Home Possibly Unwanted Program Ghokswa Browser

Ghokswa Browser

Posted: November 18, 2015

Threat Metric

Ranking: 87
Threat Level: 1/10
Infected PCs: 1,166,989
First Seen: November 18, 2015
Last Seen: March 10, 2025
OS(es) Affected: Windows


The Ghokswa Browser is a recompiled version of Chrome sometimes associated with shortcut hijackings and unwanted installations. Since these habits tend to be signs of unwanted products that may monitor your information or launch additional advertisements, malware experts have classified the Ghokswa Browser as being a Potentially Unwanted Program (PUP) until further information is available. Most PC users should use their anti-malware and anti-adware software for deleting a Ghokswa Browser, which has a well-documented history of reinstalling itself when removed by standard methods.

The 'Other' Chrome You Didn't Know About

The Chrome's popularity as a 'safe' Web browser has made it one of the prime targets for adware and other extensions dedicated to loading unwanted or even threatening Web content ironically. However, some developers of Potentially Unwanted Programs go even further than that, and may replace your Chrome browser in its entirety. This trend is one that malware analysts have seen in previous products, such as the Crxbro Browser, and now are seeing in the Ghokswa Browser.

While the Ghokswa Browser does have a dedicated website, either its developers or even third parties have been distributing this browser through alternative means, such as bundled downloads, mislabeled e-mail attachments or browser exploits. As of the last two months of 2015, most PC users report of experiencing the Ghokswa Browser installing itself automatically. The Ghokswa Browser does display an entry in the Windows 'installed programs' list, although efforts at removing the Ghokswa Browser through traditional means merely result in its reinstalling itself.

In addition to reinstalling itself, the Ghokswa Browser also may hijack your default Chrome shortcuts and file associations (such as what browser launches when you double-click an HTML file). Other discrepancies you may notice include additional advertising content being served by the Ghokswa Browser, extended loading times, redirects to unwanted websites or extra usage of your system resources. Malware analysts have not yet identified any confirmed, threatening behavior from the Ghokswa Browser, although a minority of PC security companies have gone so far as to label its site as toxic.

Restoring a Chrome Browser to Its Original Shine

Despite its being a rebuild of Chrome, the Ghokswa Browser's poor business practices and notably installation changes force malware analysts to recommend deleting this program, much as they already have recommended for the Crxbro Browser. Once you've verified that the Ghokswa Browser is on your PC, restart into Safe Mode and launch system scans with appropriate security products while keeping all browsers closed. You also may need to reinstall the original version of Chrome to restore your shortcuts. While doing so, be sure to avoid reinstalling the Ghokswa Browser unintentionally, due to interacting with a 'hijacked' file link.

Techniques like the ones seen in the Ghokswa Browser may serve advertisements, much like an invasive form of adware. However, some con artists also may use them for collecting information. If you've transferred passwords, account names, or other, sensitive information through a Ghokswa Browser, that information may be used against you. After cleaning up the Ghokswa Browser, you should change all passwords as needed and contact related institutions, such as your bank, when it's appropriate.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



c:\programdata\microsoft\software\shadow\provider.dll File name: provider.dll
Size: 122.88 KB (122880 bytes)
MD5: 444c6621caed712fafa7fa0afc8c5be7
Detection count: 1,223
File type: Dynamic link library
Mime Type: unknown/dll
Path: c:\programdata\microsoft\software\shadow\provider.dll
Group: Malware file
Last Updated: February 14, 2024
%ALLUSERSPROFILE%\microsoft onenote\updates\versioncheck\chk.dll File name: chk.dll
Size: 105.47 KB (105472 bytes)
MD5: 9260fcee39be90620e1f202590c40f97
Detection count: 400
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\microsoft onenote\updates\versioncheck\chk.dll
Group: Malware file
Last Updated: July 21, 2022
c:\programdata\microsoft\appv\sym\dbg.dll File name: dbg.dll
Size: 109.05 KB (109056 bytes)
MD5: 51fdc4d5a3f458e10123cbadbf77f4bf
Detection count: 241
File type: Dynamic link library
Mime Type: unknown/dll
Path: c:\programdata\microsoft\appv\sym\dbg.dll
Group: Malware file
Last Updated: April 10, 2022
c:\programdata\microsoft\app-v\client\appv.dll File name: appv.dll
Size: 105.98 KB (105984 bytes)
MD5: 79d096f16e7538c2df69f61403b06da8
Detection count: 241
File type: Dynamic link library
Mime Type: unknown/dll
Path: c:\programdata\microsoft\app-v\client\appv.dll
Group: Malware file
Last Updated: May 23, 2022
C:\Program Files\Firefox\bin\trzBAD6.tmp File name: trzBAD6.tmp
Size: 98.45 KB (98456 bytes)
MD5: 4c1c3aaafacc78ee820ca5e98ecf43e4
Detection count: 225
File type: Temporary File
Mime Type: unknown/tmp
Path: C:\Program Files\Firefox\bin\trzBAD6.tmp
Group: Malware file
Last Updated: March 4, 2022
C:\ProgramData\Package Cache\{00C5024D-925C-4E9E-A8E6-F9B84ABE0DA0}\packages\Win81_SDK\9bcb3fab78e80d68be28892ea7ad46c3.msp.dll File name: 9bcb3fab78e80d68be28892ea7ad46c3.msp.dll
Size: 105.47 KB (105472 bytes)
MD5: 77cd97afc91d1e31bd8e2023fab25b90
Detection count: 129
File type: Dynamic link library
Mime Type: unknown/dll
Path: C:\ProgramData\Package Cache\{00C5024D-925C-4E9E-A8E6-F9B84ABE0DA0}\packages\Win81_SDK\9bcb3fab78e80d68be28892ea7ad46c3.msp.dll
Group: Malware file
Last Updated: December 20, 2021
%ALLUSERSPROFILE%\Microsoft OneNote\Updates\Version\Check\chkver.dll File name: chkver.dll
Size: 105.47 KB (105472 bytes)
MD5: f31cccc81416f9cbcf6b78fec1d0a3e9
Detection count: 117
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Microsoft OneNote\Updates\Version\Check
Group: Malware file
Last Updated: February 1, 2020
%ALLUSERSPROFILE%\Package Cache\{1FBCBC17-4527-2340-0832-B1D49C41FF67}v10.0.26624\packages\Font\10240\4e29234340aaf3a96ec480c1aad8d179.cab:ad File name: 4e29234340aaf3a96ec480c1aad8d179.cab:ad
Size: 107 KB (107008 bytes)
MD5: 51fe179e199b04bb3e82558fd5a9183b
Detection count: 77
Mime Type: unknown/cab:ad
Path: %ALLUSERSPROFILE%\Package Cache\{1FBCBC17-4527-2340-0832-B1D49C41FF67}v10.0.26624\packages\Font\10240
Group: Malware file
Last Updated: August 22, 2020
%ALLUSERSPROFILE%\Package Cache\{00C5024D-925C-4E9E-A8E6-F9B84ABE0DA0}\packages\Win81_SDK\9bcb3fab78e80d68be28892ea7ad46c3.msp:dp File name: 9bcb3fab78e80d68be28892ea7ad46c3.msp:dp
Size: 106.49 KB (106496 bytes)
MD5: 8181dc651a89923800a109c9629d957f
Detection count: 74
Mime Type: unknown/msp:dp
Path: %ALLUSERSPROFILE%\Package Cache\{00C5024D-925C-4E9E-A8E6-F9B84ABE0DA0}\packages\Win81_SDK
Group: Malware file
Last Updated: June 2, 2017
%ALLUSERSPROFILE%\Microsoft\Phone Tools\CoreCon\12.0\addons\SDKFilesVer.dll File name: SDKFilesVer.dll
Size: 325.99 KB (325997 bytes)
MD5: 2311c387be305e70dc6103bb623c3f4d
Detection count: 72
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Microsoft\Phone Tools\CoreCon\12.0\addons
Group: Malware file
Last Updated: June 27, 2017
%ALLUSERSPROFILE%\Microsoft\IdentityCRL\production\ppcrlconfig617.dll File name: ppcrlconfig617.dll
Size: 117.76 KB (117760 bytes)
MD5: 12699c22a6cd88a31b9cb670c29ceb2b
Detection count: 54
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Microsoft\IdentityCRL\production
Group: Malware file
Last Updated: December 18, 2019
%ALLUSERSPROFILE%\Microsoft\Apps\common\helper.dll File name: helper.dll
Size: 105.98 KB (105984 bytes)
MD5: 733ccd349c8d6a86ff6bd0a65a82b901
Detection count: 42
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Microsoft\Apps\common
Group: Malware file
Last Updated: March 24, 2021
%ALLUSERSPROFILE%\Microsoft\AppV\Setup\Integrator.dll File name: Integrator.dll
Size: 105.98 KB (105984 bytes)
MD5: a4030f19a6672564adb9f6e90222f7c9
Detection count: 42
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Microsoft\AppV\Setup
Group: Malware file
Last Updated: December 6, 2020
%ALLUSERSPROFILE%\Microsoft\Windows\system\appidsvr.dll File name: appidsvr.dll
Size: 103.93 KB (103936 bytes)
MD5: 66edd44eb8353805b4ed081f4aab0e2e
Detection count: 40
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Microsoft\Windows\system
Group: Malware file
Last Updated: April 4, 2020
C:\ProgramData\Microsoft\Office\OneNote\Appinfo.dll File name: Appinfo.dll
Size: 120.83 KB (120832 bytes)
MD5: 7f07d0a50a65f6d24297f5c4428ffaef
Detection count: 33
File type: Dynamic link library
Mime Type: unknown/dll
Path: C:\ProgramData\Microsoft\Office\OneNote\Appinfo.dll
Group: Malware file
Last Updated: February 27, 2023
%ALLUSERSPROFILE%\Package Cache\{59399776-575D-9C54-E861-0D5EAB7E707D}v10.1.14393.795\Installers\IIS\iisexp.dll File name: iisexp.dll
Size: 105.47 KB (105472 bytes)
MD5: f3922eb8251356a2e2913718f5c69925
Detection count: 14
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Package Cache\{59399776-575D-9C54-E861-0D5EAB7E707D}v10.1.14393.795\Installers\IIS
Group: Malware file
Last Updated: April 24, 2020
%ALLUSERSPROFILE%\Microsoft\Office\PackageLocker.dll File name: PackageLocker.dll
Size: 119.8 KB (119808 bytes)
MD5: 73e165be0fe990382bae26b8c71a4a04
Detection count: 9
File type: Dynamic link library
Mime Type: unknown/dll
Path: %ALLUSERSPROFILE%\Microsoft\Office
Group: Malware file
Last Updated: June 27, 2020
%PROGRAMFILES(x86)%\IIS\Microsoft Web Deploy V3\te\msdeploy.resources.dll File name: msdeploy.resources.dll
Size: 105.98 KB (105984 bytes)
MD5: ae88db5467abeb4d91c511c5e468c25d
Detection count: 9
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES(x86)%\IIS\Microsoft Web Deploy V3\te
Group: Malware file
Last Updated: October 8, 2018
%PROGRAMFILES(x86)%\Microsoft Office\Updates\Detection\Version\Descriptor.dll File name: Descriptor.dll
Size: 101.37 KB (101376 bytes)
MD5: 4b36b6e7d0699dd1e3fc0142a63b04d0
Detection count: 5
File type: Dynamic link library
Mime Type: unknown/dll
Path: %PROGRAMFILES(x86)%\Microsoft Office\Updates\Detection\Version
Group: Malware file
Last Updated: July 23, 2022
%ALLUSERSPROFILE%\Package Cache\{E01CB7F1-3E88-4450-1764-B3CC1E205C4A}v10.1.14393.795\Installers\30daf459e79c5d26366654b1b482e87.cab:dp File name: 30daf459e79c5d26366654b1b482e87.cab:dp
Size: 102.91 KB (102912 bytes)
MD5: 11552c35ea61525d8ba2102eeec1ae38
Detection count: 5
Mime Type: unknown/cab:dp
Path: %ALLUSERSPROFILE%\Package Cache\{E01CB7F1-3E88-4450-1764-B3CC1E205C4A}v10.1.14393.795\Installers
Group: Malware file
Last Updated: June 2, 2017

More files

Registry Modifications

The following newly produced Registry Values are:

Regexp file mask%ALLUSERSPROFILE%\Apple\Common\Cloud\WinHelper.dll%ALLUSERSPROFILE%\Apple\Temp\upgrade.ini:ad%ALLUSERSPROFILE%\common\Apple\Apps\AzureTools.dll%ALLUSERSPROFILE%\Microsoft OneDrive\setup\SyncTool.dll%ALLUSERSPROFILE%\Microsoft OneNote\Updates\Version\Check\chkver.dll%ALLUSERSPROFILE%\Microsoft OneNote\Updates\VersionCheck\chk.dll%ALLUSERSPROFILE%\Microsoft\App-V\Client\AppV.dll%ALLUSERSPROFILE%\Microsoft\Apps\common\helper.dll%ALLUSERSPROFILE%\Microsoft\AppV\setup\install.dll%ALLUSERSPROFILE%\Microsoft\AppV\Setup\Integrator.dll%ALLUSERSPROFILE%\Microsoft\AppV\sym\dbg.dll%ALLUSERSPROFILE%\Microsoft\IdentityCRL\production\ppcrlconfig617.dll%ALLUSERSPROFILE%\Microsoft\Office\OneNote\Appinfo.dll%ALLUSERSPROFILE%\Microsoft\Office\PackageLocker.dll%ALLUSERSPROFILE%\Microsoft\OneDrive\Uploader.dll%ALLUSERSPROFILE%\Microsoft\Phone Tools\CoreCon\12.0\addons\SDKFilesVer.dll%ALLUSERSPROFILE%\Microsoft\Software\Shadow\Provider.dll%ALLUSERSPROFILE%\Microsoft\Windows\GameExplorer\Resources.dll%ALLUSERSPROFILE%\Microsoft\Windows\system\appidsvr.dll%ALLUSERSPROFILE%\Package Cache\{2A002F88-FD5D-379B-A350-A25D84AF128B}v14.0.25420\packages\VisualC_D14\VC_IDE.Base\VC_IDE_Base.dll%ALLUSERSPROFILE%\PreEmptive Solutions\Common\LAC\sos\1.1.4322__2.3.0.2.dll%ALLUSERSPROFILE%\Software\Apple\Apps\Notification.dll%ALLUSERSPROFILE%\Sun\Java\extension.dll%ALLUSERSPROFILE%\Windows\App\Kit\ApplicationVerifier.dll%APPDATA%\go00001.bak%PROGRAMFILES%\Explorer\iedvutils.exe%PROGRAMFILES(x86)%\Explorer\iedvutils.exe%PROGRAMFILES(x86)%\IIS\Microsoft Web Deploy V3\te\msdeploy.resources.dll%PROGRAMFILES(x86)%\Microsoft Office\Updates\Detection\Version\Descriptor.dll%WINDIR%\System32\Tasks\BookfatUpdateTaskMachineCore%WINDIR%\System32\Tasks\BookfatUpdateTaskMachineUA%WINDIR%\System32\Tasks\ceQeekgBrowserUpdateCore%WINDIR%\System32\Tasks\ceQeekgBrowserUpdateUA%WINDIR%\System32\Tasks\ceQeekgCheckTask%WINDIR%\System32\Tasks\FootblueUpdateTaskMachineCore%WINDIR%\System32\Tasks\FootblueUpdateTaskMachineUA%WINDIR%\System32\Tasks\milimili%WINDIR%\System32\Tasks\MonoldBrowserUpdateUA%WINDIR%\System32\Tasks\MonoldCheckTask%WINDIR%\System32\Tasks\OutboatUpdateTaskMachineCore%WINDIR%\System32\Tasks\OutboatUpdateTaskMachineUA%WINDIR%\System32\Tasks\ZootonyUpdateTaskMachineCore%WINDIR%\System32\Tasks\ZootonyUpdateTaskMachineUAHKEY..\..\..\..{RegistryKeys}SOFTWARE\ApplemySOFTWARE\BaglookSOFTWARE\BagSarahSOFTWARE\BangcarSOFTWARE\BangtonySOFTWARE\BedkissSOFTWARE\DohatSOFTWARE\EastnessSOFTWARE\EvernessSOFTWARE\FootjaneSOFTWARE\GotoeSoftware\HipmySOFTWARE\HippigSOFTWARE\HotleafSOFTWARE\LegassSOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\milimiliSOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MonoldBrowserUpdateCoreSOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\MonoldBrowserUpdateUASOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\apple_configSOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost\AppsSvcSoftware\Microsoft\Windows\CurrentVersion\Run\background_faultSOFTWARE\PearhasSOFTWARE\SetleafSOFTWARE\Wow6432Node\ApplemySOFTWARE\Wow6432Node\BaglookSOFTWARE\WOW6432Node\BagSarahSOFTWARE\Wow6432Node\BangcarSOFTWARE\Wow6432Node\BangtonySOFTWARE\WOW6432Node\BedkissSOFTWARE\WOW6432Node\DohatSOFTWARE\WOW6432Node\EastnessSOFTWARE\WOW6432Node\EvernessSOFTWARE\WOW6432Node\FootjaneSOFTWARE\Wow6432Node\GotoeSOFTWARE\Wow6432Node\HipmySOFTWARE\Wow6432Node\HippigSOFTWARE\WOW6432Node\HotleafSOFTWARE\Wow6432Node\LegassSOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost\apple_configSOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Svchost\AppsSvcSOFTWARE\Wow6432Node\PearhasSOFTWARE\WOW6432Node\SetleafSYSTEM\ControlSet001\services\AlltieSUSYSTEM\ControlSet001\services\Apple_CfgSYSTEM\ControlSet001\Services\APPLE_svrSYSTEM\ControlSet001\services\AppleAzureSrvSYSTEM\ControlSet001\services\Apps_CfgSYSTEM\ControlSet001\services\eventlog\Application\iedvutilsSYSTEM\ControlSet001\Services\FootblueUSYSTEM\ControlSet001\services\FootperSUSYSTEM\ControlSet001\Services\MCSvcSYSTEM\ControlSet001\Services\MSCFG_SVRSYSTEM\ControlSet001\services\MVCSrvSYSTEM\ControlSet001\services\vreXjvX_protectSYSTEM\ControlSet001\services\vreXjvX_updateSYSTEM\ControlSet001\Services\WPDTSrvSYSTEM\ControlSet002\services\AlltieSUSYSTEM\ControlSet002\services\Apple_CfgSYSTEM\ControlSet002\Services\APPLE_svrSYSTEM\ControlSet002\services\AppleAzureSrvSYSTEM\ControlSet002\services\Apps_CfgSYSTEM\ControlSet002\services\eventlog\Application\iedvutilsSYSTEM\ControlSet002\Services\FootblueUSYSTEM\ControlSet002\services\FootperSUSYSTEM\ControlSet002\Services\MCSvcSYSTEM\ControlSet002\Services\MSCFG_SVRSYSTEM\ControlSet002\services\MVCSrvSYSTEM\ControlSet002\services\vreXjvX_protectSYSTEM\ControlSet002\services\vreXjvX_updateSYSTEM\ControlSet002\Services\WPDTSrvSYSTEM\CurrentControlSet\services\AlltieSUSYSTEM\CurrentControlSet\services\Apple_CfgSYSTEM\CurrentControlSet\Services\APPLE_svrSYSTEM\CurrentControlSet\services\AppleAzureSrvSYSTEM\CurrentControlSet\services\Apps_CfgSYSTEM\CurrentControlSet\services\eventlog\Application\iedvutilsSYSTEM\CurrentControlSet\Services\FootblueUSYSTEM\CurrentControlSet\services\FootperSUSYSTEM\CurrentControlSet\Services\MCSvcSYSTEM\CurrentControlSet\Services\MSCFG_SVRSYSTEM\CurrentControlSet\services\MVCSrvSYSTEM\CurrentControlSet\services\vreXjvX_protectSYSTEM\CurrentControlSet\services\vreXjvX_updateSYSTEM\CurrentControlSet\Services\WPDTSrv

Additional Information

The following directories were created:
%ALLUSERSPROFILE%\Application Data\Inbob%ALLUSERSPROFILE%\Bagbin%ALLUSERSPROFILE%\Banglamp%ALLUSERSPROFILE%\Birdeye%ALLUSERSPROFILE%\Birdmay%ALLUSERSPROFILE%\Bookfat%ALLUSERSPROFILE%\Bossseed%ALLUSERSPROFILE%\Eastmy%ALLUSERSPROFILE%\Eastness%ALLUSERSPROFILE%\Fishlose%ALLUSERSPROFILE%\Footblue%ALLUSERSPROFILE%\Gotoe%ALLUSERSPROFILE%\Hotdear%ALLUSERSPROFILE%\Hotmay%ALLUSERSPROFILE%\Inbob%ALLUSERSPROFILE%\Jamben%ALLUSERSPROFILE%\Jamjob%ALLUSERSPROFILE%\Junetoe%ALLUSERSPROFILE%\Newjob%ALLUSERSPROFILE%\Onfat%ALLUSERSPROFILE%\Setmike%ALLUSERSPROFILE%\Weness%ALLUSERSPROFILE%\Zootony%ALLUSERSPROFILE%\ceQeekg%ALLUSERSPROFILE%\redjane%ALLUSERSPROFILE%\seteat%APPDATA%\go00001%LOCALAPPDATA%\Allold%LOCALAPPDATA%\Alltoe%LOCALAPPDATA%\Antanna%LOCALAPPDATA%\Antper%LOCALAPPDATA%\Applefat%LOCALAPPDATA%\Applemy%LOCALAPPDATA%\Bagbin%LOCALAPPDATA%\Baghair%LOCALAPPDATA%\Baglook%LOCALAPPDATA%\Bagsarah%LOCALAPPDATA%\Ballcine%LOCALAPPDATA%\Ballduck%LOCALAPPDATA%\Bangcar%LOCALAPPDATA%\Banglamp%LOCALAPPDATA%\Bangone%LOCALAPPDATA%\Bangtony%LOCALAPPDATA%\Bedhat%LOCALAPPDATA%\Bedkiss%LOCALAPPDATA%\Bemike%LOCALAPPDATA%\Bepat%LOCALAPPDATA%\Bigflat%LOCALAPPDATA%\Bigold%LOCALAPPDATA%\Birdeye%LOCALAPPDATA%\Birdkiss%LOCALAPPDATA%\Birdmay%LOCALAPPDATA%\Birdsarah%LOCALAPPDATA%\Bookfat%LOCALAPPDATA%\Bossface%LOCALAPPDATA%\Bossseed%LOCALAPPDATA%\Bossship%LOCALAPPDATA%\Boxbob%LOCALAPPDATA%\Boxfat%LOCALAPPDATA%\Cansuck%LOCALAPPDATA%\Coldmay%LOCALAPPDATA%\Coldold%LOCALAPPDATA%\Coldone%LOCALAPPDATA%\Cupblue%LOCALAPPDATA%\Cupface%LOCALAPPDATA%\Cuppat%LOCALAPPDATA%\Daydoor%LOCALAPPDATA%\Docine%LOCALAPPDATA%\Doeye%LOCALAPPDATA%\Dohat%LOCALAPPDATA%\Doold%LOCALAPPDATA%\Eastmy%LOCALAPPDATA%\Eastness%LOCALAPPDATA%\Eggness%LOCALAPPDATA%\Evercine%LOCALAPPDATA%\Everness%LOCALAPPDATA%\Fishjane%LOCALAPPDATA%\Fishlamp%LOCALAPPDATA%\Fishlose%LOCALAPPDATA%\Footblue%LOCALAPPDATA%\Footeat%LOCALAPPDATA%\Footjane%LOCALAPPDATA%\Footlook%LOCALAPPDATA%\Footper%LOCALAPPDATA%\Gofat%LOCALAPPDATA%\Goldass%LOCALAPPDATA%\Gotoe%LOCALAPPDATA%\Gunone%LOCALAPPDATA%\Gunship%LOCALAPPDATA%\Hipbear%LOCALAPPDATA%\Hipeat%LOCALAPPDATA%\Hipfat%LOCALAPPDATA%\Hipmy%LOCALAPPDATA%\Hippig%LOCALAPPDATA%\Hisarah%LOCALAPPDATA%\Hotdear%LOCALAPPDATA%\Hothair%LOCALAPPDATA%\Hotjob%LOCALAPPDATA%\Hotleaf%LOCALAPPDATA%\Hotmay%LOCALAPPDATA%\Inbob%LOCALAPPDATA%\Infun%LOCALAPPDATA%\Inper%LOCALAPPDATA%\Jamben%LOCALAPPDATA%\Jamjob%LOCALAPPDATA%\Jamlarry%LOCALAPPDATA%\Jamsarah%LOCALAPPDATA%\Jarhair%LOCALAPPDATA%\Jarness%LOCALAPPDATA%\Junedoor%LOCALAPPDATA%\Junetoe%LOCALAPPDATA%\Lefttoe%LOCALAPPDATA%\Legness%LOCALAPPDATA%\Legpat%LOCALAPPDATA%\Mapbob%LOCALAPPDATA%\Mapcar%LOCALAPPDATA%\Moncar%LOCALAPPDATA%\Monold%LOCALAPPDATA%\Newjob%LOCALAPPDATA%\Nobean%LOCALAPPDATA%\Nolarry%LOCALAPPDATA%\Nosekiss%LOCALAPPDATA%\Nosemay%LOCALAPPDATA%\Onfat%LOCALAPPDATA%\Ontoe%LOCALAPPDATA%\Outbob%LOCALAPPDATA%\Outfire%LOCALAPPDATA%\Outlose%LOCALAPPDATA%\Pearhas%LOCALAPPDATA%\Seablue%LOCALAPPDATA%\Seaness%LOCALAPPDATA%\Setleaf%LOCALAPPDATA%\Setmike%LOCALAPPDATA%\Shutness%LOCALAPPDATA%\Stancine%LOCALAPPDATA%\Standoor%LOCALAPPDATA%\Standuck%LOCALAPPDATA%\Stanper%LOCALAPPDATA%\Tooleat%LOCALAPPDATA%\Toolhair%LOCALAPPDATA%\Toolrain%LOCALAPPDATA%\Tooltony%LOCALAPPDATA%\Wefat%LOCALAPPDATA%\Weness%LOCALAPPDATA%\Yeahfire%LOCALAPPDATA%\Yeahseed%LOCALAPPDATA%\Yeahship%LOCALAPPDATA%\Yesdear%LOCALAPPDATA%\Yeshat%LOCALAPPDATA%\Yestony%LOCALAPPDATA%\Zooarm%LOCALAPPDATA%\Zooface%LOCALAPPDATA%\Zootony%LOCALAPPDATA%\background_fault%LOCALAPPDATA%\birdjob%LOCALAPPDATA%\ceQeekg%LOCALAPPDATA%\fishhas%LOCALAPPDATA%\hotcine%LOCALAPPDATA%\legass%LOCALAPPDATA%\redjane%LOCALAPPDATA%\seteat%LOCALAPPDATA%\vreXjvX%PROGRAMFILES%\Alltoe%PROGRAMFILES%\Antanna%PROGRAMFILES%\Antper%PROGRAMFILES%\Applefat%PROGRAMFILES%\Applemy%PROGRAMFILES%\Bagbin%PROGRAMFILES%\Baghair%PROGRAMFILES%\Baglook%PROGRAMFILES%\Bagsarah%PROGRAMFILES%\Ballcine%PROGRAMFILES%\Ballduck%PROGRAMFILES%\Bangcar%PROGRAMFILES%\Banglamp%PROGRAMFILES%\Bangtony%PROGRAMFILES%\Bedhat%PROGRAMFILES%\Bedkiss%PROGRAMFILES%\Bemike%PROGRAMFILES%\Bepat%PROGRAMFILES%\Bigflat%PROGRAMFILES%\Bigold%PROGRAMFILES%\Birdeye%PROGRAMFILES%\Birdmay%PROGRAMFILES%\Bookfat%PROGRAMFILES%\Bossface%PROGRAMFILES%\Bossseed%PROGRAMFILES%\Bossship%PROGRAMFILES%\Boxbob%PROGRAMFILES%\Boxfat%PROGRAMFILES%\Cansuck%PROGRAMFILES%\Coldmay%PROGRAMFILES%\Coldold%PROGRAMFILES%\Coldone%PROGRAMFILES%\Cupface%PROGRAMFILES%\Cuppat%PROGRAMFILES%\Doeye%PROGRAMFILES%\Dohat%PROGRAMFILES%\Eastmy%PROGRAMFILES%\Eastness%PROGRAMFILES%\Eggness%PROGRAMFILES%\Evercine%PROGRAMFILES%\Everness%PROGRAMFILES%\Fishjane%PROGRAMFILES%\Fishlose%PROGRAMFILES%\Footblue%PROGRAMFILES%\Footeat%PROGRAMFILES%\Footjane%PROGRAMFILES%\Footlook%PROGRAMFILES%\Footper%PROGRAMFILES%\Gofat%PROGRAMFILES%\Goldass%PROGRAMFILES%\Gotoe%PROGRAMFILES%\Gunone%PROGRAMFILES%\Hipeat%PROGRAMFILES%\Hipmy%PROGRAMFILES%\Hippig%PROGRAMFILES%\Hotdear%PROGRAMFILES%\Hothair%PROGRAMFILES%\Hotjob%PROGRAMFILES%\Hotleaf%PROGRAMFILES%\Hotmay%PROGRAMFILES%\Inbob%PROGRAMFILES%\Infun%PROGRAMFILES%\Inper%PROGRAMFILES%\Jamben%PROGRAMFILES%\Jamjob%PROGRAMFILES%\Jamlarry%PROGRAMFILES%\Jarhair%PROGRAMFILES%\Jarness%PROGRAMFILES%\Junetoe%PROGRAMFILES%\Legness%PROGRAMFILES%\Lerfopervather Host%PROGRAMFILES%\MIO\loader%PROGRAMFILES%\Mapbob%PROGRAMFILES%\Moncar%PROGRAMFILES%\Newjob%PROGRAMFILES%\Nolarry%PROGRAMFILES%\Nosekiss%PROGRAMFILES%\Onfat%PROGRAMFILES%\Ontoe%PROGRAMFILES%\Outbob%PROGRAMFILES%\Pearhas%PROGRAMFILES%\Setleaf%PROGRAMFILES%\Setmike%PROGRAMFILES%\Shutness%PROGRAMFILES%\Stancine%PROGRAMFILES%\Standoor%PROGRAMFILES%\Standuck%PROGRAMFILES%\Stanper%PROGRAMFILES%\Tooleat%PROGRAMFILES%\Toolhair%PROGRAMFILES%\Tooltony%PROGRAMFILES%\Weness%PROGRAMFILES%\Yeahfire%PROGRAMFILES%\Yeahseed%PROGRAMFILES%\Yeahship%PROGRAMFILES%\Yeshat%PROGRAMFILES%\Zooarm%PROGRAMFILES%\Zootony%PROGRAMFILES%\birdjob%PROGRAMFILES%\fishhas%PROGRAMFILES%\hotcine%PROGRAMFILES%\legass%PROGRAMFILES%\redjane%PROGRAMFILES%\seteat%PROGRAMFILES(x86)%\Alltoe%PROGRAMFILES(x86)%\Antanna%PROGRAMFILES(x86)%\Antper%PROGRAMFILES(x86)%\Applefat%PROGRAMFILES(x86)%\Applemy%PROGRAMFILES(x86)%\Bagbin%PROGRAMFILES(x86)%\Baghair%PROGRAMFILES(x86)%\Baglook%PROGRAMFILES(x86)%\Bagsarah%PROGRAMFILES(x86)%\Ballcine%PROGRAMFILES(x86)%\Ballduck%PROGRAMFILES(x86)%\Bangcar%PROGRAMFILES(x86)%\Banglamp%PROGRAMFILES(x86)%\Bangtony%PROGRAMFILES(x86)%\Bedhat%PROGRAMFILES(x86)%\Bedkiss%PROGRAMFILES(x86)%\Bemike%PROGRAMFILES(x86)%\Bepat%PROGRAMFILES(x86)%\Bigflat%PROGRAMFILES(x86)%\Bigold%PROGRAMFILES(x86)%\Birdeye%PROGRAMFILES(x86)%\Birdmay%PROGRAMFILES(x86)%\Bookfat%PROGRAMFILES(x86)%\Bossface%PROGRAMFILES(x86)%\Bossseed%PROGRAMFILES(x86)%\Bossship%PROGRAMFILES(x86)%\Boxbob%PROGRAMFILES(x86)%\Boxfat%PROGRAMFILES(x86)%\Cansuck%PROGRAMFILES(x86)%\Coldmay%PROGRAMFILES(x86)%\Coldold%PROGRAMFILES(x86)%\Coldone%PROGRAMFILES(x86)%\Cupface%PROGRAMFILES(x86)%\Cuppat%PROGRAMFILES(x86)%\Daydoor%PROGRAMFILES(x86)%\Doeye%PROGRAMFILES(x86)%\Dohat%PROGRAMFILES(x86)%\Eastmy%PROGRAMFILES(x86)%\Eastness%PROGRAMFILES(x86)%\Eggness%PROGRAMFILES(x86)%\Evercine%PROGRAMFILES(x86)%\Everness%PROGRAMFILES(x86)%\Fishjane%PROGRAMFILES(x86)%\Fishlose%PROGRAMFILES(x86)%\Footblue%PROGRAMFILES(x86)%\Footeat%PROGRAMFILES(x86)%\Footjane%PROGRAMFILES(x86)%\Footlook%PROGRAMFILES(x86)%\Footper%PROGRAMFILES(x86)%\Gofat%PROGRAMFILES(x86)%\Goldass%PROGRAMFILES(x86)%\Gotoe%PROGRAMFILES(x86)%\Gunone%PROGRAMFILES(x86)%\Hipeat%PROGRAMFILES(x86)%\Hipmy%PROGRAMFILES(x86)%\Hippig%PROGRAMFILES(x86)%\Hotdear%PROGRAMFILES(x86)%\Hothair%PROGRAMFILES(x86)%\Hotjob%PROGRAMFILES(x86)%\Hotleaf%PROGRAMFILES(x86)%\Hotmay%PROGRAMFILES(x86)%\Inbob%PROGRAMFILES(x86)%\Infun%PROGRAMFILES(x86)%\Inper%PROGRAMFILES(x86)%\Jamben%PROGRAMFILES(x86)%\Jamjob%PROGRAMFILES(x86)%\Jamlarry%PROGRAMFILES(x86)%\Jarhair%PROGRAMFILES(x86)%\Jarness%PROGRAMFILES(x86)%\Junetoe%PROGRAMFILES(x86)%\Legness%PROGRAMFILES(x86)%\Lerfopervather Host%PROGRAMFILES(x86)%\MIO\loader%PROGRAMFILES(x86)%\Mapbob%PROGRAMFILES(x86)%\Moncar%PROGRAMFILES(x86)%\Newjob%PROGRAMFILES(x86)%\Nolarry%PROGRAMFILES(x86)%\Nosekiss%PROGRAMFILES(x86)%\Onfat%PROGRAMFILES(x86)%\Ontoe%PROGRAMFILES(x86)%\Outbob%PROGRAMFILES(x86)%\Pearhas%PROGRAMFILES(x86)%\Setleaf%PROGRAMFILES(x86)%\Setmike%PROGRAMFILES(x86)%\Shutness%PROGRAMFILES(x86)%\Stancine%PROGRAMFILES(x86)%\Standoor%PROGRAMFILES(x86)%\Standuck%PROGRAMFILES(x86)%\Stanper%PROGRAMFILES(x86)%\Tooleat%PROGRAMFILES(x86)%\Toolhair%PROGRAMFILES(x86)%\Tooltony%PROGRAMFILES(x86)%\Weness%PROGRAMFILES(x86)%\Yeahfire%PROGRAMFILES(x86)%\Yeahseed%PROGRAMFILES(x86)%\Yeahship%PROGRAMFILES(x86)%\Yeshat%PROGRAMFILES(x86)%\Zooarm%PROGRAMFILES(x86)%\Zootony%PROGRAMFILES(x86)%\birdjob%PROGRAMFILES(x86)%\fishhas%PROGRAMFILES(x86)%\hotcine%PROGRAMFILES(x86)%\legass%PROGRAMFILES(x86)%\redjane%PROGRAMFILES(x86)%\seteat%UserProfile%\Local Settings\Application Data\Weness%UserProfile%\Local Settings\Application Data\Yestony
Loading...