Monday, November 10, 2008

Tatfo Trojan

How To Remove Tatfo?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Tatfo is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.


Tatfo It also known as:

[Kaspersky]Trojan-Downloader.Win32.Small.glh,Trojan-Downloader.Win32.Small.gyc;
[F-Prot]W32/Downloader-Tir-based!Maximus;
[Other]Win32/Tatfo.B,W32/DLoader.EPPH

Tatfo Symptoms:

Files:
[%SYSTEM%]\drivers\ntosnh.sys
[%SYSTEM%]\drivers\ntoss.sys
[%SYSTEM%]\ldr.exe
[%SYSTEM%]\drivers\ntosnh.sys
[%SYSTEM%]\drivers\ntoss.sys
[%SYSTEM%]\ldr.exe

Registry Keys:
HKEY_LOCAL_MACHINE\system\currentcontrolset\enum\root\legacy_ntosnh.sys
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\ntosnh.sys
HKEY_LOCAL_MACHINE\system\currentcontrolset\services\ntoss.sys


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

AtomWire Adware

How To Remove AtomWire?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
AtomWire is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

Worms can be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.

Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.

This family of Trojans downloads and installs new malware or adware on the computer.
The downloader then either launches the new malware or registers it to enable autorun
according to the local operating system requirements.

The names and locations of malware to be downloaded are either coded into the
Trojan or downloaded from a specified website.


AtomWire It also known as:

[Panda]Adware/Esdads

AtomWire Symptoms:

Files:
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\audio.xsd
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\document.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\image.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\image.xsd
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\rom.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\rom.xsd
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\video.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\video.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\audio.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\document.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\image.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\image.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\rom.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\rom.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\video.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\video.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\document.xml
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\document.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\image.xml
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\image.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\rom.xml
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\rom.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\video.xml
[%WINDOWS%]\iexplorr11.dll
[%WINDOWS%]\iexplorr22.dll
[%WINDOWS%]\iexplorr23.dll
[%DESKTOP%]\atomwire.lnk
[%WINDOWS%]\iexplorr24.dll
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\audio.xsd
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\document.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\image.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\image.xsd
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\rom.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\rom.xsd
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\video.xml
[%PROGRAM_FILES%]\Morpheus Ultra\Schemas\video.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\audio.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\document.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\image.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\image.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\rom.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\rom.xsd
[%PROGRAM_FILES%]\Morpheus\Schemas\video.xml
[%PROGRAM_FILES%]\Morpheus\Schemas\video.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\document.xml
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\document.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\image.xml
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\image.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\rom.xml
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\rom.xsd
[%PROGRAM_FILES%]\StreamCast\Morpheus\Schemas\video.xml
[%WINDOWS%]\iexplorr11.dll
[%WINDOWS%]\iexplorr22.dll
[%WINDOWS%]\iexplorr23.dll
[%DESKTOP%]\atomwire.lnk
[%WINDOWS%]\iexplorr24.dll

Folders:
[%PROGRAM_FILES%]\atomwire

Registry Keys:
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\menuorder\start menu\programs\atomwire
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\atomwire_is1


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

WinAd Trojan

How To Remove WinAd?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
WinAd is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.

BHO (Browser Helper Object) Trojan.
The BHO waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
The method of network transport used by the attacker makes this Trojan unique.
Typically, keyloggers of this type will send the stolen information back to the attacker via email
or HTTP POST, which can appear suspicious.
Instead, this Trojan encodes the data with a simple XOR algorithm before placing it into
the data section of an ICMP ping packet." explained the company.


WinAd It also known as:

[Kaspersky]Trojan.Win32.Dialer.ai,AdWare.Win32.CaptainCode.a,AdWare.Win32.WinAd,AdWare.Win32.WinAD.be,AdWare.Win32.WinAD.abb,AdWare.Win32.WinAD.b,AdWare.Win32.WinAD.aw;
[McAfee]Adware.WinAd,Adware-WinAd;
[F-Prot]W32/Agent.BN,W32/Windu.G;
[Panda]Dialer.EE,Adware/WUpd;
[Computer Associates]Win32/DelAutoexec!Trojan;
[Other]Win32/WinAd.AV,TrojanDownloader:Win32/Agent.BF,Win32/WinAd.AS,Adware.Windupdates,Win32/WinAd.AT,Adware.MediaPass,Win32/WinAd.AQ,Adware.WinTaskAd,W32/Agent.ATD.dropper,Adware.WinAd,Win32/WinAd.BG

WinAd Symptoms:

Files:
[%PROFILE%]\LOCAL.EXE
[%PROGRAM_FILES%]\adstatus service
[%PROGRAM_FILES%]\info.txt
[%DESKTOP%]\cartooninstall.exe
[%DESKTOP%]\free laptop.url
[%PROFILE%]\recent\cartooninstall.lnk
[%PROFILE_TEMP%]\2.39 mb.exe
[%PROFILE_TEMP%]\578 kb.exe
[%PROFILE_TEMP%]\gd255.exe
[%WINDOWS%]\system\winad2.dll
[%PROFILE%]\LOCAL.EXE
[%PROGRAM_FILES%]\adstatus service
[%PROGRAM_FILES%]\info.txt
[%DESKTOP%]\cartooninstall.exe
[%DESKTOP%]\free laptop.url
[%PROFILE%]\recent\cartooninstall.lnk
[%PROFILE_TEMP%]\2.39 mb.exe
[%PROFILE_TEMP%]\578 kb.exe
[%PROFILE_TEMP%]\gd255.exe
[%WINDOWS%]\system\winad2.dll

Folders:
[%PROGRAM_FILES%]\Video Access ActiveX Object

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{15ad4789-cdb4-47e1-a9da-992ee8e6bad6}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Video Access ActiveX Object
HKEY_CLASSES_ROOT\AdManCtlx.Installer
HKEY_CLASSES_ROOT\winadx.installer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{15AD4789-CDB4-47E1-A9DA-992EE8E6BAD6}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinadX.Installer
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WinStatX.Installer
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdStatus Service
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AdTools Service
HKEY_LOCAL_MACHINE\SOFTWARE\Windows TaskAd
HKEY_CLASSES_ROOT\clsid\{53d3c442-8fee-4784-9a21-6297d39613f0}
HKEY_CLASSES_ROOT\deskadx.installer
HKEY_LOCAL_MACHINE\software\classes\clsid\{53d3c442-8fee-4784-9a21-6297d39613f0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{53d3c442-8fee-4784-9a21-6297d39613f0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\preview adservice
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\windows adstatus
HKEY_LOCAL_MACHINE\software\preview adservice
HKEY_LOCAL_MACHINE\software\windows adstatus
HKEY_LOCAL_MACHINE\software\winpopup

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

IECodec Ransomware

How To Remove IECodec?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
IECodec is dangerous virus:
The term ransomware is commonly used to describe such software,
although the field known as cryptovirology predates the term "ransomware".

This type of ransom attack can be accomplished by (for example) attaching
a specially crafted file/program to an e-mail message and sending this to the victim.


IECodec Symptoms:

Folders:
[%PROGRAM_FILES%]\IECodec

Registry Keys:
HKEY_CLASSES_ROOT\interface\{da5eab81-9e79-4751-8e06-3e68ff0cffb6}
HKEY_CLASSES_ROOT\typelib\{7c12a866-f10b-43b4-a9d0-8857c318af17}
HKEY_CURRENT_USER\software\classes\appid\iecodec.dll
HKEY_CURRENT_USER\software\classes\appid\{9f264a67-6126-451a-8d14-d6ee64364cd0}
HKEY_CURRENT_USER\software\classes\clsid\{4507c219-24aa-4813-9561-a2003f9920c3}
HKEY_CURRENT_USER\software\classes\iecodec.iecodecbho
HKEY_CURRENT_USER\software\classes\iecodec.iecodecbho.1
HKEY_LOCAL_MACHINE\software\iecodec
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4507c219-24aa-4813-9561-a2003f9920c3}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\iecodec


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

Windows.FormatAd Adware

How To Remove Windows.FormatAd?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Windows.FormatAd is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer.



Windows.FormatAd Symptoms:

Folders:
[%PROGRAM_FILES%]\windows formatad

Registry Keys:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\windows formatad
HKEY_LOCAL_MACHINE\software\windows formatad

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

Assassin Trojan

How To Remove Assassin?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Assassin is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Worms can be classified according to the propagation method they use,
i.e. how they deliver copies of themselves to new victim machines.
Worms can also be classified by installation method, launch method and finally according
to characteristics standard to all malware: polymorphism, stealth etc.

Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.
The methods are listed separately below.
Backdoors are the most dangerous type of Trojans and the most popular.
Backdoors open infected machines to external control via Internet.
Often the backdoor will not be visible in the log of active programs.
Many trojans and backdoors now have remote administration capabilities
allowing an individual to control the victim's computer.
Many times a file called the server must be opened on the victim's computer before
the trojan can have access to it.

These are generally sent through email, P2P file sharing software,
and in internet downloads. They are usually disguised as a legitimate program or file.
Many server files will display a fake error message when opened, to make it seem like it didn't open.
Some will also kill antivirus and firewall software.
The downloader either launches the new malware or registers it to enable autorun
according to the local operating system requirements.
DoS programs attack web servers by sending numerous requests to the specified server,
often causing it to crash under an excessive volume of requests.




Assassin It also known as:

[Kaspersky]Assassin_II.959,Backdoor.Assasin.10.a,Backdoor.Assasin.20.a,Backdoor.Assasin.20.b,Backdoor.Assasin.20.h;
[Eset]probably unknown TSR.EXE virus,Win32/Assasin.10 trojan,Win32/Assasin.20 trojan,Win32/Assasin.20.B trojan,Win32/Assasin.20.H trojan,Win32/Tanked.A worm,Assassin.959 virus;
[McAfee]BackDoor-AGS;
[F-Prot]security risk or a "backdoor" program,security risk named W32/Assasin.C;
[Panda]Assassin.959,Backdoor Program,Bck/Assasin.10,Bck/Assasin.20.B,Trj/Assasin.20;
[Computer Associates]Assassin.959,Backdoor/Assasin.10!plugin!dll,Win32.Assasin.A!plugin,Backdoor/Assasin.20.B.Server,Backdoor/Assasin.20.B.ServerDLL,Backdoor/Assasin.20.Server,Backdoor/Assasin.20.Serverstub,Win32.Assasin.20,Win32.Assasin.20.B,Win32.Assasin.20.plugin

Assassin Symptoms:

Files:
[%WINDOWS%]\ms spool32.exe
[%WINDOWS%]\ms spool32.exe

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\runservices


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

VB.eh Trojan

How To Remove VB.eh?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
VB.eh is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware can even change computer settings, resulting in slow connection speeds,
different home pages, and loss of Internet or other programs.
In an attempt to increase the understanding of spyware, a more formal classification
of its included software types is captured under the term privacy-invasive software.


VB.eh Symptoms:

Files:
[%SYSTEM%]\msvrgu.exe
[%SYSTEM%]\msvrgu.exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

Small.kz Trojan

How To Remove Small.kz?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Small.kz is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.


Small.kz Symptoms:

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{d48d738b-28a3-47f8-a2e4-64e33583a3ac}
HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\e263c16a-a3d8-4157-a192-6e63d44d222c


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

Backdoor/Worm/Sdbot Worm

How To Remove Backdoor/Worm/Sdbot?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Backdoor/Worm/Sdbot is dangerous virus:
Many of the worms which managed to cause significant outbreaks use more then
one propagation method as well as more than one infection technique.



Backdoor/Worm/Sdbot Symptoms:

Files:
[%SYSTEM%]\scvhost32.exe
[%SYSTEM%]\scvhost32.exe

Registry Values:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

PowerReg.Scheduler Adware

How To Remove PowerReg.Scheduler?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
PowerReg.Scheduler is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


PowerReg.Scheduler Symptoms:

Files:
[%ALTSTARTUP%]\powerreg scheduler v3.exe
[%APPDATA%]\iolo\Disabled Entries\Current User\PowerReg Scheduler.exe
[%APPDATA%]\Microsoft\TuneUp\PowerReg Scheduler.exe
[%PROFILE_TEMP%]\backups\backup-20061120-170415-624-PowerReg Scheduler V3.exe
[%PROGRAMS%]\PowerReg Scheduler.exe
[%STARTUP%]\PowerReg Scheduler V3.exe
[%STARTUP%]\PowerReg Scheduler.exe
[%STARTUP%]\PowerReg SchedulerV2.exe
[%WINDOWS%]\pss\PowerReg Scheduler V3.exeStartup
[%WINDOWS%]\pss\PowerReg Scheduler.exeStartup
[%WINDOWS%]\pss\PowerReg SchedulerV2.exeStartup
[%STARTUP%]\powerreg scheduler v3.exe
[%STARTUP%]\powerreg scheduler.exe
[%STARTUP%]\powerreg schedulerv2.exe
[%WINDOWS%]\desktop\startup\powerreg scheduler.exe
[%WINDOWS%]\start menu\programs\startup\image.lnk
[%WINDOWS%]\start menu\programs\startup\norton disk doctor.lnk
[%WINDOWS%]\start menu\programs\startup\powerreg scheduler v3.exe
[%WINDOWS%]\start menu\programs\startup\powerreg scheduler.exe
[%ALTSTARTUP%]\powerreg scheduler v3.exe
[%APPDATA%]\iolo\Disabled Entries\Current User\PowerReg Scheduler.exe
[%APPDATA%]\Microsoft\TuneUp\PowerReg Scheduler.exe
[%PROFILE_TEMP%]\backups\backup-20061120-170415-624-PowerReg Scheduler V3.exe
[%PROGRAMS%]\PowerReg Scheduler.exe
[%STARTUP%]\PowerReg Scheduler V3.exe
[%STARTUP%]\PowerReg Scheduler.exe
[%STARTUP%]\PowerReg SchedulerV2.exe
[%WINDOWS%]\pss\PowerReg Scheduler V3.exeStartup
[%WINDOWS%]\pss\PowerReg Scheduler.exeStartup
[%WINDOWS%]\pss\PowerReg SchedulerV2.exeStartup
[%STARTUP%]\powerreg scheduler v3.exe
[%STARTUP%]\powerreg scheduler.exe
[%STARTUP%]\powerreg schedulerv2.exe
[%WINDOWS%]\desktop\startup\powerreg scheduler.exe
[%WINDOWS%]\start menu\programs\startup\image.lnk
[%WINDOWS%]\start menu\programs\startup\norton disk doctor.lnk
[%WINDOWS%]\start menu\programs\startup\powerreg scheduler v3.exe
[%WINDOWS%]\start menu\programs\startup\powerreg scheduler.exe

Folders:
[%DESKTOP%]\startup
[%DESKTOP%]\startup
[%PROGRAM_FILES%]\powerreg


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

System.Spy Trojan

How To Remove System.Spy?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
System.Spy is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.


System.Spy It also known as:

[Kaspersky]Trojan.Spy.VB.s;
[Panda]Trojan Horse.LC

System.Spy Symptoms:

Files:
[%SYSTEM%]\vblib.ocx
[%SYSTEM%]\vblib.ocx

Folders:
[%PROGRAM_FILES%]\Diplodock\System Spy Shareware
[%PROGRAM_FILES%]\ss

Registry Keys:
HKEY_LOCAL_MACHINE\software\classes\cryptxctl.cryptx\clsid
HKEY_CLASSES_ROOT\clsid\{104e51da-c011-11d1-9c65-70a605c10e27}
HKEY_CLASSES_ROOT\clsid\{104e51db-c011-11d1-9c65-70a605c10e27}
HKEY_CLASSES_ROOT\clsid\{104e51dc-c011-11d1-9c65-70a605c10e27}
HKEY_CLASSES_ROOT\clsid\{104e51dd-c011-11d1-9c65-70a605c10e27}
HKEY_CLASSES_ROOT\clsid\{45070aee-e66c-11d1-b0ac-444553540000}
HKEY_CLASSES_ROOT\clsid\{4b447062-9f42-11d2-90f1-444553540000}
HKEY_CLASSES_ROOT\clsid\{4b447063-9f42-11d2-90f1-444553540000}
HKEY_CLASSES_ROOT\clsid\{4b447067-9f42-11d2-90f1-444553540000}
HKEY_CLASSES_ROOT\clsid\{fbb3c000-6d14-11d2-9e37-813a750b363d}
HKEY_CLASSES_ROOT\clsid\{fbb3c001-6d14-11d2-9e37-813a750b363d}
HKEY_CLASSES_ROOT\clsid\{fbb3c003-6d14-11d2-9e37-813a750b363d}
HKEY_CLASSES_ROOT\clsid\{fbb3c006-6d14-11d2-9e37-813a750b363d}
HKEY_CLASSES_ROOT\clsid\{fbb3c007-6d14-11d2-9e37-813a750b363d}
HKEY_CLASSES_ROOT\clsid\{fbb3c009-6d14-11d2-9e37-813a750b363d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{104e51db-c011-11d1-9c65-70a605c10e27}
HKEY_LOCAL_MACHINE\software\classes\clsid\{4b447063-9f42-11d2-90f1-444553540000}
HKEY_LOCAL_MACHINE\software\classes\clsid\{fbb3c001-6d14-11d2-9e37-813a750b363d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{fbb3c007-6d14-11d2-9e37-813a750b363d}
HKEY_LOCAL_MACHINE\software\classes\interface\{104e51da-c011-11d1-9c65-70a605c10e27}
HKEY_LOCAL_MACHINE\software\classes\interface\{104e51dc-c011-11d1-9c65-70a605c10e27}
HKEY_LOCAL_MACHINE\software\classes\interface\{4b447062-9f42-11d2-90f1-444553540000}
HKEY_LOCAL_MACHINE\software\classes\interface\{4b447067-9f42-11d2-90f1-444553540000}
HKEY_LOCAL_MACHINE\software\classes\interface\{fbb3c000-6d14-11d2-9e37-813a750b363d}
HKEY_LOCAL_MACHINE\software\classes\interface\{fbb3c003-6d14-11d2-9e37-813a750b363d}
HKEY_LOCAL_MACHINE\software\classes\interface\{fbb3c006-6d14-11d2-9e37-813a750b363d}
HKEY_LOCAL_MACHINE\software\classes\typelib\{104e51dd-c011-11d1-9c65-70a605c10e27}
HKEY_LOCAL_MACHINE\software\classes\typelib\{45070aee-e66c-11d1-b0ac-444553540000}
HKEY_LOCAL_MACHINE\software\classes\typelib\{fbb3c009-6d14-11d2-9e37-813a750b363d}
HKEY_LOCAL_MACHINE\software\classes\vblibrary.vblib\clsid

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\system spy v1.00
HKEY_LOCAL_MACHINE\software\tbproducts\system spy\v1.00
HKEY_LOCAL_MACHINE\software\tg byte software\setup\currentversion\uninstall specialist


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

JessicaSimpsonScreenSaver Trojan

How To Remove JessicaSimpsonScreenSaver?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
JessicaSimpsonScreenSaver is dangerous virus:
This category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits


JessicaSimpsonScreenSaver It also known as:

[Kaspersky]AdWare.Win32.MediaMotor.a

JessicaSimpsonScreenSaver Symptoms:

Files:
[%PROGRAMS%]\filesubmit\Install jessicasimpsonsetup.exe.lnk
[%PROGRAMS%]\filesubmit\Uninstall jessicasimpsonsetup.exe.lnk
[%SYSTEM%]\Jessica Simpson.scr
[%PROGRAMS%]\filesubmit\Install jessicasimpsonsetup.exe.lnk
[%PROGRAMS%]\filesubmit\Uninstall jessicasimpsonsetup.exe.lnk
[%SYSTEM%]\Jessica Simpson.scr

Registry Values:
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\jessica simpson1.0
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\jessica simpson1.0
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\jessicasimpsonsetup.exe
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\jessicasimpsonsetup.exe


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

Zlob.Fam.SearchToolbar Trojan

How To Remove Zlob.Fam.SearchToolbar?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
Zlob.Fam.SearchToolbar is dangerous virus:
This loose category includes a variety of Trojans that damage victim machines or
threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers
create multi-functional Trojans rather than Trojan packs.
Adware is the class of programs that place advertisements on your screen.
These may be in the form of pop-ups, pop-unders, advertisements embedded in programs,
advertisements placed on top of ads in web sites, or any other way the authors can
think of showing you an ad.

The pop-ups generally will not be stopped by pop-up stoppers, and often are
not dependent on your having Internet Explorer open.
They may show up when you are playing a game, writing a document, listening to music,
or anything else. Should you be surfing, the advertisements will often be related to
the web page you are viewing.


Zlob.Fam.SearchToolbar Symptoms:

Registry Keys:
HKEY_CLASSES_ROOT\CLSID\{08BEC6AA-49FC-4379-3587-4B21E286C19E}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{08BEC6AA-49FC-4379-3587-4B21E286C19E}

Registry Values:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats:

LOP Adware

How To Remove LOP?
You must download trial version of "Exterminate-It" antivirus software,to check your computer instantly.
LOP is dangerous virus:
Adware are programs that facilitate delivery for advertising content
to the user and in some cases gather information from the user's computer,
including information related to Internet browser usage or other computer habits
Spyware programs can collect various types of personal information,
such as Internet surfing habit, sites that have been visited,
but can also interfere with user control of the computer in other ways,
such as installing additional software, redirecting Web browser activity,
accessing websites blindly that will cause more harmful viruses,
or diverting advertising revenue to a third party.
The BHO (Browser Helper Object) waits for the user to post personal information to a monitored website.
As this information is entered by the user, it is captured by the BHO and sent back to the attacker.
Toolbar presents itself as a helpful add-on for Internet Explorer but it is a real pest.
It replaces your start page, continuosly open a number of pop up windows and so on.
Trojans-downloaders downloads and installs new malware or adware on the computer.

Tracking cookies, like regular cookies, are small files that get deposited
onto your computer's hard drive as you browse the Internet.
Unlike harmless cookies that normally let you use certain websites more easily,
tracking cookies usually collect and report information about what websites you visit
and what you do at those websites.
Hijackers are software programs that modify users' default browser home page,
search settings, error page settings, or desktop wallpaper without adequate notice, disclosure,
or user consent.
Adware is the class of programs that place advertisements on your screen.
These may be in the form of pop-ups, pop-unders, advertisements embedded in programs,
advertisements placed on top of ads in web sites, or any other way the authors can
think of showing you an ad.

The pop-ups generally will not be stopped by pop-up stoppers, and often are
not dependent on your having Internet Explorer open.
They may show up when you are playing a game, writing a document, listening to music,
or anything else. Should you be surfing, the advertisements will often be related to
the web page you are viewing.


LOP It also known as:

[Kaspersky]Trojan.Win32.SecondThought.h,TrojanDownloader.Win32.Small.bp,TrojanDownloader.Win32.Swizzor.au,TrojanDownloader.Win32.Swizzor.ba,TrojanDownloader.Win32.Swizzor.bm,TrojanDownloader.Win32.Swizzor.bn,TrojanDownloader.Win32.Swizzor.br,TrojanDownloader.Win32.Swizzor.i,TrojanDownloader.Win32.Swizzor.q,TrojanDropper.Win32.Small.fl,AdWare.Win32.Lop,AdWare.Win32.Lop.z;
[McAfee]Adware-180Solutions,LopAdvert,MP3Search,MpAdvert,Swizzor.dr;
[F-Prot]W32/Swicer.A;
[Panda]Adware/Adtomi,Adware/Apropos,Adware/Lop,Adware/nCase,Adware/NetPals,Adware/WinActive,Dialer.AL,Spyware/Infameow,Trj/Downloader.HC,Trj/Downloader.HW,Trj/Downloader.HX,Trj/Zerolin.A,VBS/Inor.gen;
[Computer Associates]VBS.ObjectDataHTA,VBS.Suzer,VBS/Suzer.A!Dropper,Win32/Polbya.A!Trojan;
[Other]Adware.Lop,C2.Lop

LOP Symptoms:

Files:
[%APPDATA%]\wa_inst.exe
[%FAVORITES%]\ business and finance\b to b.url
[%FAVORITES%]\ business and finance\banking.url
[%FAVORITES%]\ business and finance\business.url
[%FAVORITES%]\ business and finance\careers.url
[%FAVORITES%]\ business and finance\credit cards.url
[%FAVORITES%]\ business and finance\finance.url
[%FAVORITES%]\ business and finance\insurance.url
[%FAVORITES%]\ business and finance\office.url
[%FAVORITES%]\ business and finance\printing.url
[%FAVORITES%]\ computers and tech\computer games.url
[%FAVORITES%]\ computers and tech\computer stores.url
[%FAVORITES%]\ computers and tech\dedicated server.url
[%FAVORITES%]\ computers and tech\domain names.url
[%FAVORITES%]\ computers and tech\hardware.url
[%FAVORITES%]\ computers and tech\laptops.url
[%FAVORITES%]\ computers and tech\software.url
[%FAVORITES%]\ computers and tech\telecommunication\mobile phones.url
[%FAVORITES%]\ computers and tech\telecommunication\telecommunication.url
[%FAVORITES%]\ computers and tech\telecommunication\telephone.url
[%FAVORITES%]\ computers and tech\telecommunication\text sms messaging.url
[%FAVORITES%]\ computers and tech\web design.url
[%FAVORITES%]\ computers and tech\web hosting.url
[%FAVORITES%]\ cool stuff\auction.url
[%FAVORITES%]\ cool stuff\classifieds.url
[%FAVORITES%]\ cool stuff\free emails.url
[%FAVORITES%]\ cool stuff\free homepages.url
[%FAVORITES%]\ cool stuff\free services.url
[%FAVORITES%]\ cool stuff\school essays and homework.url
[%FAVORITES%]\ cool stuff\services.url
[%FAVORITES%]\ entertainment\automotive.url
[%FAVORITES%]\ entertainment\dvd.url
[%FAVORITES%]\ entertainment\entertainment.url
[%FAVORITES%]\ entertainment\hot games and gaming.url
[%FAVORITES%]\ entertainment\mp3.url
[%FAVORITES%]\ entertainment\travel.url
[%FAVORITES%]\ games.url
[%FAVORITES%]\ mp3 music.url
[%FAVORITES%]\ news.url
[%FAVORITES%]\ on lifestyle\art.url
[%FAVORITES%]\ on lifestyle\astrology.url
[%FAVORITES%]\ on lifestyle\books.url
[%FAVORITES%]\ on lifestyle\community.url
[%FAVORITES%]\ on lifestyle\ebooks.url
[%FAVORITES%]\ on lifestyle\education\education.url
[%FAVORITES%]\ on lifestyle\education\training.url
[%FAVORITES%]\ on lifestyle\health and beauty\beauty.url
[%FAVORITES%]\ on lifestyle\health and beauty\health and fitness.url
[%FAVORITES%]\ on lifestyle\health and beauty\pharmacy.url
[%FAVORITES%]\ on lifestyle\home and garden\construction.url
[%FAVORITES%]\ on lifestyle\home and garden\furniture.url
[%FAVORITES%]\ on lifestyle\home and garden\home and garden.url
[%FAVORITES%]\ on lifestyle\home and garden\real estate.url
[%FAVORITES%]\ on lifestyle\home and garden\utilities.url
[%FAVORITES%]\ on lifestyle\kids.url
[%FAVORITES%]\ on lifestyle\magazines.url
[%FAVORITES%]\ on lifestyle\matchmaking.url
[%FAVORITES%]\ on lifestyle\pets.url
[%FAVORITES%]\ on lifestyle\self help.url
[%FAVORITES%]\ on lifestyle\wine.url
[%FAVORITES%]\ on lifestyle\women.url
[%FAVORITES%]\entertainment\games.url
[%LOCAL_APPDATA%]\Temp\Twunk001.MTX
[%PROFILE_TEMP%]\Inside Program.exe
[%PROFILE_TEMP%]\sta10.exe
[%PROFILE_TEMP%]\sta3.exe
[%PROFILE_TEMP%]\staE.exe
[%SYSTEM%]\veg32.dll.dll
[%APPDATA%]\01acid~1\creativeviewpop.exe
[%APPDATA%]\01ACID~1\soap enc.exe
[%APPDATA%]\4suppo~1\File proxy pop.exe
[%APPDATA%]\4SUPPO~1\tons beep real.exe
[%APPDATA%]\64batb~1\BASEHOLEBIKE.exe
[%APPDATA%]\64BATB~1\uploadplanchin.exe
[%APPDATA%]\??curity\l?gonui.exe
[%APPDATA%]\about1~1\DeleteDumbSetup.exe
[%APPDATA%]\ABOUT1~1\settingsgridplus.exe
[%APPDATA%]\AIMOWN~1\link amen shim.exe
[%APPDATA%]\aimown~1\readmevga2.exe
[%APPDATA%]\amvoolgizow.exe
[%APPDATA%]\antifr~1\meta help lite.exe
[%APPDATA%]\ANTIFR~1\Multi store htm.exe
[%APPDATA%]\armybo~1\Heart Test Time.exe
[%APPDATA%]\ARMYBO~1\sendbatcreative.exe
[%APPDATA%]\atomvc~1\less ooze chic.exe
[%APPDATA%]\audiol~1\Atom Bolt Surf.exe
[%APPDATA%]\AUDIOL~1\Bat File Beep.exe
[%APPDATA%]\axisdu~1\Mp3 skip mapi.exe
[%APPDATA%]\axispart\Trans Dupe Book.exe
[%APPDATA%]\AXISPL~1\anti flaw.exe
[%APPDATA%]\axispl~1\Blahelseokay.exe
[%APPDATA%]\ballab~1\Lovepuresign.exe
[%APPDATA%]\BALLAB~1\type mp3.exe
[%APPDATA%]\barbba~1\DATE TRUST MIX.exe
[%APPDATA%]\BARBBA~1\find bias.exe
[%APPDATA%]\biasbo~1\Holecoolsupport.exe
[%APPDATA%]\BIASBO~1\SoftMixWeb.exe
[%APPDATA%]\bindti~1\Bib base 4.exe
[%APPDATA%]\BINDTI~1\Dart help spam.exe
[%APPDATA%]\blahmo~1\barbcorndoes.exe
[%APPDATA%]\BLAHMO~1\citybash.exe
[%APPDATA%]\BLEHTE~1\NurbFunkStore.exe
[%APPDATA%]\blehte~1\WaitMeowDoes.exe
[%APPDATA%]\blueax~1\junk mode first.exe
[%APPDATA%]\BLUEAX~1\Lite Bait.exe
[%APPDATA%]\boldde~1\audiocoalweb.exe
[%APPDATA%]\BOLDDE~1\grey memo.exe
[%APPDATA%]\boldit~1\errorprocgram.exe
[%APPDATA%]\BOLDIT~1\Ooze ford real.exe
[%APPDATA%]\BOOKFR~1\OPTION STORE PEAK.exe
[%APPDATA%]\bookfr~1\start wma bore.exe
[%APPDATA%]\bookhi~1\Body license exit.exe
[%APPDATA%]\BOOKHI~1\Fourjoy.exe
[%APPDATA%]\BOREDU~1\activestart.exe
[%APPDATA%]\boredu~1\BikeVgaAxis.exe
[%APPDATA%]\browse~1\linklocksbook.exe
[%APPDATA%]\buildp~1\bind media aim.exe
[%APPDATA%]\BUILDP~1\Corn bleh.exe
[%APPDATA%]\burnlo~1\newmultidata.exe
[%APPDATA%]\BURNLO~1\rdrdogskip.exe
[%APPDATA%]\burnma~1\GRAM REAL FLAP.exe
[%APPDATA%]\CASHIN~1\soft chic.exe
[%APPDATA%]\CHINGP~1\CAKE BLEH.exe
[%APPDATA%]\chingp~1\phone proxy grid.exe
[%APPDATA%]\CHINRD~1\else show.exe
[%APPDATA%]\chinrd~1\user each free.exe
[%APPDATA%]\closes~1\Deaf Bits Internet.exe
[%APPDATA%]\CLOSES~1\keep wait.exe
[%APPDATA%]\coalth~1\Bitsbindpart.exe
[%APPDATA%]\COALTH~1\Loadflag.exe
[%APPDATA%]\coolto~2\test else sect.exe
[%APPDATA%]\copyca~1\Bone Balm Amen.exe
[%APPDATA%]\DASHHE~1\fastcomp.exe
[%APPDATA%]\dashhe~1\Flap Global Grim.exe
[%APPDATA%]\datamo~1\Delete Live Axis.exe
[%APPDATA%]\DATEON~1\shim cash.exe
[%APPDATA%]\dateon~1\Two save global.exe
[%APPDATA%]\DEFYDO~1\Base Flap.exe
[%APPDATA%]\DOWNLO~1\Burn fork.exe
[%APPDATA%]\DRIVEC~1\Junk Cast.exe
[%APPDATA%]\drivec~1\MoveUpAbout.exe
[%APPDATA%]\DRIVES~1\CdromDaleBib.exe
[%APPDATA%]\drives~1\iso bias blue.exe
[%APPDATA%]\DUPEKI~1\Debug itch.exe
[%APPDATA%]\dvdwarn\live intra bash.exe
[%APPDATA%]\dvdwarn\Stupid Funk That.exe
[%APPDATA%]\dvdwav~1\drvburnwait.exe
[%APPDATA%]\ELSEPL~1\AXISNEW.exe
[%APPDATA%]\elsepl~1\Thunkdeafgreat.exe
[%APPDATA%]\EXTRAM~1\Rectelse.exe
[%APPDATA%]\FACENE~1\Find Exit.exe
[%APPDATA%]\facene~1\LiesOnceHeart.exe
[%APPDATA%]\faceth~1\closebodydefault.exe
[%APPDATA%]\FACETH~1\PopRoam.exe
[%APPDATA%]\findfast.exe
[%APPDATA%]\fiveat~1\Love Bend Browse.exe
[%APPDATA%]\FIVEAT~1\Wait Third.exe
[%APPDATA%]\FLAPLO~1\Settings byte debug.exe
[%APPDATA%]\forfiv~1\HTM BYTE REAL.exe
[%APPDATA%]\FORFIV~1\Media Noun.exe
[%APPDATA%]\fourtr~1\Body scr 01.exe
[%APPDATA%]\FOURTR~1\Peakstart.exe
[%APPDATA%]\ftha.exe
[%APPDATA%]\global~1\Clock pile meow.exe
[%APPDATA%]\global~1\DataMemoBook.exe
[%APPDATA%]\GLOBAL~1\Moreruledead.exe
[%APPDATA%]\global~1\view barb beep.exe
[%APPDATA%]\GLOBAL~1\ViewCamp.exe
[%APPDATA%]\gpl2cool\Bib4Log.exe
[%APPDATA%]\gpl2cool\Film dumb.exe
[%APPDATA%]\GPLAIM~1\Draw does.exe
[%APPDATA%]\gplaim~1\DRIVEBODYSTOP.exe
[%APPDATA%]\gplcoo~1\Bib Amen Mags.exe
[%APPDATA%]\GPLCOO~1\datawarnooze.exe
[%APPDATA%]\gplido~1\Tray burn third.exe
[%APPDATA%]\GPLLIN~1\show cash.exe
[%APPDATA%]\GPLPIN~1\Obj Iso Free.exe
[%APPDATA%]\GPLROA~1\Global Team.exe
[%APPDATA%]\grambi~1\BIAS TITLE SIZE.exe
[%APPDATA%]\GRAMBI~1\LOUD PROGRAM.exe
[%APPDATA%]\greato~1\Option2win.exe
[%APPDATA%]\grimde~1\dvd barb thunk.exe
[%APPDATA%]\GRIMDE~1\findlesseq.exe
[%APPDATA%]\grimwa~1\Mags list amok.exe
[%APPDATA%]\GRIMWA~1\newdead.exe
[%APPDATA%]\HECKKE~1\Extra Hold Each.exe
[%APPDATA%]\heckke~1\IntraDefyHelp.exe
[%APPDATA%]\HIDEAM~1\Burn Idol Bore.exe
[%APPDATA%]\hideam~1\TrayBuildWeb.exe
[%APPDATA%]\hidedu~1\Proxy funk film.exe
[%APPDATA%]\hidires\hidr.exe
[%APPDATA%]\hidn\hidn2.exe
[%APPDATA%]\HOLEST~1\Cdrom gram.exe
[%APPDATA%]\holest~1\Rdr Htm Drive.exe
[%APPDATA%]\idlebin\BIND THIRD BYTE.exe
[%APPDATA%]\ietfoz.exe
[%APPDATA%]\infolo~1\bowsballfilm.exe
[%APPDATA%]\INFOLO~1\Cash Style.exe
[%APPDATA%]\intern~1\2 store flaw.exe
[%APPDATA%]\intern~1\Beepboltcomp.exe
[%APPDATA%]\INTERN~1\GplCake.exe
[%APPDATA%]\INTRAV~1\link help grid.exe
[%APPDATA%]\liesde~1\Deletecoolmail.exe
[%APPDATA%]\LIESDE~1\mediabindraw.exe
[%APPDATA%]\LIESLE~1\Defy Exit Once.exe
[%APPDATA%]\LINKPI~1\Loadskip.exe
[%APPDATA%]\LISTPE~1\Castwma.exe
[%APPDATA%]\listpe~1\htm clock corn.exe
[%APPDATA%]\LISTVGA\SIZE DVD.exe
[%APPDATA%]\log1pa~1\Bold Mapi Lies.exe
[%APPDATA%]\logido~1\peak mfcd one.exe
[%APPDATA%]\LOGIDO~1\PlatformWay.exe
[%APPDATA%]\LOGMEA~1\Bits Plan.exe
[%APPDATA%]\logmea~1\loudjumpstop.exe
[%APPDATA%]\LOGOAM~1\SOFTWARE TICK WAVE.exe
[%APPDATA%]\lovefa~1\ATOMOBJONLINE.exe
[%APPDATA%]\LOVEFA~1\Type Soap.exe
[%APPDATA%]\mailch~1\bike view locks.exe
[%APPDATA%]\MAILCH~1\dumb comp.exe
[%APPDATA%]\mapiex~1\jugs date file.exe
[%APPDATA%]\METAAD~1\FIND THE TOOL.exe
[%APPDATA%]\metaad~1\ItchSendDate.exe
[%APPDATA%]\Microsoft\Windows\fwqkg.exe
[%APPDATA%]\Microsoft\Windows\guchov.exe
[%APPDATA%]\Microsoft\Windows\irbvqq.exe
[%APPDATA%]\Microsoft\Windows\mbdlqx.exe
[%APPDATA%]\Microsoft\Windows\nexklcx.exe
[%APPDATA%]\Microsoft\Windows\psfbjhi.exe
[%APPDATA%]\Microsoft\Windows\qosrlj.exe
[%APPDATA%]\Microsoft\Windows\rayio.exe
[%APPDATA%]\Microsoft\Windows\rayiou.exe
[%APPDATA%]\Microsoft\Windows\reviag.exe
[%APPDATA%]\Microsoft\Windows\rkavlfl.exe
[%APPDATA%]\Microsoft\Windows\rnlsnj.exe
[%APPDATA%]\Microsoft\Windows\vhxksjy.exe
[%APPDATA%]\Microsoft\Windows\vtejsn.exe
[%APPDATA%]\Microsoft\Windows\wtydo.exe
[%APPDATA%]\Microsoft\Windows\xmfoyr.exe
[%APPDATA%]\mixsty~1\Datebrowsetime.exe
[%APPDATA%]\MIXSTY~1\Pile Deaf Drv.exe
[%APPDATA%]\MOVELE~1\cash 2.exe
[%APPDATA%]\movele~1\MATH LOUD LOGO.exe
[%APPDATA%]\moveph~1\RemoteBoldKnob.exe
[%APPDATA%]\MP3HTM~1\64 window close.exe
[%APPDATA%]\mp3htm~1\Flag platform bore.exe
[%APPDATA%]\mp3web\Atom phone pile.exe
[%APPDATA%]\My-disgo\MyKey disgo.exe
[%APPDATA%]\MyKey\MyKey.exe
[%APPDATA%]\MySpace\IM\bin\MySpaceIM.exe
[%APPDATA%]\m\flec006.exe
[%APPDATA%]\nethi.exe
[%APPDATA%]\newfra~1\chinnurbfile.exe
[%APPDATA%]\NOUNGR~1\fileeqkeep.exe
[%APPDATA%]\noungr~1\Play Readme Scr.exe
[%APPDATA%]\nounro~1\jugs active sign.exe
[%APPDATA%]\nurbdu~1\HoleWarnLess.exe
[%APPDATA%]\objaxis\deaffivebib.exe
[%APPDATA%]\OBJAXIS\waygreat.exe
[%APPDATA%]\objboo~1\kind dent itch.exe
[%APPDATA%]\OBJBOO~1\meow trans.exe
[%APPDATA%]\Once64\SpamProgram.exe
[%APPDATA%]\ONCETR~1\SecondReal.exe
[%APPDATA%]\oncetr~1\UploadThatDelete.exe
[%APPDATA%]\onehea~1\showpollbits.exe
[%APPDATA%]\ONEHEA~1\Webbash.exe
[%APPDATA%]\ONESTY~1\dart bias surf.exe
[%APPDATA%]\onesty~1\ManagerAmenAtom.exe
[%APPDATA%]\PHONEJ~1\CITY LESS EACH.exe
[%APPDATA%]\phonej~1\filmlinkdale.exe
[%APPDATA%]\PHONES~1\active amen.exe
[%APPDATA%]\phonet~1\site license mode.exe
[%APPDATA%]\PHONET~1\TimeFlap.exe
[%APPDATA%]\planti~1\FILEGREATKNOB.exe
[%APPDATA%]\platfo~1\Drive Amok Acid.exe
[%APPDATA%]\PLUSTH~1\Dartnounfive.exe
[%APPDATA%]\plusth~1\kindbendpart.exe
[%APPDATA%]\procmu~1\Bone axis skip.exe
[%APPDATA%]\PROCMU~1\burn city readme.exe
[%APPDATA%]\PROXYS~1\body grid army.exe
[%APPDATA%]\proxys~1\TypeStyleGrim.exe
[%APPDATA%]\PUREHE~1\sendextrasetup.exe
[%APPDATA%]\REFTHE~1\BITSBAITEACH.exe
[%APPDATA%]\ROADFR~1\typedrvcake.exe
[%APPDATA%]\roadfr~1\win bib math.exe
[%APPDATA%]\SAVEEG~1\LongPlatform.exe
[%APPDATA%]\saveeg~1\WMA DATE TRUST.exe
[%APPDATA%]\SETUPM~1\Enc 16.exe
[%APPDATA%]\setupm~1\flagpokeelse.exe
[%APPDATA%]\SIGNPL~1\bike soap.exe
[%APPDATA%]\softde~1\Anti Pure Blah.exe
[%APPDATA%]\SOFTPH~1\spam roam.exe
[%APPDATA%]\softph~1\Test Chin Tons.exe
[%APPDATA%]\SOFTWA~1\dupeacidaxis.exe
[%APPDATA%]\softwa~1\WAIT INTER MEOW.exe
[%APPDATA%]\SPAMFL~1\atomblah.exe
[%APPDATA%]\spamfl~1\internet boob blue.exe
[%APPDATA%]\STOPCA~1\Flawmeow.exe
[%APPDATA%]\surfdr~1\Balm Eggs Settings.exe
[%APPDATA%]\SURFDR~1\Second Knob.exe
[%APPDATA%]\T?sks\?explore.exe
[%APPDATA%]\TESTST~1\ITCH ENC.exe
[%APPDATA%]\ThisMix\Extra bias.exe
[%APPDATA%]\thismix\Four axis license.exe
[%APPDATA%]\thispr~1\OOZE PHONE ENC.exe
[%APPDATA%]\THISPR~1\Pop Bias.exe
[%APPDATA%]\tonspi~1\bore thunk help.exe
[%APPDATA%]\Tools\1.exe
[%APPDATA%]\TRANSB~1\For Axis.exe
[%APPDATA%]\transp~1\LITE CITY THE.exe
[%APPDATA%]\trayop~1\DASH BEEP WIPE.exe
[%APPDATA%]\UPLOAD~1\Data Bolt File.exe
[%APPDATA%]\UPLOAD~1\funksignheart.exe
[%APPDATA%]\upload~1\Style About Acid.exe
[%APPDATA%]\UPLOCKS\Inter Plan.exe
[%APPDATA%]\uplocks\internetfourblah.exe
[%APPDATA%]\UpSellTool\ut.exe
[%APPDATA%]\USERDR~1\ANTE INSIDE.exe
[%APPDATA%]\userdr~1\DupeLinkStart.exe
[%APPDATA%]\Verbatim Software\V-Key.exe
[%APPDATA%]\webcur~1\Mealcamprect.exe
[%APPDATA%]\WholeSecurity\CAT\ConfidenceLite.exe
[%APPDATA%]\WinButler\WinButler.exe
[%APPDATA%]\window~1\defaultmediasign.exe
[%APPDATA%]\WINDOW~1\seek grid.exe
[%APPDATA%]\WinTouch\WinTouch.exe
[%APPDATA%]\wmadum~1\MEMO CITY OBJ.exe
[%APPDATA%]\WMADUM~1\size hide mode.exe
[%APPDATA%]\wmaspa~1\Aboutace01.exe
[%APPDATA%]\WMASPA~1\Manager this.exe
[%APPDATA%]\wpnqaxmu.exe
[%APPDATA%]\wxgoery.exe
[%COMMON_APPDATA%]\1 once hole send\Mail cash.exe
[%COMMON_APPDATA%]\ABOUT TEAM INFO SECT\Clock up.exe
[%COMMON_APPDATA%]\Active defy itch second\Warn Tons.exe
[%COMMON_APPDATA%]\Admin Inter 1 Mags\Wave Soap.exe
[%COMMON_APPDATA%]\AMEN GREY GLUE TITLE\Knobbias.exe
[%COMMON_APPDATA%]\Anti bind error defy\64aim.exe
[%COMMON_APPDATA%]\AOL\UserProfiles\All Users\antiSpyware\dat\updates\aspapp\sunsetAsp2.exe
[%COMMON_APPDATA%]\ARMYENCSETUPLINK\Axis Road.exe
[%COMMON_APPDATA%]\audio junk trans body\freehide.exe
[%COMMON_APPDATA%]\Bagsboobokaycorn\typeokay.exe
[%COMMON_APPDATA%]\bait noun acid once\file start.exe
[%COMMON_APPDATA%]\Barb plus chic wait\REGS JUNK.exe
[%COMMON_APPDATA%]\Beep media move 64\jugs book.exe
[%COMMON_APPDATA%]\biasthunksupportbib\knobobj.exe
[%COMMON_APPDATA%]\bike bore media real\defybold.exe
[%COMMON_APPDATA%]\BIN PILE OKAY BIAS\Mixbold.exe
[%COMMON_APPDATA%]\Bind Face Glue Name\Way Loud.exe
[%COMMON_APPDATA%]\binlovehtmaxis\Dumb Online.exe
[%COMMON_APPDATA%]\Bird Soft Second Lies\help frag.exe
[%COMMON_APPDATA%]\Body ooze meal inter\32 Bib.exe
[%COMMON_APPDATA%]\boob book jump vc\Plan Name.exe
[%COMMON_APPDATA%]\Boob Corn Up Option\DELETEFORD.exe
[%COMMON_APPDATA%]\BOWS TWO BIAS LOGO\second 4.exe
[%COMMON_APPDATA%]\burn download defy inside\Window vga.exe
[%COMMON_APPDATA%]\Camp Mess Warn Pop\mess bash.exe
[%COMMON_APPDATA%]\CampDataFiveBike\About Data.exe
[%COMMON_APPDATA%]\chic extra drive joy\KeepCoal.exe
[%COMMON_APPDATA%]\city about store file\About Debug.exe
[%COMMON_APPDATA%]\Close first mags size\FileHeck.exe
[%COMMON_APPDATA%]\Comp Live Axis Safe\BOLT FIVE.exe
[%COMMON_APPDATA%]\corncaketimemix\FindIntra.exe
[%COMMON_APPDATA%]\cornmetampegthe\BOLDWIPE.exe
[%COMMON_APPDATA%]\ctqbgngx.exe
[%COMMON_APPDATA%]\DASH DELETE LIES FIND\StartAce.exe
[%COMMON_APPDATA%]\Date Spam Ball Window\Bags 16.exe
[%COMMON_APPDATA%]\Deaf Meow Lite Mags\Junk Admin.exe
[%COMMON_APPDATA%]\default heart roam idol\Bash pop hole.exe
[%COMMON_APPDATA%]\dilqxing.exe
[%COMMON_APPDATA%]\Download loud seek support\sizeroam.exe
[%COMMON_APPDATA%]\dumb pure bind support\Vga acid.exe
[%COMMON_APPDATA%]\dupe real memo 01\PureCopy.exe
[%COMMON_APPDATA%]\dyfmvipo.exe
[%COMMON_APPDATA%]\each new axis love\Each Play.exe
[%COMMON_APPDATA%]\each new axis love\inter chic.exe
[%COMMON_APPDATA%]\evgnctuj.exe
[%COMMON_APPDATA%]\Exit Bias Skip Send\OPENPILE.exe
[%COMMON_APPDATA%]\Exit Sect Bags Mfcd\BallLive.exe
[%COMMON_APPDATA%]\fafkbqpc.exe
[%COMMON_APPDATA%]\flag style dead axis\oozechic.exe
[%COMMON_APPDATA%]\Flapgramarmyboob\bits idol.exe
[%COMMON_APPDATA%]\ford does hold option\Ball beep.exe
[%COMMON_APPDATA%]\gbgdotoh.exe
[%COMMON_APPDATA%]\glue 32 heck real\Vga info.exe
[%COMMON_APPDATA%]\Gpl Safe Meta Mags\magsuser.exe
[%COMMON_APPDATA%]\Grid Blue Memo Site\Exit ford.exe
[%COMMON_APPDATA%]\Grid Blue Memo Site\Intra load.exe
[%COMMON_APPDATA%]\gtuncnqj.exe
[%COMMON_APPDATA%]\Hold Book 01 Link\regs open.exe
[%COMMON_APPDATA%]\hozihatk.exe
[%COMMON_APPDATA%]\htmfordrectsafe\MoveMfcd.exe
[%COMMON_APPDATA%]\idol grim aim readme\five bat.exe
[%COMMON_APPDATA%]\IDOL UPLOAD LOCKS GRID\Save long.exe
[%COMMON_APPDATA%]\ihsnwpsd.exe
[%COMMON_APPDATA%]\infocoaleachcorn\Loudmeal.exe
[%COMMON_APPDATA%]\Inside less atom mags\Burn Ante.exe
[%COMMON_APPDATA%]\internet settings clock blue\else pure.exe
[%COMMON_APPDATA%]\ipqpwngj.exe
[%COMMON_APPDATA%]\jmrotsvu.exe
[%COMMON_APPDATA%]\Less Bleh Bone Tons\COAL HOLE ANTE.exe
[%COMMON_APPDATA%]\LICENSE FORD HOPE DRAW\intra site.exe
[%COMMON_APPDATA%]\Link Axis Bat Wave\wipe great.exe
[%COMMON_APPDATA%]\ListPlusMeetError\Mfcd Boob.exe
[%COMMON_APPDATA%]\live 64 math does\Slow Bash.exe
[%COMMON_APPDATA%]\live 64 math does\SUPPORT THIRD.exe
[%COMMON_APPDATA%]\live 64 math does\type chin.exe
[%COMMON_APPDATA%]\LongSoftwareTrayExtra\drive save.exe
[%COMMON_APPDATA%]\mailhtmdrvblue\Blah Error.exe
[%COMMON_APPDATA%]\MealSetupArmy1\64 Open.exe
[%COMMON_APPDATA%]\Memo save stupid creative\exit proc.exe
[%COMMON_APPDATA%]\meow four dale link\mfcd stop more.exe
[%COMMON_APPDATA%]\Microsoft\Network\Connections\Cm\GRAS301\GUpload.exe
[%COMMON_APPDATA%]\Mode Rule 64 Inter\once body.exe
[%COMMON_APPDATA%]\Modecashcloselite\third gram.exe
[%COMMON_APPDATA%]\More Third Camp Help\Tons Else.exe
[%COMMON_APPDATA%]\MOREBIRDSETTINGSCASH\pile style.exe
[%COMMON_APPDATA%]\Move Bore Curb Tool\Idle Platform.exe
[%COMMON_APPDATA%]\msw\BMan1.exe
[%COMMON_APPDATA%]\Noun Vga Title Mess\seekmanager.exe
[%COMMON_APPDATA%]\Nounlogdrvload\Twocopy.exe
[%COMMON_APPDATA%]\nydilmry.exe
[%COMMON_APPDATA%]\Okay Plan Move Rule\DriveAbout.exe
[%COMMON_APPDATA%]\One idol win data\16 cool.exe
[%COMMON_APPDATA%]\Owns Chin Warn Open\Curb funk.exe
[%COMMON_APPDATA%]\part dead amok eggs\Shim tons.exe
[%COMMON_APPDATA%]\pile mpeg gpl rect\Tick Stupid.exe
[%COMMON_APPDATA%]\plansupportshow32\clock less.exe
[%COMMON_APPDATA%]\platformopenforchic\Copy Debug.exe
[%COMMON_APPDATA%]\PlusFreeBaitTitle\comp dash.exe
[%COMMON_APPDATA%]\pmnevwnm.exe
[%COMMON_APPDATA%]\Poll for free upload\bone ante.exe
[%COMMON_APPDATA%]\Poploudaxisroam\CashShim.exe
[%COMMON_APPDATA%]\proc exit pop rule\peak store.exe
[%COMMON_APPDATA%]\RdrTickNurbInside\Proxystore.exe
[%COMMON_APPDATA%]\Readme Live Axis Tons\Mode window.exe
[%COMMON_APPDATA%]\rect program sign window\Exitfrag.exe
[%COMMON_APPDATA%]\second regs grim software\Joy Keep Soap.exe
[%COMMON_APPDATA%]\Send acid copy bin\Chic Date.exe
[%COMMON_APPDATA%]\SETTINGSMEDIADEADDOES\Greyjoy.exe
[%COMMON_APPDATA%]\size style dead love\Play Comp.exe
[%COMMON_APPDATA%]\Software rule flag owns\Pile sect.exe
[%COMMON_APPDATA%]\StyleAceEqLoad\idlenew.exe
[%COMMON_APPDATA%]\SupportIntraLicenseAmok\HEART NOUN.exe
[%COMMON_APPDATA%]\tezchiby.exe
[%COMMON_APPDATA%]\third lies itch ford\Online bash.exe
[%COMMON_APPDATA%]\time hide idol bird\64 wait.exe
[%COMMON_APPDATA%]\Tons balm hope 2\Four Poke.exe
[%COMMON_APPDATA%]\Tons Chin Up Balm\Data Hide.exe
[%COMMON_APPDATA%]\tool debug gpl wipe\bookrdr.exe
[%COMMON_APPDATA%]\Trans Platform New Defy\Idle Vga.exe
[%COMMON_APPDATA%]\TREK\MemMon.exe
[%COMMON_APPDATA%]\up creative first dumb\warn mail fork.exe
[%COMMON_APPDATA%]\Upload Mapi Stop Win\tickobj.exe
[%COMMON_APPDATA%]\windeafjumpwipe\tray shim.exe
[%COMMON_APPDATA%]\WinLiesPureWay\MediaCorn.exe
[%COMMON_APPDATA%]\xiladgte.exe
[%LOCAL_APPDATA%]\0fb96401.exe
[%LOCAL_APPDATA%]\835d5592.exe
[%LOCAL_APPDATA%]\DellVistaUpgrade\Vista_Upgrade.exe
[%LOCAL_APPDATA%]\e9d930bf.exe
[%LOCAL_APPDATA%]\Trend Micro\HCMS\FLock\en-US\FLMain.exe
[%LOCAL_APPDATA%]\Trend Micro\HCMS\FLock\jp\FLMain.exe
[%PROGRAM_FILES%]\Adverts\uninst.exe
[%PROGRAM_FILES%]\Cox\APPLIC~1\app\cox.exe
[%WINDOWS%]\APPLIC~1\GPLBLU~1\dupe wait hole.exe
[%WINDOWS%]\APPLIC~1\LINKWA~1\show one.exe
[%WINDOWS%]\Tasks\3FE9680011230E1C.job
[%WINDOWS%]\Tasks\48D04D489C25B0A4.job
[%WINDOWS%]\Tasks\49E4AE3ED409C6CA.job
[%WINDOWS%]\Tasks\80C5B53097CA5960.job
[%WINDOWS%]\Tasks\8115327787A6DDB7.job
[%WINDOWS%]\Tasks\81659A1B913609FF.job
[%WINDOWS%]\Tasks\81D325158168D511.job
[%WINDOWS%]\Tasks\81FA5DEC9065FFFC.job
[%WINDOWS%]\Tasks\84F3F3B98FA46999.job
[%WINDOWS%]\Tasks\85DC0DDF94ABB12F.job
[%WINDOWS%]\Tasks\86C5553E8B0AD1BA.job
[%WINDOWS%]\Tasks\86C55BB2929EFA46.job
[%WINDOWS%]\Tasks\8991B51A9046221A.job
[%WINDOWS%]\Tasks\89AB3F619388A099.job
[%WINDOWS%]\Tasks\8A13A970932840FC.job
[%WINDOWS%]\Tasks\8C5637EA9391CCA6.job
[%WINDOWS%]\Tasks\8D71F21B83A6925B.job
[%WINDOWS%]\Tasks\8F2D2084935EF4EC.job
[%WINDOWS%]\Tasks\8FB1E50C960E83BC.job
[%WINDOWS%]\Tasks\925B441E906D0C62.job
[%WINDOWS%]\Tasks\935EEA238B629413.job
[%WINDOWS%]\Tasks\93E33D9CB810B388.job
[%WINDOWS%]\Tasks\9880D935B04346FD.job
[%WINDOWS%]\Tasks\9966E82A8149AD8A.job
[%WINDOWS%]\Tasks\9A1A04269239CEFE.job
[%WINDOWS%]\Tasks\9A8D9B26BBA20AB2.job
[%WINDOWS%]\Tasks\9C47CE6FB79C7C13.job
[%WINDOWS%]\Tasks\9DF231D38E61CA27.job
[%WINDOWS%]\Tasks\A03EA02891E55650.job
[%WINDOWS%]\Tasks\A054A886910F580A.job
[%WINDOWS%]\Tasks\A05F41E29184F86A.job
[%WINDOWS%]\Tasks\A07610A591A9817D.job
[%WINDOWS%]\Tasks\A09EA3B491715DBC.job
[%WINDOWS%]\Tasks\A0AF7F559184F0E5.job
[%WINDOWS%]\Tasks\A0B8E05B918F9E83.job
[%WINDOWS%]\Tasks\A0C536A2918AADD2.job
[%WINDOWS%]\Tasks\A0C831119193A145.job
[%WINDOWS%]\Tasks\A0D68E4191C53EC1.job
[%WINDOWS%]\Tasks\A0DAE32F915D96F3.job
[%WINDOWS%]\Tasks\A0E1E4B191869F39.job
[%WINDOWS%]\Tasks\A0E321C99184D2D9.job
[%WINDOWS%]\Tasks\A19EDFDD918156C5.job
[%WINDOWS%]\Tasks\A1D3555E9184C576.job
[%WINDOWS%]\Tasks\A1D5D4D1918A4B81.job
[%WINDOWS%]\Tasks\A1DBFF9091987EC4.job
[%WINDOWS%]\Tasks\A1E769219180E871.job
[%WINDOWS%]\Tasks\A213EE9A91A0997A.job
[%WINDOWS%]\Tasks\A23B702191C4E58D.job
[%WINDOWS%]\Tasks\A23FBBFE918434C6.job
[%WINDOWS%]\Tasks\A245DC72918A58EA.job
[%WINDOWS%]\Tasks\A28C882F919B06B7.job
[%WINDOWS%]\Tasks\A29E995C90850F40.job
[%WINDOWS%]\Tasks\A2A506B491AAB6BC.job
[%WINDOWS%]\Tasks\A2AD0E0E918E8A46.job
[%WINDOWS%]\Tasks\A2DBD87A91B4569E.job
[%WINDOWS%]\Tasks\A2E2438D9019C2AD.job
[%WINDOWS%]\Tasks\A2FAB32E91C52D12.job
[%WINDOWS%]\Tasks\A31773389118EFE8.job
[%WINDOWS%]\Tasks\A336BADF91D52B4B.job
[%WINDOWS%]\Tasks\A3571FFD90DC9B61.job
[%WINDOWS%]\Tasks\A36892B590EF0735.job
[%WINDOWS%]\Tasks\A36DE85E90CA678E.job
[%WINDOWS%]\Tasks\A3800781919FB92D.job
[%WINDOWS%]\Tasks\A384F710918F6958.job
[%WINDOWS%]\Tasks\A3A74B2D9198C045.job
[%WINDOWS%]\Tasks\A3ACF3BC91EB6980.job
[%WINDOWS%]\Tasks\A3C6DFA59131503D.job
[%WINDOWS%]\Tasks\A3CAEA1591259A75.job
[%WINDOWS%]\Tasks\A3DCA9D7918B5FC3.job
[%WINDOWS%]\Tasks\A3DFA0519475235D.job
[%WINDOWS%]\Tasks\A43354299180C731.job
[%WINDOWS%]\Tasks\A443001B9170B7A3.job
[%WINDOWS%]\Tasks\A447E5F493909A4C.job
[%WINDOWS%]\Tasks\A4569B9A91990E56.job
[%WINDOWS%]\Tasks\A4620CDE9119BD46.job
[%WINDOWS%]\Tasks\A48B967F91880E0B.job
[%WINDOWS%]\Tasks\A4975DF69188D85E.job
[%WINDOWS%]\Tasks\A4A8E96793779BC7.job
[%WINDOWS%]\Tasks\A4AB0BF191C8BCE1.job
[%WINDOWS%]\Tasks\A4C416EF91EF8ED7.job
[%WINDOWS%]\Tasks\A4ECFBC8919F79D4.job
[%WINDOWS%]\Tasks\A5088F65918B078D.job
[%WINDOWS%]\Tasks\A54F7EF4903CF470.job
[%WINDOWS%]\Tasks\A57D936090C611F0.job
[%WINDOWS%]\Tasks\A59FD48D93AC4ACD.job
[%WINDOWS%]\Tasks\A5C282E591B934C5.job
[%WINDOWS%]\Tasks\A5CEDB4092694BA4.job
[%WINDOWS%]\Tasks\A64B47079198FE83.job
[%WINDOWS%]\Tasks\A6528AD5979500C5.job
[%WINDOWS%]\Tasks\A671F47D91666B1D.job
[%WINDOWS%]\Tasks\A6744C789187C4B4.job
[%WINDOWS%]\Tasks\A67C2135916BD45D.job
[%WINDOWS%]\Tasks\A690CE6F91074DC7.job
[%WINDOWS%]\Tasks\A695A2CB9392215F.job
[%WINDOWS%]\Tasks\A696B55C91BD2584.job
[%WINDOWS%]\Tasks\A6AEC5A8918575E4.job
[%WINDOWS%]\Tasks\A6BD75DA91DEF542.job
[%WINDOWS%]\Tasks\A6BDC6DD906A75B9.job
[%WINDOWS%]\Tasks\A6C5BE60918A3270.job
[%WINDOWS%]\Tasks\A6CB56539188D377.job
[%WINDOWS%]\Tasks\A7149E4E91A31782.job
[%WINDOWS%]\Tasks\A716C09B91897FBF.job
[%WINDOWS%]\Tasks\A71EF5C5918D7515.job
[%WINDOWS%]\Tasks\A72AE2F09165982C.job
[%WINDOWS%]\Tasks\A75D25F391BADC67.job
[%WINDOWS%]\Tasks\A75FC171900C6631.job
[%WINDOWS%]\Tasks\A7830BA8918489C0.job
[%WINDOWS%]\Tasks\A7C036BC91E3AD6C.job
[%WINDOWS%]\Tasks\A7F7905991840E79.job
[%WINDOWS%]\Tasks\A7FAFD6A95257C1A.job
[%WINDOWS%]\Tasks\A7FDF2B191AE63B9.job
[%WINDOWS%]\Tasks\A80E0C4F91CD85DB.job
[%WINDOWS%]\Tasks\A8137A70919CF140.job
[%WINDOWS%]\Tasks\A813A1CE91845D1A.job
[%WINDOWS%]\Tasks\A81A5D6E9195D44E.job
[%WINDOWS%]\Tasks\A832E4FD91819BF5.job
[%WINDOWS%]\Tasks\A84453E99187CA69.job
[%WINDOWS%]\Tasks\A8472E409154AA1C.job
[%WINDOWS%]\Tasks\A84B947A91C8069E.job
[%WINDOWS%]\Tasks\A852F6BD91856D51.job
[%WINDOWS%]\Tasks\A865020991BEB2C9.job
[%WINDOWS%]\Tasks\A8689E2B918314F7.job
[%WINDOWS%]\Tasks\A8699E79918614ED.job
[%WINDOWS%]\Tasks\A887F9EB9184705F.job
[%WINDOWS%]\Tasks\A8AA54CF959DCC83.job
[%WINDOWS%]\Tasks\A8AE8F7691850A72.job
[%WINDOWS%]\Tasks\A8B4082E91CFBCC2.job
[%WINDOWS%]\Tasks\A8BAAA0991852085.job
[%WINDOWS%]\Tasks\A8C6411D9195F7AD.job
[%WINDOWS%]\Tasks\A8CD700F9012E9D3.job
[%WINDOWS%]\Tasks\A8E630F8918DA16C.job
[%WINDOWS%]\Tasks\A8FB3ABA91ECB85A.job
[%WINDOWS%]\Tasks\A8FD8C7B918A02B3.job
[%WINDOWS%]\Tasks\A9166F9C9199E974.job
[%WINDOWS%]\Tasks\A91F7E929184F43A.job
[%WINDOWS%]\Tasks\A933189591C08B49.job
[%WINDOWS%]\Tasks\A9381F71918F9195.job
[%WINDOWS%]\Tasks\A97913B290FE8AFA.job
[%WINDOWS%]\Tasks\A982356791EDA6FB.job
[%WINDOWS%]\Tasks\A987C47C91D87A08.job
[%WINDOWS%]\Tasks\A988F1C593B76C7D.job
[%WINDOWS%]\Tasks\A99AFC499381707D.job
[%WINDOWS%]\Tasks\A99FB4E191842C51.job
[%WINDOWS%]\Tasks\A9A1C75091E27D28.job
[%WINDOWS%]\Tasks\A9B26F5E9321E5EE.job
[%WINDOWS%]\Tasks\A9BB960D91840D9D.job
[%WINDOWS%]\Tasks\A9D2FAB7914173D3.job
[%WINDOWS%]\Tasks\A9DC00CF90FBB9CF.job
[%WINDOWS%]\Tasks\A9DE73DA9515E85A.job
[%WINDOWS%]\Tasks\A9DFAD50918423B4.job
[%WINDOWS%]\Tasks\A9E2A38A92D15756.job
[%WINDOWS%]\Tasks\A9E2B23D9195296D.job
[%WINDOWS%]\Tasks\A9E5DD14919A5B54.job
[%WINDOWS%]\Tasks\A9FAA44891DD5A50.job
[%WINDOWS%]\Tasks\AA09435D97FEF975.job
[%WINDOWS%]\Tasks\AA0CD0E5918B46A5.job
[%WINDOWS%]\Tasks\AA1E379D9181AC4D.job
[%WINDOWS%]\Tasks\AA369A3D902110CD.job
[%WINDOWS%]\Tasks\AA3B5DFC91ACD2D8.job
[%WINDOWS%]\Tasks\AA3E5DC5918DD2C1.job
[%WINDOWS%]\Tasks\AA45173D91968F51.job
[%WINDOWS%]\Tasks\AA58D65E938B4646.job
[%WINDOWS%]\Tasks\AA6E24D7942DD6FF.job
[%WINDOWS%]\Tasks\AA75913E91720B86.job
[%WINDOWS%]\Tasks\AA89A4129192559E.job
[%WINDOWS%]\Tasks\AA912A739136A2B3.job
[%WINDOWS%]\Tasks\AA95F1EA918E662E.job
[%WINDOWS%]\Tasks\AAA8156A918B93AA.job
[%WINDOWS%]\Tasks\AAA8242B930BDFD7.job
[%WINDOWS%]\Tasks\AAAC375091ABB008.job
[%WINDOWS%]\Tasks\AAAD0966918ABC76.job
[%WINDOWS%]\Tasks\AAB3C0A9918C7EF9.job
[%WINDOWS%]\Tasks\AABAFACB91856F4B.job
[%WINDOWS%]\Tasks\AAD194D291960892.job
[%WINDOWS%]\Tasks\AAE9B997918A30AF.job
[%WINDOWS%]\Tasks\AAF6D92091854E98.job
[%WINDOWS%]\Tasks\AB0205F09185BBCC.job
[%WINDOWS%]\Tasks\AB066115905A1165.job
[%WINDOWS%]\Tasks\AB09C9DE919A48E2.job
[%WINDOWS%]\Tasks\AB11801499063008.job
[%WINDOWS%]\Tasks\AB185EF991AFD11D.job
[%WINDOWS%]\Tasks\AB212149918ED619.job
[%WINDOWS%]\Tasks\AB25BAF29066272E.job
[%WINDOWS%]\Tasks\AB397A2395A6EBF3.job
[%WINDOWS%]\Tasks\AB3AFF479185703B.job
[%WINDOWS%]\Tasks\AB3EB53791ED2F8F.job
[%WINDOWS%]\Tasks\AB4C0685915FBD4D.job
[%WINDOWS%]\Tasks\AB52143C90958808.job
[%WINDOWS%]\Tasks\AB6735B79184A9CB.job
[%WINDOWS%]\Tasks\AB6D7C46916EF93E.job
[%WINDOWS%]\Tasks\AB8526FF918EDC2B.job
[%WINDOWS%]\Tasks\AB92E98A919D9E52.job
[%WINDOWS%]\Tasks\ABA85EC6918FD456.job
[%WINDOWS%]\Tasks\ABAE8436910D3976.job
[%WINDOWS%]\Tasks\ABB8D13F910747C7.job
[%WINDOWS%]\Tasks\ABC10397913E818B.job
[%WINDOWS%]\Tasks\ABC89FC4915B1810.job
[%WINDOWS%]\Tasks\ABDB20A09184D5D8.job
[%WINDOWS%]\Tasks\ABFEF49A90C96B16.job
[%WINDOWS%]\Tasks\AC017EE293AEF77A.job
[%WINDOWS%]\Tasks\AC1C9E1990170EA1.job
[%WINDOWS%]\Tasks\AC21DAA191364AF1.job
[%WINDOWS%]\Tasks\AC28E82593AB9B09.job
[%WINDOWS%]\Tasks\AC312CA891A6DE48.job
[%WINDOWS%]\Tasks\AC351FD594A293F5.job
[%WINDOWS%]\Tasks\AC39C47890B67974.job
[%WINDOWS%]\Tasks\AC51A1EC93965688.job
[%WINDOWS%]\Tasks\AC58F5DF918F66D7.job
[%WINDOWS%]\Tasks\AC639CD991B810DD.job
[%WINDOWS%]\Tasks\AC77FDCC91847080.job
[%WINDOWS%]\Tasks\AC8D898291D23D12.job
[%WINDOWS%]\Tasks\AC9202BD901DBB75.job
[%WINDOWS%]\Tasks\AC923A249189B188.job
[%WINDOWS%]\Tasks\ACAA0F7E918581C6.job
[%WINDOWS%]\Tasks\ACAE1DF0918999C8.job
[%WINDOWS%]\Tasks\ACD5021C9192B43C.job
[%WINDOWS%]\Tasks\ACDAF4269185668E.job
[%WINDOWS%]\Tasks\ACE0987291E313FA.job
[%WINDOWS%]\Tasks\ACE0CEBF918741C7.job
[%WINDOWS%]\Tasks\ACEE03219185BA75.job
[%WINDOWS%]\Tasks\ACEE1735918D8959.job
[%WINDOWS%]\Tasks\ACF0F03D91D36585.job
[%WINDOWS%]\Tasks\AD1020DE9173DEE6.job
[%WINDOWS%]\Tasks\AD12280191EDA5C5.job
[%WINDOWS%]\Tasks\AD24C72C91EB7E2C.job
[%WINDOWS%]\Tasks\AD31CD91918E7E11.job
[%WINDOWS%]\Tasks\AD324ACF91A5CA17.job
[%WINDOWS%]\Tasks\AD357B6090A2F4B8.job
[%WINDOWS%]\Tasks\AD3B371F9184AA9B.job
[%WINDOWS%]\Tasks\AD40C490915F74CC.job
[%WINDOWS%]\Tasks\AD43F61E90686B42.job
[%WINDOWS%]\Tasks\AD4F409E9184FE06.job
[%WINDOWS%]\Tasks\AD61D89C93C25414.job
[%WINDOWS%]\Tasks\AD7012DB91C38CF7.job
[%WINDOWS%]\Tasks\AD723B609185B038.job
[%WINDOWS%]\Tasks\AD8391C091840530.job
[%WINDOWS%]\Tasks\AD83A64491985784.job
[%WINDOWS%]\Tasks\AD86D6869195521A.job
[%WINDOWS%]\Tasks\AD99C91A918A7C7E.job
[%WINDOWS%]\Tasks\ADA7B1AD918425A9.job
[%WINDOWS%]\Tasks\ADA7EB0091B49F18.job
[%WINDOWS%]\Tasks\ADABDDE290205B6E.job
[%WINDOWS%]\Tasks\ADCF0AE49184BDF0.job
[%WINDOWS%]\Tasks\ADE362E9919515B5.job
[%WINDOWS%]\Tasks\AE13845190C839AD.job
[%WINDOWS%]\Tasks\AE188C68903F0118.job
[%WINDOWS%]\Tasks\AE19929B97CA366F.job
[%WINDOWS%]\Tasks\AE2BBCB29184394E.job
[%WINDOWS%]\Tasks\AE2CD5FF918346DF.job
[%WINDOWS%]\Tasks\AE2D847997D25C9D.job
[%WINDOWS%]\Tasks\AE3366F191951F65.job
[%WINDOWS%]\Tasks\AE34F65291D76762.job
[%WINDOWS%]\Tasks\AE364E7F9B95CCBB.job
[%WINDOWS%]\Tasks\AE384D8F90EFFE83.job
[%WINDOWS%]\Tasks\AE3C1AC391BB8D13.job
[%WINDOWS%]\Tasks\AE4D6A60918F1B14.job
[%WINDOWS%]\Tasks\AE5039FC918BAA98.job
[%WINDOWS%]\Tasks\AE535209913CC6BD.job
[%WINDOWS%]\Tasks\AE550276918EB2FA.job
[%WINDOWS%]\Tasks\AE56FC91918571A5.job
[%WINDOWS%]\Tasks\AE5749409184F9EC.job
[%WINDOWS%]\Tasks\AE5B77249180E7D0.job
[%WINDOWS%]\Tasks\AE5FAC5D91845CC9.job
[%WINDOWS%]\Tasks\AE608D7F954F3DF7.job
[%WINDOWS%]\Tasks\AE659BF1922E1B39.job
[%WINDOWS%]\Tasks\AE66895A91F50062.job
[%WINDOWS%]\Tasks\AE6873E7919BE487.job
[%WINDOWS%]\Tasks\AE72C4D69185759E.job
[%WINDOWS%]\Tasks\AE799CC190D20CD5.job
[%WINDOWS%]\Tasks\AE7F50AF919CC277.job
[%WINDOWS%]\Tasks\AE916CBE91871D1E.job
[%WINDOWS%]\Tasks\AE92E1AF91D19FAB.job
[%WINDOWS%]\Tasks\AEA9E97292E661EA.job
[%WINDOWS%]\Tasks\AEBD259A91D2DB7E.job
[%WINDOWS%]\Tasks\AEC14FDC9296FFB8.job
[%WINDOWS%]\Tasks\AEC53FD19016B66D.job
[%WINDOWS%]\Tasks\AECE6DC5918A1DC1.job
[%WINDOWS%]\Tasks\AED74BC59180FBFD.job
[%WINDOWS%]\Tasks\AEDD6527910315EF.job
[%WINDOWS%]\Tasks\AEDFA8CC91A021CC.job
[%WINDOWS%]\Tasks\AEF1AE2890EE2DB4.job
[%WINDOWS%]\Tasks\AEFA57A49185C7FC.job
[%WINDOWS%]\Tasks\AF20026B907BB563.job
[%WINDOWS%]\Tasks\AF26AF2B91D120C3.job
[%WINDOWS%]\Tasks\AF358E9C91B60AE8.job
[%WINDOWS%]\Tasks\AF37C6B391844587.job
[%WINDOWS%]\Tasks\AF46640491B21468.job
[%WINDOWS%]\Tasks\AF4C897091FF3B84.job
[%WINDOWS%]\Tasks\AF6F77C09034E95C.job
[%WINDOWS%]\Tasks\AF739C8797AC0D7F.job
[%WINDOWS%]\Tasks\AF8CBC8C904B32D8.job
[%WINDOWS%]\Tasks\AF913467906AAE7F.job
[%WINDOWS%]\Tasks\AF9618AC91C58B38.job
[%WINDOWS%]\Tasks\AF9DB541911625CD.job
[%WINDOWS%]\Tasks\AF9E3A4F9811ACE7.job
[%WINDOWS%]\Tasks\AFABAD7B91DC246B.job
[%WINDOWS%]\Tasks\AFD68E99918504C9.job
[%WINDOWS%]\Tasks\AFE15857919ECD93.job
[%WINDOWS%]\Tasks\AFE16DDE90B6E6A2.job
[%WINDOWS%]\Tasks\AFEE47609119FBDC.job
[%WINDOWS%]\Tasks\AFFA37AC9181A8F8.job
[%WINDOWS%]\Tasks\B023DA3894504E54.job
[%WINDOWS%]\Tasks\B0537C9090F8F6E4.job
[%WINDOWS%]\Tasks\B05C3027918BDCE7.job
[%WINDOWS%]\Tasks\B088EEF390DB9D57.job
[%WINDOWS%]\Tasks\B09149A29066FEDA.job
[%WINDOWS%]\Tasks\B0C9CBAE94E27EE2.job
[%WINDOWS%]\Tasks\B139EB41910E9E15.job
[%WINDOWS%]\Tasks\B13E200591C1D7FD.job
[%WINDOWS%]\Tasks\B14928B09126DACC.job
[%WINDOWS%]\Tasks\B149D899918A4535.job
[%WINDOWS%]\Tasks\B164445C9083ED74.job
[%WINDOWS%]\Tasks\B206064A95A1BC46.job
[%WINDOWS%]\Tasks\B21B4F7691C0FD1E.job
[%WINDOWS%]\Tasks\B24948299492C265.job
[%WINDOWS%]\Tasks\B2535E149254D2E0.job
[%WINDOWS%]\Tasks\B2E3097B9E74BAA7.job
[%WINDOWS%]\Tasks\B31FCAF99300426D.job
[%WINDOWS%]\Tasks\B34551649446C238.job
[%WINDOWS%]\Tasks\B34F75769924F262.job
[%WINDOWS%]\Tasks\B37C4384962FF2E0.job
[%WINDOWS%]\Tasks\B380AACA936B275E.job
[%WINDOWS%]\Tasks\B3AA13BF91A58127.job
[%WINDOWS%]\Tasks\B3C3154C94CC8AD4.job
[%WINDOWS%]\Tasks\B3DB44489374F560.job
[%WINDOWS%]\Tasks\B3FB537B99BCCA87.job
[%WINDOWS%]\Tasks\B4031B54908C8A30.job
[%WINDOWS%]\Tasks\B44C2C7892BBD710.job
[%WINDOWS%]\Tasks\B4615D409132C8A4.job
[%WINDOWS%]\Tasks\B47CF201975F698D.job
[%WINDOWS%]\Tasks\B4C8D73A918F412A.job
[%WINDOWS%]\Tasks\B501FFB193367715.job
[%WINDOWS%]\Tasks\B5816C3D91A7178D.job
[%WINDOWS%]\Tasks\B5840A3C9137B768.job
[%WINDOWS%]\Tasks\B63E2A8D96BDDAA5.job
[%WINDOWS%]\Tasks\B680BC73916B3197.job
[%WINDOWS%]\Tasks\B683D1DC91C87A70.job
[%WINDOWS%]\Tasks\B68B765091391F28.job
[%WINDOWS%]\Tasks\B69E15439CB18C5F.job
[%WINDOWS%]\Tasks\B6ABF5A89DC068A0.job
[%WINDOWS%]\Tasks\B6C112BE91E683D6.job
[%WINDOWS%]\Tasks\B6FA0C8F91858567.job
[%WINDOWS%]\Tasks\B71C4F139103F837.job
[%WINDOWS%]\Tasks\B72AE07691858A26.job
[%WINDOWS%]\Tasks\B741C4B097F67D10.job
[%WINDOWS%]\Tasks\B76BE98F853C9B3F.job
[%WINDOWS%]\Tasks\B79E6C6091961DB8.job
[%WINDOWS%]\Tasks\B7AF06DE9184B03E.job
[%WINDOWS%]\Tasks\B7FEED4190B16431.job
[%WINDOWS%]\Tasks\B880E3F899538DC4.job
[%WINDOWS%]\Tasks\B8956F01950EE141.job
[%WINDOWS%]\Tasks\B98161B8909B0300.job
[%WINDOWS%]\Tasks\BA6FB54998543165.job
[%WINDOWS%]\Tasks\BB9FE35B9634993B.job
[%WINDOWS%]\Tasks\BBD3272C9C4CDE90.job
[%WINDOWS%]\Tasks\BC60B715956728E9.job
[%WINDOWS%]\Tasks\BC9384EA82983B4E.job
[%WINDOWS%]\Tasks\BDD43CD293DBA226.job
[%WINDOWS%]\Tasks\BDE436EF96DBA10F.job
[%WINDOWS%]\Tasks\BEAFDA3A9900435A.job
[%WINDOWS%]\Tasks\BFCC536F9B23F6EB.job
[%WINDOWS%]\Tasks\C6E82DF5F43FA2A9.job
[%WINDOWS%]\Tasks\Cox High Speed Internet security suite.job
[%WINDOWS%]\Tasks\D4F5B09FF0465CB3.job
[%WINDOWS%]\Tasks\E05308C286ECDC76.job
[%WINDOWS%]\Tasks\E3313D38983EC4E0.job
[%WINDOWS%]\Tasks\E69D8C01ADBE0029.job
[%WINDOWS%]\Tasks\F08674CB8DCA10AB.job
[%WINDOWS%]\Tasks\F875C532891384F6.job
[%APPDATA%]\aybgwarn.htm
[%APPDATA%]\aybwarn.htm
[%APPDATA%]\brsswthg.exe
[%APPDATA%]\chblgrstd.lib
[%APPDATA%]\ckcoofrunea.exe
[%APPDATA%]\ddinxmdb.exe
[%APPDATA%]\deskicon.lib
[%APPDATA%]\dgpxzhtb.exe
[%APPDATA%]\djgxsbcl.exe
[%APPDATA%]\drpfocoow.dll
[%APPDATA%]\drstesprpee.dll
[%APPDATA%]\efjwxjsl.exe
[%APPDATA%]\eneqckap.exe
[%APPDATA%]\flmgvmas.exe
[%APPDATA%]\fqbhyhjh.exe
[%APPDATA%]\frlyjeebtrn.dll
[%APPDATA%]\frlyjeebtru.dll
[%APPDATA%]\frsezaeaast.dll
[%APPDATA%]\frsezaeaav.dll
[%APPDATA%]\gchmfrea.exe
[%APPDATA%]\glckqksdr.dll
[%APPDATA%]\gqlfiqii.exe
[%APPDATA%]\gzxqpghe.exe
[%APPDATA%]\hlsctpay.exe
[%APPDATA%]\hlyvjncf.exe
[%APPDATA%]\HOLEBATFLAWTRAY\SendDogWma
[%APPDATA%]\idixbdmf.exe
[%APPDATA%]\ieeblostqly.dll
[%APPDATA%]\kmigeuhh.exe
[%APPDATA%]\lckqdcvd.exe
[%APPDATA%]\list cool loud math\objnew.exe
[%APPDATA%]\lkxelvrg.exe
[%APPDATA%]\llssalycshh.dll
[%APPDATA%]\lopsearch.exe
[%APPDATA%]\memo01idleheart\roam info.exe
[%APPDATA%]\mspuztbg.exe
[%APPDATA%]\muqhatod.exe
[%APPDATA%]\muxibdom.exe
[%APPDATA%]\mycvbdqu.exe
[%APPDATA%]\nimylprv.exe
[%APPDATA%]\nshelstpgl.dll
[%APPDATA%]\one bolt bleh anti\once each.exe
[%APPDATA%]\oostshthptrv.dll
[%APPDATA%]\ovnolxvi.exe
[%APPDATA%]\pbgqwhoj.exe
[%APPDATA%]\plg_ie0.dll
[%APPDATA%]\prnshgrdssb.dll
[%APPDATA%]\qhiqikdr.exe
[%APPDATA%]\qtufbghm.exe
[%APPDATA%]\qwxgxlrv.exe
[%APPDATA%]\roam surf part tick\junk pure.exe
[%APPDATA%]\roam surf part tick\puretrust.exe
[%APPDATA%]\save third mfcd boob\loudmove.exe
[%APPDATA%]\save third mfcd boob\vga admin.exe
[%APPDATA%]\sefiqovd.exe
[%APPDATA%]\srytuikb.exe
[%APPDATA%]\taecoidy.exe
[%APPDATA%]\trmugnsu.exe
[%APPDATA%]\trstlskb.exe
[%APPDATA%]\uljpmexe.exe
[%APPDATA%]\vlluafrq.exe
[%APPDATA%]\vygaeifz.exe
[%APPDATA%]\xxdfwvli.exe
[%APPDATA%]\ysaebwco.exe
[%APPDATA%]\zaeoxdiu.exe
[%APPDATA%]\zdmlfhmh.exe
[%APPDATA%]\zvpkxxtu.exe
[%APPDATA%]\zvxcypnh.exe
[%APPDATA%]\zxenmgrbl.dll
[%DESKTOP%]\gambling and online casinos.lnk
[%DESKTOP%]\mp3 music search.lnk
[%DESKTOP%]\news and sports.lnk
[%DESKTOP%]\online movies.lnk
[%FAVORITES%]\ adult entertainment.url
[%FAVORITES%]\ adult\adult chat.url
[%FAVORITES%]\ adult\amateur photo.url
[%FAVORITES%]\ adult\asian sex.url
[%FAVORITES%]\ adult\ebony.url
[%FAVORITES%]\ adult\fetish.url
[%FAVORITES%]\ adult\gay and lesbian.url
[%FAVORITES%]\ adult\hardcore.url
[%FAVORITES%]\ adult\live video feeds.url
[%FAVORITES%]\ adult\matchmaking.url
[%FAVORITES%]\ adult\xxx cartoons.url
[%FAVORITES%]\ entertainment\adult entertainment.url
[%FAVORITES%]\ gambling.url
[%FAVORITES%]\ gambling\black jack.url
[%FAVORITES%]\ gambling\chips.url
[%FAVORITES%]\ gambling\craps.url
[%FAVORITES%]\ gambling\multi player.url
[%FAVORITES%]\ gambling\online casinos.url
[%FAVORITES%]\ gambling\poker.url
[%FAVORITES%]\ gambling\roulette.url
[%FAVORITES%]\ gambling\slots.url
[%FAVORITES%]\ gambling\sports books.url
[%LOCAL_APPDATA%]\ckcoofrunea.exe
[%PROFILE%]\owner\local settings\temp\rem18c.exe
[%PROFILE_TEMP%]\ayw17f.exe
[%PROFILE_TEMP%]\bae1.exe
[%PROFILE_TEMP%]\bc1968a3.exe
[%PROFILE_TEMP%]\bvj13.exe
[%PROFILE_TEMP%]\den1.exe
[%PROFILE_TEMP%]\fbf1.exe
[%PROFILE_TEMP%]\hqe1.exe
[%PROFILE_TEMP%]\now1.exe
[%PROFILE_TEMP%]\pfn1.exe
[%PROFILE_TEMP%]\pnt1.exe
[%PROFILE_TEMP%]\prab.exe
[%PROFILE_TEMP%]\pyo25.exe
[%PROFILE_TEMP%]\qhy81.exe
[%PROFILE_TEMP%]\rem15.exe
[%PROFILE_TEMP%]\rem24.exe
[%PROFILE_TEMP%]\rem25.exe
[%PROFILE_TEMP%]\rem2ea.exe
[%PROFILE_TEMP%]\rny1.exe
[%PROFILE_TEMP%]\sml1.exe
[%PROFILE_TEMP%]\sta11.exe
[%PROFILE_TEMP%]\sta2C.exe
[%PROFILE_TEMP%]\szwe.exe
[%PROFILE_TEMP%]\txo1.exe
[%PROFILE_TEMP%]\uqg1.exe
[%PROFILE_TEMP%]\vyz1.exe
[%PROFILE_TEMP%]\wry1.exe
[%PROFILE_TEMP%]\znp1.exe
[%PROGRAM_FILES%]\64comp~1\rule keep.dll
[%PROGRAM_FILES%]\acidme~1\barbboob.dll
[%PROGRAM_FILES%]\acidme~1\chin mfcd.bin
[%PROGRAM_FILES%]\active download\16537.exe
[%PROGRAM_FILES%]\active download\store funk.dll
[%PROGRAM_FILES%]\active~1\store funk.dll
[%PROGRAM_FILES%]\armymo~1\3549.exe
[%PROGRAM_FILES%]\armymo~1\antitype.dll
[%PROGRAM_FILES%]\armymo~1\hole title.dll
[%PROGRAM_FILES%]\armymo~1\longpuresoft.bin
[%PROGRAM_FILES%]\burn media meta\bdvcnypx.exe
[%PROGRAM_FILES%]\creati~1\jynqzshx.exe
[%PROGRAM_FILES%]\creati~1\oozeboob.exe
[%PROGRAM_FILES%]\creati~1\pazgtrve.exe
[%PROGRAM_FILES%]\creati~1\plus thunk mags.exe
[%PROGRAM_FILES%]\creati~1\settings browse.exe
[%PROGRAM_FILES%]\creati~1\skfvhmqz.exe
[%PROGRAM_FILES%]\driveh~1\64bikeabout.exe
[%PROGRAM_FILES%]\fourat~1\bowsbleh.exe
[%PROGRAM_FILES%]\fourat~1\fkrbssba.exe
[%PROGRAM_FILES%]\fourat~1\ford wma dead.exe
[%PROGRAM_FILES%]\fourat~1\gagmqvaf.exe
[%PROGRAM_FILES%]\fourat~1\kcwarhnv.exe
[%PROGRAM_FILES%]\fourat~1\pure bash.exe
[%PROGRAM_FILES%]\fourat~1\qsrdfyqj.exe
[%PROGRAM_FILES%]\freein~1\fastfirst.exe
[%PROGRAM_FILES%]\freein~1\knynnyma.exe
[%PROGRAM_FILES%]\global~1\mfcdpingwarnfast.exe
[%PROGRAM_FILES%]\greato~1\activebitsflap.exe
[%PROGRAM_FILES%]\greato~1\afniekvu.exe
[%PROGRAM_FILES%]\greato~1\cakerdrplan.exe
[%PROGRAM_FILES%]\greato~1\idle barb ball.exe
[%PROGRAM_FILES%]\greato~1\vzmhfjyb.exe
[%PROGRAM_FILES%]\inside~1\manager free.exe
[%PROGRAM_FILES%]\jugsse~1\pile inter grim.bin
[%PROGRAM_FILES%]\manager ace gram\1072.exe
[%PROGRAM_FILES%]\mapigr~1\acid slow.bin
[%PROGRAM_FILES%]\mapigr~1\peak that.dll
[%PROGRAM_FILES%]\mathte~1\bold grim.exe
[%PROGRAM_FILES%]\memoli~1\bzqzgkdq.exe
[%PROGRAM_FILES%]\memoli~1\cjcegzut.exe
[%PROGRAM_FILES%]\memoli~1\dentcurbfree.exe
[%PROGRAM_FILES%]\memoli~1\drv list part corn.exe
[%PROGRAM_FILES%]\memoli~1\flaw army name.exe
[%PROGRAM_FILES%]\memoli~1\hojxfjdu.exe
[%PROGRAM_FILES%]\memoli~1\loyftzhg.exe
[%PROGRAM_FILES%]\metaac~1\phone internet.dll
[%PROGRAM_FILES%]\nounbe~1\curbuser.exe
[%PROGRAM_FILES%]\objcdrom\16logplayprogram.exe
[%PROGRAM_FILES%]\objcdrom\bait cake part bash.exe
[%PROGRAM_FILES%]\objcdrom\safesoaplicenseplay.exe
[%PROGRAM_FILES%]\objels~1\sizebuildlogo.exe
[%PROGRAM_FILES%]\oozejo~1\14599.exe
[%PROGRAM_FILES%]\oozejo~1\19205.exe
[%PROGRAM_FILES%]\oozejo~1\24758.exe
[%PROGRAM_FILES%]\oozejo~1\29923.exe
[%PROGRAM_FILES%]\oozejo~1\copy data.dll
[%PROGRAM_FILES%]\oozejo~1\dent team.dll
[%PROGRAM_FILES%]\progra~1\city tons.exe
[%PROGRAM_FILES%]\progra~1\clock mags inter book.exe
[%PROGRAM_FILES%]\progra~1\cmbjcmrq.exe
[%PROGRAM_FILES%]\progra~1\else iso user bows.exe
[%PROGRAM_FILES%]\progra~1\flapholdlogo.exe
[%PROGRAM_FILES%]\progra~1\inter phone pile default.exe
[%PROGRAM_FILES%]\progra~1\one cdrom type more.exe
[%PROGRAM_FILES%]\progra~1\zwsghqhs.exe
[%PROGRAM_FILES%]\roamse~1\rulefindcamp.exe
[%PROGRAM_FILES%]\roamse~1\window skip.exe
[%PROGRAM_FILES%]\safeba~1\stop hope.exe
[%PROGRAM_FILES%]\thirda~1\etarwlaf.exe
[%PROGRAM_FILES%]\thirda~1\glue blue tons.exe
[%PROGRAM_FILES%]\thirda~1\mediawebdownload.exe
[%PROGRAM_FILES%]\thirda~1\ozrkesxz.exe
[%PROGRAM_FILES%]\thirda~1\qmgytdru.exe
[%PROGRAM_FILES%]\thirda~1\ruledatawma.exe
[%PROGRAM_FILES%]\trayokay\eygfyuoe.exe
[%PROGRAM_FILES%]\trayokay\rppzstyl.exe
[%PROGRAM_FILES%]\wavebo~1\20044.exe
[%PROGRAM_FILES%]\wavebo~1\7310.exe
[%PROGRAM_FILES%]\wavebo~1\acid team.dll
[%PROGRAM_FILES%]\wavebo~1\elsemode.dll
[%SYSTEM%]\donk_bar.dll
[%SYSTEM%]\npddeapi.dll
[%SYSTEM%]\plg_ie0.dll
[%SYSTEM%]\sxbmat.exe
[%WINDOWS%]\application data\asshuktr.exe
[%WINDOWS%]\application data\aybgwarn.htm
[%WINDOWS%]\application data\aybwarn.htm
[%WINDOWS%]\application data\bilyooas.exe
[%WINDOWS%]\application data\byb_save.exe
[%WINDOWS%]\application data\chksbdriya.dll
[%WINDOWS%]\application data\crgbeaoa.exe
[%WINDOWS%]\application data\dmvcrthl.exe
[%WINDOWS%]\application data\droxtrdchdoo.dll
[%WINDOWS%]\application data\eaeeishllblc.dll
[%WINDOWS%]\application data\ealymfrprwch.dll
[%WINDOWS%]\application data\eaymulyl.exe
[%WINDOWS%]\application data\eelykofrllfrj.dll
[%WINDOWS%]\application data\eelykofrllfrpr.dll
[%WINDOWS%]\application data\eeublidc.exe
[%WINDOWS%]\application data\epllkeeoopr.dll
[%WINDOWS%]\application data\freabrlaouw.dll
[%WINDOWS%]\application data\gldqumssfrie.dll
[%WINDOWS%]\application data\glxshmcr.exe
[%WINDOWS%]\application data\heeachmstll.dll
[%WINDOWS%]\application data\hglllyxrxw.dll
[%WINDOWS%]\application data\icdrhwno.dll
[%WINDOWS%]\application data\ijlysseb.exe
[%WINDOWS%]\application data\jqumysto.exe
[%WINDOWS%]\application data\kfriegbs.exe
[%WINDOWS%]\application data\llfggrdr.exe
[%WINDOWS%]\application data\lltckiey.exe
[%WINDOWS%]\application data\lopsearc.exe
[%WINDOWS%]\application data\meemnckyqbr.exe
[%WINDOWS%]\application data\meepajlr.dll
[%WINDOWS%]\application data\meepajlr.exe
[%WINDOWS%]\application data\mprcouie.exe
[%WINDOWS%]\application data\oofrkxpe.exe
[%WINDOWS%]\application data\ousszidrta.dll
[%WINDOWS%]\application data\peebqusz.exe
[%WINDOWS%]\application data\prnouestssstx.dll
[%WINDOWS%]\application data\prxzoustustgr.dll
[%WINDOWS%]\application data\quglwachfs.dll
[%WINDOWS%]\application data\quveioot.exe
[%WINDOWS%]\application data\shoucrck.exe
[%WINDOWS%]\application data\ssmeeibl.exe
[%WINDOWS%]\application data\sstroallhqch.dll
[%WINDOWS%]\application data\tblchepruprgr.dll
[%WINDOWS%]\application data\tchpeatr.exe
[%WINDOWS%]\application data\tglblrll.exe
[%WINDOWS%]\application data\trdzhtxf.exe
[%WINDOWS%]\application data\trstdris.exe
[%WINDOWS%]\application data\trstshcrscksr.dll
[%WINDOWS%]\application data\ukfroigl.dll
[%WINDOWS%]\application data\ulyuiexeechp.exe
[%WINDOWS%]\application data\upckeetoutw.dll
[%WINDOWS%]\application data\veaeyglckr.dll
[%WINDOWS%]\application data\vestufck.exe
[%WINDOWS%]\application data\vfthrcbr.exe
[%WINDOWS%]\application data\woafrquzn.dll
[%WINDOWS%]\application data\xogyfhp.exe
[%WINDOWS%]\application data\yeecrsoustoull.dll
[%WINDOWS%]\application data\ykphmbre.exe
[%WINDOWS%]\application data\ylynfste.exe
[%WINDOWS%]\application data\ziebaeeoaeepr.dll
[%WINDOWS%]\b_dnserr.gif
[%WINDOWS%]\cvsprthiell.gif
[%WINDOWS%]\desktop.htm
[%WINDOWS%]\dnserror.htm
[%WINDOWS%]\downloaded program files\the_ultimate_browser_enhancer.exe
[%WINDOWS%]\fvsprthiell.gif
[%WINDOWS%]\i_dnserr.gif
[%WINDOWS%]\jexpoofro.htm
[%WINDOWS%]\lvsprthiell.gif
[%WINDOWS%]\r_dnserr.gif
[%WINDOWS%]\sprthielllyl.htm
[%WINDOWS%]\system\donk_bar.dll
[%WINDOWS%]\system\plg_ie0.dll
[%WINDOWS%]\s_dnserr.gif
[%WINDOWS%]\temp\rem9b.exe
[%WINDOWS%]\temp\remd.exe
[%WINDOWS%]\thvsprthiell.gif
[%WINDOWS%]\ubipwdk.exe
[%WINDOWS%]\web\wallpaper\desktop.htm
[%WINDOWS%]\web\wallpaper\desktop.swf
[%PROGRAM_FILES%]\mapigr~1\acid slow.bin
[%APPDATA%]\wa_inst.exe
[%FAVORITES%]\ business and finance\b to b.url
[%FAVORITES%]\ business and finance\banking.url
[%FAVORITES%]\ business and finance\business.url
[%FAVORITES%]\ business and finance\careers.url
[%FAVORITES%]\ business and finance\credit cards.url
[%FAVORITES%]\ business and finance\finance.url
[%FAVORITES%]\ business and finance\insurance.url
[%FAVORITES%]\ business and finance\office.url
[%FAVORITES%]\ business and finance\printing.url
[%FAVORITES%]\ computers and tech\computer games.url
[%FAVORITES%]\ computers and tech\computer stores.url
[%FAVORITES%]\ computers and tech\dedicated server.url
[%FAVORITES%]\ computers and tech\domain names.url
[%FAVORITES%]\ computers and tech\hardware.url
[%FAVORITES%]\ computers and tech\laptops.url
[%FAVORITES%]\ computers and tech\software.url
[%FAVORITES%]\ computers and tech\telecommunication\mobile phones.url
[%FAVORITES%]\ computers and tech\telecommunication\telecommunication.url
[%FAVORITES%]\ computers and tech\telecommunication\telephone.url
[%FAVORITES%]\ computers and tech\telecommunication\text sms messaging.url
[%FAVORITES%]\ computers and tech\web design.url
[%FAVORITES%]\ computers and tech\web hosting.url
[%FAVORITES%]\ cool stuff\auction.url
[%FAVORITES%]\ cool stuff\classifieds.url
[%FAVORITES%]\ cool stuff\free emails.url
[%FAVORITES%]\ cool stuff\free homepages.url
[%FAVORITES%]\ cool stuff\free services.url
[%FAVORITES%]\ cool stuff\school essays and homework.url
[%FAVORITES%]\ cool stuff\services.url
[%FAVORITES%]\ entertainment\automotive.url
[%FAVORITES%]\ entertainment\dvd.url
[%FAVORITES%]\ entertainment\entertainment.url
[%FAVORITES%]\ entertainment\hot games and gaming.url
[%FAVORITES%]\ entertainment\mp3.url
[%FAVORITES%]\ entertainment\travel.url
[%FAVORITES%]\ games.url
[%FAVORITES%]\ mp3 music.url
[%FAVORITES%]\ news.url
[%FAVORITES%]\ on lifestyle\art.url
[%FAVORITES%]\ on lifestyle\astrology.url
[%FAVORITES%]\ on lifestyle\books.url
[%FAVORITES%]\ on lifestyle\community.url
[%FAVORITES%]\ on lifestyle\ebooks.url
[%FAVORITES%]\ on lifestyle\education\education.url
[%FAVORITES%]\ on lifestyle\education\training.url
[%FAVORITES%]\ on lifestyle\health and beauty\beauty.url
[%FAVORITES%]\ on lifestyle\health and beauty\health and fitness.url
[%FAVORITES%]\ on lifestyle\health and beauty\pharmacy.url
[%FAVORITES%]\ on lifestyle\home and garden\construction.url
[%FAVORITES%]\ on lifestyle\home and garden\furniture.url
[%FAVORITES%]\ on lifestyle\home and garden\home and garden.url
[%FAVORITES%]\ on lifestyle\home and garden\real estate.url
[%FAVORITES%]\ on lifestyle\home and garden\utilities.url
[%FAVORITES%]\ on lifestyle\kids.url
[%FAVORITES%]\ on lifestyle\magazines.url
[%FAVORITES%]\ on lifestyle\matchmaking.url
[%FAVORITES%]\ on lifestyle\pets.url
[%FAVORITES%]\ on lifestyle\self help.url
[%FAVORITES%]\ on lifestyle\wine.url
[%FAVORITES%]\ on lifestyle\women.url
[%FAVORITES%]\entertainment\games.url
[%LOCAL_APPDATA%]\Temp\Twunk001.MTX
[%PROFILE_TEMP%]\Inside Program.exe
[%PROFILE_TEMP%]\sta10.exe
[%PROFILE_TEMP%]\sta3.exe
[%PROFILE_TEMP%]\staE.exe
[%SYSTEM%]\veg32.dll.dll
[%APPDATA%]\01acid~1\creativeviewpop.exe
[%APPDATA%]\01ACID~1\soap enc.exe
[%APPDATA%]\4suppo~1\File proxy pop.exe
[%APPDATA%]\4SUPPO~1\tons beep real.exe
[%APPDATA%]\64batb~1\BASEHOLEBIKE.exe
[%APPDATA%]\64BATB~1\uploadplanchin.exe
[%APPDATA%]\??curity\l?gonui.exe
[%APPDATA%]\about1~1\DeleteDumbSetup.exe
[%APPDATA%]\ABOUT1~1\settingsgridplus.exe
[%APPDATA%]\AIMOWN~1\link amen shim.exe
[%APPDATA%]\aimown~1\readmevga2.exe
[%APPDATA%]\amvoolgizow.exe
[%APPDATA%]\antifr~1\meta help lite.exe
[%APPDATA%]\ANTIFR~1\Multi store htm.exe
[%APPDATA%]\armybo~1\Heart Test Time.exe
[%APPDATA%]\ARMYBO~1\sendbatcreative.exe
[%APPDATA%]\atomvc~1\less ooze chic.exe
[%APPDATA%]\audiol~1\Atom Bolt Surf.exe
[%APPDATA%]\AUDIOL~1\Bat File Beep.exe
[%APPDATA%]\axisdu~1\Mp3 skip mapi.exe
[%APPDATA%]\axispart\Trans Dupe Book.exe
[%APPDATA%]\AXISPL~1\anti flaw.exe
[%APPDATA%]\axispl~1\Blahelseokay.exe
[%APPDATA%]\ballab~1\Lovepuresign.exe
[%APPDATA%]\BALLAB~1\type mp3.exe
[%APPDATA%]\barbba~1\DATE TRUST MIX.exe
[%APPDATA%]\BARBBA~1\find bias.exe
[%APPDATA%]\biasbo~1\Holecoolsupport.exe
[%APPDATA%]\BIASBO~1\SoftMixWeb.exe
[%APPDATA%]\bindti~1\Bib base 4.exe
[%APPDATA%]\BINDTI~1\Dart help spam.exe
[%APPDATA%]\blahmo~1\barbcorndoes.exe
[%APPDATA%]\BLAHMO~1\citybash.exe
[%APPDATA%]\BLEHTE~1\NurbFunkStore.exe
[%APPDATA%]\blehte~1\WaitMeowDoes.exe
[%APPDATA%]\blueax~1\junk mode first.exe
[%APPDATA%]\BLUEAX~1\Lite Bait.exe
[%APPDATA%]\boldde~1\audiocoalweb.exe
[%APPDATA%]\BOLDDE~1\grey memo.exe
[%APPDATA%]\boldit~1\errorprocgram.exe
[%APPDATA%]\BOLDIT~1\Ooze ford real.exe
[%APPDATA%]\BOOKFR~1\OPTION STORE PEAK.exe
[%APPDATA%]\bookfr~1\start wma bore.exe
[%APPDATA%]\bookhi~1\Body license exit.exe
[%APPDATA%]\BOOKHI~1\Fourjoy.exe
[%APPDATA%]\BOREDU~1\activestart.exe
[%APPDATA%]\boredu~1\BikeVgaAxis.exe
[%APPDATA%]\browse~1\linklocksbook.exe
[%APPDATA%]\buildp~1\bind media aim.exe
[%APPDATA%]\BUILDP~1\Corn bleh.exe
[%APPDATA%]\burnlo~1\newmultidata.exe
[%APPDATA%]\BURNLO~1\rdrdogskip.exe
[%APPDATA%]\burnma~1\GRAM REAL FLAP.exe
[%APPDATA%]\CASHIN~1\soft chic.exe
[%APPDATA%]\CHINGP~1\CAKE BLEH.exe
[%APPDATA%]\chingp~1\phone proxy grid.exe
[%APPDATA%]\CHINRD~1\else show.exe
[%APPDATA%]\chinrd~1\user each free.exe
[%APPDATA%]\closes~1\Deaf Bits Internet.exe
[%APPDATA%]\CLOSES~1\keep wait.exe
[%APPDATA%]\coalth~1\Bitsbindpart.exe
[%APPDATA%]\COALTH~1\Loadflag.exe
[%APPDATA%]\coolto~2\test else sect.exe
[%APPDATA%]\copyca~1\Bone Balm Amen.exe
[%APPDATA%]\DASHHE~1\fastcomp.exe
[%APPDATA%]\dashhe~1\Flap Global Grim.exe
[%APPDATA%]\datamo~1\Delete Live Axis.exe
[%APPDATA%]\DATEON~1\shim cash.exe
[%APPDATA%]\dateon~1\Two save global.exe
[%APPDATA%]\DEFYDO~1\Base Flap.exe
[%APPDATA%]\DOWNLO~1\Burn fork.exe
[%APPDATA%]\DRIVEC~1\Junk Cast.exe
[%APPDATA%]\drivec~1\MoveUpAbout.exe
[%APPDATA%]\DRIVES~1\CdromDaleBib.exe
[%APPDATA%]\drives~1\iso bias blue.exe
[%APPDATA%]\DUPEKI~1\Debug itch.exe
[%APPDATA%]\dvdwarn\live intra bash.exe
[%APPDATA%]\dvdwarn\Stupid Funk That.exe
[%APPDATA%]\dvdwav~1\drvburnwait.exe
[%APPDATA%]\ELSEPL~1\AXISNEW.exe
[%APPDATA%]\elsepl~1\Thunkdeafgreat.exe
[%APPDATA%]\EXTRAM~1\Rectelse.exe
[%APPDATA%]\FACENE~1\Find Exit.exe
[%APPDATA%]\facene~1\LiesOnceHeart.exe
[%APPDATA%]\faceth~1\closebodydefault.exe
[%APPDATA%]\FACETH~1\PopRoam.exe
[%APPDATA%]\findfast.exe
[%APPDATA%]\fiveat~1\Love Bend Browse.exe
[%APPDATA%]\FIVEAT~1\Wait Third.exe
[%APPDATA%]\FLAPLO~1\Settings byte debug.exe
[%APPDATA%]\forfiv~1\HTM BYTE REAL.exe
[%APPDATA%]\FORFIV~1\Media Noun.exe
[%APPDATA%]\fourtr~1\Body scr 01.exe
[%APPDATA%]\FOURTR~1\Peakstart.exe
[%APPDATA%]\ftha.exe
[%APPDATA%]\global~1\Clock pile meow.exe
[%APPDATA%]\global~1\DataMemoBook.exe
[%APPDATA%]\GLOBAL~1\Moreruledead.exe
[%APPDATA%]\global~1\view barb beep.exe
[%APPDATA%]\GLOBAL~1\ViewCamp.exe
[%APPDATA%]\gpl2cool\Bib4Log.exe
[%APPDATA%]\gpl2cool\Film dumb.exe
[%APPDATA%]\GPLAIM~1\Draw does.exe
[%APPDATA%]\gplaim~1\DRIVEBODYSTOP.exe
[%APPDATA%]\gplcoo~1\Bib Amen Mags.exe
[%APPDATA%]\GPLCOO~1\datawarnooze.exe
[%APPDATA%]\gplido~1\Tray burn third.exe
[%APPDATA%]\GPLLIN~1\show cash.exe
[%APPDATA%]\GPLPIN~1\Obj Iso Free.exe
[%APPDATA%]\GPLROA~1\Global Team.exe
[%APPDATA%]\grambi~1\BIAS TITLE SIZE.exe
[%APPDATA%]\GRAMBI~1\LOUD PROGRAM.exe
[%APPDATA%]\greato~1\Option2win.exe
[%APPDATA%]\grimde~1\dvd barb thunk.exe
[%APPDATA%]\GRIMDE~1\findlesseq.exe
[%APPDATA%]\grimwa~1\Mags list amok.exe
[%APPDATA%]\GRIMWA~1\newdead.exe
[%APPDATA%]\HECKKE~1\Extra Hold Each.exe
[%APPDATA%]\heckke~1\IntraDefyHelp.exe
[%APPDATA%]\HIDEAM~1\Burn Idol Bore.exe
[%APPDATA%]\hideam~1\TrayBuildWeb.exe
[%APPDATA%]\hidedu~1\Proxy funk film.exe
[%APPDATA%]\hidires\hidr.exe
[%APPDATA%]\hidn\hidn2.exe
[%APPDATA%]\HOLEST~1\Cdrom gram.exe
[%APPDATA%]\holest~1\Rdr Htm Drive.exe
[%APPDATA%]\idlebin\BIND THIRD BYTE.exe
[%APPDATA%]\ietfoz.exe
[%APPDATA%]\infolo~1\bowsballfilm.exe
[%APPDATA%]\INFOLO~1\Cash Style.exe
[%APPDATA%]\intern~1\2 store flaw.exe
[%APPDATA%]\intern~1\Beepboltcomp.exe
[%APPDATA%]\INTERN~1\GplCake.exe
[%APPDATA%]\INTRAV~1\link help grid.exe
[%APPDATA%]\liesde~1\Deletecoolmail.exe
[%APPDATA%]\LIESDE~1\mediabindraw.exe
[%APPDATA%]\LIESLE~1\Defy Exit Once.exe
[%APPDATA%]\LINKPI~1\Loadskip.exe
[%APPDATA%]\LISTPE~1\Castwma.exe
[%APPDATA%]\listpe~1\htm clock corn.exe
[%APPDATA%]\LISTVGA\SIZE DVD.exe
[%APPDATA%]\log1pa~1\Bold Mapi Lies.exe
[%APPDATA%]\logido~1\peak mfcd one.exe
[%APPDATA%]\LOGIDO~1\PlatformWay.exe
[%APPDATA%]\LOGMEA~1\Bits Plan.exe
[%APPDATA%]\logmea~1\loudjumpstop.exe
[%APPDATA%]\LOGOAM~1\SOFTWARE TICK WAVE.exe
[%APPDATA%]\lovefa~1\ATOMOBJONLINE.exe
[%APPDATA%]\LOVEFA~1\Type Soap.exe
[%APPDATA%]\mailch~1\bike view locks.exe
[%APPDATA%]\MAILCH~1\dumb comp.exe
[%APPDATA%]\mapiex~1\jugs date file.exe
[%APPDATA%]\METAAD~1\FIND THE TOOL.exe
[%APPDATA%]\metaad~1\ItchSendDate.exe
[%APPDATA%]\Microsoft\Windows\fwqkg.exe
[%APPDATA%]\Microsoft\Windows\guchov.exe
[%APPDATA%]\Microsoft\Windows\irbvqq.exe
[%APPDATA%]\Microsoft\Windows\mbdlqx.exe
[%APPDATA%]\Microsoft\Windows\nexklcx.exe
[%APPDATA%]\Microsoft\Windows\psfbjhi.exe
[%APPDATA%]\Microsoft\Windows\qosrlj.exe
[%APPDATA%]\Microsoft\Windows\rayio.exe
[%APPDATA%]\Microsoft\Windows\rayiou.exe
[%APPDATA%]\Microsoft\Windows\reviag.exe
[%APPDATA%]\Microsoft\Windows\rkavlfl.exe
[%APPDATA%]\Microsoft\Windows\rnlsnj.exe
[%APPDATA%]\Microsoft\Windows\vhxksjy.exe
[%APPDATA%]\Microsoft\Windows\vtejsn.exe
[%APPDATA%]\Microsoft\Windows\wtydo.exe
[%APPDATA%]\Microsoft\Windows\xmfoyr.exe
[%APPDATA%]\mixsty~1\Datebrowsetime.exe
[%APPDATA%]\MIXSTY~1\Pile Deaf Drv.exe
[%APPDATA%]\MOVELE~1\cash 2.exe
[%APPDATA%]\movele~1\MATH LOUD LOGO.exe
[%APPDATA%]\moveph~1\RemoteBoldKnob.exe
[%APPDATA%]\MP3HTM~1\64 window close.exe
[%APPDATA%]\mp3htm~1\Flag platform bore.exe
[%APPDATA%]\mp3web\Atom phone pile.exe
[%APPDATA%]\My-disgo\MyKey disgo.exe
[%APPDATA%]\MyKey\MyKey.exe
[%APPDATA%]\MySpace\IM\bin\MySpaceIM.exe
[%APPDATA%]\m\flec006.exe
[%APPDATA%]\nethi.exe
[%APPDATA%]\newfra~1\chinnurbfile.exe
[%APPDATA%]\NOUNGR~1\fileeqkeep.exe
[%APPDATA%]\noungr~1\Play Readme Scr.exe
[%APPDATA%]\nounro~1\jugs active sign.exe
[%APPDATA%]\nurbdu~1\HoleWarnLess.exe
[%APPDATA%]\objaxis\deaffivebib.exe
[%APPDATA%]\OBJAXIS\waygreat.exe
[%APPDATA%]\objboo~1\kind dent itch.exe
[%APPDATA%]\OBJBOO~1\meow trans.exe
[%APPDATA%]\Once64\SpamProgram.exe
[%APPDATA%]\ONCETR~1\SecondReal.exe
[%APPDATA%]\oncetr~1\UploadThatDelete.exe
[%APPDATA%]\onehea~1\showpollbits.exe
[%APPDATA%]\ONEHEA~1\Webbash.exe
[%APPDATA%]\ONESTY~1\dart bias surf.exe
[%APPDATA%]\onesty~1\ManagerAmenAtom.exe
[%APPDATA%]\PHONEJ~1\CITY LESS EACH.exe
[%APPDATA%]\phonej~1\filmlinkdale.exe
[%APPDATA%]\PHONES~1\active amen.exe
[%APPDATA%]\phonet~1\site license mode.exe
[%APPDATA%]\PHONET~1\TimeFlap.exe
[%APPDATA%]\planti~1\FILEGREATKNOB.exe
[%APPDATA%]\platfo~1\Drive Amok Acid.exe
[%APPDATA%]\PLUSTH~1\Dartnounfive.exe
[%APPDATA%]\plusth~1\kindbendpart.exe
[%APPDATA%]\procmu~1\Bone axis skip.exe
[%APPDATA%]\PROCMU~1\burn city readme.exe
[%APPDATA%]\PROXYS~1\body grid army.exe
[%APPDATA%]\proxys~1\TypeStyleGrim.exe
[%APPDATA%]\PUREHE~1\sendextrasetup.exe
[%APPDATA%]\REFTHE~1\BITSBAITEACH.exe
[%APPDATA%]\ROADFR~1\typedrvcake.exe
[%APPDATA%]\roadfr~1\win bib math.exe
[%APPDATA%]\SAVEEG~1\LongPlatform.exe
[%APPDATA%]\saveeg~1\WMA DATE TRUST.exe
[%APPDATA%]\SETUPM~1\Enc 16.exe
[%APPDATA%]\setupm~1\flagpokeelse.exe
[%APPDATA%]\SIGNPL~1\bike soap.exe
[%APPDATA%]\softde~1\Anti Pure Blah.exe
[%APPDATA%]\SOFTPH~1\spam roam.exe
[%APPDATA%]\softph~1\Test Chin Tons.exe
[%APPDATA%]\SOFTWA~1\dupeacidaxis.exe
[%APPDATA%]\softwa~1\WAIT INTER MEOW.exe
[%APPDATA%]\SPAMFL~1\atomblah.exe
[%APPDATA%]\spamfl~1\internet boob blue.exe
[%APPDATA%]\STOPCA~1\Flawmeow.exe
[%APPDATA%]\surfdr~1\Balm Eggs Settings.exe
[%APPDATA%]\SURFDR~1\Second Knob.exe
[%APPDATA%]\T?sks\?explore.exe
[%APPDATA%]\TESTST~1\ITCH ENC.exe
[%APPDATA%]\ThisMix\Extra bias.exe
[%APPDATA%]\thismix\Four axis license.exe
[%APPDATA%]\thispr~1\OOZE PHONE ENC.exe
[%APPDATA%]\THISPR~1\Pop Bias.exe
[%APPDATA%]\tonspi~1\bore thunk help.exe
[%APPDATA%]\Tools\1.exe
[%APPDATA%]\TRANSB~1\For Axis.exe
[%APPDATA%]\transp~1\LITE CITY THE.exe
[%APPDATA%]\trayop~1\DASH BEEP WIPE.exe
[%APPDATA%]\UPLOAD~1\Data Bolt File.exe
[%APPDATA%]\UPLOAD~1\funksignheart.exe
[%APPDATA%]\upload~1\Style About Acid.exe
[%APPDATA%]\UPLOCKS\Inter Plan.exe
[%APPDATA%]\uplocks\internetfourblah.exe
[%APPDATA%]\UpSellTool\ut.exe
[%APPDATA%]\USERDR~1\ANTE INSIDE.exe
[%APPDATA%]\userdr~1\DupeLinkStart.exe
[%APPDATA%]\Verbatim Software\V-Key.exe
[%APPDATA%]\webcur~1\Mealcamprect.exe
[%APPDATA%]\WholeSecurity\CAT\ConfidenceLite.exe
[%APPDATA%]\WinButler\WinButler.exe
[%APPDATA%]\window~1\defaultmediasign.exe
[%APPDATA%]\WINDOW~1\seek grid.exe
[%APPDATA%]\WinTouch\WinTouch.exe
[%APPDATA%]\wmadum~1\MEMO CITY OBJ.exe
[%APPDATA%]\WMADUM~1\size hide mode.exe
[%APPDATA%]\wmaspa~1\Aboutace01.exe
[%APPDATA%]\WMASPA~1\Manager this.exe
[%APPDATA%]\wpnqaxmu.exe
[%APPDATA%]\wxgoery.exe
[%COMMON_APPDATA%]\1 once hole send\Mail cash.exe
[%COMMON_APPDATA%]\ABOUT TEAM INFO SECT\Clock up.exe
[%COMMON_APPDATA%]\Active defy itch second\Warn Tons.exe
[%COMMON_APPDATA%]\Admin Inter 1 Mags\Wave Soap.exe
[%COMMON_APPDATA%]\AMEN GREY GLUE TITLE\Knobbias.exe
[%COMMON_APPDATA%]\Anti bind error defy\64aim.exe
[%COMMON_APPDATA%]\AOL\UserProfiles\All Users\antiSpyware\dat\updates\aspapp\sunsetAsp2.exe
[%COMMON_APPDATA%]\ARMYENCSETUPLINK\Axis Road.exe
[%COMMON_APPDATA%]\audio junk trans body\freehide.exe
[%COMMON_APPDATA%]\Bagsboobokaycorn\typeokay.exe
[%COMMON_APPDATA%]\bait noun acid once\file start.exe
[%COMMON_APPDATA%]\Barb plus chic wait\REGS JUNK.exe
[%COMMON_APPDATA%]\Beep media move 64\jugs book.exe
[%COMMON_APPDATA%]\biasthunksupportbib\knobobj.exe
[%COMMON_APPDATA%]\bike bore media real\defybold.exe
[%COMMON_APPDATA%]\BIN PILE OKAY BIAS\Mixbold.exe
[%COMMON_APPDATA%]\Bind Face Glue Name\Way Loud.exe
[%COMMON_APPDATA%]\binlovehtmaxis\Dumb Online.exe
[%COMMON_APPDATA%]\Bird Soft Second Lies\help frag.exe
[%COMMON_APPDATA%]\Body ooze meal inter\32 Bib.exe
[%COMMON_APPDATA%]\boob book jump vc\Plan Name.exe
[%COMMON_APPDATA%]\Boob Corn Up Option\DELETEFORD.exe
[%COMMON_APPDATA%]\BOWS TWO BIAS LOGO\second 4.exe
[%COMMON_APPDATA%]\burn download defy inside\Window vga.exe
[%COMMON_APPDATA%]\Camp Mess Warn Pop\mess bash.exe
[%COMMON_APPDATA%]\CampDataFiveBike\About Data.exe
[%COMMON_APPDATA%]\chic extra drive joy\KeepCoal.exe
[%COMMON_APPDATA%]\city about store file\About Debug.exe
[%COMMON_APPDATA%]\Close first mags size\FileHeck.exe
[%COMMON_APPDATA%]\Comp Live Axis Safe\BOLT FIVE.exe
[%COMMON_APPDATA%]\corncaketimemix\FindIntra.exe
[%COMMON_APPDATA%]\cornmetampegthe\BOLDWIPE.exe
[%COMMON_APPDATA%]\ctqbgngx.exe
[%COMMON_APPDATA%]\DASH DELETE LIES FIND\StartAce.exe
[%COMMON_APPDATA%]\Date Spam Ball Window\Bags 16.exe
[%COMMON_APPDATA%]\Deaf Meow Lite Mags\Junk Admin.exe
[%COMMON_APPDATA%]\default heart roam idol\Bash pop hole.exe
[%COMMON_APPDATA%]\dilqxing.exe
[%COMMON_APPDATA%]\Download loud seek support\sizeroam.exe
[%COMMON_APPDATA%]\dumb pure bind support\Vga acid.exe
[%COMMON_APPDATA%]\dupe real memo 01\PureCopy.exe
[%COMMON_APPDATA%]\dyfmvipo.exe
[%COMMON_APPDATA%]\each new axis love\Each Play.exe
[%COMMON_APPDATA%]\each new axis love\inter chic.exe
[%COMMON_APPDATA%]\evgnctuj.exe
[%COMMON_APPDATA%]\Exit Bias Skip Send\OPENPILE.exe
[%COMMON_APPDATA%]\Exit Sect Bags Mfcd\BallLive.exe
[%COMMON_APPDATA%]\fafkbqpc.exe
[%COMMON_APPDATA%]\flag style dead axis\oozechic.exe
[%COMMON_APPDATA%]\Flapgramarmyboob\bits idol.exe
[%COMMON_APPDATA%]\ford does hold option\Ball beep.exe
[%COMMON_APPDATA%]\gbgdotoh.exe
[%COMMON_APPDATA%]\glue 32 heck real\Vga info.exe
[%COMMON_APPDATA%]\Gpl Safe Meta Mags\magsuser.exe
[%COMMON_APPDATA%]\Grid Blue Memo Site\Exit ford.exe
[%COMMON_APPDATA%]\Grid Blue Memo Site\Intra load.exe
[%COMMON_APPDATA%]\gtuncnqj.exe
[%COMMON_APPDATA%]\Hold Book 01 Link\regs open.exe
[%COMMON_APPDATA%]\hozihatk.exe
[%COMMON_APPDATA%]\htmfordrectsafe\MoveMfcd.exe
[%COMMON_APPDATA%]\idol grim aim readme\five bat.exe
[%COMMON_APPDATA%]\IDOL UPLOAD LOCKS GRID\Save long.exe
[%COMMON_APPDATA%]\ihsnwpsd.exe
[%COMMON_APPDATA%]\infocoaleachcorn\Loudmeal.exe
[%COMMON_APPDATA%]\Inside less atom mags\Burn Ante.exe
[%COMMON_APPDATA%]\internet settings clock blue\else pure.exe
[%COMMON_APPDATA%]\ipqpwngj.exe
[%COMMON_APPDATA%]\jmrotsvu.exe
[%COMMON_APPDATA%]\Less Bleh Bone Tons\COAL HOLE ANTE.exe
[%COMMON_APPDATA%]\LICENSE FORD HOPE DRAW\intra site.exe
[%COMMON_APPDATA%]\Link Axis Bat Wave\wipe great.exe
[%COMMON_APPDATA%]\ListPlusMeetError\Mfcd Boob.exe
[%COMMON_APPDATA%]\live 64 math does\Slow Bash.exe
[%COMMON_APPDATA%]\live 64 math does\SUPPORT THIRD.exe
[%COMMON_APPDATA%]\live 64 math does\type chin.exe
[%COMMON_APPDATA%]\LongSoftwareTrayExtra\drive save.exe
[%COMMON_APPDATA%]\mailhtmdrvblue\Blah Error.exe
[%COMMON_APPDATA%]\MealSetupArmy1\64 Open.exe
[%COMMON_APPDATA%]\Memo save stupid creative\exit proc.exe
[%COMMON_APPDATA%]\meow four dale link\mfcd stop more.exe
[%COMMON_APPDATA%]\Microsoft\Network\Connections\Cm\GRAS301\GUpload.exe
[%COMMON_APPDATA%]\Mode Rule 64 Inter\once body.exe
[%COMMON_APPDATA%]\Modecashcloselite\third gram.exe
[%COMMON_APPDATA%]\More Third Camp Help\Tons Else.exe
[%COMMON_APPDATA%]\MOREBIRDSETTINGSCASH\pile style.exe
[%COMMON_APPDATA%]\Move Bore Curb Tool\Idle Platform.exe
[%COMMON_APPDATA%]\msw\BMan1.exe
[%COMMON_APPDATA%]\Noun Vga Title Mess\seekmanager.exe
[%COMMON_APPDATA%]\Nounlogdrvload\Twocopy.exe
[%COMMON_APPDATA%]\nydilmry.exe
[%COMMON_APPDATA%]\Okay Plan Move Rule\DriveAbout.exe
[%COMMON_APPDATA%]\One idol win data\16 cool.exe
[%COMMON_APPDATA%]\Owns Chin Warn Open\Curb funk.exe
[%COMMON_APPDATA%]\part dead amok eggs\Shim tons.exe
[%COMMON_APPDATA%]\pile mpeg gpl rect\Tick Stupid.exe
[%COMMON_APPDATA%]\plansupportshow32\clock less.exe
[%COMMON_APPDATA%]\platformopenforchic\Copy Debug.exe
[%COMMON_APPDATA%]\PlusFreeBaitTitle\comp dash.exe
[%COMMON_APPDATA%]\pmnevwnm.exe
[%COMMON_APPDATA%]\Poll for free upload\bone ante.exe
[%COMMON_APPDATA%]\Poploudaxisroam\CashShim.exe
[%COMMON_APPDATA%]\proc exit pop rule\peak store.exe
[%COMMON_APPDATA%]\RdrTickNurbInside\Proxystore.exe
[%COMMON_APPDATA%]\Readme Live Axis Tons\Mode window.exe
[%COMMON_APPDATA%]\rect program sign window\Exitfrag.exe
[%COMMON_APPDATA%]\second regs grim software\Joy Keep Soap.exe
[%COMMON_APPDATA%]\Send acid copy bin\Chic Date.exe
[%COMMON_APPDATA%]\SETTINGSMEDIADEADDOES\Greyjoy.exe
[%COMMON_APPDATA%]\size style dead love\Play Comp.exe
[%COMMON_APPDATA%]\Software rule flag owns\Pile sect.exe
[%COMMON_APPDATA%]\StyleAceEqLoad\idlenew.exe
[%COMMON_APPDATA%]\SupportIntraLicenseAmok\HEART NOUN.exe
[%COMMON_APPDATA%]\tezchiby.exe
[%COMMON_APPDATA%]\third lies itch ford\Online bash.exe
[%COMMON_APPDATA%]\time hide idol bird\64 wait.exe
[%COMMON_APPDATA%]\Tons balm hope 2\Four Poke.exe
[%COMMON_APPDATA%]\Tons Chin Up Balm\Data Hide.exe
[%COMMON_APPDATA%]\tool debug gpl wipe\bookrdr.exe
[%COMMON_APPDATA%]\Trans Platform New Defy\Idle Vga.exe
[%COMMON_APPDATA%]\TREK\MemMon.exe
[%COMMON_APPDATA%]\up creative first dumb\warn mail fork.exe
[%COMMON_APPDATA%]\Upload Mapi Stop Win\tickobj.exe
[%COMMON_APPDATA%]\windeafjumpwipe\tray shim.exe
[%COMMON_APPDATA%]\WinLiesPureWay\MediaCorn.exe
[%COMMON_APPDATA%]\xiladgte.exe
[%LOCAL_APPDATA%]\0fb96401.exe
[%LOCAL_APPDATA%]\835d5592.exe
[%LOCAL_APPDATA%]\DellVistaUpgrade\Vista_Upgrade.exe
[%LOCAL_APPDATA%]\e9d930bf.exe
[%LOCAL_APPDATA%]\Trend Micro\HCMS\FLock\en-US\FLMain.exe
[%LOCAL_APPDATA%]\Trend Micro\HCMS\FLock\jp\FLMain.exe
[%PROGRAM_FILES%]\Adverts\uninst.exe
[%PROGRAM_FILES%]\Cox\APPLIC~1\app\cox.exe
[%WINDOWS%]\APPLIC~1\GPLBLU~1\dupe wait hole.exe
[%WINDOWS%]\APPLIC~1\LINKWA~1\show one.exe
[%WINDOWS%]\Tasks\3FE9680011230E1C.job
[%WINDOWS%]\Tasks\48D04D489C25B0A4.job
[%WINDOWS%]\Tasks\49E4AE3ED409C6CA.job
[%WINDOWS%]\Tasks\80C5B53097CA5960.job
[%WINDOWS%]\Tasks\8115327787A6DDB7.job
[%WINDOWS%]\Tasks\81659A1B913609FF.job
[%WINDOWS%]\Tasks\81D325158168D511.job
[%WINDOWS%]\Tasks\81FA5DEC9065FFFC.job
[%WINDOWS%]\Tasks\84F3F3B98FA46999.job
[%WINDOWS%]\Tasks\85DC0DDF94ABB12F.job
[%WINDOWS%]\Tasks\86C5553E8B0AD1BA.job
[%WINDOWS%]\Tasks\86C55BB2929EFA46.job
[%WINDOWS%]\Tasks\8991B51A9046221A.job
[%WINDOWS%]\Tasks\89AB3F619388A099.job
[%WINDOWS%]\Tasks\8A13A970932840FC.job
[%WINDOWS%]\Tasks\8C5637EA9391CCA6.job
[%WINDOWS%]\Tasks\8D71F21B83A6925B.job
[%WINDOWS%]\Tasks\8F2D2084935EF4EC.job
[%WINDOWS%]\Tasks\8FB1E50C960E83BC.job
[%WINDOWS%]\Tasks\925B441E906D0C62.job
[%WINDOWS%]\Tasks\935EEA238B629413.job
[%WINDOWS%]\Tasks\93E33D9CB810B388.job
[%WINDOWS%]\Tasks\9880D935B04346FD.job
[%WINDOWS%]\Tasks\9966E82A8149AD8A.job
[%WINDOWS%]\Tasks\9A1A04269239CEFE.job
[%WINDOWS%]\Tasks\9A8D9B26BBA20AB2.job
[%WINDOWS%]\Tasks\9C47CE6FB79C7C13.job
[%WINDOWS%]\Tasks\9DF231D38E61CA27.job
[%WINDOWS%]\Tasks\A03EA02891E55650.job
[%WINDOWS%]\Tasks\A054A886910F580A.job
[%WINDOWS%]\Tasks\A05F41E29184F86A.job
[%WINDOWS%]\Tasks\A07610A591A9817D.job
[%WINDOWS%]\Tasks\A09EA3B491715DBC.job
[%WINDOWS%]\Tasks\A0AF7F559184F0E5.job
[%WINDOWS%]\Tasks\A0B8E05B918F9E83.job
[%WINDOWS%]\Tasks\A0C536A2918AADD2.job
[%WINDOWS%]\Tasks\A0C831119193A145.job
[%WINDOWS%]\Tasks\A0D68E4191C53EC1.job
[%WINDOWS%]\Tasks\A0DAE32F915D96F3.job
[%WINDOWS%]\Tasks\A0E1E4B191869F39.job
[%WINDOWS%]\Tasks\A0E321C99184D2D9.job
[%WINDOWS%]\Tasks\A19EDFDD918156C5.job
[%WINDOWS%]\Tasks\A1D3555E9184C576.job
[%WINDOWS%]\Tasks\A1D5D4D1918A4B81.job
[%WINDOWS%]\Tasks\A1DBFF9091987EC4.job
[%WINDOWS%]\Tasks\A1E769219180E871.job
[%WINDOWS%]\Tasks\A213EE9A91A0997A.job
[%WINDOWS%]\Tasks\A23B702191C4E58D.job
[%WINDOWS%]\Tasks\A23FBBFE918434C6.job
[%WINDOWS%]\Tasks\A245DC72918A58EA.job
[%WINDOWS%]\Tasks\A28C882F919B06B7.job
[%WINDOWS%]\Tasks\A29E995C90850F40.job
[%WINDOWS%]\Tasks\A2A506B491AAB6BC.job
[%WINDOWS%]\Tasks\A2AD0E0E918E8A46.job
[%WINDOWS%]\Tasks\A2DBD87A91B4569E.job
[%WINDOWS%]\Tasks\A2E2438D9019C2AD.job
[%WINDOWS%]\Tasks\A2FAB32E91C52D12.job
[%WINDOWS%]\Tasks\A31773389118EFE8.job
[%WINDOWS%]\Tasks\A336BADF91D52B4B.job
[%WINDOWS%]\Tasks\A3571FFD90DC9B61.job
[%WINDOWS%]\Tasks\A36892B590EF0735.job
[%WINDOWS%]\Tasks\A36DE85E90CA678E.job
[%WINDOWS%]\Tasks\A3800781919FB92D.job
[%WINDOWS%]\Tasks\A384F710918F6958.job
[%WINDOWS%]\Tasks\A3A74B2D9198C045.job
[%WINDOWS%]\Tasks\A3ACF3BC91EB6980.job
[%WINDOWS%]\Tasks\A3C6DFA59131503D.job
[%WINDOWS%]\Tasks\A3CAEA1591259A75.job
[%WINDOWS%]\Tasks\A3DCA9D7918B5FC3.job
[%WINDOWS%]\Tasks\A3DFA0519475235D.job
[%WINDOWS%]\Tasks\A43354299180C731.job
[%WINDOWS%]\Tasks\A443001B9170B7A3.job
[%WINDOWS%]\Tasks\A447E5F493909A4C.job
[%WINDOWS%]\Tasks\A4569B9A91990E56.job
[%WINDOWS%]\Tasks\A4620CDE9119BD46.job
[%WINDOWS%]\Tasks\A48B967F91880E0B.job
[%WINDOWS%]\Tasks\A4975DF69188D85E.job
[%WINDOWS%]\Tasks\A4A8E96793779BC7.job
[%WINDOWS%]\Tasks\A4AB0BF191C8BCE1.job
[%WINDOWS%]\Tasks\A4C416EF91EF8ED7.job
[%WINDOWS%]\Tasks\A4ECFBC8919F79D4.job
[%WINDOWS%]\Tasks\A5088F65918B078D.job
[%WINDOWS%]\Tasks\A54F7EF4903CF470.job
[%WINDOWS%]\Tasks\A57D936090C611F0.job
[%WINDOWS%]\Tasks\A59FD48D93AC4ACD.job
[%WINDOWS%]\Tasks\A5C282E591B934C5.job
[%WINDOWS%]\Tasks\A5CEDB4092694BA4.job
[%WINDOWS%]\Tasks\A64B47079198FE83.job
[%WINDOWS%]\Tasks\A6528AD5979500C5.job
[%WINDOWS%]\Tasks\A671F47D91666B1D.job
[%WINDOWS%]\Tasks\A6744C789187C4B4.job
[%WINDOWS%]\Tasks\A67C2135916BD45D.job
[%WINDOWS%]\Tasks\A690CE6F91074DC7.job
[%WINDOWS%]\Tasks\A695A2CB9392215F.job
[%WINDOWS%]\Tasks\A696B55C91BD2584.job
[%WINDOWS%]\Tasks\A6AEC5A8918575E4.job
[%WINDOWS%]\Tasks\A6BD75DA91DEF542.job
[%WINDOWS%]\Tasks\A6BDC6DD906A75B9.job
[%WINDOWS%]\Tasks\A6C5BE60918A3270.job
[%WINDOWS%]\Tasks\A6CB56539188D377.job
[%WINDOWS%]\Tasks\A7149E4E91A31782.job
[%WINDOWS%]\Tasks\A716C09B91897FBF.job
[%WINDOWS%]\Tasks\A71EF5C5918D7515.job
[%WINDOWS%]\Tasks\A72AE2F09165982C.job
[%WINDOWS%]\Tasks\A75D25F391BADC67.job
[%WINDOWS%]\Tasks\A75FC171900C6631.job
[%WINDOWS%]\Tasks\A7830BA8918489C0.job
[%WINDOWS%]\Tasks\A7C036BC91E3AD6C.job
[%WINDOWS%]\Tasks\A7F7905991840E79.job
[%WINDOWS%]\Tasks\A7FAFD6A95257C1A.job
[%WINDOWS%]\Tasks\A7FDF2B191AE63B9.job
[%WINDOWS%]\Tasks\A80E0C4F91CD85DB.job
[%WINDOWS%]\Tasks\A8137A70919CF140.job
[%WINDOWS%]\Tasks\A813A1CE91845D1A.job
[%WINDOWS%]\Tasks\A81A5D6E9195D44E.job
[%WINDOWS%]\Tasks\A832E4FD91819BF5.job
[%WINDOWS%]\Tasks\A84453E99187CA69.job
[%WINDOWS%]\Tasks\A8472E409154AA1C.job
[%WINDOWS%]\Tasks\A84B947A91C8069E.job
[%WINDOWS%]\Tasks\A852F6BD91856D51.job
[%WINDOWS%]\Tasks\A865020991BEB2C9.job
[%WINDOWS%]\Tasks\A8689E2B918314F7.job
[%WINDOWS%]\Tasks\A8699E79918614ED.job
[%WINDOWS%]\Tasks\A887F9EB9184705F.job
[%WINDOWS%]\Tasks\A8AA54CF959DCC83.job
[%WINDOWS%]\Tasks\A8AE8F7691850A72.job
[%WINDOWS%]\Tasks\A8B4082E91CFBCC2.job
[%WINDOWS%]\Tasks\A8BAAA0991852085.job
[%WINDOWS%]\Tasks\A8C6411D9195F7AD.job
[%WINDOWS%]\Tasks\A8CD700F9012E9D3.job
[%WINDOWS%]\Tasks\A8E630F8918DA16C.job
[%WINDOWS%]\Tasks\A8FB3ABA91ECB85A.job
[%WINDOWS%]\Tasks\A8FD8C7B918A02B3.job
[%WINDOWS%]\Tasks\A9166F9C9199E974.job
[%WINDOWS%]\Tasks\A91F7E929184F43A.job
[%WINDOWS%]\Tasks\A933189591C08B49.job
[%WINDOWS%]\Tasks\A9381F71918F9195.job
[%WINDOWS%]\Tasks\A97913B290FE8AFA.job
[%WINDOWS%]\Tasks\A982356791EDA6FB.job
[%WINDOWS%]\Tasks\A987C47C91D87A08.job
[%WINDOWS%]\Tasks\A988F1C593B76C7D.job
[%WINDOWS%]\Tasks\A99AFC499381707D.job
[%WINDOWS%]\Tasks\A99FB4E191842C51.job
[%WINDOWS%]\Tasks\A9A1C75091E27D28.job
[%WINDOWS%]\Tasks\A9B26F5E9321E5EE.job
[%WINDOWS%]\Tasks\A9BB960D91840D9D.job
[%WINDOWS%]\Tasks\A9D2FAB7914173D3.job
[%WINDOWS%]\Tasks\A9DC00CF90FBB9CF.job
[%WINDOWS%]\Tasks\A9DE73DA9515E85A.job
[%WINDOWS%]\Tasks\A9DFAD50918423B4.job
[%WINDOWS%]\Tasks\A9E2A38A92D15756.job
[%WINDOWS%]\Tasks\A9E2B23D9195296D.job
[%WINDOWS%]\Tasks\A9E5DD14919A5B54.job
[%WINDOWS%]\Tasks\A9FAA44891DD5A50.job
[%WINDOWS%]\Tasks\AA09435D97FEF975.job
[%WINDOWS%]\Tasks\AA0CD0E5918B46A5.job
[%WINDOWS%]\Tasks\AA1E379D9181AC4D.job
[%WINDOWS%]\Tasks\AA369A3D902110CD.job
[%WINDOWS%]\Tasks\AA3B5DFC91ACD2D8.job
[%WINDOWS%]\Tasks\AA3E5DC5918DD2C1.job
[%WINDOWS%]\Tasks\AA45173D91968F51.job
[%WINDOWS%]\Tasks\AA58D65E938B4646.job
[%WINDOWS%]\Tasks\AA6E24D7942DD6FF.job
[%WINDOWS%]\Tasks\AA75913E91720B86.job
[%WINDOWS%]\Tasks\AA89A4129192559E.job
[%WINDOWS%]\Tasks\AA912A739136A2B3.job
[%WINDOWS%]\Tasks\AA95F1EA918E662E.job
[%WINDOWS%]\Tasks\AAA8156A918B93AA.job
[%WINDOWS%]\Tasks\AAA8242B930BDFD7.job
[%WINDOWS%]\Tasks\AAAC375091ABB008.job
[%WINDOWS%]\Tasks\AAAD0966918ABC76.job
[%WINDOWS%]\Tasks\AAB3C0A9918C7EF9.job
[%WINDOWS%]\Tasks\AABAFACB91856F4B.job
[%WINDOWS%]\Tasks\AAD194D291960892.job
[%WINDOWS%]\Tasks\AAE9B997918A30AF.job
[%WINDOWS%]\Tasks\AAF6D92091854E98.job
[%WINDOWS%]\Tasks\AB0205F09185BBCC.job
[%WINDOWS%]\Tasks\AB066115905A1165.job
[%WINDOWS%]\Tasks\AB09C9DE919A48E2.job
[%WINDOWS%]\Tasks\AB11801499063008.job
[%WINDOWS%]\Tasks\AB185EF991AFD11D.job
[%WINDOWS%]\Tasks\AB212149918ED619.job
[%WINDOWS%]\Tasks\AB25BAF29066272E.job
[%WINDOWS%]\Tasks\AB397A2395A6EBF3.job
[%WINDOWS%]\Tasks\AB3AFF479185703B.job
[%WINDOWS%]\Tasks\AB3EB53791ED2F8F.job
[%WINDOWS%]\Tasks\AB4C0685915FBD4D.job
[%WINDOWS%]\Tasks\AB52143C90958808.job
[%WINDOWS%]\Tasks\AB6735B79184A9CB.job
[%WINDOWS%]\Tasks\AB6D7C46916EF93E.job
[%WINDOWS%]\Tasks\AB8526FF918EDC2B.job
[%WINDOWS%]\Tasks\AB92E98A919D9E52.job
[%WINDOWS%]\Tasks\ABA85EC6918FD456.job
[%WINDOWS%]\Tasks\ABAE8436910D3976.job
[%WINDOWS%]\Tasks\ABB8D13F910747C7.job
[%WINDOWS%]\Tasks\ABC10397913E818B.job
[%WINDOWS%]\Tasks\ABC89FC4915B1810.job
[%WINDOWS%]\Tasks\ABDB20A09184D5D8.job
[%WINDOWS%]\Tasks\ABFEF49A90C96B16.job
[%WINDOWS%]\Tasks\AC017EE293AEF77A.job
[%WINDOWS%]\Tasks\AC1C9E1990170EA1.job
[%WINDOWS%]\Tasks\AC21DAA191364AF1.job
[%WINDOWS%]\Tasks\AC28E82593AB9B09.job
[%WINDOWS%]\Tasks\AC312CA891A6DE48.job
[%WINDOWS%]\Tasks\AC351FD594A293F5.job
[%WINDOWS%]\Tasks\AC39C47890B67974.job
[%WINDOWS%]\Tasks\AC51A1EC93965688.job
[%WINDOWS%]\Tasks\AC58F5DF918F66D7.job
[%WINDOWS%]\Tasks\AC639CD991B810DD.job
[%WINDOWS%]\Tasks\AC77FDCC91847080.job
[%WINDOWS%]\Tasks\AC8D898291D23D12.job
[%WINDOWS%]\Tasks\AC9202BD901DBB75.job
[%WINDOWS%]\Tasks\AC923A249189B188.job
[%WINDOWS%]\Tasks\ACAA0F7E918581C6.job
[%WINDOWS%]\Tasks\ACAE1DF0918999C8.job
[%WINDOWS%]\Tasks\ACD5021C9192B43C.job
[%WINDOWS%]\Tasks\ACDAF4269185668E.job
[%WINDOWS%]\Tasks\ACE0987291E313FA.job
[%WINDOWS%]\Tasks\ACE0CEBF918741C7.job
[%WINDOWS%]\Tasks\ACEE03219185BA75.job
[%WINDOWS%]\Tasks\ACEE1735918D8959.job
[%WINDOWS%]\Tasks\ACF0F03D91D36585.job
[%WINDOWS%]\Tasks\AD1020DE9173DEE6.job
[%WINDOWS%]\Tasks\AD12280191EDA5C5.job
[%WINDOWS%]\Tasks\AD24C72C91EB7E2C.job
[%WINDOWS%]\Tasks\AD31CD91918E7E11.job
[%WINDOWS%]\Tasks\AD324ACF91A5CA17.job
[%WINDOWS%]\Tasks\AD357B6090A2F4B8.job
[%WINDOWS%]\Tasks\AD3B371F9184AA9B.job
[%WINDOWS%]\Tasks\AD40C490915F74CC.job
[%WINDOWS%]\Tasks\AD43F61E90686B42.job
[%WINDOWS%]\Tasks\AD4F409E9184FE06.job
[%WINDOWS%]\Tasks\AD61D89C93C25414.job
[%WINDOWS%]\Tasks\AD7012DB91C38CF7.job
[%WINDOWS%]\Tasks\AD723B609185B038.job
[%WINDOWS%]\Tasks\AD8391C091840530.job
[%WINDOWS%]\Tasks\AD83A64491985784.job
[%WINDOWS%]\Tasks\AD86D6869195521A.job
[%WINDOWS%]\Tasks\AD99C91A918A7C7E.job
[%WINDOWS%]\Tasks\ADA7B1AD918425A9.job
[%WINDOWS%]\Tasks\ADA7EB0091B49F18.job
[%WINDOWS%]\Tasks\ADABDDE290205B6E.job
[%WINDOWS%]\Tasks\ADCF0AE49184BDF0.job
[%WINDOWS%]\Tasks\ADE362E9919515B5.job
[%WINDOWS%]\Tasks\AE13845190C839AD.job
[%WINDOWS%]\Tasks\AE188C68903F0118.job
[%WINDOWS%]\Tasks\AE19929B97CA366F.job
[%WINDOWS%]\Tasks\AE2BBCB29184394E.job
[%WINDOWS%]\Tasks\AE2CD5FF918346DF.job
[%WINDOWS%]\Tasks\AE2D847997D25C9D.job
[%WINDOWS%]\Tasks\AE3366F191951F65.job
[%WINDOWS%]\Tasks\AE34F65291D76762.job
[%WINDOWS%]\Tasks\AE364E7F9B95CCBB.job
[%WINDOWS%]\Tasks\AE384D8F90EFFE83.job
[%WINDOWS%]\Tasks\AE3C1AC391BB8D13.job
[%WINDOWS%]\Tasks\AE4D6A60918F1B14.job
[%WINDOWS%]\Tasks\AE5039FC918BAA98.job
[%WINDOWS%]\Tasks\AE535209913CC6BD.job
[%WINDOWS%]\Tasks\AE550276918EB2FA.job
[%WINDOWS%]\Tasks\AE56FC91918571A5.job
[%WINDOWS%]\Tasks\AE5749409184F9EC.job
[%WINDOWS%]\Tasks\AE5B77249180E7D0.job
[%WINDOWS%]\Tasks\AE5FAC5D91845CC9.job
[%WINDOWS%]\Tasks\AE608D7F954F3DF7.job
[%WINDOWS%]\Tasks\AE659BF1922E1B39.job
[%WINDOWS%]\Tasks\AE66895A91F50062.job
[%WINDOWS%]\Tasks\AE6873E7919BE487.job
[%WINDOWS%]\Tasks\AE72C4D69185759E.job
[%WINDOWS%]\Tasks\AE799CC190D20CD5.job
[%WINDOWS%]\Tasks\AE7F50AF919CC277.job
[%WINDOWS%]\Tasks\AE916CBE91871D1E.job
[%WINDOWS%]\Tasks\AE92E1AF91D19FAB.job
[%WINDOWS%]\Tasks\AEA9E97292E661EA.job
[%WINDOWS%]\Tasks\AEBD259A91D2DB7E.job
[%WINDOWS%]\Tasks\AEC14FDC9296FFB8.job
[%WINDOWS%]\Tasks\AEC53FD19016B66D.job
[%WINDOWS%]\Tasks\AECE6DC5918A1DC1.job
[%WINDOWS%]\Tasks\AED74BC59180FBFD.job
[%WINDOWS%]\Tasks\AEDD6527910315EF.job
[%WINDOWS%]\Tasks\AEDFA8CC91A021CC.job
[%WINDOWS%]\Tasks\AEF1AE2890EE2DB4.job
[%WINDOWS%]\Tasks\AEFA57A49185C7FC.job
[%WINDOWS%]\Tasks\AF20026B907BB563.job
[%WINDOWS%]\Tasks\AF26AF2B91D120C3.job
[%WINDOWS%]\Tasks\AF358E9C91B60AE8.job
[%WINDOWS%]\Tasks\AF37C6B391844587.job
[%WINDOWS%]\Tasks\AF46640491B21468.job
[%WINDOWS%]\Tasks\AF4C897091FF3B84.job
[%WINDOWS%]\Tasks\AF6F77C09034E95C.job
[%WINDOWS%]\Tasks\AF739C8797AC0D7F.job
[%WINDOWS%]\Tasks\AF8CBC8C904B32D8.job
[%WINDOWS%]\Tasks\AF913467906AAE7F.job
[%WINDOWS%]\Tasks\AF9618AC91C58B38.job
[%WINDOWS%]\Tasks\AF9DB541911625CD.job
[%WINDOWS%]\Tasks\AF9E3A4F9811ACE7.job
[%WINDOWS%]\Tasks\AFABAD7B91DC246B.job
[%WINDOWS%]\Tasks\AFD68E99918504C9.job
[%WINDOWS%]\Tasks\AFE15857919ECD93.job
[%WINDOWS%]\Tasks\AFE16DDE90B6E6A2.job
[%WINDOWS%]\Tasks\AFEE47609119FBDC.job
[%WINDOWS%]\Tasks\AFFA37AC9181A8F8.job
[%WINDOWS%]\Tasks\B023DA3894504E54.job
[%WINDOWS%]\Tasks\B0537C9090F8F6E4.job
[%WINDOWS%]\Tasks\B05C3027918BDCE7.job
[%WINDOWS%]\Tasks\B088EEF390DB9D57.job
[%WINDOWS%]\Tasks\B09149A29066FEDA.job
[%WINDOWS%]\Tasks\B0C9CBAE94E27EE2.job
[%WINDOWS%]\Tasks\B139EB41910E9E15.job
[%WINDOWS%]\Tasks\B13E200591C1D7FD.job
[%WINDOWS%]\Tasks\B14928B09126DACC.job
[%WINDOWS%]\Tasks\B149D899918A4535.job
[%WINDOWS%]\Tasks\B164445C9083ED74.job
[%WINDOWS%]\Tasks\B206064A95A1BC46.job
[%WINDOWS%]\Tasks\B21B4F7691C0FD1E.job
[%WINDOWS%]\Tasks\B24948299492C265.job
[%WINDOWS%]\Tasks\B2535E149254D2E0.job
[%WINDOWS%]\Tasks\B2E3097B9E74BAA7.job
[%WINDOWS%]\Tasks\B31FCAF99300426D.job
[%WINDOWS%]\Tasks\B34551649446C238.job
[%WINDOWS%]\Tasks\B34F75769924F262.job
[%WINDOWS%]\Tasks\B37C4384962FF2E0.job
[%WINDOWS%]\Tasks\B380AACA936B275E.job
[%WINDOWS%]\Tasks\B3AA13BF91A58127.job
[%WINDOWS%]\Tasks\B3C3154C94CC8AD4.job
[%WINDOWS%]\Tasks\B3DB44489374F560.job
[%WINDOWS%]\Tasks\B3FB537B99BCCA87.job
[%WINDOWS%]\Tasks\B4031B54908C8A30.job
[%WINDOWS%]\Tasks\B44C2C7892BBD710.job
[%WINDOWS%]\Tasks\B4615D409132C8A4.job
[%WINDOWS%]\Tasks\B47CF201975F698D.job
[%WINDOWS%]\Tasks\B4C8D73A918F412A.job
[%WINDOWS%]\Tasks\B501FFB193367715.job
[%WINDOWS%]\Tasks\B5816C3D91A7178D.job
[%WINDOWS%]\Tasks\B5840A3C9137B768.job
[%WINDOWS%]\Tasks\B63E2A8D96BDDAA5.job
[%WINDOWS%]\Tasks\B680BC73916B3197.job
[%WINDOWS%]\Tasks\B683D1DC91C87A70.job
[%WINDOWS%]\Tasks\B68B765091391F28.job
[%WINDOWS%]\Tasks\B69E15439CB18C5F.job
[%WINDOWS%]\Tasks\B6ABF5A89DC068A0.job
[%WINDOWS%]\Tasks\B6C112BE91E683D6.job
[%WINDOWS%]\Tasks\B6FA0C8F91858567.job
[%WINDOWS%]\Tasks\B71C4F139103F837.job
[%WINDOWS%]\Tasks\B72AE07691858A26.job
[%WINDOWS%]\Tasks\B741C4B097F67D10.job
[%WINDOWS%]\Tasks\B76BE98F853C9B3F.job
[%WINDOWS%]\Tasks\B79E6C6091961DB8.job
[%WINDOWS%]\Tasks\B7AF06DE9184B03E.job
[%WINDOWS%]\Tasks\B7FEED4190B16431.job
[%WINDOWS%]\Tasks\B880E3F899538DC4.job
[%WINDOWS%]\Tasks\B8956F01950EE141.job
[%WINDOWS%]\Tasks\B98161B8909B0300.job
[%WINDOWS%]\Tasks\BA6FB54998543165.job
[%WINDOWS%]\Tasks\BB9FE35B9634993B.job
[%WINDOWS%]\Tasks\BBD3272C9C4CDE90.job
[%WINDOWS%]\Tasks\BC60B715956728E9.job
[%WINDOWS%]\Tasks\BC9384EA82983B4E.job
[%WINDOWS%]\Tasks\BDD43CD293DBA226.job
[%WINDOWS%]\Tasks\BDE436EF96DBA10F.job
[%WINDOWS%]\Tasks\BEAFDA3A9900435A.job
[%WINDOWS%]\Tasks\BFCC536F9B23F6EB.job
[%WINDOWS%]\Tasks\C6E82DF5F43FA2A9.job
[%WINDOWS%]\Tasks\Cox High Speed Internet security suite.job
[%WINDOWS%]\Tasks\D4F5B09FF0465CB3.job
[%WINDOWS%]\Tasks\E05308C286ECDC76.job
[%WINDOWS%]\Tasks\E3313D38983EC4E0.job
[%WINDOWS%]\Tasks\E69D8C01ADBE0029.job
[%WINDOWS%]\Tasks\F08674CB8DCA10AB.job
[%WINDOWS%]\Tasks\F875C532891384F6.job
[%APPDATA%]\aybgwarn.htm
[%APPDATA%]\aybwarn.htm
[%APPDATA%]\brsswthg.exe
[%APPDATA%]\chblgrstd.lib
[%APPDATA%]\ckcoofrunea.exe
[%APPDATA%]\ddinxmdb.exe
[%APPDATA%]\deskicon.lib
[%APPDATA%]\dgpxzhtb.exe
[%APPDATA%]\djgxsbcl.exe
[%APPDATA%]\drpfocoow.dll
[%APPDATA%]\drstesprpee.dll
[%APPDATA%]\efjwxjsl.exe
[%APPDATA%]\eneqckap.exe
[%APPDATA%]\flmgvmas.exe
[%APPDATA%]\fqbhyhjh.exe
[%APPDATA%]\frlyjeebtrn.dll
[%APPDATA%]\frlyjeebtru.dll
[%APPDATA%]\frsezaeaast.dll
[%APPDATA%]\frsezaeaav.dll
[%APPDATA%]\gchmfrea.exe
[%APPDATA%]\glckqksdr.dll
[%APPDATA%]\gqlfiqii.exe
[%APPDATA%]\gzxqpghe.exe
[%APPDATA%]\hlsctpay.exe
[%APPDATA%]\hlyvjncf.exe
[%APPDATA%]\HOLEBATFLAWTRAY\SendDogWma
[%APPDATA%]\idixbdmf.exe
[%APPDATA%]\ieeblostqly.dll
[%APPDATA%]\kmigeuhh.exe
[%APPDATA%]\lckqdcvd.exe
[%APPDATA%]\list cool loud math\objnew.exe
[%APPDATA%]\lkxelvrg.exe
[%APPDATA%]\llssalycshh.dll
[%APPDATA%]\lopsearch.exe
[%APPDATA%]\memo01idleheart\roam info.exe
[%APPDATA%]\mspuztbg.exe
[%APPDATA%]\muqhatod.exe
[%APPDATA%]\muxibdom.exe
[%APPDATA%]\mycvbdqu.exe
[%APPDATA%]\nimylprv.exe
[%APPDATA%]\nshelstpgl.dll
[%APPDATA%]\one bolt bleh anti\once each.exe
[%APPDATA%]\oostshthptrv.dll
[%APPDATA%]\ovnolxvi.exe
[%APPDATA%]\pbgqwhoj.exe
[%APPDATA%]\plg_ie0.dll
[%APPDATA%]\prnshgrdssb.dll
[%APPDATA%]\qhiqikdr.exe
[%APPDATA%]\qtufbghm.exe
[%APPDATA%]\qwxgxlrv.exe
[%APPDATA%]\roam surf part tick\junk pure.exe
[%APPDATA%]\roam surf part tick\puretrust.exe
[%APPDATA%]\save third mfcd boob\loudmove.exe
[%APPDATA%]\save third mfcd boob\vga admin.exe
[%APPDATA%]\sefiqovd.exe
[%APPDATA%]\srytuikb.exe
[%APPDATA%]\taecoidy.exe
[%APPDATA%]\trmugnsu.exe
[%APPDATA%]\trstlskb.exe
[%APPDATA%]\uljpmexe.exe
[%APPDATA%]\vlluafrq.exe
[%APPDATA%]\vygaeifz.exe
[%APPDATA%]\xxdfwvli.exe
[%APPDATA%]\ysaebwco.exe
[%APPDATA%]\zaeoxdiu.exe
[%APPDATA%]\zdmlfhmh.exe
[%APPDATA%]\zvpkxxtu.exe
[%APPDATA%]\zvxcypnh.exe
[%APPDATA%]\zxenmgrbl.dll
[%DESKTOP%]\gambling and online casinos.lnk
[%DESKTOP%]\mp3 music search.lnk
[%DESKTOP%]\news and sports.lnk
[%DESKTOP%]\online movies.lnk
[%FAVORITES%]\ adult entertainment.url
[%FAVORITES%]\ adult\adult chat.url
[%FAVORITES%]\ adult\amateur photo.url
[%FAVORITES%]\ adult\asian sex.url
[%FAVORITES%]\ adult\ebony.url
[%FAVORITES%]\ adult\fetish.url
[%FAVORITES%]\ adult\gay and lesbian.url
[%FAVORITES%]\ adult\hardcore.url
[%FAVORITES%]\ adult\live video feeds.url
[%FAVORITES%]\ adult\matchmaking.url
[%FAVORITES%]\ adult\xxx cartoons.url
[%FAVORITES%]\ entertainment\adult entertainment.url
[%FAVORITES%]\ gambling.url
[%FAVORITES%]\ gambling\black jack.url
[%FAVORITES%]\ gambling\chips.url
[%FAVORITES%]\ gambling\craps.url
[%FAVORITES%]\ gambling\multi player.url
[%FAVORITES%]\ gambling\online casinos.url
[%FAVORITES%]\ gambling\poker.url
[%FAVORITES%]\ gambling\roulette.url
[%FAVORITES%]\ gambling\slots.url
[%FAVORITES%]\ gambling\sports books.url
[%LOCAL_APPDATA%]\ckcoofrunea.exe
[%PROFILE%]\owner\local settings\temp\rem18c.exe
[%PROFILE_TEMP%]\ayw17f.exe
[%PROFILE_TEMP%]\bae1.exe
[%PROFILE_TEMP%]\bc1968a3.exe
[%PROFILE_TEMP%]\bvj13.exe
[%PROFILE_TEMP%]\den1.exe
[%PROFILE_TEMP%]\fbf1.exe
[%PROFILE_TEMP%]\hqe1.exe
[%PROFILE_TEMP%]\now1.exe
[%PROFILE_TEMP%]\pfn1.exe
[%PROFILE_TEMP%]\pnt1.exe
[%PROFILE_TEMP%]\prab.exe
[%PROFILE_TEMP%]\pyo25.exe
[%PROFILE_TEMP%]\qhy81.exe
[%PROFILE_TEMP%]\rem15.exe
[%PROFILE_TEMP%]\rem24.exe
[%PROFILE_TEMP%]\rem25.exe
[%PROFILE_TEMP%]\rem2ea.exe
[%PROFILE_TEMP%]\rny1.exe
[%PROFILE_TEMP%]\sml1.exe
[%PROFILE_TEMP%]\sta11.exe
[%PROFILE_TEMP%]\sta2C.exe
[%PROFILE_TEMP%]\szwe.exe
[%PROFILE_TEMP%]\txo1.exe
[%PROFILE_TEMP%]\uqg1.exe
[%PROFILE_TEMP%]\vyz1.exe
[%PROFILE_TEMP%]\wry1.exe
[%PROFILE_TEMP%]\znp1.exe
[%PROGRAM_FILES%]\64comp~1\rule keep.dll
[%PROGRAM_FILES%]\acidme~1\barbboob.dll
[%PROGRAM_FILES%]\acidme~1\chin mfcd.bin
[%PROGRAM_FILES%]\active download\16537.exe
[%PROGRAM_FILES%]\active download\store funk.dll
[%PROGRAM_FILES%]\active~1\store funk.dll
[%PROGRAM_FILES%]\armymo~1\3549.exe
[%PROGRAM_FILES%]\armymo~1\antitype.dll
[%PROGRAM_FILES%]\armymo~1\hole title.dll
[%PROGRAM_FILES%]\armymo~1\longpuresoft.bin
[%PROGRAM_FILES%]\burn media meta\bdvcnypx.exe
[%PROGRAM_FILES%]\creati~1\jynqzshx.exe
[%PROGRAM_FILES%]\creati~1\oozeboob.exe
[%PROGRAM_FILES%]\creati~1\pazgtrve.exe
[%PROGRAM_FILES%]\creati~1\plus thunk mags.exe
[%PROGRAM_FILES%]\creati~1\settings browse.exe
[%PROGRAM_FILES%]\creati~1\skfvhmqz.exe
[%PROGRAM_FILES%]\driveh~1\64bikeabout.exe
[%PROGRAM_FILES%]\fourat~1\bowsbleh.exe
[%PROGRAM_FILES%]\fourat~1\fkrbssba.exe
[%PROGRAM_FILES%]\fourat~1\ford wma dead.exe
[%PROGRAM_FILES%]\fourat~1\gagmqvaf.exe
[%PROGRAM_FILES%]\fourat~1\kcwarhnv.exe
[%PROGRAM_FILES%]\fourat~1\pure bash.exe
[%PROGRAM_FILES%]\fourat~1\qsrdfyqj.exe
[%PROGRAM_FILES%]\freein~1\fastfirst.exe
[%PROGRAM_FILES%]\freein~1\knynnyma.exe
[%PROGRAM_FILES%]\global~1\mfcdpingwarnfast.exe
[%PROGRAM_FILES%]\greato~1\activebitsflap.exe
[%PROGRAM_FILES%]\greato~1\afniekvu.exe
[%PROGRAM_FILES%]\greato~1\cakerdrplan.exe
[%PROGRAM_FILES%]\greato~1\idle barb ball.exe
[%PROGRAM_FILES%]\greato~1\vzmhfjyb.exe
[%PROGRAM_FILES%]\inside~1\manager free.exe
[%PROGRAM_FILES%]\jugsse~1\pile inter grim.bin
[%PROGRAM_FILES%]\manager ace gram\1072.exe
[%PROGRAM_FILES%]\mapigr~1\acid slow.bin
[%PROGRAM_FILES%]\mapigr~1\peak that.dll
[%PROGRAM_FILES%]\mathte~1\bold grim.exe
[%PROGRAM_FILES%]\memoli~1\bzqzgkdq.exe
[%PROGRAM_FILES%]\memoli~1\cjcegzut.exe
[%PROGRAM_FILES%]\memoli~1\dentcurbfree.exe
[%PROGRAM_FILES%]\memoli~1\drv list part corn.exe
[%PROGRAM_FILES%]\memoli~1\flaw army name.exe
[%PROGRAM_FILES%]\memoli~1\hojxfjdu.exe
[%PROGRAM_FILES%]\memoli~1\loyftzhg.exe
[%PROGRAM_FILES%]\metaac~1\phone internet.dll
[%PROGRAM_FILES%]\nounbe~1\curbuser.exe
[%PROGRAM_FILES%]\objcdrom\16logplayprogram.exe
[%PROGRAM_FILES%]\objcdrom\bait cake part bash.exe
[%PROGRAM_FILES%]\objcdrom\safesoaplicenseplay.exe
[%PROGRAM_FILES%]\objels~1\sizebuildlogo.exe
[%PROGRAM_FILES%]\oozejo~1\14599.exe
[%PROGRAM_FILES%]\oozejo~1\19205.exe
[%PROGRAM_FILES%]\oozejo~1\24758.exe
[%PROGRAM_FILES%]\oozejo~1\29923.exe
[%PROGRAM_FILES%]\oozejo~1\copy data.dll
[%PROGRAM_FILES%]\oozejo~1\dent team.dll
[%PROGRAM_FILES%]\progra~1\city tons.exe
[%PROGRAM_FILES%]\progra~1\clock mags inter book.exe
[%PROGRAM_FILES%]\progra~1\cmbjcmrq.exe
[%PROGRAM_FILES%]\progra~1\else iso user bows.exe
[%PROGRAM_FILES%]\progra~1\flapholdlogo.exe
[%PROGRAM_FILES%]\progra~1\inter phone pile default.exe
[%PROGRAM_FILES%]\progra~1\one cdrom type more.exe
[%PROGRAM_FILES%]\progra~1\zwsghqhs.exe
[%PROGRAM_FILES%]\roamse~1\rulefindcamp.exe
[%PROGRAM_FILES%]\roamse~1\window skip.exe
[%PROGRAM_FILES%]\safeba~1\stop hope.exe
[%PROGRAM_FILES%]\thirda~1\etarwlaf.exe
[%PROGRAM_FILES%]\thirda~1\glue blue tons.exe
[%PROGRAM_FILES%]\thirda~1\mediawebdownload.exe
[%PROGRAM_FILES%]\thirda~1\ozrkesxz.exe
[%PROGRAM_FILES%]\thirda~1\qmgytdru.exe
[%PROGRAM_FILES%]\thirda~1\ruledatawma.exe
[%PROGRAM_FILES%]\trayokay\eygfyuoe.exe
[%PROGRAM_FILES%]\trayokay\rppzstyl.exe
[%PROGRAM_FILES%]\wavebo~1\20044.exe
[%PROGRAM_FILES%]\wavebo~1\7310.exe
[%PROGRAM_FILES%]\wavebo~1\acid team.dll
[%PROGRAM_FILES%]\wavebo~1\elsemode.dll
[%SYSTEM%]\donk_bar.dll
[%SYSTEM%]\npddeapi.dll
[%SYSTEM%]\plg_ie0.dll
[%SYSTEM%]\sxbmat.exe
[%WINDOWS%]\application data\asshuktr.exe
[%WINDOWS%]\application data\aybgwarn.htm
[%WINDOWS%]\application data\aybwarn.htm
[%WINDOWS%]\application data\bilyooas.exe
[%WINDOWS%]\application data\byb_save.exe
[%WINDOWS%]\application data\chksbdriya.dll
[%WINDOWS%]\application data\crgbeaoa.exe
[%WINDOWS%]\application data\dmvcrthl.exe
[%WINDOWS%]\application data\droxtrdchdoo.dll
[%WINDOWS%]\application data\eaeeishllblc.dll
[%WINDOWS%]\application data\ealymfrprwch.dll
[%WINDOWS%]\application data\eaymulyl.exe
[%WINDOWS%]\application data\eelykofrllfrj.dll
[%WINDOWS%]\application data\eelykofrllfrpr.dll
[%WINDOWS%]\application data\eeublidc.exe
[%WINDOWS%]\application data\epllkeeoopr.dll
[%WINDOWS%]\application data\freabrlaouw.dll
[%WINDOWS%]\application data\gldqumssfrie.dll
[%WINDOWS%]\application data\glxshmcr.exe
[%WINDOWS%]\application data\heeachmstll.dll
[%WINDOWS%]\application data\hglllyxrxw.dll
[%WINDOWS%]\application data\icdrhwno.dll
[%WINDOWS%]\application data\ijlysseb.exe
[%WINDOWS%]\application data\jqumysto.exe
[%WINDOWS%]\application data\kfriegbs.exe
[%WINDOWS%]\application data\llfggrdr.exe
[%WINDOWS%]\application data\lltckiey.exe
[%WINDOWS%]\application data\lopsearc.exe
[%WINDOWS%]\application data\meemnckyqbr.exe
[%WINDOWS%]\application data\meepajlr.dll
[%WINDOWS%]\application data\meepajlr.exe
[%WINDOWS%]\application data\mprcouie.exe
[%WINDOWS%]\application data\oofrkxpe.exe
[%WINDOWS%]\application data\ousszidrta.dll
[%WINDOWS%]\application data\peebqusz.exe
[%WINDOWS%]\application data\prnouestssstx.dll
[%WINDOWS%]\application data\prxzoustustgr.dll
[%WINDOWS%]\application data\quglwachfs.dll
[%WINDOWS%]\application data\quveioot.exe
[%WINDOWS%]\application data\shoucrck.exe
[%WINDOWS%]\application data\ssmeeibl.exe
[%WINDOWS%]\application data\sstroallhqch.dll
[%WINDOWS%]\application data\tblchepruprgr.dll
[%WINDOWS%]\application data\tchpeatr.exe
[%WINDOWS%]\application data\tglblrll.exe
[%WINDOWS%]\application data\trdzhtxf.exe
[%WINDOWS%]\application data\trstdris.exe
[%WINDOWS%]\application data\trstshcrscksr.dll
[%WINDOWS%]\application data\ukfroigl.dll
[%WINDOWS%]\application data\ulyuiexeechp.exe
[%WINDOWS%]\application data\upckeetoutw.dll
[%WINDOWS%]\application data\veaeyglckr.dll
[%WINDOWS%]\application data\vestufck.exe
[%WINDOWS%]\application data\vfthrcbr.exe
[%WINDOWS%]\application data\woafrquzn.dll
[%WINDOWS%]\application data\xogyfhp.exe
[%WINDOWS%]\application data\yeecrsoustoull.dll
[%WINDOWS%]\application data\ykphmbre.exe
[%WINDOWS%]\application data\ylynfste.exe
[%WINDOWS%]\application data\ziebaeeoaeepr.dll
[%WINDOWS%]\b_dnserr.gif
[%WINDOWS%]\cvsprthiell.gif
[%WINDOWS%]\desktop.htm
[%WINDOWS%]\dnserror.htm
[%WINDOWS%]\downloaded program files\the_ultimate_browser_enhancer.exe
[%WINDOWS%]\fvsprthiell.gif
[%WINDOWS%]\i_dnserr.gif
[%WINDOWS%]\jexpoofro.htm
[%WINDOWS%]\lvsprthiell.gif
[%WINDOWS%]\r_dnserr.gif
[%WINDOWS%]\sprthielllyl.htm
[%WINDOWS%]\system\donk_bar.dll
[%WINDOWS%]\system\plg_ie0.dll
[%WINDOWS%]\s_dnserr.gif
[%WINDOWS%]\temp\rem9b.exe
[%WINDOWS%]\temp\remd.exe
[%WINDOWS%]\thvsprthiell.gif
[%WINDOWS%]\ubipwdk.exe
[%WINDOWS%]\web\wallpaper\desktop.htm
[%WINDOWS%]\web\wallpaper\desktop.swf
[%PROGRAM_FILES%]\mapigr~1\acid slow.bin

Folders:
[%FAVORITES%]\ shopping and gifts
[%PROGRAM_FILES%]\Batty2
[%PROGRAM_FILES%]\window active
[%APPDATA%]\audio amen
[%APPDATA%]\Inside Locks Each
[%APPDATA%]\live enc army hope
[%APPDATA%]\Memo safe ford browse
[%APPDATA%]\MoveFlagNoun
[%PROFILE_TEMP%]\delete.me
[%PROGRAM_FILES%]\dvdfindload
[%PROGRAM_FILES%]\elsewa~1
[%PROGRAM_FILES%]\logobi~1
[%PROGRAM_FILES%]\MoveFlagNoun
[%PROGRAM_FILES%]\proxyn~1
[%PROGRAM_FILES%]\roamju~1
[%PROGRAM_FILES%]\showsupport
[%PROGRAM_FILES%]\showsu~1
[%PROGRAM_FILES%]\sitein~1
[%PROGRAM_FILES%]\waveba~1
[%PROGRAM_FILES%]\wavesu~1
[%PROGRAM_FILES%]\waymov~1
[%PROGRAM_FILES%]\wayvga~2

Registry Keys:
HKEY_CLASSES_ROOT\clsid\{994d478a-45d0-4db4-ae27-738b1e346f99}
HKEY_CLASSES_ROOT\invisiblepop.invisible
HKEY_CLASSES_ROOT\invisiblepop.invisible.1
HKEY_CLASSES_ROOT\protocols\handler\ayb
HKEY_CLASSES_ROOT\swish.toolband
HKEY_CLASSES_ROOT\swish.toolband.1
HKEY_CLASSES_ROOT\typelib\{dffe1ccf-e1e8-4470-9962-73277cc2c898}
HKEY_CURRENT_USER\software\batty2
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\backup
HKEY_CURRENT_USER\software\winactive
HKEY_CLASSES_ROOT\CLSID\{0C6D3118-8BD1-00B5-ACB8-5E7F10803485}
HKEY_CLASSES_ROOT\CLSID\{951769A8-4FE6-8816-BC68-67B7514A1F1B}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0C6D3118-8BD1-00B5-ACB8-5E7F10803485}
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{951769A8-4FE6-8816-BC68-67B7514A1F1B}
HKEY_CLASSES_ROOT\acdnv.hdruclosurrvu
HKEY_CLASSES_ROOT\acdnv.hdruclosurrvu.1
HKEY_CLASSES_ROOT\clsid\{00000012-890e-4aac-afd9-000000000000}
HKEY_CLASSES_ROOT\clsid\{03e3d2bf-051f-5094-5068-c5ee261285bc}
HKEY_CLASSES_ROOT\clsid\{07c0d34d-11d7-43f7-832b-c6bb41726f5f}
HKEY_CLASSES_ROOT\clsid\{0d4312e2-5e4d-4a27-a9d8-043e43904277}
HKEY_CLASSES_ROOT\clsid\{139e58c9-85b4-45db-9fc9-3919813709f0}
HKEY_CLASSES_ROOT\clsid\{1502ab76-0376-4b7b-8226-d34c941072f2}
HKEY_CLASSES_ROOT\clsid\{162ab497-087d-4fb3-83ba-4f5159613796}
HKEY_CLASSES_ROOT\clsid\{189210a0-36c2-11d7-9928-444553540000}
HKEY_CLASSES_ROOT\clsid\{18fd2e3d-35df-aa65-0952-7875de70845f}
HKEY_CLASSES_ROOT\clsid\{1a35419c-7394-4989-b3c5-6189eb06bd66}
HKEY_CLASSES_ROOT\clsid\{1e62ecd8-ae05-988b-f40a-369b2026409e}
HKEY_CLASSES_ROOT\clsid\{24f13043-edfc-446c-a07c-8ed6beb9e39e}
HKEY_CLASSES_ROOT\clsid\{25f1bb0d-2d8c-4dda-ad46-684719d09b7e}
HKEY_CLASSES_ROOT\clsid\{289848e1-2d29-4d00-9ff1-0c09a1256662}
HKEY_CLASSES_ROOT\clsid\{2e1162f8-d289-359d-b1e4-0a4d9301a7d1}
HKEY_CLASSES_ROOT\clsid\{3247f2dc-f2a1-9d95-a072-dbb3e1690643}
HKEY_CLASSES_ROOT\clsid\{3dcdb313-84a2-6218-64ee-1110caa46fb5}
HKEY_CLASSES_ROOT\clsid\{4b8edc53-6cfd-4ee4-9504-38ce7a5bc416}
HKEY_CLASSES_ROOT\clsid\{4d803979-834a-64ca-93f8-4954f0614bae}
HKEY_CLASSES_ROOT\clsid\{4fa088f1-1910-adb5-0643-1f26ca51dee6}
HKEY_CLASSES_ROOT\clsid\{562a6158-bcae-e53f-d40e-403ef85b70a4}
HKEY_CLASSES_ROOT\clsid\{56d59f1a-e81a-c85f-d7bb-07a6f380a834}
HKEY_CLASSES_ROOT\clsid\{79247097-cff4-4956-8f84-64c4720afd3e}
HKEY_CLASSES_ROOT\clsid\{7b49a2a5-b45f-46f3-ac60-2578477671ee}
HKEY_CLASSES_ROOT\clsid\{80fddae7-d472-4e1f-8c3a-36b75a091c44}
HKEY_CLASSES_ROOT\clsid\{84b55b37-aff7-8942-25ac-f0c5d7a32619}
HKEY_CLASSES_ROOT\clsid\{8522f9b3-38c5-4aa4-ae40-7401f1bbc851}
HKEY_CLASSES_ROOT\clsid\{8f1a15a7-92b0-4467-ad12-369f60174008}
HKEY_CLASSES_ROOT\clsid\{914d0f58-630a-465d-8e28-aea5158e6606}
HKEY_CLASSES_ROOT\clsid\{9b35a850-66ab-4c6d-8a66-136ecadcd904}
HKEY_CLASSES_ROOT\clsid\{a27d4f42-3018-59ed-19ff-4c1b7a2c18fa}
HKEY_CLASSES_ROOT\clsid\{b0a11536-00dc-268e-042a-6cb617e6965e}
HKEY_CLASSES_ROOT\clsid\{b91dd04c-336e-4743-92e5-5b24240a9309}
HKEY_CLASSES_ROOT\clsid\{b9c38317-4e71-4d7b-b072-3aa8dda923b3}
HKEY_CLASSES_ROOT\clsid\{bcd5534b-2f54-428e-b3f3-e03b6f10a233}
HKEY_CLASSES_ROOT\clsid\{bd8fd0b2-0e6b-4ffa-916f-db8ff7411d5f}
HKEY_CLASSES_ROOT\clsid\{c4b41c0c-4e7b-37e0-7b80-ed6437c8eb2c}
HKEY_CLASSES_ROOT\clsid\{c5d6b9c5-1c08-43f9-bd04-6aefa21dd754}
HKEY_CLASSES_ROOT\clsid\{c61c874f-60bb-4ee7-8afa-92dc85b180c9}
HKEY_CLASSES_ROOT\clsid\{c65cad7f-e382-4b90-95c6-89123d0aee61}
HKEY_CLASSES_ROOT\clsid\{cfadae1d-f67a-c8f7-46a6-eb20e32a92cd}
HKEY_CLASSES_ROOT\clsid\{d1d9e2f6-c179-4386-b197-c4a85c026f67}
HKEY_CLASSES_ROOT\clsid\{d3119527-9be0-422c-b9fa-5143d75dfbea}
HKEY_CLASSES_ROOT\clsid\{d31e488c-9ed3-4fb0-8f82-f1d559553c06}
HKEY_CLASSES_ROOT\clsid\{d44b5436-b3e4-4595-b0e9-106690e70a58}
HKEY_CLASSES_ROOT\clsid\{e58e7c45-c426-993a-2a9f-3640a22bf60e}
HKEY_CLASSES_ROOT\clsid\{e69e6d3b-861e-4c8b-bdd4-a8b7a61af313}
HKEY_CLASSES_ROOT\clsid\{eb9bdd24-ccf1-4a87-98c0-579dba9bda83}
HKEY_CLASSES_ROOT\clsid\{ec28a907-37ac-4d9a-a928-ee2ba555a141}
HKEY_CLASSES_ROOT\clsid\{f2a5a613-88e0-b267-ce78-aedd8db3ce45}
HKEY_CLASSES_ROOT\clsid\{fe289ae1-16e9-9235-420a-95ff90a194f4}
HKEY_CLASSES_ROOT\clsid\{fe54e96b-f246-4ed7-97a2-e27086ce5b21}
HKEY_CLASSES_ROOT\cnirq.oulyloaznputl
HKEY_CLASSES_ROOT\cnirq.oulyloaznputl.1
HKEY_CLASSES_ROOT\coal.insidechic
HKEY_CLASSES_ROOT\coal.insidechic.1
HKEY_CLASSES_ROOT\dfzkm.hdrucloi
HKEY_CLASSES_ROOT\dfzkm.hdrucloi.1
HKEY_CLASSES_ROOT\dybvi.rngrstrm
HKEY_CLASSES_ROOT\dybvi.rngrstrm.1
HKEY_CLASSES_ROOT\narkq.oulyloam
HKEY_CLASSES_ROOT\narkq.oulyloam.1
HKEY_CLASSES_ROOT\pop.phonebird
HKEY_CLASSES_ROOT\pop.phonebird.1
HKEY_CLASSES_ROOT\proto.handler
HKEY_CLASSES_ROOT\proto.handler.1
HKEY_CLASSES_ROOT\software\microsoft\windows\currentversion\explorer\browser helper objects\{d44b5436-b3e4-4595-b0e9-106690e70a58}
HKEY_CLASSES_ROOT\swish.browserhelper
HKEY_CLASSES_ROOT\swish.browserhelper.1
HKEY_CLASSES_ROOT\typelib\{1a35419c-7394-4989-b3c5-6189eb06bd66}
HKEY_CLASSES_ROOT\typelib\{8f1a15a7-92b0-4467-ad12-369f60174008}
HKEY_CLASSES_ROOT\typelib\{c65cad7f-e382-4b90-95c6-89123d0aee61}
HKEY_CLASSES_ROOT\typelib\{d31e488c-9ed3-4fb0-8f82-f1d559553c06}
HKEY_CLASSES_ROOT\typelib\{fe54e96b-f246-4ed7-97a2-e27086ce5b21}
HKEY_CLASSES_ROOT\udhiu.rngrstrjyvscd
HKEY_CLASSES_ROOT\udhiu.rngrstrjyvscd.1
HKEY_CURRENT_USER\software\axvenore
HKEY_CURRENT_USER\software\corn else tickfind
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\2cashplatform
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\uninstall\bone platform bags
HKEY_CURRENT_USER\software\nlfprfooqoollp
HKEY_CURRENT_USER\software\sdvita
HKEY_CURRENT_USER\software\trinityayb
HKEY_CURRENT_USER\software\xsswbrwougouecr
HKEY_LOCAL_MACHINE\software\classes\clsid\{092d8662-f5c6-41a3-be1d-14d940f6010d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{139e58c9-85b4-45db-9fc9-3919813709f0}
HKEY_LOCAL_MACHINE\software\classes\clsid\{162ab497-087d-4fb3-83ba-4f5159613796}
HKEY_LOCAL_MACHINE\software\classes\clsid\{289848e1-2d29-4d00-9ff1-0c09a1256662}
HKEY_LOCAL_MACHINE\software\classes\clsid\{33a4af42-fc94-4873-8bc0-1da97d6edd6d}
HKEY_LOCAL_MACHINE\software\classes\clsid\{80fddae7-d472-4e1f-8c3a-36b75a091c44}
HKEY_LOCAL_MACHINE\software\classes\clsid\{914d0f58-630a-465d-8e28-aea5158e6606}
HKEY_LOCAL_MACHINE\software\classes\clsid\{9b35a850-66ab-4c6d-8a66-136ecadcd904}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b0a11536-00dc-268e-042a-6cb617e6965e}
HKEY_LOCAL_MACHINE\software\classes\clsid\{b9c38317-4e71-4d7b-b072-3aa8dda923b3}
HKEY_LOCAL_MACHINE\software\classes\clsid\{bd8fd0b2-0e6b-4ffa-916f-db8ff7411d5f}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c5d6b9c5-1c08-43f9-bd04-6aefa21dd754}
HKEY_LOCAL_MACHINE\software\classes\clsid\{c8a113e0-6da0-4f0e-bb89-9726212aaf32}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d3119527-9be0-422c-b9fa-5143d75dfbea}
HKEY_LOCAL_MACHINE\software\classes\clsid\{d44b5436-b3e4-4595-b0e9-106690e70a58}
HKEY_LOCAL_MACHINE\software\classes\clsid\{e69e6d3b-861e-4c8b-bdd4-a8b7a61af313}
HKEY_LOCAL_MACHINE\software\classes\clsid\{f689307b-c3cd-4d10-aaf2-d1f75358a5c2}
HKEY_LOCAL_MACHINE\software\classes\clsid\{fe289ae1-16e9-9235-420a-95ff90a194f4}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{03e3d2bf-051f-5094-5068-c5ee261285bc}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{092d8662-f5c6-41a3-be1d-14d940f6010d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{139e58c9-85b4-45db-9fc9-3919813709f0}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{162ab497-087d-4fb3-83ba-4f5159613796}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{24f13043-edfc-446c-a07c-8ed6beb9e39e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{3247f2dc-f2a1-9d95-a072-dbb3e1690643}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{33a4af42-fc94-4873-8bc0-1da97d6edd6d}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{3dcdb313-84a2-6218-64ee-1110caa46fb5}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4b8edc53-6cfd-4ee4-9504-38ce7a5bc416}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{4fa088f1-1910-adb5-0643-1f26ca51dee6}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{79247097-cff4-4956-8f84-64c4720afd3e}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{b9c38317-4e71-4d7b-b072-3aa8dda923b3}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{bd8fd0b2-0e6b-4ffa-916f-db8ff7411d5f}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{c8a113e0-6da0-4f0e-bb89-9726212aaf32}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{cfadae1d-f67a-c8f7-46a6-eb20e32a92cd}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{d44b5436-b3e4-4595-b0e9-106690e70a58}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{e69e6d3b-861e-4c8b-bdd4-a8b7a61af313}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\browser helper objects\{f2a5a613-88e0-b267-ce78-aedd8db3ce45}
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\nthlllleth
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\pprwazmprss
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\shubryochuss
HKEY_CLASSES_ROOT\clsid\{c65cad7f-e382-4b90-95c6-89123d0aee61}

Registry Values:
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\new windows\allow
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MsgPlus! Plugin
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MsgPlus! Plugin
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\main
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\internet explorer\toolbar\webbrowser
HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\main
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\internet explorer\toolbar
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\bone platform bags
HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\uninstall\bone platform bags


You must clean you computer ASAP !!!
Download Free Trial Version of antivirus software here, to check your computer instantly.

Also Be Aware of the Following Threats: