jfiag3g_gg.exe C:\Users\test22\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\test22\AppData\Local\Temp\fj4ghga23_fsa.txt
7664jfiag3g_gg.exe C:\Users\test22\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\test22\AppData\Local\Temp\fj4ghga23_fsa.txt
3460RunWW.exe "C:\Program Files (x86)\Data Finder\Versium Research\RunWW.exe"
3872rundll32.exe "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\test22\AppData\Local\Temp\install.dll",install
4608lylal220.tmp "C:\Users\test22\AppData\Local\Temp\is-6R8JP.tmp\lylal220.tmp" /SL5="$72024E,491750,408064,C:\Program Files (x86)\Data Finder\Versium Research\lylal220.exe"
615256FT____________________.exe "C:\Users\test22\AppData\Local\Temp\is-55P3Q.tmp\56FT____________________.exe" /S /UID=lylal220
6912irecord.tmp "C:\Users\test22\AppData\Local\Temp\is-RTHQU.tmp\irecord.tmp" /SL5="$7901AE,6139911,56832,C:\Program Files\HashTab Shell Extension\EJCJHZGFIU\irecord.exe" /VERYSILENT
500i-record.exe "C:\Program Files (x86)\recording\i-record.exe" -silent -desktopShortcut -programMenu
8812Jelawelolo.exe "C:\Users\test22\AppData\Local\Temp\6a-d7f9e-6a0-12888-4e49c084e80d5\Jelawelolo.exe"
3044iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
7284Majalefaehu.exe "C:\Users\test22\AppData\Local\Temp\c5-2bfc7-8c8-99ebe-e58c1b8e3ef15\Majalefaehu.exe"
7904LabPicV3.tmp "C:\Users\test22\AppData\Local\Temp\is-M1GNJ.tmp\LabPicV3.tmp" /SL5="$5603FE,506086,422400,C:\Program Files (x86)\Data Finder\Versium Research\LabPicV3.exe"
8104_____________.exe "C:\Users\test22\AppData\Local\Temp\is-GMNUJ.tmp\_____________.exe" /S /UID=lab214
4964prolab.tmp "C:\Users\test22\AppData\Local\Temp\is-BC9K1.tmp\prolab.tmp" /SL5="$5D0218,575243,216576,C:\Program Files\MSBuild\YZNUZKAESP\prolab.exe" /VERYSILENT
884Bynikaqahy.exe "C:\Users\test22\AppData\Local\Temp\ab-30604-9bc-d29ad-578b95c248612\Bynikaqahy.exe"
1568iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
4308iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe" SCODEF:4308 CREDAT:145409
1436Juzhokasysu.exe "C:\Users\test22\AppData\Local\Temp\0a-4bda9-e30-2afa3-2c2539260bc3e\Juzhokasysu.exe"
6372explorer.exe C:\Windows\Explorer.EXE
1848