Professional Documents
Culture Documents
PFRO
PFRO
\C:\Users\subashe\AppData\Local\Temp\_iu14D2
N.tmp, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Users\subashe\AppData\Local\Temp\~nsu.t
mp\Au_.exe, |delete operation|, 0xc000003a
12/19/2015 22:11:35 - PFRO Error: \??\C:\Users\subashe\AppData\Local\Temp\~nsu.t
mp, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - PFRO Error: \??\C:\Program Files (x86)\K7 Computing\K7TSec
urity\AVDefs\K7AVSign.Old, |delete operation|, 0xc0000034
12/19/2015 22:11:35 - 40 Successful PFRO operations
1/1/2016 17:24:24 - PFRO
ity\AVDefs\K7AVSign.Old,
1/1/2016 17:24:24 - PFRO
ity\AVDefs\K7AVSign.Old,
1/1/2016 17:24:24 - PFRO
ity\AVDefs\K7AVSign.Old,
1/1/2016 17:24:24 - PFRO
ity\AVDefs\K7AVSign.Old,
1/1/2016 17:24:24 - PFRO
ity\AVDefs\K7AVSign.Old,
1/1/2016 17:24:24 - PFRO
ity\AVDefs\K7AVSign.Old,
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur
Computing\K7TSecur