe McAfee installiert, wo ich nicht genau weiß ob ich das richtig ausgeschaltet habe (und falls nicht, wie ich das mache). Hier meine Logs: (weil zu lang, in neuen posts) Im Vorraus schon vielen Dank für die Hilfe FRST Logfile: FRST Logfile: Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 21-02-2015 Ran by Jessica (administrator) on JESSICA-PC on 22-02-2015 12:57:18 Running from C:\Users\Jessica\Downloads Loaded Profiles: Jessica (Available profiles: Jessica) Platform: Microsoft Windows 7 Home Premium Service Pack 1 (X86) OS Language: Deutsch (Deutschland) Internet Explorer Version 11 (Default browser: FF) Boot Mode: Normal Tutorial for Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/ ==================== Processes (Whitelisted) ================= (If an entry is included in the fixlist, the process will be closed. The file will not be moved.) (NVIDIA Corporation) C:\Windows\System32\nvvsvc.exe (NVIDIA Corporation) C:\Windows\System32\nvvsvc.exe () C:\Program Files\ICQ6Toolbar\ICQ Service.exe (McAfee, Inc.) C:\Program Files\McAfee\SiteAdvisor\McSACore.exe (McAfee, Inc.) C:\Windows\System32\mfevtps.exe () C:\Program Files\Samsung Casual Games\GameConsole\OberonGameConsoleService.exe () C:\Windows\System32\Rezip.exe () C:\Program Files\CyberLink\Shared files\RichVideo.exe (Iminent) C:\Program Files\Common Files\Umbrella\umbrella.exe () C:\Program Files\Web Assistant\ExtensionUpdaterService.exe (McAfee, Inc.) C:\Program Files\McAfee\MSC\McAPExe.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\AMCore\mcshield.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\SystemCore\mfefire.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe (Microsoft Corporation) C:\Windows\System32\rundll32.exe (Samsung Electronics Co., Ltd.) C:\Program Files\Samsung\EasySpeedUpManager\EasySpeedUpManager.exe (Samsung Electronics Co., Ltd.) C:\Program Files\Samsung\Easy Display Manager\dmhkcore.exe (SAMSUNG Electronics) C:\Program Files\Samsung\Samsung Support Center\SSCKbdHk.exe (SEC) C:\Program Files\Samsung\Samsung Recovery Solution 4\WCScheduler.exe (Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe (Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe (CyberLink) C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe (CyberLink Corp.) C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe (Iminent) C:\Program Files\Iminent\Iminent.exe (Iminent) C:\Program Files\Iminent\Iminent.Messengers.exe (Oracle Corporation) C:\Program Files\Common Files\Java\Java Update\jusched.exe (Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPHelper.exe (McAfee, Inc.) C:\Program Files\McAfee Security Scan\3.8.150\SSScheduler.exe (Dropbox, Inc.) C:\Users\Jessica\AppData\Roaming\Dropbox\bin\Dropbox.exe (Microsoft Corporation) C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE (McAfee, Inc.) C:\Program Files\Common Files\McAfee\CSP\1.3.336.0\McCSPServiceHost.exe (McAfee, Inc.) C:\Program Files\Common Files\McAfee\Platform\McUICnt.exe (Mozilla Corporation) C:\Program Files\Mozilla Firefox\firefox.exe (McAfee, Inc.) C:\Program Files\McAfee\SiteAdvisor\saUI.exe (McAfee, Inc.) C:\Program Files\McAfee\VirusScan\mcods.exe (Microsoft Corporation) C:\Windows\System32\rundll32.exe () C:\Users\Jessica\Downloads\Defogger.exe ==================== Registry (Whitelisted) ================== (If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.) HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe [8120864 2009-12-15] (Realtek Semiconductor) HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1578280 2009-10-10] (Synaptics Incorporated) HKLM\...\Run: [UpdateLBPShortCut] => C:\Program Files\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe [222504 2009-05-19] (CyberLink Corp.) HKLM\...\Run: [CLMLServer] => C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe [103720 2009-06-03] (CyberLink) HKLM\...\Run: [UpdateP2GoShortCut] => C:\Program Files\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe [222504 2009-05-19] (CyberLink Corp.) HKLM\...\Run: [UpdatePDRShortCut] => C:\Program Files\CyberLink\PowerDirector\MUITransfer\MUIStartMenu.exe [222504 2008-01-04] (CyberLink Corp.) HKLM\...\Run: [RemoteControl8] => C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe [91432 2009-04-15] (CyberLink Corp.) HKLM\...\Run: [PDVD8LanguageShortcut] => C:\Program Files\CyberLink\PowerDVD8\Language\Language.exe [50472 2009-04-15] (CyberLink Corp.) HKLM\...\Run: [UpdatePPShortCut] => C:\Program Files\CyberLink\PowerProducer\MUITransfer\MUIStartMenu.exe [218408 2008-12-03] (CyberLink Corp.) HKLM\...\Run: [UpdatePSTShortCut] => C:\Program Files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe [210216 2009-07-21] (CyberLink Corp.) HKLM\...\Run: [APLangApp] => C:\Program Files\AnyPC Client\APLangApp.exe [13312 2009-11-20] (DoctorSoft) HKLM\...\Run: [NvCplDaemon] => RUNDLL32.EXE C:\windows\system32\NvCpl.dll,NvStartup HKLM\...\Run: [UCam_Menu] => C:\Program Files\CyberLink\YouCam\MUITransfer\MUIStartMenu.exe [222504 2009-05-19] (CyberLink Corp.) HKLM\...\Run: [mcui_exe] => C:\Program Files\McAfee.com\Agent\mcagent.exe [514832 2014-10-06] (McAfee, Inc.) HKLM\...\Run: [Iminent] => C:\Program Files\Iminent\Iminent.exe [1074736 2013-07-02] (Iminent) HKLM\...\Run: [IminentMessenger] => C:\Program Files\Iminent\Iminent.Messengers.exe [884784 2013-07-02] (Iminent) HKLM\...\Run: [SunJavaUpdateSched] => C:\Program Files\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation) HKLM\...\Run: [mcpltui_exe] => C:\Program Files\Common Files\McAfee\Platform\mcuicnt.exe [499352 2014-09-17] (McAfee, Inc.) HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [EA Core] => "C:\Program Files\Electronic Arts\EADM\Core.exe" -silent HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [SSync] => C:\Users\Jessica\AppData\Roaming\SSync\SSync.exe [36864 2013-04-09] () HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [OMESupervisor] => C:\Users\Jessica\AppData\Local\omesuperv.exe [2239256 2013-12-24] () HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [swg] => C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2010-03-05] (Google Inc.) HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [SCheck] => C:\Users\Jessica\AppData\Roaming\SCheck\SCheck.exe [37376 2013-12-09] () HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [Snoozer] => C:\Users\Jessica\AppData\Roaming\Snz\Snz.exe [1641116 2015-02-18] () HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [DataMgr] => C:\Users\Jessica\AppData\Roaming\DataMgr\DataMgr.exe [168848 2013-06-26] (HTTO Group, Ltd.) HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Run: [Intermediate] => C:\Users\Jessica\AppData\Roaming\Intermediate\Intermediate.exe [37376 2013-12-09] () HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\MountPoints2: F - F:\setup_vmc_lite.exe /checkApplicationPresence HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\MountPoints2: {a253fd9b-317b-11df-a1e6-806e6f6e6963} - E:\Autorun.exe HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\MountPoints2: {faa0af6a-d47c-11df-8cb9-00245487e561} - F:\setup_vmc_lite.exe /checkApplicationPresence HKU\S-1-5-18\...\RunOnce: [SPReview] => C:\windows\System32\SPReview\SPReview.exe [280576 2013-03-20] (Microsoft Corporation) Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\McAfee Security Scan Plus.lnk ShortcutTarget: McAfee Security Scan Plus.lnk -> C:\Program Files\McAfee Security Scan\3.8.150\SSScheduler.exe (McAfee, Inc.) Startup: C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk ShortcutTarget: Dropbox.lnk -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.) Startup: C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2007 Bildschirmausschnitt- und Startprogramm.lnk ShortcutTarget: OneNote 2007 Bildschirmausschnitt- und Startprogramm.lnk -> C:\Program Files\Microsoft Office\Office12\ONENOTEM.EXE (Microsoft Corporation) ShellIconOverlayIdentifiers: [DropboxExt1] -> {FB314ED9-A251-47B7-93E1-CDD82E34AF8B} => C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) ShellIconOverlayIdentifiers: [DropboxExt2] -> {FB314EDA-A251-47B7-93E1-CDD82E34AF8B} => C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) ShellIconOverlayIdentifiers: [DropboxExt3] -> {FB314EDB-A251-47B7-93E1-CDD82E34AF8B} => C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) ==================== Internet (Whitelisted) ==================== (If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.) HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank HKU\S-1-5-21-2339853823-2107313754-116825072-1001\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.google.com/ig/redirectdomain?brand=smsn&bmod=smsn HKU\S-1-5-21-2339853823-2107313754-116825072-1001\Software\Microsoft\Internet Explorer\Main,ICQ Search = hxxp://search.icq.com/search/results.php?q={searchTerms}&ch_id=osd HKU\S-1-5-21-2339853823-2107313754-116825072-1001\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://search.fbdownloader.com/?channel=fpo URLSearchHook: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 - Default Value = {855F3B16-6D32-4fe6-8A56-BBB695989046} URLSearchHook: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 - ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Program Files\ICQ6Toolbar\ICQToolBar.dll (ICQ) URLSearchHook: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 - McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.) SearchScopes: HKLM -> DefaultScope {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7SMSN SearchScopes: HKLM -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7SMSN SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> DefaultScope {95B7759C-8C7F-4BF1-B163-73684A933233} URL = hxxp://search.fbdownloader.com/search.php?channel=fpo&q={searchTerms} SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {6552C7DD-90A4-4387-B795-F8F96747DE19} URL = hxxp://search.icq.com/search/results.php?q={searchTerms}&ch_id=osd SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {67A2568C-7A0A-4EED-AECC-B5405DE63B64} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7SMSN_de___DE401 SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {95B7759C-8C7F-4BF1-B163-73684A933233} URL = hxxp://search.fbdownloader.com/search.php?channel=fpo&q={searchTerms} SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {BC72CD84-CE4D-47EC-BBFE-F8F58A00E455} URL = https://de.search.yahoo.com/search?fr=mcafee&type=B011DE532D20140115&p={SearchTerms} SearchScopes: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> {CFF4DB9B-135F-47c0-9269-B4C6572FD61A} URL = hxxp://mystart.incredibar.com/mb139/?search={searchTerms}&loc=IB_DS&a=6OyBVFejmS&i=26 BHO: MSS+ Identifier -> {0E8A89AD-95D7-40EB-8D9D-083EF7066A01} -> C:\Program Files\McAfee Security Scan\3.8.150\McAfeeMSS_IE.dll (McAfee, Inc.) BHO: Adobe PDF Link Helper -> {18DF081C-E8AD-4283-A596-FA578C2EBDC3} -> C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (Adobe Systems Incorporated) BHO: McAfee Phishing Filter -> {27B4851A-3207-45A2-B947-BE8AFE6163AB} -> c:\progra~1\mcafee\msk\mskapbho.dll No File BHO: DownloadnSave Class -> {3013CC39-DFA7-4D19-A172-3FE22E46D439} -> C:\ProgramData\DownloadnSave\bhoclass.dll () BHO: Web Assistant -> {336D0C35-8A85-403a-B9D2-65C292C39087} -> C:\Program Files\Web Assistant\Extension32.dll () BHO: PiccShare BHO -> {553318DA-D010-469E-84B1-496563CAE1C0} -> C:\Users\Jessica\AppData\Local\ext_piccshare\ext_piccshare.dll (HTTO Group, Ltd) BHO: No Name -> {5C255C8A-E604-49b4-9D64-90988571CECB} -> No File BHO: Incredibar.com Helper Object -> {6E13DDE1-2B6E-46CE-8B66-DC8BF36F6B99} -> C:\Program Files\Incredibar.com\incredibar\1.5.11.14\bh\incredibar.dll (Montera Technologeis LTD) BHO: Java(tm) Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation) BHO: Windows Live Anmelde-Hilfsprogramm -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation) BHO: IMinent WebBooster (BHO) -> {A09AB6EB-31B5-454C-97EC-9B294D92EE2A} -> C:\Program Files\Iminent\Minibar.InternetExplorer.BHOx86.dll (SIEN) BHO: Google Toolbar Helper -> {AA58ED58-01DD-4d91-8333-CF10577473F7} -> C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.) BHO: Skype Plug-In -> {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} -> C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.) BHO: McAfee SiteAdvisor BHO -> {B164E929-A1B6-4A06-B104-2CD0E90A88FF} -> c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.) BHO: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation) BHO: ChromeFrame BHO -> {ECB3C477-1A0A-44BD-BB57-78F9EFE34FA7} -> C:\Program Files\Google\Chrome Frame\Application\32.0.1700.107\npchrome_frame.dll (Google Inc.) BHO: DVDVideoSoft WebPageAdjuster Class -> {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} -> C:\Program Files\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll (DVDVideoSoft Ltd.) Toolbar: HKLM - McAfee SiteAdvisor Toolbar - {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.) Toolbar: HKLM - Incredibar Toolbar - {F9639E4A-801B-4843-AEE3-03D9DA199E77} - C:\Program Files\Incredibar.com\incredibar\1.5.11.14\incredibarTlbr.dll (Montera Technologeis LTD) Toolbar: HKLM - ICQToolBar - {855F3B16-6D32-4FE6-8A56-BBB695989046} - C:\Program Files\ICQ6Toolbar\ICQToolBar.dll (ICQ) Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.) Toolbar: HKU\S-1-5-21-2339853823-2107313754-116825072-1001 -> Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.) DPF: {02BCC737-B171-4746-94C9-0D8A0B2C0089} hxxp://office.microsoft.com/sites/production/ieawsdc32.cab DPF: {C345E174-3E87-4F41-A01C-B066A90A49B4} hxxp://trial.trymicrosoftoffice.com/trialoaa/buymsoffice_assets/framework/microsoft/wrc32.ocx Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.) Handler: gcf - {9875BFAF-B04D-445E-8A69-BE36838CDE3E} - C:\Program Files\Google\Chrome Frame\Application\32.0.1700.107\npchrome_frame.dll (Google Inc.) Handler: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\Program Files\Windows Live\Messenger\msgrapp.14.0.8089.0726.dll (Microsoft Corporation) Handler: ms-itss - {0A9007C0-4076-11D3-8789-0000F8105754} - C:\Program Files\Common Files\Microsoft Shared\Information Retrieval\msitss.dll (Microsoft Corporation) Handler: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\Program Files\Windows Live\Messenger\msgrapp.14.0.8089.0726.dll (Microsoft Corporation) Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\Program Files\McAfee\SiteAdvisor\McIEPlg.dll (McAfee, Inc.) Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.) Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files\Common Files\Skype\Skype4COM.dll (Skype Technologies) Filter: application/x-mfe-ipt - {3EF5086B-5478-4598-A054-786C45D75692} - c:\Program Files\McAfee\MSC\McSnIePl.dll (McAfee, Inc.) Tcpip\Parameters: [DhcpNameServer] 192.168.178.1 FireFox: ======== FF ProfilePath: C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default FF DefaultSearchEngine: Search FF DefaultSearchUrl: hxxp://search.fbdownloader.com/search.php?channel=fpo&q= FF SearchEngineOrder.1: Sichere Suche FF SelectedSearchEngine: Search FF Homepage: https://www.google.de/?gws_rd=ssl FF Keyword.URL: hxxp://search.fbdownloader.com/search.php?channel=fpo&q= FF Plugin: @adobe.com/FlashPlayer -> C:\windows\system32\Macromed\Flash\NPSWF32_16_0_0_305.dll () FF Plugin: @Google.com/GoogleEarthPlugin -> C:\Program Files\Google\Google Earth\plugin\npgeplugin.dll (Google) FF Plugin: @java.com/DTPlugin,version=10.45.2 -> C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation) FF Plugin: @java.com/JavaPlugin,version=10.45.2 -> C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation) FF Plugin: @mcafee.com/MSC,version=10 -> c:\PROGRA~1\mcafee\msc\NPMCSN~1.DLL () FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> C:\Program Files\Microsoft Silverlight\3.0.40624.0\npctrl.dll ( Microsoft Corporation) FF Plugin: @microsoft.com/OfficeLive,version=1.3 -> C:\Program Files\Microsoft\Office Live\npOLW.dll (Microsoft Corp.) FF Plugin: @microsoft.com/WLPG,version=14.0.8081.0709 -> C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation) FF Plugin: @tools.google.com/Google Update;version=3 -> C:\Program Files\Google\Update\1.3.26.9\npGoogleUpdate3.dll (Google Inc.) FF Plugin: @tools.google.com/Google Update;version=9 -> C:\Program Files\Google\Update\1.3.26.9\npGoogleUpdate3.dll (Google Inc.) FF Plugin: Adobe Reader -> C:\Program Files\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.) FF Plugin HKU\S-1-5-21-2339853823-2107313754-116825072-1001: bebomedia.com/OfferMosquitoIEHelper -> C:\Users\Jessica\AppData\Local\ext_offermosquito\npOfferMosquitoIEHelper.dll (Bebo Media Ltd) FF Plugin ProgramFiles/Appdata: C:\Program Files\mozilla firefox\plugins\nppdf32.dll (Adobe Systems Inc.) FF SearchPlugin: C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\searchplugins\fbdownloader_search.xml FF SearchPlugin: C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\searchplugins\search.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\McSiteAdvisor.xml FF Extension: Iminent - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\firefoxmini@go.im.xpi [2014-08-10] FF Extension: OfferMosquito - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\om@offermosquito.com.xpi [2013-12-19] FF Extension: Simple New Tab - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\snt@simplenewtab.com.xpi [2014-12-24] FF Extension: Adblock Plus - C:\Users\Jessica\AppData\Roaming\Mozilla\Firefox\Profiles\xqn19gsg.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2014-03-29] FF HKLM\...\Firefox\Extensions: [{4ED1F68A-5463-4931-9384-8FFF5ED91D92}] - C:\Program Files\McAfee\SiteAdvisor FF Extension: McAfee SiteAdvisor - C:\Program Files\McAfee\SiteAdvisor [2010-03-05] FF HKLM\...\Firefox\Extensions: [{336D0C35-8A85-403a-B9D2-65C292C39087}] - C:\Program Files\Web Assistant\Firefox FF Extension: Web Assistant - C:\Program Files\Web Assistant\Firefox [2012-05-15] FF HKLM\...\Firefox\Extensions: [{ACAA314B-EEBA-48e4-AD47-84E31C44796C}] - C:\Program Files\Common Files\DVDVideoSoft\plugins\ff FF Extension: DVDVideoSoft YouTube MP3 and Video Download - C:\Program Files\Common Files\DVDVideoSoft\plugins\ff [2013-02-14] FF HKLM\...\Thunderbird\Extensions: [msktbird@mcafee.com] - C:\Program Files\McAfee\MSK FF Extension: McAfee Anti-Spam Thunderbird Extension - C:\Program Files\McAfee\MSK [2010-03-05] FF HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Firefox\Extensions: [{e4f94d1e-2f53-401e-8885-681602c0ddd8}] - C:\ProgramData\McAfee Security Scan\Extensions\{e4f94d1e-2f53-401e-8885-681602c0ddd8}.xpi FF Extension: No Name - C:\ProgramData\McAfee Security Scan\Extensions\{e4f94d1e-2f53-401e-8885-681602c0ddd8}.xpi [2014-04-04] Chrome: ======= CHR StartupUrls: Default -> "http:\/\/search.fbdownloader.com\/?channel=fpo" CHR DefaultSuggestURL: Default -> CHR Plugin: (Remoting Viewer) - internal-remoting-viewer CHR Plugin: (Native Client) - C:\Program Files\Google\Chrome\Application\40.0.2214.111\ppGoogleNaClPluginChrome.dll No File CHR Plugin: (Chrome PDF Viewer) - C:\Program Files\Google\Chrome\Application\40.0.2214.111\pdf.dll () CHR Plugin: (Shockwave Flash) - C:\Program Files\Google\Chrome\Application\40.0.2214.111\gcswf32.dll No File CHR Plugin: (Shockwave Flash) - C:\windows\system32\Macromed\Flash\NPSWF32_11_2_202_235.dll No File CHR Plugin: (Injovo Extension Plugin) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\dlnembnfbcpjnepmfjmngjenhhajpdfd\2.0.0.430_0\npbrowserext.dll No File CHR Plugin: (McAfee SiteAdvisor) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\fheoggkfdfchfphceeifdbepaooicaho\3.41.123.2_0\McChPlg.dll No File CHR Plugin: (McAfee SiteAdvisor) - C:\Program Files\McAfee\SiteAdvisor\npmcffplg32.dll (McAfee, Inc.) CHR Plugin: (Adobe Acrobat) - C:\Program Files\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll No File CHR Plugin: (Google Earth Plugin) - C:\Program Files\Google\Google Earth\plugin\npgeplugin.dll (Google) CHR Plugin: (Google Update) - C:\Program Files\Google\Update\1.3.21.111\npGoogleUpdate3.dll No File CHR Plugin: (Silverlight Plug-In) - C:\Program Files\Microsoft Silverlight\3.0.40624.0\npctrl.dll ( Microsoft Corporation) CHR Plugin: (Microsoft Office Live Plug-in for Firefox) - C:\Program Files\Microsoft\Office Live\npOLW.dll (Microsoft Corp.) CHR Plugin: (Windows Live® Photo Gallery) - C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation) CHR Plugin: (McAfee SecurityCenter) - c:\progra~1\mcafee\msc\npmcsn~1.dll () CHR Profile: C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default CHR Extension: (Love 3) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\agljhkifkkcfncajnfokkhioadolnkho [2011-10-25] CHR Extension: (YouTube) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2011-12-16] CHR Extension: (Google Search) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2011-12-16] CHR Extension: (SiteAdvisor) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\fheoggkfdfchfphceeifdbepaooicaho [2011-10-24] CHR Extension: (OfferMosquito) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\gbmdkmlcnbapgegninelmjbfibaghdmk [2013-07-20] CHR Extension: (Iminent) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\igdhbblpcellaljokkpfhcjlagemhgjl [2013-07-23] CHR Extension: (Any New Tab) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfenflmklmpohipcckmagnmbmbibnolo [2013-12-07] CHR Extension: (Gmail) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2011-12-16] CHR Extension: (Simple New Tab) - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\Extensions\pmgkeimkiojpjcoiiipekfjaopchhjga [2013-12-25] CHR HKLM\...\Chrome\Extension: [bopakagnckmlgajfccecajhnimjiiedh] - hxxp://clients2.google.com/service/update2/crx CHR HKLM\...\Chrome\Extension: [dlnembnfbcpjnepmfjmngjenhhajpdfd] - C:\Program Files\Web Assistant\source.crx [2012-05-15] CHR HKLM\...\Chrome\Extension: [ebdkldcjjkfbcjdhfkmdlnppdmjdpnoo] - C:\ProgramData\DownloadnSave\ebdkldcjjkfbcjdhfkmdlnppdmjdpnoo.crx [2012-05-15] CHR HKLM\...\Chrome\Extension: [fheoggkfdfchfphceeifdbepaooicaho] - C:\Program Files\McAfee\SiteAdvisor\McChPlg.crx [2015-02-14] CHR HKU\S-1-5-21-2339853823-2107313754-116825072-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [docfnddcclkgokdfpnmngpiliiachclb] - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\ext_piccshare\ext_piccshare.crx [2013-06-26] CHR HKU\S-1-5-21-2339853823-2107313754-116825072-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [gbmdkmlcnbapgegninelmjbfibaghdmk] - C:\Users\Jessica\AppData\Local\Google\Chrome\User Data\Default\ext_offermosquito\ext_offermosquito.crx [2013-12-19] CHR HKU\S-1-5-21-2339853823-2107313754-116825072-1001\SOFTWARE\Google\Chrome\Extensions\...\Chrome\Extension: [nikpibnbobmbdbheedjfogjlikpgpnhp] - C:\Program Files\Common Files\DVDVideoSoft\plugins\DVDVideoSoftBrowserExtension.crx [2013-02-14] ========================== Services (Whitelisted) ================= (If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.) R2 HomeNetSvc; C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.) R2 ICQ Service; C:\Program Files\ICQ6Toolbar\ICQ Service.exe [247608 2010-11-21] () R2 McAfee SiteAdvisor Service; C:\Program Files\McAfee\SiteAdvisor\McSACore.exe [132160 2015-02-12] (McAfee, Inc.) R2 McAPExe; C:\Program Files\McAfee\MSC\McAPExe.exe [529216 2014-10-06] (McAfee, Inc.) S3 McComponentHostService; C:\Program Files\McAfee Security Scan\3.8.150\McCHSvc.exe [235696 2014-04-09] (McAfee, Inc.) R2 mccspsvc; C:\Program Files\Common Files\McAfee\CSP\1.3.336.0\McCSPServiceHost.exe [338160 2014-11-21] (McAfee, Inc.) R2 McMPFSvc; C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.) R2 McNaiAnn; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.) R3 McODS; C:\Program Files\McAfee\VirusScan\mcods.exe [471560 2014-12-03] (McAfee, Inc.) R2 mcpltsvc; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.) R2 McProxy; C:\Program Files\Common Files\McAfee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.) R2 mfecore; C:\Program Files\Common Files\McAfee\AMCore\mcshield.exe [661088 2014-11-06] (McAfee, Inc.) R2 mfefire; C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe [171368 2014-10-01] (McAfee, Inc.) R2 mfevtp; C:\windows\system32\mfevtps.exe [179608 2014-10-01] (McAfee, Inc.) R2 MSK80Service; C:\Program Files\Common Files\Mcafee\Platform\McSvcHost\McSvHost.exe [286672 2014-10-31] (McAfee, Inc.) R2 OberonGameConsoleService; C:\Program Files\Samsung Casual Games\GameConsole\OberonGameConsoleService.exe [44312 2009-08-13] () R2 Rezip; C:\windows\SYSTEM32\Rezip.exe [311296 2009-03-05] () [File not signed] R2 RichVideo; C:\Program Files\CyberLink\Shared files\RichVideo.exe [247152 2009-07-07] () R2 SProtection; C:\Program Files\Common Files\Umbrella\umbrella.exe [3767936 2014-12-18] (Iminent) R2 Web Assistant Updater; C:\Program Files\Web Assistant\ExtensionUpdaterService.exe [185856 2012-05-01] () [File not signed] S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [680960 2013-05-27] (Microsoft Corporation) ==================== Drivers (Whitelisted) ==================== (If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.) R3 cfwids; C:\windows\System32\drivers\cfwids.sys [62840 2014-10-01] (McAfee, Inc.) S3 HipShieldK; C:\windows\System32\drivers\HipShieldK.sys [147912 2013-09-23] (McAfee, Inc.) R3 mfeapfk; C:\windows\System32\drivers\mfeapfk.sys [135880 2014-10-01] (McAfee, Inc.) R3 mfeavfk; C:\windows\System32\drivers\mfeavfk.sys [238312 2014-10-01] (McAfee, Inc.) S3 mfebopk; C:\windows\System32\drivers\mfebopk.sys [67824 2014-10-01] (McAfee, Inc.) R3 mfefirek; C:\windows\System32\drivers\mfefirek.sys [371712 2014-10-01] (McAfee, Inc.) R0 mfehidk; C:\windows\System32\drivers\mfehidk.sys [575992 2014-10-01] (McAfee, Inc.) R3 mfencbdc; C:\windows\System32\DRIVERS\mfencbdc.sys [352360 2014-09-19] (McAfee, Inc.) S3 mfencrk; C:\windows\System32\DRIVERS\mfencrk.sys [81304 2014-09-19] (McAfee, Inc.) R0 mfewfpk; C:\windows\System32\drivers\mfewfpk.sys [217232 2014-10-01] (McAfee, Inc.) R3 yukonw7; C:\windows\System32\DRIVERS\yk62x86.sys [315392 2009-09-28] () S3 ZTEusbnet; C:\windows\System32\DRIVERS\ZTEusbnet.sys [110592 2009-04-09] (ZTE Corporation) S3 ZTEusbvoice; C:\windows\System32\DRIVERS\ZTEusbvoice.sys [105344 2009-04-09] (ZTE Incorporated) ==================== NetSvcs (Whitelisted) =================== (If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.) ==================== One Month Created Files and Folders ======== (If an entry is included in the fixlist, the file\folder will be moved.) 2015-02-22 12:57 - 2015-02-22 12:58 - 00029242 _____ () C:\Users\Jessica\Downloads\FRST.txt 2015-02-22 12:56 - 2015-02-22 12:57 - 00000000 ____D () C:\FRST 2015-02-22 12:55 - 2015-02-22 12:56 - 00000476 _____ () C:\Users\Jessica\Downloads\defogger_disable.log 2015-02-22 12:55 - 2015-02-22 12:55 - 00000000 _____ () C:\Users\Jessica\defogger_reenable 2015-02-22 12:49 - 2015-02-22 12:49 - 00380416 _____ () C:\Users\Jessica\Downloads\vnrfyu79.exe 2015-02-22 12:48 - 2015-02-22 12:48 - 01126400 _____ (Farbar) C:\Users\Jessica\Downloads\FRST.exe 2015-02-22 12:48 - 2015-02-22 12:48 - 00050477 _____ () C:\Users\Jessica\Downloads\Defogger.exe 2015-02-21 21:16 - 2015-02-21 21:16 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\McAfee 2015-02-18 19:03 - 2015-02-18 19:03 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Snz 2015-02-18 12:42 - 2015-01-23 04:43 - 00620032 _____ (Microsoft Corporation) C:\windows\system32\jscript9diag.dll 2015-02-18 12:42 - 2015-01-23 04:17 - 04300800 _____ (Microsoft Corporation) C:\windows\system32\jscript9.dll 2015-02-14 12:25 - 2015-01-15 08:46 - 00136640 _____ (Microsoft Corporation) C:\windows\system32\Drivers\ksecpkg.sys 2015-02-14 12:25 - 2015-01-15 08:46 - 00067520 _____ (Microsoft Corporation) C:\windows\system32\Drivers\ksecdd.sys 2015-02-14 12:25 - 2015-01-15 08:43 - 00100352 _____ (Microsoft Corporation) C:\windows\system32\sspicli.dll 2015-02-14 12:25 - 2015-01-15 08:43 - 00015872 _____ (Microsoft Corporation) C:\windows\system32\sspisrv.dll 2015-02-14 12:25 - 2015-01-15 08:42 - 01061376 _____ (Microsoft Corporation) C:\windows\system32\lsasrv.dll 2015-02-14 12:25 - 2015-01-15 08:42 - 00050176 _____ (Microsoft Corporation) C:\windows\system32\auditpol.exe 2015-02-14 12:25 - 2015-01-15 08:42 - 00022528 _____ (Microsoft Corporation) C:\windows\system32\lsass.exe 2015-02-14 12:25 - 2015-01-15 08:42 - 00022016 _____ (Microsoft Corporation) C:\windows\system32\secur32.dll 2015-02-14 12:25 - 2015-01-15 08:39 - 00146432 _____ (Microsoft Corporation) C:\windows\system32\msaudite.dll 2015-02-14 12:25 - 2015-01-15 08:39 - 00060416 _____ (Microsoft Corporation) C:\windows\system32\msobjs.dll 2015-02-14 12:25 - 2015-01-15 08:37 - 00686080 _____ (Microsoft Corporation) C:\windows\system32\adtschema.dll 2015-02-14 12:25 - 2015-01-15 05:21 - 00369968 _____ (Microsoft Corporation) C:\windows\system32\Drivers\cng.sys 2015-02-14 12:25 - 2015-01-09 02:45 - 02380288 _____ (Microsoft Corporation) C:\windows\system32\win32k.sys 2015-02-14 12:24 - 2015-02-04 03:54 - 00482304 _____ (Microsoft Corporation) C:\windows\system32\generaltel.dll 2015-02-14 12:24 - 2015-02-04 03:53 - 00767488 _____ (Microsoft Corporation) C:\windows\system32\appraiser.dll 2015-02-14 12:24 - 2015-02-04 03:53 - 00621056 _____ (Microsoft Corporation) C:\windows\system32\invagent.dll 2015-02-14 12:24 - 2015-02-04 03:53 - 00325632 _____ (Microsoft Corporation) C:\windows\system32\devinv.dll 2015-02-14 12:24 - 2015-02-04 03:53 - 00202752 _____ (Microsoft Corporation) C:\windows\system32\aepdu.dll 2015-02-14 12:24 - 2015-02-04 03:53 - 00159744 _____ (Microsoft Corporation) C:\windows\system32\aepic.dll 2015-02-14 12:24 - 2015-02-04 03:49 - 00886784 _____ (Microsoft Corporation) C:\windows\system32\aeinv.dll 2015-02-14 12:24 - 2015-01-28 00:36 - 01167520 _____ (Microsoft Corporation) C:\windows\system32\aitstatic.exe 2015-02-14 12:24 - 2015-01-14 06:44 - 03972544 _____ (Microsoft Corporation) C:\windows\system32\ntkrnlpa.exe 2015-02-14 12:24 - 2015-01-14 06:44 - 03917760 _____ (Microsoft Corporation) C:\windows\system32\ntoskrnl.exe 2015-02-14 12:24 - 2014-11-26 04:32 - 00571904 _____ (Microsoft Corporation) C:\windows\system32\oleaut32.dll 2015-02-14 12:24 - 2014-10-04 02:42 - 03221504 _____ (Microsoft Corporation) C:\windows\system32\mstscax.dll 2015-02-14 12:24 - 2014-10-04 02:42 - 00131584 _____ (Microsoft Corporation) C:\windows\system32\aaclient.dll 2015-02-14 12:23 - 2015-01-14 06:09 - 00342712 _____ (Microsoft Corporation) C:\windows\system32\iedkcs32.dll 2015-02-14 12:23 - 2015-01-12 03:25 - 19740160 _____ (Microsoft Corporation) C:\windows\system32\mshtml.dll 2015-02-14 12:23 - 2015-01-12 03:21 - 02724864 _____ (Microsoft Corporation) C:\windows\system32\mshtml.tlb 2015-02-14 12:23 - 2015-01-12 03:21 - 00004096 _____ (Microsoft Corporation) C:\windows\system32\ieetwcollectorres.dll 2015-02-14 12:23 - 2015-01-12 03:08 - 00503296 _____ (Microsoft Corporation) C:\windows\system32\vbscript.dll 2015-02-14 12:23 - 2015-01-12 03:07 - 00062464 _____ (Microsoft Corporation) C:\windows\system32\iesetup.dll 2015-02-14 12:23 - 2015-01-12 03:07 - 00047616 _____ (Microsoft Corporation) C:\windows\system32\ieetwproxystub.dll 2015-02-14 12:23 - 2015-01-12 03:05 - 00064000 _____ (Microsoft Corporation) C:\windows\system32\MshtmlDac.dll 2015-02-14 12:23 - 2015-01-12 03:02 - 02277888 _____ (Microsoft Corporation) C:\windows\system32\iertutil.dll 2015-02-14 12:23 - 2015-01-12 03:00 - 00047104 _____ (Microsoft Corporation) C:\windows\system32\jsproxy.dll 2015-02-14 12:23 - 2015-01-12 02:59 - 00030720 _____ (Microsoft Corporation) C:\windows\system32\iernonce.dll 2015-02-14 12:23 - 2015-01-12 02:57 - 00478208 _____ (Microsoft Corporation) C:\windows\system32\ieui.dll 2015-02-14 12:23 - 2015-01-12 02:55 - 00115712 _____ (Microsoft Corporation) C:\windows\system32\ieUnatt.exe 2015-02-14 12:23 - 2015-01-12 02:55 - 00102912 _____ (Microsoft Corporation) C:\windows\system32\ieetwcollector.exe 2015-02-14 12:23 - 2015-01-12 02:48 - 00667648 _____ (Microsoft Corporation) C:\windows\system32\MsSpellCheckingFacility.exe 2015-02-14 12:23 - 2015-01-12 02:45 - 00418304 _____ (Microsoft Corporation) C:\windows\system32\dxtmsft.dll 2015-02-14 12:23 - 2015-01-12 02:40 - 00060416 _____ (Microsoft Corporation) C:\windows\system32\JavaScriptCollectionAgent.dll 2015-02-14 12:23 - 2015-01-12 02:36 - 00168960 _____ (Microsoft Corporation) C:\windows\system32\msrating.dll 2015-02-14 12:23 - 2015-01-12 02:35 - 00076288 _____ (Microsoft Corporation) C:\windows\system32\mshtmled.dll 2015-02-14 12:23 - 2015-01-12 02:33 - 00285696 _____ (Microsoft Corporation) C:\windows\system32\dxtrans.dll 2015-02-14 12:23 - 2015-01-12 02:23 - 02052608 _____ (Microsoft Corporation) C:\windows\system32\inetcpl.cpl 2015-02-14 12:23 - 2015-01-12 02:23 - 00688640 _____ (Microsoft Corporation) C:\windows\system32\msfeeds.dll 2015-02-14 12:23 - 2015-01-12 02:23 - 00684544 _____ (Microsoft Corporation) C:\windows\system32\ie4uinit.exe 2015-02-14 12:23 - 2015-01-12 02:22 - 01155072 _____ (Microsoft Corporation) C:\windows\system32\mshtmlmedia.dll 2015-02-14 12:23 - 2015-01-12 02:14 - 12829184 _____ (Microsoft Corporation) C:\windows\system32\ieframe.dll 2015-02-14 12:23 - 2015-01-12 02:00 - 01888256 _____ (Microsoft Corporation) C:\windows\system32\wininet.dll 2015-02-14 12:23 - 2015-01-12 01:56 - 01307136 _____ (Microsoft Corporation) C:\windows\system32\urlmon.dll 2015-02-14 12:23 - 2015-01-12 01:55 - 00710144 _____ (Microsoft Corporation) C:\windows\system32\ieapfltr.dll 2015-02-14 12:23 - 2015-01-10 07:27 - 00550912 _____ (Microsoft Corporation) C:\windows\system32\kerberos.dll 2015-02-14 12:23 - 2015-01-10 07:27 - 00259584 _____ (Microsoft Corporation) C:\windows\system32\msv1_0.dll 2015-02-14 12:23 - 2015-01-10 07:27 - 00248832 _____ (Microsoft Corporation) C:\windows\system32\schannel.dll 2015-02-14 12:23 - 2015-01-10 07:27 - 00221184 _____ (Microsoft Corporation) C:\windows\system32\ncrypt.dll 2015-02-14 12:23 - 2015-01-10 07:27 - 00172032 _____ (Microsoft Corporation) C:\windows\system32\wdigest.dll 2015-02-14 12:23 - 2015-01-10 07:27 - 00065536 _____ (Microsoft Corporation) C:\windows\system32\TSpkg.dll 2015-02-14 12:23 - 2015-01-10 07:27 - 00017408 _____ (Microsoft Corporation) C:\windows\system32\credssp.dll 2015-02-14 12:22 - 2015-01-13 03:49 - 01230336 _____ (Microsoft Corporation) C:\windows\system32\WindowsCodecs.dll 2015-02-14 12:22 - 2014-12-12 06:07 - 01174528 _____ (Microsoft Corporation) C:\windows\system32\crypt32.dll 2015-02-14 12:22 - 2014-12-08 03:46 - 00308224 _____ (Microsoft Corporation) C:\windows\system32\scesrv.dll 2015-02-14 12:22 - 2014-07-07 02:40 - 00179200 _____ (Microsoft Corporation) C:\windows\system32\wintrust.dll 2015-02-14 12:22 - 2014-07-07 02:40 - 00143872 _____ (Microsoft Corporation) C:\windows\system32\cryptsvc.dll 2015-01-27 18:18 - 2015-01-27 18:18 - 00000000 ____D () C:\Program Files\Mozilla Firefox ==================== One Month Modified Files and Folders ======= (If an entry is included in the fixlist, the file\folder will be moved.) 2015-02-22 12:58 - 2010-03-05 05:29 - 02031858 _____ () C:\windows\WindowsUpdate.log 2015-02-22 12:55 - 2010-09-25 18:25 - 00000000 ____D () C:\Users\Jessica 2015-02-22 12:55 - 2009-07-14 05:34 - 00023328 ____H () C:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2015-02-22 12:55 - 2009-07-14 05:34 - 00023328 ____H () C:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2015-02-22 12:38 - 2012-04-15 15:20 - 00000884 _____ () C:\windows\Tasks\Adobe Flash Player Updater.job 2015-02-21 21:09 - 2012-06-15 13:41 - 00000000 ___RD () C:\Users\Jessica\Dropbox 2015-02-21 21:09 - 2012-06-15 13:38 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Dropbox 2015-02-21 21:07 - 2010-09-25 18:25 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CyberLink DVD Suite 2015-02-21 21:06 - 2009-07-14 05:53 - 00000006 ____H () C:\windows\Tasks\SA.DAT 2015-02-21 21:06 - 2009-07-14 05:39 - 00194739 _____ () C:\windows\setupact.log 2015-02-20 18:10 - 2010-12-31 17:22 - 00002121 _____ () C:\Users\Public\Desktop\Google Chrome.lnk 2015-02-18 19:03 - 2013-07-20 19:27 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\DataMgr 2015-02-18 19:01 - 2014-12-08 18:36 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\FBDownloader 2015-02-18 12:37 - 2010-03-05 05:43 - 00000000 ____D () C:\Program Files\Common Files\McAfee 2015-02-15 18:01 - 2009-07-14 05:33 - 00346000 _____ () C:\windows\system32\FNTCACHE.DAT 2015-02-15 17:59 - 2010-03-05 06:55 - 00802060 _____ () C:\windows\PFRO.log 2015-02-15 17:58 - 2014-12-13 11:27 - 00000000 ____D () C:\windows\system32\appraiser 2015-02-15 17:58 - 2014-05-19 18:43 - 00000000 ___SD () C:\windows\system32\CompatTel 2015-02-15 17:58 - 2009-07-14 03:37 - 00000000 ____D () C:\windows\system32\de-DE 2015-02-15 17:31 - 2014-03-04 08:40 - 113756392 _____ (Microsoft Corporation) C:\windows\system32\MRT.exe 2015-02-15 17:31 - 2014-03-04 08:40 - 00000000 ____D () C:\windows\system32\MRT 2015-02-14 12:00 - 2012-06-15 13:41 - 00001025 _____ () C:\Users\Jessica\Desktop\Dropbox.lnk 2015-02-14 12:00 - 2012-06-15 13:39 - 00000000 ____D () C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Dropbox 2015-02-07 09:33 - 2012-04-15 15:20 - 00701616 _____ (Adobe Systems Incorporated) C:\windows\system32\FlashPlayerApp.exe 2015-02-07 09:33 - 2011-05-21 06:18 - 00071344 _____ (Adobe Systems Incorporated) C:\windows\system32\FlashPlayerCPLApp.cpl 2015-02-07 09:08 - 2014-05-13 16:52 - 00001098 _____ () C:\windows\Tasks\GoogleUpdateTaskMachineUA1cf6ec357c82803.job 2015-02-07 09:08 - 2010-09-25 19:59 - 00001094 _____ () C:\windows\Tasks\GoogleUpdateTaskMachineCore.job 2015-02-03 21:25 - 2009-07-14 03:37 - 00000000 ____D () C:\windows\Microsoft.NET 2015-02-03 18:43 - 2014-11-08 17:10 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service 2015-01-25 19:15 - 2009-07-26 21:06 - 01593888 _____ () C:\windows\system32\PerfStringBackup.INI ==================== Files in the root of some directories ======= 2013-06-26 07:53 - 2013-06-26 07:53 - 0044216 _____ () C:\Users\Jessica\AppData\Local\ext_piccshare_uninst.exe 2013-12-24 20:45 - 2013-12-24 20:45 - 2239256 _____ () C:\Users\Jessica\AppData\Local\omesuperv.exe 2011-02-22 18:35 - 2011-02-22 18:35 - 0000056 ____H () C:\ProgramData\ezsidmv.dat 2010-09-25 18:26 - 2009-08-17 05:54 - 0131368 _____ () C:\ProgramData\FullRemove.exe 2010-03-05 05:36 - 2010-03-05 05:37 - 0000109 _____ () C:\ProgramData\{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}.log 2010-03-05 05:35 - 2010-03-05 05:35 - 0000106 _____ () C:\ProgramData\{2BF2E31F-B8BB-40A7-B650-98D28E0F7D47}.log 2010-03-05 05:32 - 2010-03-05 05:33 - 0000105 _____ () C:\ProgramData\{40BF1E83-20EB-11D8-97C5-0009C5020658}.log 2010-03-05 05:36 - 2010-03-05 05:36 - 0000110 _____ () C:\ProgramData\{B7A0CE06-068E-11D6-97FD-0050BACBF861}.log 2010-03-05 05:31 - 2010-03-05 05:32 - 0000107 _____ () C:\ProgramData\{C59C179C-668D-49A9-B6EA-0121CCFC1243}.log 2010-03-05 05:33 - 2010-03-05 05:35 - 0000110 _____ () C:\ProgramData\{CB099890-1D5F-11D5-9EA9-0050BAE317E1}.log Some content of TEMP: ==================== C:\Users\Jessica\AppData\Local\Temp\0a50e25a83046228c11dcaa7eeed09bb.exe C:\Users\Jessica\AppData\Local\Temp\abd2bca3e572e998a09f73c81b93454a.exe C:\Users\Jessica\AppData\Local\Temp\AlawarGameBoxSetup.exe C:\Users\Jessica\AppData\Local\Temp\AskSLib.dll C:\Users\Jessica\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpbu8a3e.dll C:\Users\Jessica\AppData\Local\Temp\EAD1026.exe C:\Users\Jessica\AppData\Local\Temp\EAD1045.exe C:\Users\Jessica\AppData\Local\Temp\EAD10F0.exe C:\Users\Jessica\AppData\Local\Temp\EAD11BB.exe C:\Users\Jessica\AppData\Local\Temp\EAD1209.exe C:\Users\Jessica\AppData\Local\Temp\EAD1228.exe C:\Users\Jessica\AppData\Local\Temp\EAD1248.exe C:\Users\Jessica\AppData\Local\Temp\EAD1276.exe C:\Users\Jessica\AppData\Local\Temp\EAD12C4.exe C:\Users\Jessica\AppData\Local\Temp\EAD1332.exe C:\Users\Jessica\AppData\Local\Temp\EAD1341.exe C:\Users\Jessica\AppData\Local\Temp\EAD138.exe C:\Users\Jessica\AppData\Local\Temp\EAD13FC.exe C:\Users\Jessica\AppData\Local\Temp\EAD141C.exe C:\Users\Jessica\AppData\Local\Temp\EAD142B.exe C:\Users\Jessica\AppData\Local\Temp\EAD145A.exe C:\Users\Jessica\AppData\Local\Temp\EAD1479.exe C:\Users\Jessica\AppData\Local\Temp\EAD14C7.exe C:\Users\Jessica\AppData\Local\Temp\EAD14D7.exe C:\Users\Jessica\AppData\Local\Temp\EAD1582.exe C:\Users\Jessica\AppData\Local\Temp\EAD1592.exe C:\Users\Jessica\AppData\Local\Temp\EAD15B1.exe C:\Users\Jessica\AppData\Local\Temp\EAD15D0.exe C:\Users\Jessica\AppData\Local\Temp\EAD15FF.exe C:\Users\Jessica\AppData\Local\Temp\EAD160F.exe C:\Users\Jessica\AppData\Local\Temp\EAD162E.exe C:\Users\Jessica\AppData\Local\Temp\EAD167C.exe C:\Users\Jessica\AppData\Local\Temp\EAD1776.exe C:\Users\Jessica\AppData\Local\Temp\EAD1812.exe C:\Users\Jessica\AppData\Local\Temp\EAD1850.exe C:\Users\Jessica\AppData\Local\Temp\EAD186F.exe C:\Users\Jessica\AppData\Local\Temp\EAD1959.exe C:\Users\Jessica\AppData\Local\Temp\EAD195A.exe C:\Users\Jessica\AppData\Local\Temp\EAD196.exe C:\Users\Jessica\AppData\Local\Temp\EAD1978.exe C:\Users\Jessica\AppData\Local\Temp\EAD1998.exe C:\Users\Jessica\AppData\Local\Temp\EAD1A53.exe C:\Users\Jessica\AppData\Local\Temp\EAD1B0E.exe C:\Users\Jessica\AppData\Local\Temp\EAD1B0F.exe C:\Users\Jessica\AppData\Local\Temp\EAD1BC9.exe C:\Users\Jessica\AppData\Local\Temp\EAD1C75.exe C:\Users\Jessica\AppData\Local\Temp\EAD1C94.exe C:\Users\Jessica\AppData\Local\Temp\EAD1CB3.exe C:\Users\Jessica\AppData\Local\Temp\EAD1CD2.exe C:\Users\Jessica\AppData\Local\Temp\EAD1E2A.exe C:\Users\Jessica\AppData\Local\Temp\EAD1E2B.exe C:\Users\Jessica\AppData\Local\Temp\EAD1E4.exe C:\Users\Jessica\AppData\Local\Temp\EAD1E68.exe C:\Users\Jessica\AppData\Local\Temp\EAD1F33.exe C:\Users\Jessica\AppData\Local\Temp\EAD1F71.exe C:\Users\Jessica\AppData\Local\Temp\EAD1F90.exe C:\Users\Jessica\AppData\Local\Temp\EAD1FEE.exe C:\Users\Jessica\AppData\Local\Temp\EAD203C.exe C:\Users\Jessica\AppData\Local\Temp\EAD207A.exe C:\Users\Jessica\AppData\Local\Temp\EAD208A.exe C:\Users\Jessica\AppData\Local\Temp\EAD20B9.exe C:\Users\Jessica\AppData\Local\Temp\EAD2184.exe C:\Users\Jessica\AppData\Local\Temp\EAD21B2.exe C:\Users\Jessica\AppData\Local\Temp\EAD21B3.exe C:\Users\Jessica\AppData\Local\Temp\EAD222.exe C:\Users\Jessica\AppData\Local\Temp\EAD22CB.exe C:\Users\Jessica\AppData\Local\Temp\EAD231.exe C:\Users\Jessica\AppData\Local\Temp\EAD232.exe C:\Users\Jessica\AppData\Local\Temp\EAD2348.exe C:\Users\Jessica\AppData\Local\Temp\EAD23B5.exe C:\Users\Jessica\AppData\Local\Temp\EAD23B6.exe C:\Users\Jessica\AppData\Local\Temp\EAD2403.exe C:\Users\Jessica\AppData\Local\Temp\EAD2413.exe C:\Users\Jessica\AppData\Local\Temp\EAD2432.exe C:\Users\Jessica\AppData\Local\Temp\EAD2461.exe C:\Users\Jessica\AppData\Local\Temp\EAD2470.exe C:\Users\Jessica\AppData\Local\Temp\EAD2490.exe C:\Users\Jessica\AppData\Local\Temp\EAD24CE.exe C:\Users\Jessica\AppData\Local\Temp\EAD256A.exe C:\Users\Jessica\AppData\Local\Temp\EAD256B.exe C:\Users\Jessica\AppData\Local\Temp\EAD2589.exe C:\Users\Jessica\AppData\Local\Temp\EAD258A.exe C:\Users\Jessica\AppData\Local\Temp\EAD25C8.exe C:\Users\Jessica\AppData\Local\Temp\EAD260.exe C:\Users\Jessica\AppData\Local\Temp\EAD2616.exe C:\Users\Jessica\AppData\Local\Temp\EAD2644.exe C:\Users\Jessica\AppData\Local\Temp\EAD2654.exe C:\Users\Jessica\AppData\Local\Temp\EAD2683.exe C:\Users\Jessica\AppData\Local\Temp\EAD26B2.exe C:\Users\Jessica\AppData\Local\Temp\EAD26C1.exe C:\Users\Jessica\AppData\Local\Temp\EAD271F.exe C:\Users\Jessica\AppData\Local\Temp\EAD2720.exe C:\Users\Jessica\AppData\Local\Temp\EAD278C.exe C:\Users\Jessica\AppData\Local\Temp\EAD27F.exe C:\Users\Jessica\AppData\Local\Temp\EAD2857.exe C:\Users\Jessica\AppData\Local\Temp\EAD28A5.exe C:\Users\Jessica\AppData\Local\Temp\EAD28F.exe C:\Users\Jessica\AppData\Local\Temp\EAD29BE.exe C:\Users\Jessica\AppData\Local\Temp\EAD2A2B.exe C:\Users\Jessica\AppData\Local\Temp\EAD2AA9.exe C:\Users\Jessica\AppData\Local\Temp\EAD2AD6.exe C:\Users\Jessica\AppData\Local\Temp\EAD2AE7.exe C:\Users\Jessica\AppData\Local\Temp\EAD2AF6.exe C:\Users\Jessica\AppData\Local\Temp\EAD2B53.exe C:\Users\Jessica\AppData\Local\Temp\EAD2BA1.exe C:\Users\Jessica\AppData\Local\Temp\EAD2BB1.exe C:\Users\Jessica\AppData\Local\Temp\EAD2BE0.exe C:\Users\Jessica\AppData\Local\Temp\EAD2BFF.exe C:\Users\Jessica\AppData\Local\Temp\EAD2C1E.exe C:\Users\Jessica\AppData\Local\Temp\EAD2C1F.exe C:\Users\Jessica\AppData\Local\Temp\EAD2C8D.exe C:\Users\Jessica\AppData\Local\Temp\EAD2D08.exe C:\Users\Jessica\AppData\Local\Temp\EAD2D37.exe C:\Users\Jessica\AppData\Local\Temp\EAD2D46.exe C:\Users\Jessica\AppData\Local\Temp\EAD2D75.exe C:\Users\Jessica\AppData\Local\Temp\EAD2DD3.exe C:\Users\Jessica\AppData\Local\Temp\EAD2E.exe C:\Users\Jessica\AppData\Local\Temp\EAD2E11.exe C:\Users\Jessica\AppData\Local\Temp\EAD2E21.exe C:\Users\Jessica\AppData\Local\Temp\EAD2E40.exe C:\Users\Jessica\AppData\Local\Temp\EAD2E50.exe C:\Users\Jessica\AppData\Local\Temp\EAD2E6F.exe C:\Users\Jessica\AppData\Local\Temp\EAD2EAD.exe C:\Users\Jessica\AppData\Local\Temp\EAD2EC.exe C:\Users\Jessica\AppData\Local\Temp\EAD2ECC.exe C:\Users\Jessica\AppData\Local\Temp\EAD2ECD.exe C:\Users\Jessica\AppData\Local\Temp\EAD2F1B.exe C:\Users\Jessica\AppData\Local\Temp\EAD2FF5.exe C:\Users\Jessica\AppData\Local\Temp\EAD3062.exe C:\Users\Jessica\AppData\Local\Temp\EAD3091.exe C:\Users\Jessica\AppData\Local\Temp\EAD30A0.exe C:\Users\Jessica\AppData\Local\Temp\EAD312D.exe C:\Users\Jessica\AppData\Local\Temp\EAD31C9.exe C:\Users\Jessica\AppData\Local\Temp\EAD31E8.exe C:\Users\Jessica\AppData\Local\Temp\EAD3255.exe C:\Users\Jessica\AppData\Local\Temp\EAD32B.exe C:\Users\Jessica\AppData\Local\Temp\EAD32C3.exe C:\Users\Jessica\AppData\Local\Temp\EAD3330.exe C:\Users\Jessica\AppData\Local\Temp\EAD3542.exe C:\Users\Jessica\AppData\Local\Temp\EAD366A.exe C:\Users\Jessica\AppData\Local\Temp\EAD369.exe C:\Users\Jessica\AppData\Local\Temp\EAD3764.exe C:\Users\Jessica\AppData\Local\Temp\EAD382F.exe C:\Users\Jessica\AppData\Local\Temp\EAD386D.exe C:\Users\Jessica\AppData\Local\Temp\EAD389C.exe C:\Users\Jessica\AppData\Local\Temp\EAD3967.exe C:\Users\Jessica\AppData\Local\Temp\EAD39E4.exe C:\Users\Jessica\AppData\Local\Temp\EAD3A13.exe C:\Users\Jessica\AppData\Local\Temp\EAD3A41.exe C:\Users\Jessica\AppData\Local\Temp\EAD3A70.exe C:\Users\Jessica\AppData\Local\Temp\EAD3AFC.exe C:\Users\Jessica\AppData\Local\Temp\EAD3B2B.exe C:\Users\Jessica\AppData\Local\Temp\EAD3B5A.exe C:\Users\Jessica\AppData\Local\Temp\EAD3BB8.exe C:\Users\Jessica\AppData\Local\Temp\EAD3C15.exe C:\Users\Jessica\AppData\Local\Temp\EAD3D1E.exe C:\Users\Jessica\AppData\Local\Temp\EAD3D6.exe C:\Users\Jessica\AppData\Local\Temp\EAD3DBA.exe C:\Users\Jessica\AppData\Local\Temp\EAD3EE3.exe C:\Users\Jessica\AppData\Local\Temp\EAD3F02.exe C:\Users\Jessica\AppData\Local\Temp\EAD3F40.exe C:\Users\Jessica\AppData\Local\Temp\EAD3FDC.exe C:\Users\Jessica\AppData\Local\Temp\EAD4059.exe C:\Users\Jessica\AppData\Local\Temp\EAD4088.exe C:\Users\Jessica\AppData\Local\Temp\EAD40D8.exe C:\Users\Jessica\AppData\Local\Temp\EAD4153.exe C:\Users\Jessica\AppData\Local\Temp\EAD41EF.exe C:\Users\Jessica\AppData\Local\Temp\EAD421E.exe C:\Users\Jessica\AppData\Local\Temp\EAD421F.exe C:\Users\Jessica\AppData\Local\Temp\EAD424.exe C:\Users\Jessica\AppData\Local\Temp\EAD427B.exe C:\Users\Jessica\AppData\Local\Temp\EAD429A.exe C:\Users\Jessica\AppData\Local\Temp\EAD42F8.exe C:\Users\Jessica\AppData\Local\Temp\EAD434.exe C:\Users\Jessica\AppData\Local\Temp\EAD4385.exe C:\Users\Jessica\AppData\Local\Temp\EAD43B3.exe C:\Users\Jessica\AppData\Local\Temp\EAD43E2.exe C:\Users\Jessica\AppData\Local\Temp\EAD445F.exe C:\Users\Jessica\AppData\Local\Temp\EAD44B0.exe C:\Users\Jessica\AppData\Local\Temp\EAD44DC.exe C:\Users\Jessica\AppData\Local\Temp\EAD453.exe C:\Users\Jessica\AppData\Local\Temp\EAD45F4.exe C:\Users\Jessica\AppData\Local\Temp\EAD463.exe C:\Users\Jessica\AppData\Local\Temp\EAD472.exe C:\Users\Jessica\AppData\Local\Temp\EAD473.exe C:\Users\Jessica\AppData\Local\Temp\EAD473C.exe C:\Users\Jessica\AppData\Local\Temp\EAD4816.exe C:\Users\Jessica\AppData\Local\Temp\EAD48C3.exe C:\Users\Jessica\AppData\Local\Temp\EAD4910.exe C:\Users\Jessica\AppData\Local\Temp\EAD494F.exe C:\Users\Jessica\AppData\Local\Temp\EAD4B32.exe C:\Users\Jessica\AppData\Local\Temp\EAD4BED.exe C:\Users\Jessica\AppData\Local\Temp\EAD4C2C.exe C:\Users\Jessica\AppData\Local\Temp\EAD4C6B.exe C:\Users\Jessica\AppData\Local\Temp\EAD4C7A.exe C:\Users\Jessica\AppData\Local\Temp\EAD4D06.exe C:\Users\Jessica\AppData\Local\Temp\EAD4D16.exe C:\Users\Jessica\AppData\Local\Temp\EAD4E0.exe C:\Users\Jessica\AppData\Local\Temp\EAD4EF.exe C:\Users\Jessica\AppData\Local\Temp\EAD4F28.exe C:\Users\Jessica\AppData\Local\Temp\EAD4FF.exe C:\Users\Jessica\AppData\Local\Temp\EAD5012.exe C:\Users\Jessica\AppData\Local\Temp\EAD5022.exe C:\Users\Jessica\AppData\Local\Temp\EAD5023.exe C:\Users\Jessica\AppData\Local\Temp\EAD507F.exe C:\Users\Jessica\AppData\Local\Temp\EAD50ED.exe C:\Users\Jessica\AppData\Local\Temp\EAD512B.exe C:\Users\Jessica\AppData\Local\Temp\EAD514A.exe C:\Users\Jessica\AppData\Local\Temp\EAD5179.exe C:\Users\Jessica\AppData\Local\Temp\EAD5188.exe C:\Users\Jessica\AppData\Local\Temp\EAD531E.exe C:\Users\Jessica\AppData\Local\Temp\EAD539B.exe C:\Users\Jessica\AppData\Local\Temp\EAD53D.exe C:\Users\Jessica\AppData\Local\Temp\EAD5438.exe C:\Users\Jessica\AppData\Local\Temp\EAD54D.exe C:\Users\Jessica\AppData\Local\Temp\EAD55C.exe C:\Users\Jessica\AppData\Local\Temp\EAD55FB.exe C:\Users\Jessica\AppData\Local\Temp\EAD56F5.exe C:\Users\Jessica\AppData\Local\Temp\EAD583D.exe C:\Users\Jessica\AppData\Local\Temp\EAD58D8.exe C:\Users\Jessica\AppData\Local\Temp\EAD5917.exe C:\Users\Jessica\AppData\Local\Temp\EAD5965.exe C:\Users\Jessica\AppData\Local\Temp\EAD59A3.exe C:\Users\Jessica\AppData\Local\Temp\EAD5A6E.exe C:\Users\Jessica\AppData\Local\Temp\EAD5AA.exe C:\Users\Jessica\AppData\Local\Temp\EAD5AAC.exe C:\Users\Jessica\AppData\Local\Temp\EAD5B0B.exe C:\Users\Jessica\AppData\Local\Temp\EAD5C90.exe C:\Users\Jessica\AppData\Local\Temp\EAD5CA7.exe C:\Users\Jessica\AppData\Local\Temp\EAD5CAF.exe C:\Users\Jessica\AppData\Local\Temp\EAD5DB8.exe C:\Users\Jessica\AppData\Local\Temp\EAD5DB9.exe C:\Users\Jessica\AppData\Local\Temp\EAD5DC8.exe C:\Users\Jessica\AppData\Local\Temp\EAD5E36.exe C:\Users\Jessica\AppData\Local\Temp\EAD5E37.exe C:\Users\Jessica\AppData\Local\Temp\EAD5ED2.exe C:\Users\Jessica\AppData\Local\Temp\EAD5F1F.exe C:\Users\Jessica\AppData\Local\Temp\EAD5F4E.exe C:\Users\Jessica\AppData\Local\Temp\EAD5FAC.exe C:\Users\Jessica\AppData\Local\Temp\EAD5FCB.exe C:\Users\Jessica\AppData\Local\Temp\EAD6028.exe C:\Users\Jessica\AppData\Local\Temp\EAD6067.exe C:\Users\Jessica\AppData\Local\Temp\EAD60D5.exe C:\Users\Jessica\AppData\Local\Temp\EAD6113.exe C:\Users\Jessica\AppData\Local\Temp\EAD6151.exe C:\Users\Jessica\AppData\Local\Temp\EAD6180.exe C:\Users\Jessica\AppData\Local\Temp\EAD619F.exe C:\Users\Jessica\AppData\Local\Temp\EAD61FC.exe C:\Users\Jessica\AppData\Local\Temp\EAD625A.exe C:\Users\Jessica\AppData\Local\Temp\EAD6306.exe C:\Users\Jessica\AppData\Local\Temp\EAD6392.exe C:\Users\Jessica\AppData\Local\Temp\EAD6547.exe C:\Users\Jessica\AppData\Local\Temp\EAD6557.exe C:\Users\Jessica\AppData\Local\Temp\EAD66CD.exe C:\Users\Jessica\AppData\Local\Temp\EAD66DD.exe C:\Users\Jessica\AppData\Local\Temp\EAD6769.exe C:\Users\Jessica\AppData\Local\Temp\EAD67A7.exe C:\Users\Jessica\AppData\Local\Temp\EAD685.exe C:\Users\Jessica\AppData\Local\Temp\EAD6882.exe C:\Users\Jessica\AppData\Local\Temp\EAD68A1.exe C:\Users\Jessica\AppData\Local\Temp\EAD68A2.exe C:\Users\Jessica\AppData\Local\Temp\EAD68C0.exe C:\Users\Jessica\AppData\Local\Temp\EAD692D.exe C:\Users\Jessica\AppData\Local\Temp\EAD694.exe C:\Users\Jessica\AppData\Local\Temp\EAD694D.exe C:\Users\Jessica\AppData\Local\Temp\EAD6A08.exe C:\Users\Jessica\AppData\Local\Temp\EAD6A56.exe C:\Users\Jessica\AppData\Local\Temp\EAD6A75.exe C:\Users\Jessica\AppData\Local\Temp\EAD6AD3.exe C:\Users\Jessica\AppData\Local\Temp\EAD6C1B.exe C:\Users\Jessica\AppData\Local\Temp\EAD6C39.exe C:\Users\Jessica\AppData\Local\Temp\EAD6C68.exe C:\Users\Jessica\AppData\Local\Temp\EAD6CB6.exe C:\Users\Jessica\AppData\Local\Temp\EAD6DBF.exe C:\Users\Jessica\AppData\Local\Temp\EAD6DDF.exe C:\Users\Jessica\AppData\Local\Temp\EAD6DEE.exe C:\Users\Jessica\AppData\Local\Temp\EAD6E1D.exe C:\Users\Jessica\AppData\Local\Temp\EAD6ED9.exe C:\Users\Jessica\AppData\Local\Temp\EAD6FA3.exe C:\Users\Jessica\AppData\Local\Temp\EAD6FC2.exe C:\Users\Jessica\AppData\Local\Temp\EAD702.exe C:\Users\Jessica\AppData\Local\Temp\EAD703F.exe C:\Users\Jessica\AppData\Local\Temp\EAD7196.exe C:\Users\Jessica\AppData\Local\Temp\EAD730D.exe C:\Users\Jessica\AppData\Local\Temp\EAD7445.exe C:\Users\Jessica\AppData\Local\Temp\EAD7500.exe C:\Users\Jessica\AppData\Local\Temp\EAD75F.exe C:\Users\Jessica\AppData\Local\Temp\EAD7657.exe C:\Users\Jessica\AppData\Local\Temp\EAD76E3.exe C:\Users\Jessica\AppData\Local\Temp\EAD76E4.exe C:\Users\Jessica\AppData\Local\Temp\EAD7741.exe C:\Users\Jessica\AppData\Local\Temp\EAD78B7.exe C:\Users\Jessica\AppData\Local\Temp\EAD78D7.exe C:\Users\Jessica\AppData\Local\Temp\EAD7A9C.exe C:\Users\Jessica\AppData\Local\Temp\EAD7ACA.exe C:\Users\Jessica\AppData\Local\Temp\EAD7AD9.exe C:\Users\Jessica\AppData\Local\Temp\EAD7B47.exe C:\Users\Jessica\AppData\Local\Temp\EAD7C5F.exe C:\Users\Jessica\AppData\Local\Temp\EAD7D2A.exe C:\Users\Jessica\AppData\Local\Temp\EAD7F8B.exe C:\Users\Jessica\AppData\Local\Temp\EAD80B.exe C:\Users\Jessica\AppData\Local\Temp\EAD80F1.exe C:\Users\Jessica\AppData\Local\Temp\EAD813F.exe C:\Users\Jessica\AppData\Local\Temp\EAD818D.exe C:\Users\Jessica\AppData\Local\Temp\EAD81EB.exe C:\Users\Jessica\AppData\Local\Temp\EAD821A.exe C:\Users\Jessica\AppData\Local\Temp\EAD8258.exe C:\Users\Jessica\AppData\Local\Temp\EAD82A.exe C:\Users\Jessica\AppData\Local\Temp\EAD82B6.exe C:\Users\Jessica\AppData\Local\Temp\EAD82C5.exe C:\Users\Jessica\AppData\Local\Temp\EAD8352.exe C:\Users\Jessica\AppData\Local\Temp\EAD8353.exe C:\Users\Jessica\AppData\Local\Temp\EAD83A.exe C:\Users\Jessica\AppData\Local\Temp\EAD83B.exe C:\Users\Jessica\AppData\Local\Temp\EAD83BF.exe C:\Users\Jessica\AppData\Local\Temp\EAD842C.exe C:\Users\Jessica\AppData\Local\Temp\EAD847A.exe C:\Users\Jessica\AppData\Local\Temp\EAD849.exe C:\Users\Jessica\AppData\Local\Temp\EAD85A3.exe C:\Users\Jessica\AppData\Local\Temp\EAD8600.exe C:\Users\Jessica\AppData\Local\Temp\EAD868D.exe C:\Users\Jessica\AppData\Local\Temp\EAD87C5.exe C:\Users\Jessica\AppData\Local\Temp\EAD87E4.exe C:\Users\Jessica\AppData\Local\Temp\EAD8880.exe C:\Users\Jessica\AppData\Local\Temp\EAD88AF.exe C:\Users\Jessica\AppData\Local\Temp\EAD896A.exe C:\Users\Jessica\AppData\Local\Temp\EAD89D7.exe C:\Users\Jessica\AppData\Local\Temp\EAD89F6.exe C:\Users\Jessica\AppData\Local\Temp\EAD8A35.exe C:\Users\Jessica\AppData\Local\Temp\EAD8AC1.exe C:\Users\Jessica\AppData\Local\Temp\EAD8B3E.exe C:\Users\Jessica\AppData\Local\Temp\EAD8B5D.exe C:\Users\Jessica\AppData\Local\Temp\EAD8BCE.exe C:\Users\Jessica\AppData\Local\Temp\EAD8CF3.exe C:\Users\Jessica\AppData\Local\Temp\EAD8D21.exe C:\Users\Jessica\AppData\Local\Temp\EAD8D6.exe C:\Users\Jessica\AppData\Local\Temp\EAD8DFC.exe C:\Users\Jessica\AppData\Local\Temp\EAD8E0B.exe C:\Users\Jessica\AppData\Local\Temp\EAD8E79.exe C:\Users\Jessica\AppData\Local\Temp\EAD8F15.exe C:\Users\Jessica\AppData\Local\Temp\EAD8F34.exe C:\Users\Jessica\AppData\Local\Temp\EAD8F63.exe C:\Users\Jessica\AppData\Local\Temp\EAD906C.exe C:\Users\Jessica\AppData\Local\Temp\EAD90E9.exe C:\Users\Jessica\AppData\Local\Temp\EAD91A4.exe C:\Users\Jessica\AppData\Local\Temp\EAD91A5.exe C:\Users\Jessica\AppData\Local\Temp\EAD9201.exe C:\Users\Jessica\AppData\Local\Temp\EAD9211.exe C:\Users\Jessica\AppData\Local\Temp\EAD9212.exe C:\Users\Jessica\AppData\Local\Temp\EAD9230.exe C:\Users\Jessica\AppData\Local\Temp\EAD928E.exe C:\Users\Jessica\AppData\Local\Temp\EAD933.exe C:\Users\Jessica\AppData\Local\Temp\EAD93B6.exe C:\Users\Jessica\AppData\Local\Temp\EAD93F5.exe C:\Users\Jessica\AppData\Local\Temp\EAD9404.exe C:\Users\Jessica\AppData\Local\Temp\EAD94A0.exe C:\Users\Jessica\AppData\Local\Temp\EAD94B0.exe C:\Users\Jessica\AppData\Local\Temp\EAD94CF.exe C:\Users\Jessica\AppData\Local\Temp\EAD94FE.exe C:\Users\Jessica\AppData\Local\Temp\EAD955B.exe C:\Users\Jessica\AppData\Local\Temp\EAD959A.exe C:\Users\Jessica\AppData\Local\Temp\EAD95F7.exe C:\Users\Jessica\AppData\Local\Temp\EAD9617.exe C:\Users\Jessica\AppData\Local\Temp\EAD9674.exe C:\Users\Jessica\AppData\Local\Temp\EAD9675.exe C:\Users\Jessica\AppData\Local\Temp\EAD9693.exe C:\Users\Jessica\AppData\Local\Temp\EAD9694.exe C:\Users\Jessica\AppData\Local\Temp\EAD96D2.exe C:\Users\Jessica\AppData\Local\Temp\EAD96E1.exe C:\Users\Jessica\AppData\Local\Temp\EAD9701.exe C:\Users\Jessica\AppData\Local\Temp\EAD9702.exe C:\Users\Jessica\AppData\Local\Temp\EAD9710.exe C:\Users\Jessica\AppData\Local\Temp\EAD972F.exe C:\Users\Jessica\AppData\Local\Temp\EAD977D.exe C:\Users\Jessica\AppData\Local\Temp\EAD97BC.exe C:\Users\Jessica\AppData\Local\Temp\EAD97CB.exe C:\Users\Jessica\AppData\Local\Temp\EAD97EB.exe C:\Users\Jessica\AppData\Local\Temp\EAD980A.exe C:\Users\Jessica\AppData\Local\Temp\EAD9887.exe C:\Users\Jessica\AppData\Local\Temp\EAD9888.exe C:\Users\Jessica\AppData\Local\Temp\EAD9896.exe C:\Users\Jessica\AppData\Local\Temp\EAD991.exe C:\Users\Jessica\AppData\Local\Temp\EAD9951.exe C:\Users\Jessica\AppData\Local\Temp\EAD99CE.exe C:\Users\Jessica\AppData\Local\Temp\EAD99ED.exe C:\Users\Jessica\AppData\Local\Temp\EAD9A0.exe C:\Users\Jessica\AppData\Local\Temp\EAD9A2D.exe C:\Users\Jessica\AppData\Local\Temp\EAD9A5B.exe C:\Users\Jessica\AppData\Local\Temp\EAD9A5C.exe C:\Users\Jessica\AppData\Local\Temp\EAD9A89.exe C:\Users\Jessica\AppData\Local\Temp\EAD9AC8.exe C:\Users\Jessica\AppData\Local\Temp\EAD9AF7.exe C:\Users\Jessica\AppData\Local\Temp\EAD9B45.exe C:\Users\Jessica\AppData\Local\Temp\EAD9B64.exe C:\Users\Jessica\AppData\Local\Temp\EAD9B65.exe C:\Users\Jessica\AppData\Local\Temp\EAD9B93.exe C:\Users\Jessica\AppData\Local\Temp\EAD9BD1.exe C:\Users\Jessica\AppData\Local\Temp\EAD9BF0.exe C:\Users\Jessica\AppData\Local\Temp\EAD9C.exe C:\Users\Jessica\AppData\Local\Temp\EAD9C00.exe C:\Users\Jessica\AppData\Local\Temp\EAD9C01.exe C:\Users\Jessica\AppData\Local\Temp\EAD9C2F.exe C:\Users\Jessica\AppData\Local\Temp\EAD9C4E.exe C:\Users\Jessica\AppData\Local\Temp\EAD9C6D.exe C:\Users\Jessica\AppData\Local\Temp\EAD9CDB.exe C:\Users\Jessica\AppData\Local\Temp\EAD9D.exe C:\Users\Jessica\AppData\Local\Temp\EAD9D47.exe C:\Users\Jessica\AppData\Local\Temp\EAD9DB5.exe C:\Users\Jessica\AppData\Local\Temp\EAD9DC7.exe C:\Users\Jessica\AppData\Local\Temp\EAD9DE3.exe C:\Users\Jessica\AppData\Local\Temp\EAD9DE4.exe C:\Users\Jessica\AppData\Local\Temp\EAD9E13.exe C:\Users\Jessica\AppData\Local\Temp\EAD9E22.exe C:\Users\Jessica\AppData\Local\Temp\EAD9E23.exe C:\Users\Jessica\AppData\Local\Temp\EAD9E51.exe C:\Users\Jessica\AppData\Local\Temp\EAD9E7F.exe C:\Users\Jessica\AppData\Local\Temp\EAD9E9F.exe C:\Users\Jessica\AppData\Local\Temp\EAD9EAE.exe C:\Users\Jessica\AppData\Local\Temp\EAD9F2B.exe C:\Users\Jessica\AppData\Local\Temp\EAD9F69.exe C:\Users\Jessica\AppData\Local\Temp\EAD9F79.exe C:\Users\Jessica\AppData\Local\Temp\EAD9F89.exe C:\Users\Jessica\AppData\Local\Temp\EAD9F8A.exe C:\Users\Jessica\AppData\Local\Temp\EAD9FA8.exe C:\Users\Jessica\AppData\Local\Temp\EAD9FD7.exe C:\Users\Jessica\AppData\Local\Temp\EAD9FE6.exe C:\Users\Jessica\AppData\Local\Temp\EAD9FF6.exe C:\Users\Jessica\AppData\Local\Temp\EADA005.exe C:\Users\Jessica\AppData\Local\Temp\EADA006.exe C:\Users\Jessica\AppData\Local\Temp\EADA015.exe C:\Users\Jessica\AppData\Local\Temp\EADA0E.exe C:\Users\Jessica\AppData\Local\Temp\EADA0E0.exe C:\Users\Jessica\AppData\Local\Temp\EADA0EF.exe C:\Users\Jessica\AppData\Local\Temp\EADA11E.exe C:\Users\Jessica\AppData\Local\Temp\EADA14D.exe C:\Users\Jessica\AppData\Local\Temp\EADA18B.exe C:\Users\Jessica\AppData\Local\Temp\EADA1D.exe C:\Users\Jessica\AppData\Local\Temp\EADA1D9.exe C:\Users\Jessica\AppData\Local\Temp\EADA1E9.exe C:\Users\Jessica\AppData\Local\Temp\EADA1F9.exe C:\Users\Jessica\AppData\Local\Temp\EADA227.exe C:\Users\Jessica\AppData\Local\Temp\EADA275.exe C:\Users\Jessica\AppData\Local\Temp\EADA285.exe C:\Users\Jessica\AppData\Local\Temp\EADA2C3.exe C:\Users\Jessica\AppData\Local\Temp\EADA2E3.exe C:\Users\Jessica\AppData\Local\Temp\EADA2E4.exe C:\Users\Jessica\AppData\Local\Temp\EADA2F2.exe C:\Users\Jessica\AppData\Local\Temp\EADA321.exe C:\Users\Jessica\AppData\Local\Temp\EADA331.exe C:\Users\Jessica\AppData\Local\Temp\EADA340.exe C:\Users\Jessica\AppData\Local\Temp\EADA36F.exe C:\Users\Jessica\AppData\Local\Temp\EADA3AD.exe C:\Users\Jessica\AppData\Local\Temp\EADA3CD.exe C:\Users\Jessica\AppData\Local\Temp\EADA3DC.exe C:\Users\Jessica\AppData\Local\Temp\EADA3EC.exe C:\Users\Jessica\AppData\Local\Temp\EADA40B.exe C:\Users\Jessica\AppData\Local\Temp\EADA449.exe C:\Users\Jessica\AppData\Local\Temp\EADA478.exe C:\Users\Jessica\AppData\Local\Temp\EADA497.exe C:\Users\Jessica\AppData\Local\Temp\EADA4A7.exe C:\Users\Jessica\AppData\Local\Temp\EADA4B7.exe C:\Users\Jessica\AppData\Local\Temp\EADA4F5.exe C:\Users\Jessica\AppData\Local\Temp\EADA514.exe C:\Users\Jessica\AppData\Local\Temp\EADA524.exe C:\Users\Jessica\AppData\Local\Temp\EADA543.exe C:\Users\Jessica\AppData\Local\Temp\EADA544.exe C:\Users\Jessica\AppData\Local\Temp\EADA553.exe C:\Users\Jessica\AppData\Local\Temp\EADA562.exe C:\Users\Jessica\AppData\Local\Temp\EADA563.exe C:\Users\Jessica\AppData\Local\Temp\EADA5B0.exe C:\Users\Jessica\AppData\Local\Temp\EADA5C.exe C:\Users\Jessica\AppData\Local\Temp\EADA5C0.exe C:\Users\Jessica\AppData\Local\Temp\EADA5FE.exe C:\Users\Jessica\AppData\Local\Temp\EADA61D.exe C:\Users\Jessica\AppData\Local\Temp\EADA64C.exe C:\Users\Jessica\AppData\Local\Temp\EADA64D.exe C:\Users\Jessica\AppData\Local\Temp\EADA67B.exe C:\Users\Jessica\AppData\Local\Temp\EADA67C.exe C:\Users\Jessica\AppData\Local\Temp\EADA68B.exe C:\Users\Jessica\AppData\Local\Temp\EADA69A.exe C:\Users\Jessica\AppData\Local\Temp\EADA6D9.exe C:\Users\Jessica\AppData\Local\Temp\EADA6DA.exe C:\Users\Jessica\AppData\Local\Temp\EADA6DB.exe C:\Users\Jessica\AppData\Local\Temp\EADA717.exe C:\Users\Jessica\AppData\Local\Temp\EADA746.exe C:\Users\Jessica\AppData\Local\Temp\EADA765.exe C:\Users\Jessica\AppData\Local\Temp\EADA784.exe C:\Users\Jessica\AppData\Local\Temp\EADA785.exe C:\Users\Jessica\AppData\Local\Temp\EADA7B.exe C:\Users\Jessica\AppData\Local\Temp\EADA7B3.exe C:\Users\Jessica\AppData\Local\Temp\EADA7C3.exe C:\Users\Jessica\AppData\Local\Temp\EADA87E.exe C:\Users\Jessica\AppData\Local\Temp\EADA87F.exe C:\Users\Jessica\AppData\Local\Temp\EADA88D.exe C:\Users\Jessica\AppData\Local\Temp\EADA8FB.exe C:\Users\Jessica\AppData\Local\Temp\EADA8FC.exe C:\Users\Jessica\AppData\Local\Temp\EADA939.exe C:\Users\Jessica\AppData\Local\Temp\EADA93A.exe C:\Users\Jessica\AppData\Local\Temp\EADA958.exe C:\Users\Jessica\AppData\Local\Temp\EADA997.exe C:\Users\Jessica\AppData\Local\Temp\EADA998.exe C:\Users\Jessica\AppData\Local\Temp\EADA9B6.exe C:\Users\Jessica\AppData\Local\Temp\EADA9C5.exe C:\Users\Jessica\AppData\Local\Temp\EADA9E5.exe C:\Users\Jessica\AppData\Local\Temp\EADA9F4.exe C:\Users\Jessica\AppData\Local\Temp\EADA9F5.exe C:\Users\Jessica\AppData\Local\Temp\EADAA13.exe C:\Users\Jessica\AppData\Local\Temp\EADAA14.exe C:\Users\Jessica\AppData\Local\Temp\EADAA15.exe C:\Users\Jessica\AppData\Local\Temp\EADAA42.exe C:\Users\Jessica\AppData\Local\Temp\EADAA71.exe C:\Users\Jessica\AppData\Local\Temp\EADAAA0.exe C:\Users\Jessica\AppData\Local\Temp\EADAABF.exe C:\Users\Jessica\AppData\Local\Temp\EADAACF.exe C:\Users\Jessica\AppData\Local\Temp\EADAADE.exe C:\Users\Jessica\AppData\Local\Temp\EADAB0D.exe C:\Users\Jessica\AppData\Local\Temp\EADAB4B.exe C:\Users\Jessica\AppData\Local\Temp\EADAB7A.exe C:\Users\Jessica\AppData\Local\Temp\EADABC8.exe C:\Users\Jessica\AppData\Local\Temp\EADABC9.exe C:\Users\Jessica\AppData\Local\Temp\EADABCA.exe C:\Users\Jessica\AppData\Local\Temp\EADABCB.exe C:\Users\Jessica\AppData\Local\Temp\EADABD8.exe C:\Users\Jessica\AppData\Local\Temp\EADABF7.exe C:\Users\Jessica\AppData\Local\Temp\EADABF8.exe C:\Users\Jessica\AppData\Local\Temp\EADABF9.exe C:\Users\Jessica\AppData\Local\Temp\EADAC07.exe C:\Users\Jessica\AppData\Local\Temp\EADAC1A.exe C:\Users\Jessica\AppData\Local\Temp\EADAC26.exe C:\Users\Jessica\AppData\Local\Temp\EADAC45.exe C:\Users\Jessica\AppData\Local\Temp\EADAC64.exe C:\Users\Jessica\AppData\Local\Temp\EADAC83.exe C:\Users\Jessica\AppData\Local\Temp\EADAC84.exe C:\Users\Jessica\AppData\Local\Temp\EADACB2.exe C:\Users\Jessica\AppData\Local\Temp\EADACC2.exe C:\Users\Jessica\AppData\Local\Temp\EADACD1.exe C:\Users\Jessica\AppData\Local\Temp\EADACD2.exe C:\Users\Jessica\AppData\Local\Temp\EADAD00.exe C:\Users\Jessica\AppData\Local\Temp\EADAD01.exe C:\Users\Jessica\AppData\Local\Temp\EADAD02.exe C:\Users\Jessica\AppData\Local\Temp\EADAD1F.exe C:\Users\Jessica\AppData\Local\Temp\EADAD20.exe C:\Users\Jessica\AppData\Local\Temp\EADAD2F.exe C:\Users\Jessica\AppData\Local\Temp\EADAD30.exe C:\Users\Jessica\AppData\Local\Temp\EADAD5E.exe C:\Users\Jessica\AppData\Local\Temp\EADAD5F.exe C:\Users\Jessica\AppData\Local\Temp\EADAD7D.exe C:\Users\Jessica\AppData\Local\Temp\EADAD7E.exe C:\Users\Jessica\AppData\Local\Temp\EADAD8D.exe C:\Users\Jessica\AppData\Local\Temp\EADAD9C.exe C:\Users\Jessica\AppData\Local\Temp\EADADAC.exe C:\Users\Jessica\AppData\Local\Temp\EADADCB.exe C:\Users\Jessica\AppData\Local\Temp\EADADEA.exe C:\Users\Jessica\AppData\Local\Temp\EADAE09.exe C:\Users\Jessica\AppData\Local\Temp\EADAE19.exe C:\Users\Jessica\AppData\Local\Temp\EADAE1A.exe C:\Users\Jessica\AppData\Local\Temp\EADAE29.exe C:\Users\Jessica\AppData\Local\Temp\EADAE48.exe C:\Users\Jessica\AppData\Local\Temp\EADAE49.exe C:\Users\Jessica\AppData\Local\Temp\EADAE77.exe C:\Users\Jessica\AppData\Local\Temp\EADAE86.exe C:\Users\Jessica\AppData\Local\Temp\EADAEC5.exe C:\Users\Jessica\AppData\Local\Temp\EADAED4.exe C:\Users\Jessica\AppData\Local\Temp\EADAEE4.exe C:\Users\Jessica\AppData\Local\Temp\EADAF03.exe C:\Users\Jessica\AppData\Local\Temp\EADAF13.exe C:\Users\Jessica\AppData\Local\Temp\EADAF41.exe C:\Users\Jessica\AppData\Local\Temp\EADAF51.exe C:\Users\Jessica\AppData\Local\Temp\EADAF52.exe C:\Users\Jessica\AppData\Local\Temp\EADAF70.exe C:\Users\Jessica\AppData\Local\Temp\EADAF80.exe C:\Users\Jessica\AppData\Local\Temp\EADAF81.exe C:\Users\Jessica\AppData\Local\Temp\EADAF8F.exe C:\Users\Jessica\AppData\Local\Temp\EADAF9F.exe C:\Users\Jessica\AppData\Local\Temp\EADAFAF.exe C:\Users\Jessica\AppData\Local\Temp\EADAFDD.exe C:\Users\Jessica\AppData\Local\Temp\EADAFDE.exe C:\Users\Jessica\AppData\Local\Temp\EADAFED.exe C:\Users\Jessica\AppData\Local\Temp\EADAFFD.exe C:\Users\Jessica\AppData\Local\Temp\EADAFFE.exe C:\Users\Jessica\AppData\Local\Temp\EADAFFF.exe C:\Users\Jessica\AppData\Local\Temp\EADB01C.exe C:\Users\Jessica\AppData\Local\Temp\EADB03B.exe C:\Users\Jessica\AppData\Local\Temp\EADB04B.exe C:\Users\Jessica\AppData\Local\Temp\EADB05A.exe C:\Users\Jessica\AppData\Local\Temp\EADB05B.exe C:\Users\Jessica\AppData\Local\Temp\EADB06A.exe C:\Users\Jessica\AppData\Local\Temp\EADB07B.exe C:\Users\Jessica\AppData\Local\Temp\EADB0B8.exe C:\Users\Jessica\AppData\Local\Temp\EADB0B9.exe C:\Users\Jessica\AppData\Local\Temp\EADB0BA.exe C:\Users\Jessica\AppData\Local\Temp\EADB0C7.exe C:\Users\Jessica\AppData\Local\Temp\EADB0C8.exe C:\Users\Jessica\AppData\Local\Temp\EADB154.exe C:\Users\Jessica\AppData\Local\Temp\EADB163.exe C:\Users\Jessica\AppData\Local\Temp\EADB192.exe C:\Users\Jessica\AppData\Local\Temp\EADB193.exe C:\Users\Jessica\AppData\Local\Temp\EADB1D1.exe C:\Users\Jessica\AppData\Local\Temp\EADB1D2.exe C:\Users\Jessica\AppData\Local\Temp\EADB1F0.exe C:\Users\Jessica\AppData\Local\Temp\EADB1F1.exe C:\Users\Jessica\AppData\Local\Temp\EADB1F2.exe C:\Users\Jessica\AppData\Local\Temp\EADB1FF.exe C:\Users\Jessica\AppData\Local\Temp\EADB20F.exe C:\Users\Jessica\AppData\Local\Temp\EADB21F.exe C:\Users\Jessica\AppData\Local\Temp\EADB220.exe C:\Users\Jessica\AppData\Local\Temp\EADB23E.exe C:\Users\Jessica\AppData\Local\Temp\EADB23F.exe C:\Users\Jessica\AppData\Local\Temp\EADB24D.exe C:\Users\Jessica\AppData\Local\Temp\EADB26.exe C:\Users\Jessica\AppData\Local\Temp\EADB2BB.exe C:\Users\Jessica\AppData\Local\Temp\EADB2BC.exe C:\Users\Jessica\AppData\Local\Temp\EADB2CA.exe C:\Users\Jessica\AppData\Local\Temp\EADB2F9.exe C:\Users\Jessica\AppData\Local\Temp\EADB309.exe C:\Users\Jessica\AppData\Local\Temp\EADB318.exe C:\Users\Jessica\AppData\Local\Temp\EADB328.exe C:\Users\Jessica\AppData\Local\Temp\EADB329.exe C:\Users\Jessica\AppData\Local\Temp\EADB347.exe C:\Users\Jessica\AppData\Local\Temp\EADB357.exe C:\Users\Jessica\AppData\Local\Temp\EADB366.exe C:\Users\Jessica\AppData\Local\Temp\EADB376.exe C:\Users\Jessica\AppData\Local\Temp\EADB385.exe C:\Users\Jessica\AppData\Local\Temp\EADB3A5.exe C:\Users\Jessica\AppData\Local\Temp\EADB3A6.exe C:\Users\Jessica\AppData\Local\Temp\EADB3D3.exe C:\Users\Jessica\AppData\Local\Temp\EADB3E3.exe C:\Users\Jessica\AppData\Local\Temp\EADB3F3.exe C:\Users\Jessica\AppData\Local\Temp\EADB402.exe C:\Users\Jessica\AppData\Local\Temp\EADB403.exe C:\Users\Jessica\AppData\Local\Temp\EADB412.exe C:\Users\Jessica\AppData\Local\Temp\EADB441.exe C:\Users\Jessica\AppData\Local\Temp\EADB450.exe C:\Users\Jessica\AppData\Local\Temp\EADB46F.exe C:\Users\Jessica\AppData\Local\Temp\EADB47F.exe C:\Users\Jessica\AppData\Local\Temp\EADB48F.exe C:\Users\Jessica\AppData\Local\Temp\EADB49E.exe C:\Users\Jessica\AppData\Local\Temp\EADB49F.exe C:\Users\Jessica\AppData\Local\Temp\EADB4AE.exe C:\Users\Jessica\AppData\Local\Temp\EADB50B.exe C:\Users\Jessica\AppData\Local\Temp\EADB53A.exe C:\Users\Jessica\AppData\Local\Temp\EADB53B.exe C:\Users\Jessica\AppData\Local\Temp\EADB53C.exe C:\Users\Jessica\AppData\Local\Temp\EADB54A.exe C:\Users\Jessica\AppData\Local\Temp\EADB55.exe C:\Users\Jessica\AppData\Local\Temp\EADB579.exe C:\Users\Jessica\AppData\Local\Temp\EADB598.exe C:\Users\Jessica\AppData\Local\Temp\EADB5A7.exe C:\Users\Jessica\AppData\Local\Temp\EADB5B7.exe C:\Users\Jessica\AppData\Local\Temp\EADB5D6.exe C:\Users\Jessica\AppData\Local\Temp\EADB5D7.exe C:\Users\Jessica\AppData\Local\Temp\EADB5D8.exe C:\Users\Jessica\AppData\Local\Temp\EADB5E6.exe C:\Users\Jessica\AppData\Local\Temp\EADB634.exe C:\Users\Jessica\AppData\Local\Temp\EADB635.exe C:\Users\Jessica\AppData\Local\Temp\EADB653.exe C:\Users\Jessica\AppData\Local\Temp\EADB672.exe C:\Users\Jessica\AppData\Local\Temp\EADB691.exe C:\Users\Jessica\AppData\Local\Temp\EADB6A1.exe C:\Users\Jessica\AppData\Local\Temp\EADB6A2.exe C:\Users\Jessica\AppData\Local\Temp\EADB6C0.exe C:\Users\Jessica\AppData\Local\Temp\EADB6C1.exe C:\Users\Jessica\AppData\Local\Temp\EADB6EF.exe C:\Users\Jessica\AppData\Local\Temp\EADB6FF.exe C:\Users\Jessica\AppData\Local\Temp\EADB700.exe C:\Users\Jessica\AppData\Local\Temp\EADB71E.exe C:\Users\Jessica\AppData\Local\Temp\EADB72D.exe C:\Users\Jessica\AppData\Local\Temp\EADB73D.exe C:\Users\Jessica\AppData\Local\Temp\EADB74D.exe C:\Users\Jessica\AppData\Local\Temp\EADB75C.exe C:\Users\Jessica\AppData\Local\Temp\EADB75D.exe C:\Users\Jessica\AppData\Local\Temp\EADB75E.exe C:\Users\Jessica\AppData\Local\Temp\EADB78B.exe C:\Users\Jessica\AppData\Local\Temp\EADB78C.exe C:\Users\Jessica\AppData\Local\Temp\EADB78D.exe C:\Users\Jessica\AppData\Local\Temp\EADB79B.exe C:\Users\Jessica\AppData\Local\Temp\EADB7AA.exe C:\Users\Jessica\AppData\Local\Temp\EADB7C9.exe C:\Users\Jessica\AppData\Local\Temp\EADB7E9.exe C:\Users\Jessica\AppData\Local\Temp\EADB7F8.exe C:\Users\Jessica\AppData\Local\Temp\EADB7F9.exe C:\Users\Jessica\AppData\Local\Temp\EADB817.exe C:\Users\Jessica\AppData\Local\Temp\EADB827.exe C:\Users\Jessica\AppData\Local\Temp\EADB828.exe C:\Users\Jessica\AppData\Local\Temp\EADB837.exe C:\Users\Jessica\AppData\Local\Temp\EADB846.exe C:\Users\Jessica\AppData\Local\Temp\EADB856.exe C:\Users\Jessica\AppData\Local\Temp\EADB8A4.exe C:\Users\Jessica\AppData\Local\Temp\EADB8C3.exe C:\Users\Jessica\AppData\Local\Temp\EADB8E2.exe C:\Users\Jessica\AppData\Local\Temp\EADB8E3.exe C:\Users\Jessica\AppData\Local\Temp\EADB902.exe C:\Users\Jessica\AppData\Local\Temp\EADB911.exe C:\Users\Jessica\AppData\Local\Temp\EADB912.exe C:\Users\Jessica\AppData\Local\Temp\EADB96F.exe C:\Users\Jessica\AppData\Local\Temp\EADB970.exe C:\Users\Jessica\AppData\Local\Temp\EADB97E.exe C:\Users\Jessica\AppData\Local\Temp\EADB99D.exe C:\Users\Jessica\AppData\Local\Temp\EADB9BD.exe C:\Users\Jessica\AppData\Local\Temp\EADB9FB.exe C:\Users\Jessica\AppData\Local\Temp\EADBA1A.exe C:\Users\Jessica\AppData\Local\Temp\EADBA3.exe C:\Users\Jessica\AppData\Local\Temp\EADBA68.exe C:\Users\Jessica\AppData\Local\Temp\EADBA97.exe C:\Users\Jessica\AppData\Local\Temp\EADBAA7.exe C:\Users\Jessica\AppData\Local\Temp\EADBAA8.exe C:\Users\Jessica\AppData\Local\Temp\EADBAB6.exe C:\Users\Jessica\AppData\Local\Temp\EADBAB7.exe C:\Users\Jessica\AppData\Local\Temp\EADBAB8.exe C:\Users\Jessica\AppData\Local\Temp\EADBAC6.exe C:\Users\Jessica\AppData\Local\Temp\EADBB04.exe C:\Users\Jessica\AppData\Local\Temp\EADBB33.exe C:\Users\Jessica\AppData\Local\Temp\EADBB34.exe C:\Users\Jessica\AppData\Local\Temp\EADBB43.exe C:\Users\Jessica\AppData\Local\Temp\EADBB62.exe C:\Users\Jessica\AppData\Local\Temp\EADBB81.exe C:\Users\Jessica\AppData\Local\Temp\EADBB91.exe C:\Users\Jessica\AppData\Local\Temp\EADBB92.exe C:\Users\Jessica\AppData\Local\Temp\EADBBB0.exe C:\Users\Jessica\AppData\Local\Temp\EADBBBF.exe C:\Users\Jessica\AppData\Local\Temp\EADBBCF.exe C:\Users\Jessica\AppData\Local\Temp\EADBBD0.exe C:\Users\Jessica\AppData\Local\Temp\EADBBDF.exe C:\Users\Jessica\AppData\Local\Temp\EADBBEE.exe C:\Users\Jessica\AppData\Local\Temp\EADBC1D.exe C:\Users\Jessica\AppData\Local\Temp\EADBC1E.exe C:\Users\Jessica\AppData\Local\Temp\EADBC3C.exe C:\Users\Jessica\AppData\Local\Temp\EADBC6B.exe C:\Users\Jessica\AppData\Local\Temp\EADBC7B.exe C:\Users\Jessica\AppData\Local\Temp\EADBC8A.exe C:\Users\Jessica\AppData\Local\Temp\EADBC9A.exe C:\Users\Jessica\AppData\Local\Temp\EADBC9B.exe C:\Users\Jessica\AppData\Local\Temp\EADBC9C.exe C:\Users\Jessica\AppData\Local\Temp\EADBC9D.exe C:\Users\Jessica\AppData\Local\Temp\EADBCB9.exe C:\Users\Jessica\AppData\Local\Temp\EADBCD8.exe C:\Users\Jessica\AppData\Local\Temp\EADBCD9.exe C:\Users\Jessica\AppData\Local\Temp\EADBCDA.exe C:\Users\Jessica\AppData\Local\Temp\EADBCF7.exe C:\Users\Jessica\AppData\Local\Temp\EADBD26.exe C:\Users\Jessica\AppData\Local\Temp\EADBD36.exe C:\Users\Jessica\AppData\Local\Temp\EADBD37.exe C:\Users\Jessica\AppData\Local\Temp\EADBD45.exe C:\Users\Jessica\AppData\Local\Temp\EADBD74.exe C:\Users\Jessica\AppData\Local\Temp\EADBD93.exe C:\Users\Jessica\AppData\Local\Temp\EADBDA3.exe C:\Users\Jessica\AppData\Local\Temp\EADBDA4.exe C:\Users\Jessica\AppData\Local\Temp\EADBDB3.exe C:\Users\Jessica\AppData\Local\Temp\EADBDB4.exe C:\Users\Jessica\AppData\Local\Temp\EADBDF1.exe C:\Users\Jessica\AppData\Local\Temp\EADBE01.exe C:\Users\Jessica\AppData\Local\Temp\EADBE4F.exe C:\Users\Jessica\AppData\Local\Temp\EADBE50.exe C:\Users\Jessica\AppData\Local\Temp\EADBE6E.exe C:\Users\Jessica\AppData\Local\Temp\EADBE7D.exe C:\Users\Jessica\AppData\Local\Temp\EADBECB.exe C:\Users\Jessica\AppData\Local\Temp\EADBF0A.exe C:\Users\Jessica\AppData\Local\Temp\EADBF29.exe C:\Users\Jessica\AppData\Local\Temp\EADBF58.exe C:\Users\Jessica\AppData\Local\Temp\EADBFB5.exe C:\Users\Jessica\AppData\Local\Temp\EADBFD5.exe C:\Users\Jessica\AppData\Local\Temp\EADBFE4.exe C:\Users\Jessica\AppData\Local\Temp\EADC01.exe C:\Users\Jessica\AppData\Local\Temp\EADC042.exe C:\Users\Jessica\AppData\Local\Temp\EADC051.exe C:\Users\Jessica\AppData\Local\Temp\EADC0FD.exe C:\Users\Jessica\AppData\Local\Temp\EADC0FE.exe C:\Users\Jessica\AppData\Local\Temp\EADC10.exe C:\Users\Jessica\AppData\Local\Temp\EADC11C.exe C:\Users\Jessica\AppData\Local\Temp\EADC11D.exe C:\Users\Jessica\AppData\Local\Temp\EADC14B.exe C:\Users\Jessica\AppData\Local\Temp\EADC15B.exe C:\Users\Jessica\AppData\Local\Temp\EADC1A9.exe C:\Users\Jessica\AppData\Local\Temp\EADC1D7.exe C:\Users\Jessica\AppData\Local\Temp\EADC1D8.exe C:\Users\Jessica\AppData\Local\Temp\EADC216.exe C:\Users\Jessica\AppData\Local\Temp\EADC235.exe C:\Users\Jessica\AppData\Local\Temp\EADC245.exe C:\Users\Jessica\AppData\Local\Temp\EADC246.exe C:\Users\Jessica\AppData\Local\Temp\EADC283.exe C:\Users\Jessica\AppData\Local\Temp\EADC2A2.exe C:\Users\Jessica\AppData\Local\Temp\EADC2A3.exe C:\Users\Jessica\AppData\Local\Temp\EADC2B2.exe C:\Users\Jessica\AppData\Local\Temp\EADC2E1.exe C:\Users\Jessica\AppData\Local\Temp\EADC2E2.exe C:\Users\Jessica\AppData\Local\Temp\EADC30.exe C:\Users\Jessica\AppData\Local\Temp\EADC31.exe C:\Users\Jessica\AppData\Local\Temp\EADC31F.exe C:\Users\Jessica\AppData\Local\Temp\EADC32.exe C:\Users\Jessica\AppData\Local\Temp\EADC33E.exe C:\Users\Jessica\AppData\Local\Temp\EADC33F.exe C:\Users\Jessica\AppData\Local\Temp\EADC37D.exe C:\Users\Jessica\AppData\Local\Temp\EADC3CB.exe C:\Users\Jessica\AppData\Local\Temp\EADC3CC.exe C:\Users\Jessica\AppData\Local\Temp\EADC3DA.exe C:\Users\Jessica\AppData\Local\Temp\EADC3EA.exe C:\Users\Jessica\AppData\Local\Temp\EADC3EB.exe C:\Users\Jessica\AppData\Local\Temp\EADC3EC.exe C:\Users\Jessica\AppData\Local\Temp\EADC457.exe C:\Users\Jessica\AppData\Local\Temp\EADC4B5.exe C:\Users\Jessica\AppData\Local\Temp\EADC4C4.exe C:\Users\Jessica\AppData\Local\Temp\EADC4D4.exe C:\Users\Jessica\AppData\Local\Temp\EADC551.exe C:\Users\Jessica\AppData\Local\Temp\EADC560.exe C:\Users\Jessica\AppData\Local\Temp\EADC57F.exe C:\Users\Jessica\AppData\Local\Temp\EADC5AE.exe C:\Users\Jessica\AppData\Local\Temp\EADC5CD.exe C:\Users\Jessica\AppData\Local\Temp\EADC5E.exe C:\Users\Jessica\AppData\Local\Temp\EADC5ED.exe C:\Users\Jessica\AppData\Local\Temp\EADC5FC.exe C:\Users\Jessica\AppData\Local\Temp\EADC60C.exe C:\Users\Jessica\AppData\Local\Temp\EADC61B.exe C:\Users\Jessica\AppData\Local\Temp\EADC62B.exe C:\Users\Jessica\AppData\Local\Temp\EADC62C.exe C:\Users\Jessica\AppData\Local\Temp\EADC62D.exe C:\Users\Jessica\AppData\Local\Temp\EADC65A.exe C:\Users\Jessica\AppData\Local\Temp\EADC65B.exe C:\Users\Jessica\AppData\Local\Temp\EADC669.exe C:\Users\Jessica\AppData\Local\Temp\EADC66A.exe C:\Users\Jessica\AppData\Local\Temp\EADC6A8.exe C:\Users\Jessica\AppData\Local\Temp\EADC6C7.exe C:\Users\Jessica\AppData\Local\Temp\EADC6C8.exe C:\Users\Jessica\AppData\Local\Temp\EADC6D7.exe C:\Users\Jessica\AppData\Local\Temp\EADC734.exe C:\Users\Jessica\AppData\Local\Temp\EADC744.exe C:\Users\Jessica\AppData\Local\Temp\EADC763.exe C:\Users\Jessica\AppData\Local\Temp\EADC773.exe C:\Users\Jessica\AppData\Local\Temp\EADC774.exe C:\Users\Jessica\AppData\Local\Temp\EADC775.exe C:\Users\Jessica\AppData\Local\Temp\EADC782.exe C:\Users\Jessica\AppData\Local\Temp\EADC792.exe C:\Users\Jessica\AppData\Local\Temp\EADC7B1.exe C:\Users\Jessica\AppData\Local\Temp\EADC7B2.exe C:\Users\Jessica\AppData\Local\Temp\EADC7B3.exe C:\Users\Jessica\AppData\Local\Temp\EADC7E0.exe C:\Users\Jessica\AppData\Local\Temp\EADC7FF.exe C:\Users\Jessica\AppData\Local\Temp\EADC800.exe C:\Users\Jessica\AppData\Local\Temp\EADC802.exe C:\Users\Jessica\AppData\Local\Temp\EADC81E.exe C:\Users\Jessica\AppData\Local\Temp\EADC84D.exe C:\Users\Jessica\AppData\Local\Temp\EADC85D.exe C:\Users\Jessica\AppData\Local\Temp\EADC86C.exe C:\Users\Jessica\AppData\Local\Temp\EADC88B.exe C:\Users\Jessica\AppData\Local\Temp\EADC89B.exe C:\Users\Jessica\AppData\Local\Temp\EADC8D9.exe C:\Users\Jessica\AppData\Local\Temp\EADC927.exe C:\Users\Jessica\AppData\Local\Temp\EADC928.exe C:\Users\Jessica\AppData\Local\Temp\EADC966.exe C:\Users\Jessica\AppData\Local\Temp\EADC975.exe C:\Users\Jessica\AppData\Local\Temp\EADC9B4.exe C:\Users\Jessica\AppData\Local\Temp\EADC9D3.exe C:\Users\Jessica\AppData\Local\Temp\EADC9F2.exe C:\Users\Jessica\AppData\Local\Temp\EADCA31.exe C:\Users\Jessica\AppData\Local\Temp\EADCA50.exe C:\Users\Jessica\AppData\Local\Temp\EADCA51.exe C:\Users\Jessica\AppData\Local\Temp\EADCA8E.exe C:\Users\Jessica\AppData\Local\Temp\EADCAAD.exe C:\Users\Jessica\AppData\Local\Temp\EADCAAE.exe C:\Users\Jessica\AppData\Local\Temp\EADCAFB.exe C:\Users\Jessica\AppData\Local\Temp\EADCB0B.exe C:\Users\Jessica\AppData\Local\Temp\EADCB1B.exe C:\Users\Jessica\AppData\Local\Temp\EADCB2A.exe C:\Users\Jessica\AppData\Local\Temp\EADCB2B.exe C:\Users\Jessica\AppData\Local\Temp\EADCB3A.exe C:\Users\Jessica\AppData\Local\Temp\EADCB59.exe C:\Users\Jessica\AppData\Local\Temp\EADCB5A.exe C:\Users\Jessica\AppData\Local\Temp\EADCB69.exe C:\Users\Jessica\AppData\Local\Temp\EADCB88.exe C:\Users\Jessica\AppData\Local\Temp\EADCBC6.exe C:\Users\Jessica\AppData\Local\Temp\EADCBC7.exe C:\Users\Jessica\AppData\Local\Temp\EADCC05.exe C:\Users\Jessica\AppData\Local\Temp\EADCC24.exe C:\Users\Jessica\AppData\Local\Temp\EADCC91.exe C:\Users\Jessica\AppData\Local\Temp\EADCCCF.exe C:\Users\Jessica\AppData\Local\Temp\EADCCFE.exe C:\Users\Jessica\AppData\Local\Temp\EADCD0E.exe C:\Users\Jessica\AppData\Local\Temp\EADCD4C.exe C:\Users\Jessica\AppData\Local\Temp\EADCD5C.exe C:\Users\Jessica\AppData\Local\Temp\EADCD7B.exe C:\Users\Jessica\AppData\Local\Temp\EADCD8B.exe C:\Users\Jessica\AppData\Local\Temp\EADCD9A.exe C:\Users\Jessica\AppData\Local\Temp\EADCDAA.exe C:\Users\Jessica\AppData\Local\Temp\EADCDAB.exe C:\Users\Jessica\AppData\Local\Temp\EADCDC9.exe C:\Users\Jessica\AppData\Local\Temp\EADCDE8.exe C:\Users\Jessica\AppData\Local\Temp\EADCE07.exe C:\Users\Jessica\AppData\Local\Temp\EADCE08.exe C:\Users\Jessica\AppData\Local\Temp\EADCE17.exe C:\Users\Jessica\AppData\Local\Temp\EADCE18.exe C:\Users\Jessica\AppData\Local\Temp\EADCE46.exe C:\Users\Jessica\AppData\Local\Temp\EADCE47.exe C:\Users\Jessica\AppData\Local\Temp\EADCE65.exe C:\Users\Jessica\AppData\Local\Temp\EADCE66.exe C:\Users\Jessica\AppData\Local\Temp\EADCEC3.exe C:\Users\Jessica\AppData\Local\Temp\EADCEC4.exe C:\Users\Jessica\AppData\Local\Temp\EADCEF1.exe C:\Users\Jessica\AppData\Local\Temp\EADCF11.exe C:\Users\Jessica\AppData\Local\Temp\EADCF30.exe C:\Users\Jessica\AppData\Local\Temp\EADCF9D.exe C:\Users\Jessica\AppData\Local\Temp\EADCFAD.exe C:\Users\Jessica\AppData\Local\Temp\EADCFCC.exe C:\Users\Jessica\AppData\Local\Temp\EADCFDB.exe C:\Users\Jessica\AppData\Local\Temp\EADCFEC.exe C:\Users\Jessica\AppData\Local\Temp\EADCFFB.exe C:\Users\Jessica\AppData\Local\Temp\EADD02A.exe C:\Users\Jessica\AppData\Local\Temp\EADD077.exe C:\Users\Jessica\AppData\Local\Temp\EADD0C5.exe C:\Users\Jessica\AppData\Local\Temp\EADD0C6.exe C:\Users\Jessica\AppData\Local\Temp\EADD0D5.exe C:\Users\Jessica\AppData\Local\Temp\EADD123.exe C:\Users\Jessica\AppData\Local\Temp\EADD133.exe C:\Users\Jessica\AppData\Local\Temp\EADD152.exe C:\Users\Jessica\AppData\Local\Temp\EADD1A0.exe C:\Users\Jessica\AppData\Local\Temp\EADD1CF.exe C:\Users\Jessica\AppData\Local\Temp\EADD1D0.exe C:\Users\Jessica\AppData\Local\Temp\EADD20D.exe C:\Users\Jessica\AppData\Local\Temp\EADD20E.exe C:\Users\Jessica\AppData\Local\Temp\EADD23C.exe C:\Users\Jessica\AppData\Local\Temp\EADD25B.exe C:\Users\Jessica\AppData\Local\Temp\EADD2A9.exe C:\Users\Jessica\AppData\Local\Temp\EADD307.exe C:\Users\Jessica\AppData\Local\Temp\EADD326.exe C:\Users\Jessica\AppData\Local\Temp\EADD335.exe C:\Users\Jessica\AppData\Local\Temp\EADD39.exe C:\Users\Jessica\AppData\Local\Temp\EADD3C2.exe C:\Users\Jessica\AppData\Local\Temp\EADD3C3.exe C:\Users\Jessica\AppData\Local\Temp\EADD401.exe C:\Users\Jessica\AppData\Local\Temp\EADD41F.exe C:\Users\Jessica\AppData\Local\Temp\EADD420.exe C:\Users\Jessica\AppData\Local\Temp\EADD48D.exe C:\Users\Jessica\AppData\Local\Temp\EADD49C.exe C:\Users\Jessica\AppData\Local\Temp\EADD4AC.exe C:\Users\Jessica\AppData\Local\Temp\EADD4CB.exe C:\Users\Jessica\AppData\Local\Temp\EADD538.exe C:\Users\Jessica\AppData\Local\Temp\EADD598.exe C:\Users\Jessica\AppData\Local\Temp\EADD5B5.exe C:\Users\Jessica\AppData\Local\Temp\EADD613.exe C:\Users\Jessica\AppData\Local\Temp\EADD614.exe C:\Users\Jessica\AppData\Local\Temp\EADD632.exe C:\Users\Jessica\AppData\Local\Temp\EADD651.exe C:\Users\Jessica\AppData\Local\Temp\EADD670.exe C:\Users\Jessica\AppData\Local\Temp\EADD671.exe C:\Users\Jessica\AppData\Local\Temp\EADD6AF.exe C:\Users\Jessica\AppData\Local\Temp\EADD6BE.exe C:\Users\Jessica\AppData\Local\Temp\EADD6CE.exe C:\Users\Jessica\AppData\Local\Temp\EADD6ED.exe C:\Users\Jessica\AppData\Local\Temp\EADD6FD.exe C:\Users\Jessica\AppData\Local\Temp\EADD74B.exe C:\Users\Jessica\AppData\Local\Temp\EADD76A.exe C:\Users\Jessica\AppData\Local\Temp\EADD77.exe C:\Users\Jessica\AppData\Local\Temp\EADD78.exe C:\Users\Jessica\AppData\Local\Temp\EADD7A8.exe C:\Users\Jessica\AppData\Local\Temp\EADD7B8.exe C:\Users\Jessica\AppData\Local\Temp\EADD7C7.exe C:\Users\Jessica\AppData\Local\Temp\EADD7C8.exe C:\Users\Jessica\AppData\Local\Temp\EADD7D7.exe C:\Users\Jessica\AppData\Local\Temp\EADD7F6.exe C:\Users\Jessica\AppData\Local\Temp\EADD825.exe C:\Users\Jessica\AppData\Local\Temp\EADD826.exe C:\Users\Jessica\AppData\Local\Temp\EADD883.exe C:\Users\Jessica\AppData\Local\Temp\EADD8F0.exe C:\Users\Jessica\AppData\Local\Temp\EADD90F.exe C:\Users\Jessica\AppData\Local\Temp\EADD910.exe C:\Users\Jessica\AppData\Local\Temp\EADD93E.exe C:\Users\Jessica\AppData\Local\Temp\EADD94D.exe C:\Users\Jessica\AppData\Local\Temp\EADD99C.exe C:\Users\Jessica\AppData\Local\Temp\EADD9CB.exe C:\Users\Jessica\AppData\Local\Temp\EADDA09.exe C:\Users\Jessica\AppData\Local\Temp\EADDA0A.exe C:\Users\Jessica\AppData\Local\Temp\EADDA28.exe C:\Users\Jessica\AppData\Local\Temp\EADDA29.exe C:\Users\Jessica\AppData\Local\Temp\EADDA2A.exe C:\Users\Jessica\AppData\Local\Temp\EADDA6.exe C:\Users\Jessica\AppData\Local\Temp\EADDA77.exe C:\Users\Jessica\AppData\Local\Temp\EADDA85.exe C:\Users\Jessica\AppData\Local\Temp\EADDAD3.exe C:\Users\Jessica\AppData\Local\Temp\EADDB12.exe C:\Users\Jessica\AppData\Local\Temp\EADDB22.exe C:\Users\Jessica\AppData\Local\Temp\EADDB31.exe C:\Users\Jessica\AppData\Local\Temp\EADDB41.exe C:\Users\Jessica\AppData\Local\Temp\EADDB6F.exe C:\Users\Jessica\AppData\Local\Temp\EADDB8F.exe C:\Users\Jessica\AppData\Local\Temp\EADDB90.exe C:\Users\Jessica\AppData\Local\Temp\EADDBFC.exe C:\Users\Jessica\AppData\Local\Temp\EADDC1B.exe C:\Users\Jessica\AppData\Local\Temp\EADDC1C.exe C:\Users\Jessica\AppData\Local\Temp\EADDC3A.exe C:\Users\Jessica\AppData\Local\Temp\EADDC59.exe C:\Users\Jessica\AppData\Local\Temp\EADDCA7.exe C:\Users\Jessica\AppData\Local\Temp\EADDCC7.exe C:\Users\Jessica\AppData\Local\Temp\EADDCE6.exe C:\Users\Jessica\AppData\Local\Temp\EADDCF5.exe C:\Users\Jessica\AppData\Local\Temp\EADDD63.exe C:\Users\Jessica\AppData\Local\Temp\EADDD72.exe C:\Users\Jessica\AppData\Local\Temp\EADDD82.exe C:\Users\Jessica\AppData\Local\Temp\EADDDE0.exe C:\Users\Jessica\AppData\Local\Temp\EADDE0E.exe C:\Users\Jessica\AppData\Local\Temp\EADDE3D.exe C:\Users\Jessica\AppData\Local\Temp\EADDE7B.exe C:\Users\Jessica\AppData\Local\Temp\EADDE9B.exe C:\Users\Jessica\AppData\Local\Temp\EADDED9.exe C:\Users\Jessica\AppData\Local\Temp\EADDEE9.exe C:\Users\Jessica\AppData\Local\Temp\EADDF17.exe C:\Users\Jessica\AppData\Local\Temp\EADDF56.exe C:\Users\Jessica\AppData\Local\Temp\EADDF57.exe C:\Users\Jessica\AppData\Local\Temp\EADDF58.exe C:\Users\Jessica\AppData\Local\Temp\EADDF75.exe C:\Users\Jessica\AppData\Local\Temp\EADDF85.exe C:\Users\Jessica\AppData\Local\Temp\EADDFB4.exe C:\Users\Jessica\AppData\Local\Temp\EADDFC3.exe C:\Users\Jessica\AppData\Local\Temp\EADDFF2.exe C:\Users\Jessica\AppData\Local\Temp\EADE001.exe C:\Users\Jessica\AppData\Local\Temp\EADE011.exe C:\Users\Jessica\AppData\Local\Temp\EADE021.exe C:\Users\Jessica\AppData\Local\Temp\EADE04.exe C:\Users\Jessica\AppData\Local\Temp\EADE05.exe C:\Users\Jessica\AppData\Local\Temp\EADE07E.exe C:\Users\Jessica\AppData\Local\Temp\EADE0FB.exe C:\Users\Jessica\AppData\Local\Temp\EADE10B.exe C:\Users\Jessica\AppData\Local\Temp\EADE168.exe C:\Users\Jessica\AppData\Local\Temp\EADE188.exe C:\Users\Jessica\AppData\Local\Temp\EADE1C6.exe C:\Users\Jessica\AppData\Local\Temp\EADE1C7.exe C:\Users\Jessica\AppData\Local\Temp\EADE1C8.exe C:\Users\Jessica\AppData\Local\Temp\EADE204.exe C:\Users\Jessica\AppData\Local\Temp\EADE281.exe C:\Users\Jessica\AppData\Local\Temp\EADE2BF.exe C:\Users\Jessica\AppData\Local\Temp\EADE2EE.exe C:\Users\Jessica\AppData\Local\Temp\EADE31D.exe C:\Users\Jessica\AppData\Local\Temp\EADE35B.exe C:\Users\Jessica\AppData\Local\Temp\EADE3A9.exe C:\Users\Jessica\AppData\Local\Temp\EADE3AA.exe C:\Users\Jessica\AppData\Local\Temp\EADE42.exe C:\Users\Jessica\AppData\Local\Temp\EADE493.exe C:\Users\Jessica\AppData\Local\Temp\EADE4E2.exe C:\Users\Jessica\AppData\Local\Temp\EADE52.exe C:\Users\Jessica\AppData\Local\Temp\EADE520.exe C:\Users\Jessica\AppData\Local\Temp\EADE55E.exe C:\Users\Jessica\AppData\Local\Temp\EADE59D.exe C:\Users\Jessica\AppData\Local\Temp\EADE5AC.exe C:\Users\Jessica\AppData\Local\Temp\EADE5BC.exe C:\Users\Jessica\AppData\Local\Temp\EADE60A.exe C:\Users\Jessica\AppData\Local\Temp\EADE619.exe C:\Users\Jessica\AppData\Local\Temp\EADE629.exe C:\Users\Jessica\AppData\Local\Temp\EADE658.exe C:\Users\Jessica\AppData\Local\Temp\EADE6B5.exe C:\Users\Jessica\AppData\Local\Temp\EADE6D5.exe C:\Users\Jessica\AppData\Local\Temp\EADE703.exe C:\Users\Jessica\AppData\Local\Temp\EADE732.exe C:\Users\Jessica\AppData\Local\Temp\EADE780.exe C:\Users\Jessica\AppData\Local\Temp\EADE79F.exe C:\Users\Jessica\AppData\Local\Temp\EADE7AF.exe C:\Users\Jessica\AppData\Local\Temp\EADE7B0.exe C:\Users\Jessica\AppData\Local\Temp\EADE7FD.exe C:\Users\Jessica\AppData\Local\Temp\EADE81D.exe C:\Users\Jessica\AppData\Local\Temp\EADE84B.exe C:\Users\Jessica\AppData\Local\Temp\EADE84C.exe C:\Users\Jessica\AppData\Local\Temp\EADE899.exe C:\Users\Jessica\AppData\Local\Temp\EADE89A.exe C:\Users\Jessica\AppData\Local\Temp\EADE8C8.exe C:\Users\Jessica\AppData\Local\Temp\EADE8D7.exe C:\Users\Jessica\AppData\Local\Temp\EADE916.exe C:\Users\Jessica\AppData\Local\Temp\EADE925.exe C:\Users\Jessica\AppData\Local\Temp\EADE926.exe C:\Users\Jessica\AppData\Local\Temp\EADE927.exe C:\Users\Jessica\AppData\Local\Temp\EADE993.exe C:\Users\Jessica\AppData\Local\Temp\EADE9B2.exe C:\Users\Jessica\AppData\Local\Temp\EADE9D1.exe C:\Users\Jessica\AppData\Local\Temp\EADEA1F.exe C:\Users\Jessica\AppData\Local\Temp\EADEA3E.exe C:\Users\Jessica\AppData\Local\Temp\EADEA6D.exe C:\Users\Jessica\AppData\Local\Temp\EADEA7D.exe C:\Users\Jessica\AppData\Local\Temp\EADEACB.exe C:\Users\Jessica\AppData\Local\Temp\EADEADA.exe C:\Users\Jessica\AppData\Local\Temp\EADEAF.exe C:\Users\Jessica\AppData\Local\Temp\EADEB76.exe C:\Users\Jessica\AppData\Local\Temp\EADEBC4.exe C:\Users\Jessica\AppData\Local\Temp\EADEC12.exe C:\Users\Jessica\AppData\Local\Temp\EADEC22.exe C:\Users\Jessica\AppData\Local\Temp\EADEC31.exe C:\Users\Jessica\AppData\Local\Temp\EADEC8F.exe C:\Users\Jessica\AppData\Local\Temp\EADECAE.exe C:\Users\Jessica\AppData\Local\Temp\EADECAF.exe C:\Users\Jessica\AppData\Local\Temp\EADECCE.exe C:\Users\Jessica\AppData\Local\Temp\EADECE.exe C:\Users\Jessica\AppData\Local\Temp\EADECED.exe C:\Users\Jessica\AppData\Local\Temp\EADED1C.exe C:\Users\Jessica\AppData\Local\Temp\EADED69.exe C:\Users\Jessica\AppData\Local\Temp\EADED98.exe C:\Users\Jessica\AppData\Local\Temp\EADEDD7.exe C:\Users\Jessica\AppData\Local\Temp\EADEDF6.exe C:\Users\Jessica\AppData\Local\Temp\EADEE25.exe C:\Users\Jessica\AppData\Local\Temp\EADEE34.exe C:\Users\Jessica\AppData\Local\Temp\EADEE44.exe C:\Users\Jessica\AppData\Local\Temp\EADEEA1.exe C:\Users\Jessica\AppData\Local\Temp\EADEEE.exe C:\Users\Jessica\AppData\Local\Temp\EADEEEF.exe C:\Users\Jessica\AppData\Local\Temp\EADEEFF.exe C:\Users\Jessica\AppData\Local\Temp\EADEF3E.exe C:\Users\Jessica\AppData\Local\Temp\EADF066.exe C:\Users\Jessica\AppData\Local\Temp\EADF0A4.exe C:\Users\Jessica\AppData\Local\Temp\EADF0A5.exe C:\Users\Jessica\AppData\Local\Temp\EADF0D.exe C:\Users\Jessica\AppData\Local\Temp\EADF111.exe C:\Users\Jessica\AppData\Local\Temp\EADF112.exe C:\Users\Jessica\AppData\Local\Temp\EADF17F.exe C:\Users\Jessica\AppData\Local\Temp\EADF180.exe C:\Users\Jessica\AppData\Local\Temp\EADF20B.exe C:\Users\Jessica\AppData\Local\Temp\EADF269.exe C:\Users\Jessica\AppData\Local\Temp\EADF2A7.exe C:\Users\Jessica\AppData\Local\Temp\EADF314.exe C:\Users\Jessica\AppData\Local\Temp\EADF362.exe C:\Users\Jessica\AppData\Local\Temp\EADF366.exe C:\Users\Jessica\AppData\Local\Temp\EADF3FF.exe C:\Users\Jessica\AppData\Local\Temp\EADF42D.exe C:\Users\Jessica\AppData\Local\Temp\EADF44C.exe C:\Users\Jessica\AppData\Local\Temp\EADF4B.exe C:\Users\Jessica\AppData\Local\Temp\EADF4BA.exe C:\Users\Jessica\AppData\Local\Temp\EADF4E8.exe C:\Users\Jessica\AppData\Local\Temp\EADF517.exe C:\Users\Jessica\AppData\Local\Temp\EADF556.exe C:\Users\Jessica\AppData\Local\Temp\EADF5C3.exe C:\Users\Jessica\AppData\Local\Temp\EADF64F.exe C:\Users\Jessica\AppData\Local\Temp\EADF739.exe C:\Users\Jessica\AppData\Local\Temp\EADF758.exe C:\Users\Jessica\AppData\Local\Temp\EADF778.exe C:\Users\Jessica\AppData\Local\Temp\EADF7D5.exe C:\Users\Jessica\AppData\Local\Temp\EADF7E5.exe C:\Users\Jessica\AppData\Local\Temp\EADF804.exe C:\Users\Jessica\AppData\Local\Temp\EADF805.exe C:\Users\Jessica\AppData\Local\Temp\EADF814.exe C:\Users\Jessica\AppData\Local\Temp\EADF833.exe C:\Users\Jessica\AppData\Local\Temp\EADF862.exe C:\Users\Jessica\AppData\Local\Temp\EADF871.exe C:\Users\Jessica\AppData\Local\Temp\EADF881.exe C:\Users\Jessica\AppData\Local\Temp\EADF8A0.exe C:\Users\Jessica\AppData\Local\Temp\EADF8BF.exe C:\Users\Jessica\AppData\Local\Temp\EADF8D.exe C:\Users\Jessica\AppData\Local\Temp\EADFA26.exe C:\Users\Jessica\AppData\Local\Temp\EADFA36.exe C:\Users\Jessica\AppData\Local\Temp\EADFA9.exe C:\Users\Jessica\AppData\Local\Temp\EADFAA4.exe C:\Users\Jessica\AppData\Local\Temp\EADFAC2.exe C:\Users\Jessica\AppData\Local\Temp\EADFAD2.exe C:\Users\Jessica\AppData\Local\Temp\EADFAE1.exe C:\Users\Jessica\AppData\Local\Temp\EADFB4E.exe C:\Users\Jessica\AppData\Local\Temp\EADFB5E.exe C:\Users\Jessica\AppData\Local\Temp\EADFB8.exe C:\Users\Jessica\AppData\Local\Temp\EADFB8D.exe C:\Users\Jessica\AppData\Local\Temp\EADFB9C.exe C:\Users\Jessica\AppData\Local\Temp\EADFBBC.exe C:\Users\Jessica\AppData\Local\Temp\EADFCA6.exe C:\Users\Jessica\AppData\Local\Temp\EADFD03.exe C:\Users\Jessica\AppData\Local\Temp\EADFD22.exe C:\Users\Jessica\AppData\Local\Temp\EADFD32.exe C:\Users\Jessica\AppData\Local\Temp\EADFD51.exe C:\Users\Jessica\AppData\Local\Temp\EADFD70.exe C:\Users\Jessica\AppData\Local\Temp\EADFD71.exe C:\Users\Jessica\AppData\Local\Temp\EADFE7A.exe C:\Users\Jessica\AppData\Local\Temp\EADFE7B.exe C:\Users\Jessica\AppData\Local\Temp\EADFE89.exe C:\Users\Jessica\AppData\Local\Temp\EADFE99.exe C:\Users\Jessica\AppData\Local\Temp\EADFEC8.exe C:\Users\Jessica\AppData\Local\Temp\EADFED9.exe C:\Users\Jessica\AppData\Local\Temp\EADFF16.exe C:\Users\Jessica\AppData\Local\Temp\EADFF35.exe C:\Users\Jessica\AppData\Local\Temp\EADFF93.exe C:\Users\Jessica\AppData\Local\Temp\EADFFA2.exe C:\Users\Jessica\AppData\Local\Temp\EADFFC1.exe C:\Users\Jessica\AppData\Local\Temp\EADFFE0.exe C:\Users\Jessica\AppData\Local\Temp\EADFFF0.exe C:\Users\Jessica\AppData\Local\Temp\IcqUpdater.exe C:\Users\Jessica\AppData\Local\Temp\IminentSetup.exe C:\Users\Jessica\AppData\Local\Temp\installerdll109403.dll C:\Users\Jessica\AppData\Local\Temp\installerdll109965.dll C:\Users\Jessica\AppData\Local\Temp\installerdll111213.dll C:\Users\Jessica\AppData\Local\Temp\installerdll120073.dll C:\Users\Jessica\AppData\Local\Temp\installerdll1229818.dll C:\Users\Jessica\AppData\Local\Temp\installerdll125144.dll C:\Users\Jessica\AppData\Local\Temp\installerdll125487.dll C:\Users\Jessica\AppData\Local\Temp\installerdll126126.dll C:\Users\Jessica\AppData\Local\Temp\installerdll126142.dll C:\Users\Jessica\AppData\Local\Temp\installerdll126672.dll C:\Users\Jessica\AppData\Local\Temp\installerdll127203.dll C:\Users\Jessica\AppData\Local\Temp\installerdll127593.dll C:\Users\Jessica\AppData\Local\Temp\installerdll128919.dll C:\Users\Jessica\AppData\Local\Temp\installerdll131555.dll C:\Users\Jessica\AppData\Local\Temp\installerdll132632.dll C:\Users\Jessica\AppData\Local\Temp\installerdll133302.dll C:\Users\Jessica\AppData\Local\Temp\installerdll138794.dll C:\Users\Jessica\AppData\Local\Temp\installerdll138918.dll C:\Users\Jessica\AppData\Local\Temp\installerdll143115.dll C:\Users\Jessica\AppData\Local\Temp\installerdll144737.dll C:\Users\Jessica\AppData\Local\Temp\installerdll146001.dll C:\Users\Jessica\AppData\Local\Temp\installerdll155938.dll C:\Users\Jessica\AppData\Local\Temp\installerdll161975.dll C:\Users\Jessica\AppData\Local\Temp\installerdll163707.dll C:\Users\Jessica\AppData\Local\Temp\installerdll167342.dll C:\Users\Jessica\AppData\Local\Temp\installerdll176671.dll C:\Users\Jessica\AppData\Local\Temp\installerdll176749.dll C:\Users\Jessica\AppData\Local\Temp\installerdll200102.dll C:\Users\Jessica\AppData\Local\Temp\installerdll200227.dll C:\Users\Jessica\AppData\Local\Temp\installerdll254422.dll C:\Users\Jessica\AppData\Local\Temp\installerdll275965.dll C:\Users\Jessica\AppData\Local\Temp\installerdll292720.dll C:\Users\Jessica\AppData\Local\Temp\installerdll306791.dll C:\Users\Jessica\AppData\Local\Temp\installerdll343841.dll C:\Users\Jessica\AppData\Local\Temp\installerdll345713.dll C:\Users\Jessica\AppData\Local\Temp\installerdll369410.dll C:\Users\Jessica\AppData\Local\Temp\installerdll491137.dll C:\Users\Jessica\AppData\Local\Temp\installerdll5760274.dll C:\Users\Jessica\AppData\Local\Temp\jre-7u45-windows-i586-iftw.exe C:\Users\Jessica\AppData\Local\Temp\jre-8u31-windows-au.exe C:\Users\Jessica\AppData\Local\Temp\SearchWithGoogleUpdate.exe C:\Users\Jessica\AppData\Local\Temp\Setup.exe C:\Users\Jessica\AppData\Local\Temp\SkypeSetup.exe C:\Users\Jessica\AppData\Local\Temp\UninstallEADM.dll C:\Users\Jessica\AppData\Local\Temp\ZDATAI50.DLL C:\Users\Jessica\AppData\Local\Temp\_WUTL95.DLL ==================== Bamital & volsnap Check ================= (There is no automatic fix for files that do not pass verification.) C:\windows\explorer.exe => File is digitally signed C:\windows\system32\winlogon.exe => File is digitally signed C:\windows\system32\wininit.exe => File is digitally signed C:\windows\system32\svchost.exe => File is digitally signed C:\windows\system32\services.exe => File is digitally signed C:\windows\system32\User32.dll => File is digitally signed C:\windows\system32\userinit.exe => File is digitally signed C:\windows\system32\rpcss.dll => File is digitally signed C:\windows\system32\Drivers\volsnap.sys => File is digitally signed LastRegBack: 2014-10-23 17:07 ==================== End Of Log ============================ --- --- --- |
22.02.2015, 14:11 | #2 |
| Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)Code:
ATTFilter Additional scan result of Farbar Recovery Scan Tool (x86) Version: 21-02-2015 Ran by Jessica at 2015-02-22 12:59:48 Running from C:\Users\Jessica\Downloads Boot Mode: Normal ========================================================== ==================== Security Center ======================== (If an entry is included in the fixlist, it will be removed.) AV: McAfee Anti-Virus und Anti-Spyware (Enabled - Up to date) {DA9F8ED0-D0DE-39CC-F55A-51AB4CC1B556} AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} AS: McAfee Anti-Virus und Anti-Spyware (Enabled - Up to date) {61FE6F34-F6E4-3642-CFEA-6AD93746FFEB} FW: McAfee Firewall (Enabled) {E2A40FF5-9AB1-3894-DE05-F89EB212F22D} ==================== Installed Programs ====================== (Only the adware programs with "hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.) Adobe AIR (HKLM\...\Adobe AIR) (Version: 2.7.0.19480 - Adobe Systems Incorporated) Adobe Download Assistant (HKLM\...\com.adobe.downloadassistant.AdobeDownloadAssistant) (Version: 1.0.2 - Adobe Systems Incorporated) Adobe Flash Player 16 ActiveX (HKLM\...\Adobe Flash Player ActiveX) (Version: 16.0.0.305 - Adobe Systems Incorporated) Adobe Flash Player 16 NPAPI (HKLM\...\Adobe Flash Player NPAPI) (Version: 16.0.0.305 - Adobe Systems Incorporated) Adobe Reader XI - Deutsch (HKLM\...\{AC76BA86-7AD7-1031-7B44-AB0000000001}) (Version: 11.0.00 - Adobe Systems Incorporated) AnyPC Client (HKLM\...\{1AFA1FEF-8CF9-4A51-AC46-64FAA7F3D9E2}) (Version: 1.0.0.25 - Doctorsoft) Atheros Client Installation Program (HKLM\...\{D1434266-0486-4469-B338-A60082CC04E1}) (Version: 1.0.2.1119 - Atheros) BatteryLifeExtender (HKLM\...\{853F8A41-A3C9-43FA-87FA-1AE74FC6F3F7}) (Version: 1.0.1 - Samsung) Canon MP Navigator EX 2.0 (HKLM\...\MP Navigator EX 2.0) (Version: - ) Compatibility Pack für 2007 Office System (HKLM\...\{90120000-0020-0407-0000-0000000FF1CE}) (Version: 12.0.4518.1014 - Microsoft Corporation) CyberLink DVD Suite (HKLM\...\InstallShield_{1FBF6C24-C1FD-4101-A42B-0C564F9E8E79}) (Version: 6.0.2806 - CyberLink Corp.) CyberLink LabelPrint (HKLM\...\InstallShield_{C59C179C-668D-49A9-B6EA-0121CCFC1243}) (Version: 2.5.1916 - CyberLink Corp.) CyberLink Power2Go (HKLM\...\InstallShield_{40BF1E83-20EB-11D8-97C5-0009C5020658}) (Version: 6.0.3108a - CyberLink Corp.) CyberLink PowerDirector (HKLM\...\InstallShield_{CB099890-1D5F-11D5-9EA9-0050BAE317E1}) (Version: 7.0.3213 - CyberLink Corp.) CyberLink PowerDVD 8 (HKLM\...\InstallShield_{2BF2E31F-B8BB-40A7-B650-98D28E0F7D47}) (Version: 8.0.2815b - CyberLink Corp.) CyberLink PowerProducer (HKLM\...\InstallShield_{B7A0CE06-068E-11D6-97FD-0050BACBF861}) (Version: 5.0.1.1812 - CyberLink Corp.) CyberLink YouCam (HKLM\...\InstallShield_{01FB4998-33C4-4431-85ED-079E3EEFE75D}) (Version: 2.0.3625 - CyberLink Corp.) Dairy Dash (HKLM\...\{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-115053100}) (Version: - Oberon Media) Die Sims™ 3 (HKLM\...\{C05D8CDB-417D-4335-A38C-A0659EDFD6B8}) (Version: 1.50.56 - Electronic Arts) DownloadnSave (HKLM\...\{A8B0DBDE-8119-48B0-8088-D12DA01C36BA}) (Version: - DownloadnSave) Dropbox (HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\Dropbox) (Version: 3.2.6 - Dropbox, Inc.) Easy Display Manager (HKLM\...\{17283B95-21A8-4996-97DA-547A48DB266F}) (Version: 3.0 - Samsung Electronics Co., Ltd.) Easy Network Manager (HKLM\...\{34B76DCB-BF7C-440F-B058-C84172C1E338}) (Version: 4.2.8 - Samsung) Easy SpeedUp Manager (HKLM\...\{EF367AA4-070B-493C-9575-85BE59D789C9}) (Version: 3.0.0.5 - Samsung Electronics Co.,Ltd.) EasyBatteryManager (HKLM\...\{178EE5F4-0F86-4BF0-A0D1-9790AFF409D1}) (Version: 4.0.0.3 - Samsung) Farm Frenzy 2 (HKLM\...\{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-11531173}) (Version: - Oberon Media) Farm Frenzy 2 (HKLM\...\Farm Frenzy 2) (Version: - Alawar Entertainment Inc.) Free YouTube to MP3 Converter version 3.12.0.128 (HKLM\...\Free YouTube to MP3 Converter_is1) (Version: 3.12.0.128 - DVDVideoSoft Ltd.) Game Pack (HKLM\...\{63eafc52-b963-4297-a7eb-d412944e7065}_is1) (Version: 5.3.0.10 - Oberon Media, Inc.) Go-Go Gourmet (HKLM\...\{82C36957-D2B8-4EF2-B88C-5FA03AA848C7-114072167}) (Version: - Oberon Media) Google Chrome (HKLM\...\Google Chrome) (Version: 40.0.2214.115 - Google Inc.) Google Chrome Frame (HKLM\...\{CD4ABC29-0547-388C-B8BC-EF88333E5C2E}) (Version: 65.119.72 - Google, Inc.) Google Earth (HKLM\...\{4D2A6330-2F8B-11E3-9C40-B8AC6F97B88E}) (Version: 7.1.2.2041 - Google) Google Toolbar for Internet Explorer (HKLM\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.) Google Toolbar for Internet Explorer (Version: 1.0.0 - Google Inc.) Hidden Google Update Helper (Version: 1.3.25.11 - Google Inc.) Hidden Google Update Helper (Version: 1.3.26.9 - Google Inc.) Hidden ICQ Toolbar (HKLM\...\ICQToolbar) (Version: 3.0.0 - ICQ) ICQ7.5 (HKLM\...\{7578ADEA-D65F-4C89-A249-B1C88B6FFC20}) (Version: 7.5 - ICQ) Iminent (HKLM\...\IMBoosterARP) (Version: 6.27.21.0 - Iminent) <==== ATTENTION Iminent (Version: 6.27.21.0 - Iminent) Hidden <==== ATTENTION Incredibar Toolbar on IE (HKLM\...\incredibar) (Version: - ) <==== ATTENTION Intel(R) Rapid Storage Technology (HKLM\...\{3E29EE6C-963A-4aae-86C1-DC237C4A49FC}) (Version: 9.5.4.1001 - Intel Corporation) Intel(R) Turbo Boost Technology Driver (HKLM\...\{D6C630BF-8DBB-4042-8562-DC9A52CB6E7E}) (Version: 01.00.01.1003 - Intel Corporation) Java 7 Update 45 (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F83217025FF}) (Version: 7.0.450 - Oracle) Junk Mail filter update (Version: 14.0.8089.726 - Microsoft Corporation) Hidden Marvell Miniport Driver (HKLM\...\Marvell Miniport Driver) (Version: 11.22.3.3 - Marvell) McAfee Internet Security (HKLM\...\MSC) (Version: 13.6.1492 - McAfee, Inc.) McAfee Security Scan Plus (HKLM\...\McAfee Security Scan) (Version: 3.8.150.1 - McAfee, Inc.) McAfee SiteAdvisor (HKLM\...\{35ED3F83-4BDC-4c44-8EC6-6A8301C7413A}) (Version: 3.7.191 - McAfee, Inc.) Microsoft .NET Framework 4.5.1 (Deutsch) (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1031) (Version: 4.5.50938 - Microsoft Corporation) Microsoft .NET Framework 4.5.2 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.51209 - Microsoft Corporation) Microsoft Office 2007 Service Pack 2 (SP2) (HKLM\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{0B36C6D6-F5D8-4EAF-BF94-4376A230AD5B}) (Version: - Microsoft) Microsoft Office Home and Student 2007 (HKLM\...\HOMESTUDENTR) (Version: 12.0.6425.1000 - Microsoft Corporation) Microsoft Office Live Add-in 1.3 (HKLM\...\{57F0ED40-8F11-41AA-B926-4A66D0D1A9CC}) (Version: 2.0.2313.0 - Microsoft Corporation) Microsoft Office PowerPoint Viewer 2007 (German) (HKLM\...\{95120000-00AF-0407-0000-0000000FF1CE}) (Version: 12.0.4518.1014 - Microsoft Corporation) Microsoft Office Suite Activation Assistant (HKLM\...\{E50AE784-FABE-46DA-A1F8-7B6B56DCB22E}) (Version: 2.9 - Microsoft Corporation) Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 3.0.40624.0 - Microsoft Corporation) Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation) Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (HKLM\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation) Microsoft Works (HKLM\...\{39D0E034-1042-4905-BECB-5502909FCB7C}) (Version: 9.7.0621 - Microsoft Corporation) Microsoft WSE 3.0 Runtime (HKLM\...\{E3E71D07-CD27-46CB-8448-16D4FB29AA13}) (Version: 3.0.5305.0 - Microsoft Corp.) Mozilla Firefox 35.0.1 (x86 de) (HKLM\...\Mozilla Firefox 35.0.1 (x86 de)) (Version: 35.0.1 - Mozilla) Mozilla Maintenance Service (HKLM\...\MozillaMaintenanceService) (Version: 33.0.3 - Mozilla) NVIDIA Drivers (HKLM\...\NVIDIA Drivers) (Version: 1.4 - NVIDIA Corporation) Origin (HKLM\...\Origin) (Version: 8.4.1.210 - Electronic Arts, Inc.) PhotoFiltre (HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\PhotoFiltre) (Version: - ) PiccShare (HKU\S-1-5-21-2339853823-2107313754-116825072-1001\...\PiccShare) (Version: 2.0 - HTTO Group Ltd) Realtek High Definition Audio Driver (HKLM\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.6003 - Realtek Semiconductor Corp.) REALTEK Wireless LAN Software (HKLM\...\{F2BC3383-F000-410C-A038-3846ADBE8D90}) (Version: 1.01.0088 - REALTEK Semiconductor Corp.) Roll (HKLM\...\RollerCoaster Tycoon Setup) (Version: - ) Samsung Recovery Solution 4 (HKLM\...\{145DE957-0679-4A2A-BB5C-1D3E9808FAB2}) (Version: 4.0.0.6 - Samsung) Samsung R-Series (HKLM\...\{3EED7541-55F8-4DC6-B9CD-28762D71310E}) (Version: 1.0 - Samsung) Samsung Support Center (HKLM\...\{0A353130-D22C-41DD-8C67-1B02A05F2CE0}) (Version: 1.1.0 - Samsung) Samsung Update Plus (HKLM\...\{D3F2FAA5-FEC4-42AA-9ABA-1F763919A2B5}) (Version: 2.0 - Samsung Electronics Co., Ltd.) Shared C Run-time for x86 (Version: 10.0.0 - McAfee) Hidden Skype Toolbars (HKLM\...\{A29549FD-65F3-440C-A552-6B8114CF319D}) (Version: 5.2.4170 - Skype Technologies S.A.) Skype™ 5.1 (HKLM\...\{E633D396-5188-4E9D-8F6B-BFB8BF3467E8}) (Version: 5.1.112 - Skype Technologies S.A.) Spelling Dictionaries Support For Adobe Reader 9 (HKLM\...\{AC76BA86-7AD7-5464-3428-900000000004}) (Version: 9.0.0 - Adobe Systems Incorporated) Synaptics Pointing Device Driver (HKLM\...\SynTPDeinstKey) (Version: 14.0.10.0 - Synaptics Incorporated) Uninstall 1.0.0.1 (HKLM\...\Uninstall_is1) (Version: - ) USA Raser (HKLM\...\{F92C4EE6-BEA9-11D7-9E00-0004769EEFEB}) (Version: 1.00.0000 - ComputerBild Spiele) User Guide (HKLM\...\{BAE68339-B0F6-4D33-9554-5A3DB2DFF5DA}) (Version: 1.0 - ) Web Assistant 2.0.0.430 (HKLM\...\{336D0C35-8A85-403a-B9D2-65C292C39087}_is1) (Version: - IB) <==== ATTENTION Windows Live Anmelde-Assistent (HKLM\...\{52B97218-98CB-4B8B-9283-D213C85E1AA4}) (Version: 5.000.818.5 - Microsoft Corporation) Windows Live Essentials (HKLM\...\WinLiveSuite_Wave3) (Version: 14.0.8089.0726 - Microsoft Corporation) Windows Live Sync (HKLM\...\{76618402-179D-4699-A66B-D351C59436BC}) (Version: 14.0.8089.726 - Microsoft Corporation) Windows Live-Uploadtool (HKLM\...\{205C6BDD-7B73-42DE-8505-9A093F35A238}) (Version: 14.0.8014.1029 - Microsoft Corporation) ==================== Custom CLSID (selected items): ========================== (If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{005A3A96-BAC4-4B0A-94EA-C0CE100EA736}\localserver32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{039B2CA5-3B41-4D93-AD77-47D3293FC5CB}\InprocServer32 -> C:\Program Files\Skype\Plugin Manager\ezPMUtils.dll (EasyBits Media AS) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{3bc93e76-92f8-5fda-b676-5afee3735bf1}\InprocServer32 -> C:\Users\Jessica\AppData\Local\ext_offermosquito\npOfferMosquitoIEHelper.dll (Bebo Media Ltd) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{42481700-CF3C-4D05-8EC6-F9A1C57E8DC0}\InprocServer32 -> C:\Program Files\Skype\Plugin Manager\ezPMUtils.dll (EasyBits Media AS) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{9000834c-c6c7-43ac-b8ee-dc9668f39a81}\localserver32 -> C:\Users\Jessica\AppData\Local\Temp\{91814ec0-b5f0-11d2-80b9-00104b1f6cea}\IDriver.NonElevated.exe (InstallShield Software Corporation) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{BB6410D8-F879-4184-9C5C-6A02D16AE0B3}\InprocServer32 -> C:\Program Files\Skype\Plugin Manager\ezPMUtils.dll (EasyBits Media AS) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{CA1073A2-5F3F-4445-8E5E-7109BDCEDDBE}\InprocServer32 -> C:\Program Files\Skype\Plugin Manager\ezPMUtils.dll (EasyBits Media AS) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{D0D38C6E-BF64-4C42-840D-3E0019D9F7A6}\InprocServer32 -> C:\Program Files\Skype\Plugin Manager\ezPMUtils.dll (EasyBits Media AS) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{D5A55D2D-C59D-42C3-A5BF-4C08EEE74339}\InprocServer32 -> C:\Program Files\Skype\Plugin Manager\ezPMUtils.dll (EasyBits Media AS) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{ECD97DE5-3C8F-4ACB-AEEE-CCAB78F7711C}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314EDD-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314EDE-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314EDF-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) CustomCLSID: HKU\S-1-5-21-2339853823-2107313754-116825072-1001_Classes\CLSID\{FB314EE0-A251-47B7-93E1-CDD82E34AF8B}\InprocServer32 -> C:\Users\Jessica\AppData\Roaming\Dropbox\bin\DropboxExt.25.dll (Dropbox, Inc.) ==================== Restore Points ========================= 13-11-2014 18:15:54 Windows Update 14-11-2014 17:26:30 Windows Update 14-11-2014 18:14:37 Windows Update 19-11-2014 14:43:35 Windows Update 11-12-2014 19:13:47 Windows Update 20-12-2014 13:43:10 Windows Update 14-01-2015 16:38:30 Windows Update 25-01-2015 19:09:44 Windows Update 15-02-2015 17:25:03 Windows Update 18-02-2015 13:02:30 Windows Update ==================== Hosts content: ========================== (If needed Hosts: directive could be included in the fixlist to reset Hosts.) 2009-07-14 03:04 - 2009-06-10 22:39 - 00000824 ____A C:\windows\system32\Drivers\etc\hosts ==================== Scheduled Tasks (whitelisted) ============= (If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.) Task: {1B86C506-262B-429B-8D50-80E18E2532FA} - System32\Tasks\APSchedulerC => C:\Program Files\AnyPC Client\APLanMgrC.exe [2009-11-20] (DoctorSoft) Task: {25B852AF-0F08-417D-A112-DD474B4238F8} - System32\Tasks\EasyBatteryManager => C:\Program Files\Samsung\EasyBatteryManager\EasyBatteryMgr4.exe [2009-10-16] (SAMSUNG Electronics co., LTD.) Task: {4E14B5BF-F42C-4018-96CF-AA157825AB21} - System32\Tasks\Adobe Flash Player Updater => C:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2015-02-07] (Adobe Systems Incorporated) Task: {54F6AC96-D31C-4C31-B246-7154DCE95320} - System32\Tasks\GoogleUpdateTaskMachineUA1cf6ec357c82803 => C:\Program Files\Google\Update\GoogleUpdate.exe [2014-10-23] (Google Inc.) Task: {5E0C9381-BE2E-4129-A068-3FAA4BA194BA} - System32\Tasks\{A18BF3C6-420B-4554-B06C-5A644B21F51D} => pcalua.exe -a E:\SETUP.EXE -d E:\ Task: {6378EDF5-B3D1-4A49-A0C8-B161AED57A67} - System32\Tasks\SUPBackground => C:\Program Files\Samsung\Samsung Update Plus\SUPBackground.exe [2010-04-20] () Task: {7D7A6B61-5176-4311-A896-70F9A63A916A} - System32\Tasks\{CF6B4929-8E58-4AB7-9B72-DC44FD1BC523} => pcalua.exe -a "C:\Users\Jessica\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WEOL8OP7\Chicken_Invaders3_regular-setup[1].exe" -d C:\Users\Jessica\Desktop Task: {85432527-CE8D-4EEF-A10F-D3CFF47DF566} - System32\Tasks\EasySpeedUpManager => C:\Program Files\SAMSUNG\EasySpeedUpManager\EasySpeedUpManager.exe [2009-10-13] (Samsung Electronics Co., Ltd.) Task: {A1A0D5E6-3009-4926-B46E-75870411DCA1} - System32\Tasks\{2F0F3373-B524-487F-94BA-07960FD35FB6} => pcalua.exe -a "C:\Program Files\Fox\Croc\Crocrun.exe" -d "C:\Program Files\Fox\Croc" Task: {A262B463-C260-4781-909F-C756859A9E66} - System32\Tasks\BatteryLifeExtender => C:\Program Files\Samsung\BatteryLifeExtender\BatteryLifeExtender.exe [2009-11-19] (Samsung Electronics. Co. Ltd.) Task: {ABEB90BB-C5E2-43F6-AF6D-E0A25D7840D7} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files\Google\Update\GoogleUpdate.exe [2014-10-23] (Google Inc.) Task: {C653CBBB-78D5-46AA-B7BA-99E64B7FF124} - System32\Tasks\EasyDisplayMgr => C:\Program Files\Samsung\Easy Display Manager\dmhkcore.exe [2009-11-04] (Samsung Electronics Co., Ltd.) Task: {CC9DF44D-CBB5-4AE5-8A89-DEDA5CF44EF5} - System32\Tasks\SamsungSupportCenter => C:\Program Files\Samsung\Samsung Support Center\SSCKbdHk.exe [2009-12-14] (SAMSUNG Electronics) Task: {CEEA1937-5644-4F73-ACCF-F96476C92D0D} - System32\Tasks\{3CECFE6E-F5D3-4756-BB85-59ABE1046913} => pcalua.exe -a E:\Patch_Game\Install2.exe -d E:\Patch_Game Task: {D907D439-A03E-4D08-B861-C10484AFFAE1} - System32\Tasks\advSRS4 => C:\Program Files\Samsung\Samsung Recovery Solution 4\WCScheduler.exe [2010-01-19] (SEC) Task: {F521FC92-68D8-41D9-B014-B28EDA259DBB} - System32\Tasks\{81DEA884-3630-4003-B2DB-DCFD4358B7B9} => C:\Program Files\Skype\\Phone\Skype.exe [2011-01-26] (Skype Technologies S.A.) (If an entry is included in the fixlist, the task (.job) file will be moved. The file which is running by the task will not be moved.) Task: C:\windows\Tasks\Adobe Flash Player Updater.job => C:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe Task: C:\windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files\Google\Update\GoogleUpdate.exe Task: C:\windows\Tasks\GoogleUpdateTaskMachineUA1cf6ec357c82803.job => C:\Program Files\Google\Update\GoogleUpdate.exe ==================== Loaded Modules (whitelisted) ============== 2011-04-24 23:03 - 2010-11-21 11:49 - 00247608 _____ () C:\Program Files\ICQ6Toolbar\ICQ Service.exe 2010-03-05 05:51 - 2009-01-29 04:26 - 00117264 _____ () c:\Program Files\McAfee\SiteAdvisor\apengine.dll 2010-03-05 05:51 - 2009-01-29 04:27 - 00071696 _____ () c:\Program Files\McAfee\SiteAdvisor\mcfrmwk.dll 2010-03-05 05:51 - 2009-01-29 04:27 - 00207376 _____ () c:\Program Files\McAfee\SiteAdvisor\cntscan.dll 2010-09-25 18:27 - 2009-08-13 20:58 - 00044312 _____ () C:\Program Files\Samsung Casual Games\GameConsole\OberonGameConsoleService.exe 2010-03-05 05:29 - 2009-03-05 10:54 - 00311296 _____ () C:\windows\SYSTEM32\Rezip.exe 2010-03-05 05:34 - 2009-07-07 19:23 - 00247152 ____N () C:\Program Files\CyberLink\Shared files\RichVideo.exe 2012-05-15 12:38 - 2012-05-01 13:31 - 00185856 _____ () C:\Program Files\Web Assistant\ExtensionUpdaterService.exe 2010-03-05 05:38 - 2006-08-12 04:48 - 00049152 _____ () C:\Program Files\Samsung\Easy Display Manager\HookDllPS2.dll 2009-06-03 12:59 - 2009-06-03 12:59 - 00619816 ____N () C:\Program Files\CyberLink\Power2Go\CLMediaLibrary.dll 2009-06-03 12:59 - 2009-06-03 12:59 - 00013096 ____N () C:\Program Files\CyberLink\Power2Go\CLMLSvcPS.dll 2015-02-10 22:00 - 2015-02-10 22:00 - 00750080 _____ () C:\Users\Jessica\AppData\Roaming\Dropbox\bin\libGLESv2.dll 2015-02-21 21:08 - 2015-02-21 21:08 - 00043008 _____ () c:\users\jessica\appdata\local\temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmpbu8a3e.dll 2015-02-10 22:00 - 2015-02-10 22:00 - 00047616 _____ () C:\Users\Jessica\AppData\Roaming\Dropbox\bin\libEGL.dll 2015-02-10 22:00 - 2015-02-10 22:00 - 00865280 _____ () C:\Users\Jessica\AppData\Roaming\Dropbox\bin\plugins\platforms\qwindows.dll 2015-02-10 22:00 - 2015-02-10 22:00 - 00200704 _____ () C:\Users\Jessica\AppData\Roaming\Dropbox\bin\plugins\imageformats\qjpeg.dll 2015-01-27 18:18 - 2015-01-27 18:18 - 03925104 _____ () C:\Program Files\Mozilla Firefox\mozjs.dll 2015-02-22 12:48 - 2015-02-22 12:48 - 00050477 _____ () C:\Users\Jessica\Downloads\Defogger.exe ==================== Alternate Data Streams (whitelisted) ========= (If an entry is included in the fixlist, only the Alternate Data Streams will be removed.) AlternateDataStreams: C:\ProgramData\Temp:4CF61E54 AlternateDataStreams: C:\ProgramData\Temp:8173A019 AlternateDataStreams: C:\ProgramData\Temp:A42A9F39 AlternateDataStreams: C:\ProgramData\Temp:ABE89FFE AlternateDataStreams: C:\ProgramData\Temp:E1F04E8D ==================== Safe Mode (whitelisted) =================== (If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.) HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS => ""="" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcpltsvc => ""="" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\McMPFSvc => ""="Service" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MCODS => ""="" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\mcpltsvc => ""="" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\mfefire => ""="Driver" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\mfefirek => ""="Driver" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\mfefirek.sys => ""="Driver" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\mfehidk => ""="Driver" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\mfehidk.sys => ""="Driver" HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\mfevtp => ""="Driver" ==================== EXE Association (whitelisted) =============== (If an entry is included in the fixlist, the default will be restored. None default entries will be removed.) ==================== Other Areas ============================ (Currently there is no automatic fix for this section.) HKU\S-1-5-21-2339853823-2107313754-116825072-1001\Control Panel\Desktop\\Wallpaper -> C:\Users\Jessica\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg DNS Servers: 192.168.178.1 ==================== MSCONFIG/TASK MANAGER disabled items == (Currently there is no automatic fix for this section.) ==================== Accounts: ============================= Administrator (S-1-5-21-2339853823-2107313754-116825072-500 - Administrator - Disabled) Gast (S-1-5-21-2339853823-2107313754-116825072-501 - Limited - Disabled) HomeGroupUser$ (S-1-5-21-2339853823-2107313754-116825072-1002 - Limited - Enabled) Jessica (S-1-5-21-2339853823-2107313754-116825072-1001 - Administrator - Enabled) => C:\Users\Jessica ==================== Faulty Device Manager Devices ============= ==================== Event log errors: ========================= Application errors: ================== Error: (02/22/2015 01:01:40 PM) (Source: SideBySide) (EventID: 33) (User: ) Description: Fehler beim Generieren des Aktivierungskontextes für "Microsoft.Windows.Common-Controls,language="*",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"1". Die abhängige Assemblierung "Microsoft.Windows.Common-Controls,language="*",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"" konnte nicht gefunden werden. Verwenden Sie für eine detaillierte Diagnose das Programm "sxstrace.exe". Error: (02/22/2015 01:00:51 PM) (Source: SideBySide) (EventID: 33) (User: ) Description: Fehler beim Generieren des Aktivierungskontextes für "Microsoft.Windows.Common-Controls,language="*",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"1". Die abhängige Assemblierung "Microsoft.Windows.Common-Controls,language="*",processorArchitecture="amd64",publicKeyToken="6595b64144ccf1df",type="win32",version="6.0.0.0"" konnte nicht gefunden werden. Verwenden Sie für eine detaillierte Diagnose das Programm "sxstrace.exe". Error: (02/22/2015 00:49:50 PM) (Source: Application Error) (EventID: 1000) (User: ) Description: Name der fehlerhaften Anwendung: rundll32.exe_aepdu.dll, Version: 6.1.7600.16385, Zeitstempel: 0x4a5bc637 Name des fehlerhaften Moduls: ole32.dll, Version: 6.1.7601.17514, Zeitstempel: 0x4ce7b96f Ausnahmecode: 0xc0000095 Fehleroffset: 0x000485aa ID des fehlerhaften Prozesses: 0x1568 Startzeit der fehlerhaften Anwendung: 0xrundll32.exe_aepdu.dll0 Pfad der fehlerhaften Anwendung: rundll32.exe_aepdu.dll1 Pfad des fehlerhaften Moduls: rundll32.exe_aepdu.dll2 Berichtskennung: rundll32.exe_aepdu.dll3 Error: (02/18/2015 07:03:19 PM) (Source: MsiInstaller) (EventID: 11925) (User: Jessica-PC) Description: Produkt: Microsoft Visual C++ 2005 Redistributable -- Error 1925.Sie besitzen keine ausreichenden Berechtigungen, um diese Installation für alle Benutzer dieses Computers auszuführen. Melden Sie sich als Administrator an, und wiederholen Sie diese Installation. Error: (02/18/2015 07:01:57 PM) (Source: MsiInstaller) (EventID: 11925) (User: Jessica-PC) Description: Produkt: Microsoft Visual C++ 2005 Redistributable -- Error 1925.Sie besitzen keine ausreichenden Berechtigungen, um diese Installation für alle Benutzer dieses Computers auszuführen. Melden Sie sich als Administrator an, und wiederholen Sie diese Installation. Error: (01/23/2015 02:47:38 PM) (Source: Application Hang) (EventID: 1002) (User: ) Description: Programm EXCEL.EXE, Version 12.0.6425.1000 kann nicht mehr unter Windows ausgeführt werden und wurde beendet. Überprüfen Sie den Problemverlauf in der Wartungscenter-Systemsteuerung, um nach weiteren Informationen zum Problem zu suchen. Prozess-ID: 14d0 Startzeit: 01d03712b93e649d Endzeit: 0 Anwendungspfad: C:\Program Files\Microsoft Office\Office12\EXCEL.EXE Berichts-ID: 47aef398-a306-11e4-95a6-00245487e561 Error: (01/14/2015 03:55:33 PM) (Source: Application Error) (EventID: 1000) (User: ) Description: Name der fehlerhaften Anwendung: iexplore.exe, Version: 11.0.9600.17496, Zeitstempel: 0x546fddcc Name des fehlerhaften Moduls: bhoclass.dll, Version: 1.0.0.1, Zeitstempel: 0x4f79fd40 Ausnahmecode: 0xc0000005 Fehleroffset: 0x000055e6 ID des fehlerhaften Prozesses: 0x10b0 Startzeit der fehlerhaften Anwendung: 0xiexplore.exe0 Pfad der fehlerhaften Anwendung: iexplore.exe1 Pfad des fehlerhaften Moduls: iexplore.exe2 Berichtskennung: iexplore.exe3 Error: (01/14/2015 03:55:24 PM) (Source: Application Error) (EventID: 1000) (User: ) Description: Name der fehlerhaften Anwendung: iexplore.exe, Version: 11.0.9600.17496, Zeitstempel: 0x546fddcc Name des fehlerhaften Moduls: bhoclass.dll, Version: 1.0.0.1, Zeitstempel: 0x4f79fd40 Ausnahmecode: 0xc0000005 Fehleroffset: 0x000055e6 ID des fehlerhaften Prozesses: 0x14fc Startzeit der fehlerhaften Anwendung: 0xiexplore.exe0 Pfad der fehlerhaften Anwendung: iexplore.exe1 Pfad des fehlerhaften Moduls: iexplore.exe2 Berichtskennung: iexplore.exe3 Error: (01/14/2015 03:33:12 PM) (Source: AVLogEvent) (EventID: 5004) (User: NT-AUTORITÄT) Description: McShield crashed. Error Code:c0000005 Error: (01/14/2015 03:33:11 PM) (Source: Application Error) (EventID: 1000) (User: ) Description: Name der fehlerhaften Anwendung: mcshield.exe, Version: 1.1.3.178, Zeitstempel: 0x53d17f0e Name des fehlerhaften Moduls: ntdll.dll, Version: 6.1.7601.18247, Zeitstempel: 0x521ea91c Ausnahmecode: 0xc0000005 Fehleroffset: 0x0003224d ID des fehlerhaften Prozesses: 0x8c8 Startzeit der fehlerhaften Anwendung: 0xmcshield.exe0 Pfad der fehlerhaften Anwendung: mcshield.exe1 Pfad des fehlerhaften Moduls: mcshield.exe2 Berichtskennung: mcshield.exe3 System errors: ============= Error: (02/18/2015 01:35:52 PM) (Source: Service Control Manager) (EventID: 7023) (User: ) Description: Der Dienst "Server" wurde mit folgendem Fehler beendet: %%1062 Error: (02/18/2015 01:02:37 PM) (Source: DCOM) (EventID: 10010) (User: ) Description: {ADA518B9-B7A3-4C36-B4ED-49EB3FA189FC} Error: (02/18/2015 00:39:02 PM) (Source: Service Control Manager) (EventID: 7000) (User: ) Description: Der Dienst "McAfee Platform Services" wurde aufgrund folgenden Fehlers nicht gestartet: %%1053 Error: (02/18/2015 00:39:02 PM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst McAfee Platform Services erreicht. Error: (02/18/2015 00:39:01 PM) (Source: Service Control Manager) (EventID: 7000) (User: ) Description: Der Dienst "McAfee Platform Services" wurde aufgrund folgenden Fehlers nicht gestartet: %%1053 Error: (02/18/2015 00:39:01 PM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst McAfee Platform Services erreicht. Error: (02/18/2015 00:37:32 PM) (Source: Service Control Manager) (EventID: 7000) (User: ) Description: Der Dienst "McAfee Proxy Service" wurde aufgrund folgenden Fehlers nicht gestartet: %%1053 Error: (02/18/2015 00:37:32 PM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst McAfee Proxy Service erreicht. Error: (02/18/2015 00:37:32 PM) (Source: Service Control Manager) (EventID: 7000) (User: ) Description: Der Dienst "McAfee Personal Firewall Service" wurde aufgrund folgenden Fehlers nicht gestartet: %%1053 Error: (02/18/2015 00:37:32 PM) (Source: Service Control Manager) (EventID: 7009) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst McAfee Personal Firewall Service erreicht. Microsoft Office Sessions: ========================= ==================== Memory info =========================== Processor: Intel(R) Core(TM) i3 CPU M 330 @ 2.13GHz Percentage of memory in use: 54% Total physical RAM: 3060.55 MB Available physical RAM: 1388.52 MB Total Pagefile: 6119.39 MB Available Pagefile: 4243.91 MB Total Virtual: 2047.88 MB Available Virtual: 1880.79 MB ==================== Drives ================================ Drive c: () (Fixed) (Total:141.49 GB) (Free:67.43 GB) NTFS Drive d: () (Fixed) (Total:141.5 GB) (Free:122.67 GB) NTFS ==================== MBR & Partition Table ================== ======================================================== Disk: 0 (Size: 298.1 GB) (Disk ID: B0FD1CB0) Partition 1: (Not Active) - (Size=15 GB) - (Type=27) Partition 2: (Active) - (Size=100 MB) - (Type=07 NTFS) Partition 3: (Not Active) - (Size=141.5 GB) - (Type=07 NTFS) Partition 4: (Not Active) - (Size=141.5 GB) - (Type=07 NTFS) ==================== End Of Log ============================ Code:
ATTFilter GMER Logfile: |
22.02.2015, 16:32 | #3 |
/// TB-Ausbilder /// Anleitungs-Guru | Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs)Mein Name ist Jürgen und ich werde Dir bei Deinem Problem behilflich sein. Zusammen schaffen wir das...
Hinweis: Ich kann Dir niemals eine Garantie geben, dass wir alle schädlichen Dateien finden werden. Eine Formatierung ist meist der schnellere und immer der sicherste Weg, aber auch nur bei wirklicher Malware empfehlenswert. Adware & Co. können wir sehr gut entfernen. Solltest Du Dich für eine Bereinigung entscheiden, arbeite solange mit, bis Du mein clean bekommst. Los geht's: Schritt 1 Drücke bitte die + R Taste und schreibe notepad in das Ausführen Fenster. Klicke auf OK und kopiere nun den Text aus der Codebox in das leere Textdokument: Code:
ATTFilter Iminent (Version: 6.27.21.0 - Iminent) Hidden
Schritt 2 Bitte deinstalliere folgende Programme: Iminent Iminent Incredibar Toolbar on IE Web Assistant 2.0.0.430 Versuche es bei Windows 7 zunächst über Systemsteuerung/Programme deinstallieren. Sollte das nicht gehen, lade Dir bitte Revo Uninstallerhier herunter. Entpacke die zip-Datei auf den Desktop. Anleitung
Wenn Du ein Programm nicht deinstallieren kannst, mach mit dem nächsten weiter. Auch wenn am Ende noch Programme übrig geblieben sind, führe den nächsten Schritt aus: Schritt 3 Downloade Dir bitte AdwCleaner auf deinen Desktop.
Schritt 4
Schritt 5 Bitte starte FRST erneut, markiere auch die checkbox und drücke auf Scan. Bitte poste mir den Inhalt der beiden Logs die erstellt werden.
__________________ |
Themen zu Windows 7: Webseiten werden auf Werbung umgeleitet (+Werbe-Tabs) |
anleitung, code, dvdvideosoft ltd., eingeschränkt, firefox, internetverbindung, klicke, laptop, links, mcafee, neue, neuen, nicht mehr, problem, seite, startseite, suche, trojaner, umgeleitet, verbindung, webseiten, werbung, wichtig, windows, windows 7, wlan |